36 CFR 262.10 - Impoundment and disposal of unauthorized livestock.
Code of Federal Regulations, 2010 CFR
2010-07-01
... unauthorized livestock. 262.10 Section 262.10 Parks, Forests, and Public Property FOREST SERVICE, DEPARTMENT OF... unauthorized livestock. Unauthorized livestock or livestock in excess of those authorized by a grazing permit... officer determines that such livestock use is occurring, has definite knowledge of the kind of livestock...
25 CFR 168.16 - Impoundment and disposal of unauthorized livestock.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Intent to Impound unauthorized livestock is first published in the local newspaper, posted at the nearest chapter house, and in one or more local trading posts. (c) Unauthorized livestock on the Hopi... unauthorized livestock in areas for which a notice has been posted and published under paragraph (b) of this...
25 CFR 168.16 - Impoundment and disposal of unauthorized livestock.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of Intent to Impound unauthorized livestock is first published in the local newspaper, posted at the nearest chapter house, and in one or more local trading posts. (c) Unauthorized livestock on the Hopi... unauthorized livestock in areas for which a notice has been posted and published under paragraph (b) of this...
25 CFR 700.727 - Impoundment and disposal of unauthorized livestock.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of Intent to Impound Unauthorized Livestock is first published in a local newspaper, posted at the nearest chapter house, and in one or more local trading posts. (c) Unauthorized livestock on the New Lands... livestock in areas for which notice has been posted and published under paragraph (b) of this section, will...
25 CFR 700.727 - Impoundment and disposal of unauthorized livestock.
Code of Federal Regulations, 2010 CFR
2010-04-01
... of Intent to Impound Unauthorized Livestock is first published in a local newspaper, posted at the nearest chapter house, and in one or more local trading posts. (c) Unauthorized livestock on the New Lands... livestock in areas for which notice has been posted and published under paragraph (b) of this section, will...
25 CFR 166.807 - When will we impound unauthorized livestock or other property?
Code of Federal Regulations, 2014 CFR
2014-04-01
... WATER GRAZING PERMITS Trespass Actions § 166.807 When will we impound unauthorized livestock or other... other property refuses to accept delivery of a written notice of trespass and the unauthorized livestock... after five days of providing notice of impoundment if you failed to correct the trespass. ...
25 CFR 166.807 - When will we impound unauthorized livestock or other property?
Code of Federal Regulations, 2011 CFR
2011-04-01
... WATER GRAZING PERMITS Trespass Actions § 166.807 When will we impound unauthorized livestock or other... other property refuses to accept delivery of a written notice of trespass and the unauthorized livestock... after five days of providing notice of impoundment if you failed to correct the trespass. ...
25 CFR 166.807 - When will we impound unauthorized livestock or other property?
Code of Federal Regulations, 2010 CFR
2010-04-01
... WATER GRAZING PERMITS Trespass Actions § 166.807 When will we impound unauthorized livestock or other... other property refuses to accept delivery of a written notice of trespass and the unauthorized livestock... after five days of providing notice of impoundment if you failed to correct the trespass. ...
25 CFR 166.807 - When will we impound unauthorized livestock or other property?
Code of Federal Regulations, 2013 CFR
2013-04-01
... WATER GRAZING PERMITS Trespass Actions § 166.807 When will we impound unauthorized livestock or other... other property refuses to accept delivery of a written notice of trespass and the unauthorized livestock... after five days of providing notice of impoundment if you failed to correct the trespass. ...
25 CFR 166.807 - When will we impound unauthorized livestock or other property?
Code of Federal Regulations, 2012 CFR
2012-04-01
... WATER GRAZING PERMITS Trespass Actions § 166.807 When will we impound unauthorized livestock or other... other property refuses to accept delivery of a written notice of trespass and the unauthorized livestock... after five days of providing notice of impoundment if you failed to correct the trespass. ...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 2 2010-07-01 2010-07-01 false Livestock. 261.7 Section 261... Prohibitions § 261.7 Livestock. The following are prohibited: (a) Placing or allowing unauthorized livestock to... unauthorized livestock from the National Forest System or other lands under Forest Service control when...
25 CFR 161.707 - When will BIA impound unauthorized livestock or other property?
Code of Federal Regulations, 2013 CFR
2013-04-01
... WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.707 When will BIA impound... livestock or other property refuses to accept delivery of a written notice of trespass and the unauthorized... after 5 days of providing notice of impoundment if the trespasser failed to correct the trespass. ...
25 CFR 161.707 - When will BIA impound unauthorized livestock or other property?
Code of Federal Regulations, 2010 CFR
2010-04-01
... WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.707 When will BIA impound... livestock or other property refuses to accept delivery of a written notice of trespass and the unauthorized... after 5 days of providing notice of impoundment if the trespasser failed to correct the trespass. ...
25 CFR 161.707 - When will BIA impound unauthorized livestock or other property?
Code of Federal Regulations, 2014 CFR
2014-04-01
... WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.707 When will BIA impound... livestock or other property refuses to accept delivery of a written notice of trespass and the unauthorized... after 5 days of providing notice of impoundment if the trespasser failed to correct the trespass. ...
25 CFR 161.707 - When will BIA impound unauthorized livestock or other property?
Code of Federal Regulations, 2012 CFR
2012-04-01
... WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.707 When will BIA impound... livestock or other property refuses to accept delivery of a written notice of trespass and the unauthorized... after 5 days of providing notice of impoundment if the trespasser failed to correct the trespass. ...
25 CFR 161.707 - When will BIA impound unauthorized livestock or other property?
Code of Federal Regulations, 2011 CFR
2011-04-01
... WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.707 When will BIA impound... livestock or other property refuses to accept delivery of a written notice of trespass and the unauthorized... after 5 days of providing notice of impoundment if the trespasser failed to correct the trespass. ...
Code of Federal Regulations, 2010 CFR
2010-04-01
..., DEPARTMENT OF THE INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.808 How are trespassers notified if their unauthorized livestock or other property are to be impounded? (a) If the trespass is not corrected in the time specified in the initial trespass notice, we will send written notice of our intent to...
Code of Federal Regulations, 2013 CFR
2013-04-01
..., DEPARTMENT OF THE INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.808 How are trespassers notified if their unauthorized livestock or other property are to be impounded? (a) If the trespass is not corrected in the time specified in the initial trespass notice, we will send written notice of our intent to...
Code of Federal Regulations, 2012 CFR
2012-04-01
..., DEPARTMENT OF THE INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.808 How are trespassers notified if their unauthorized livestock or other property are to be impounded? (a) If the trespass is not corrected in the time specified in the initial trespass notice, we will send written notice of our intent to...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., DEPARTMENT OF THE INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.808 How are trespassers notified if their unauthorized livestock or other property are to be impounded? (a) If the trespass is not corrected in the time specified in the initial trespass notice, we will send written notice of our intent to...
Code of Federal Regulations, 2014 CFR
2014-04-01
..., DEPARTMENT OF THE INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.808 How are trespassers notified if their unauthorized livestock or other property are to be impounded? (a) If the trespass is not corrected in the time specified in the initial trespass notice, we will send written notice of our intent to...
25 CFR 166.809 - What happens after my unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2011 CFR
2011-04-01
... INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.809 What happens after my unauthorized... agricultural lands where the trespass is occurring. The public notice will include a description of the...
25 CFR 166.809 - What happens after my unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2013 CFR
2013-04-01
... INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.809 What happens after my unauthorized... agricultural lands where the trespass is occurring. The public notice will include a description of the...
25 CFR 166.809 - What happens after my unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2012 CFR
2012-04-01
... INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.809 What happens after my unauthorized... agricultural lands where the trespass is occurring. The public notice will include a description of the...
25 CFR 166.809 - What happens after my unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2010 CFR
2010-04-01
... INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.809 What happens after my unauthorized... agricultural lands where the trespass is occurring. The public notice will include a description of the...
25 CFR 166.809 - What happens after my unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2014 CFR
2014-04-01
... INTERIOR LAND AND WATER GRAZING PERMITS Trespass Actions § 166.809 What happens after my unauthorized... agricultural lands where the trespass is occurring. The public notice will include a description of the...
25 CFR 161.709 - What happens after unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2013 CFR
2013-04-01
... INTERIOR LAND AND WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.709 What happens... Indian agricultural lands where the trespass is occurring. The public notice will include a description...
25 CFR 161.709 - What happens after unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2011 CFR
2011-04-01
... INTERIOR LAND AND WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.709 What happens... Indian agricultural lands where the trespass is occurring. The public notice will include a description...
25 CFR 161.709 - What happens after unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2014 CFR
2014-04-01
... INTERIOR LAND AND WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.709 What happens... Indian agricultural lands where the trespass is occurring. The public notice will include a description...
25 CFR 161.709 - What happens after unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2012 CFR
2012-04-01
... INTERIOR LAND AND WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.709 What happens... Indian agricultural lands where the trespass is occurring. The public notice will include a description...
25 CFR 161.709 - What happens after unauthorized livestock or other property are impounded?
Code of Federal Regulations, 2010 CFR
2010-04-01
... INTERIOR LAND AND WATER NAVAJO PARTITIONED LANDS GRAZING PERMITS Trespass Actions § 161.709 What happens... Indian agricultural lands where the trespass is occurring. The public notice will include a description...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR RANGE MANAGEMENT (4000) PROTECTION, MANAGEMENT, AND CONTROL OF WILD FREE-ROAMING HORSES AND BURROS Management...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR RANGE MANAGEMENT (4000) PROTECTION, MANAGEMENT, AND CONTROL OF WILD FREE-ROAMING HORSES AND BURROS Management...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR RANGE MANAGEMENT (4000) PROTECTION, MANAGEMENT, AND CONTROL OF WILD FREE-ROAMING HORSES AND BURROS Management...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR RANGE MANAGEMENT (4000) PROTECTION, MANAGEMENT, AND CONTROL OF WILD FREE-ROAMING HORSES AND BURROS Management...
Code of Federal Regulations, 2013 CFR
2013-01-01
... as conditions warrant. (2) Detect and delay any unauthorized attempt to gain access or introduce... of § 73.20(a). (3) Detect attempts to gain unauthorized access or introduce unauthorized materials... system shall: (1) Detect attempts to gain unauthorized entry or introduce unauthorized materials into...
Code of Federal Regulations, 2010 CFR
2010-01-01
... as conditions warrant. (2) Detect and delay any unauthorized attempt to gain access or introduce... of § 73.20(a). (3) Detect attempts to gain unauthorized access or introduce unauthorized materials... system shall: (1) Detect attempts to gain unauthorized entry or introduce unauthorized materials into...
Code of Federal Regulations, 2014 CFR
2014-01-01
... as conditions warrant. (2) Detect and delay any unauthorized attempt to gain access or introduce... of § 73.20(a). (3) Detect attempts to gain unauthorized access or introduce unauthorized materials... system shall: (1) Detect attempts to gain unauthorized entry or introduce unauthorized materials into...
Unauthorized Immigrants Prolong the Life of Medicare's Trust Fund.
Zallman, Leah; Wilson, Fernando A; Stimpson, James P; Bearse, Adriana; Arsenault, Lisa; Dube, Blessing; Himmelstein, David; Woolhandler, Steffie
2016-01-01
Unauthorized immigrants seldom have access to public health insurance programs such as Medicare Part A, which pays hospitals and other health facilities and is funded through the Medicare Trust Fund. We tabulated annual and total Trust Fund contributions and withdrawals by unauthorized immigrants (i.e., outlays on their behalf) from 2000 to 2011 using the Current Population Survey and Medical Expenditure Panel Surveys. We estimated when the Trust Fund would be depleted if unauthorized immigrants had neither contributed to it nor withdrawn from it. We estimated Trust Fund surpluses by unauthorized immigrants if 10 % were to become authorized annually over the subsequent 7 years. From 2000 to 2011, unauthorized immigrants contributed $2.2 to $3.8 billion more than they withdrew annually (a total surplus of $35.1 billion). Had unauthorized immigrants neither contributed to nor withdrawn from the Trust Fund during those 11 years, it would become insolvent in 2029-1 year earlier than currently predicted. If 10 % of unauthorized immigrants became authorized annually for the subsequent 7 years, Trust Fund surpluses contributed by unauthorized immigrants would total $45.7 billion. Unauthorized immigrants have prolonged the life of the Medicare Trust Fund. Policies that curtail the influx of unauthorized immigrants may accelerate the Trust Fund's depletion.
Profiling unauthorized natural resource users for better targeting of conservation interventions
Baker, Julia; Twinamatsiko, Medard; Milner‐Gulland, E.J.
2015-01-01
Abstract Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management‐relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be managed transparently and equitably. PMID:26238261
Profiling unauthorized natural resource users for better targeting of conservation interventions.
Harrison, Mariel; Baker, Julia; Twinamatsiko, Medard; Milner-Gulland, E J
2015-12-01
Unauthorized use of natural resources is a key threat to many protected areas. Approaches to reducing this threat include law enforcement and integrated conservation and development (ICD) projects, but for such ICDs to be targeted effectively, it is important to understand who is illegally using which natural resources and why. The nature of unauthorized behavior makes it difficult to ascertain this information through direct questioning. Bwindi Impenetrable National Park, Uganda, has many ICD projects, including authorizing some local people to use certain nontimber forest resources from the park. However, despite over 25 years of ICD, unauthorized resource use continues. We used household surveys, indirect questioning (unmatched count technique), and focus group discussions to generate profiles of authorized and unauthorized resource users and to explore motivations for unauthorized activity. Overall, unauthorized resource use was most common among people from poor households who lived closest to the park boundary and farthest from roads and trading centers. Other motivations for unauthorized resource use included crop raiding by wild animals, inequity of revenue sharing, and lack of employment, factors that created resentment among the poorest communities. In some communities, benefits obtained from ICD were reported to be the greatest deterrents against unauthorized activity, although law enforcement ranked highest overall. Despite the sensitive nature of exploring unauthorized resource use, management-relevant insights into the profiles and motivations of unauthorized resource users can be gained from a combination of survey techniques, as adopted here. To reduce unauthorized activity at Bwindi, we suggest ICD benefit the poorest people living in remote areas and near the park boundary by providing affordable alternative sources of forest products and addressing crop raiding. To prevent resentment from driving further unauthorized activity, ICDs should be managed transparently and equitably. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.
10 CFR 1048.3 - Unauthorized entry.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized entry. 1048.3 Section 1048.3 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.3 Unauthorized entry. Unauthorized entry into or upon an SPR facility or real property...
10 CFR 1048.3 - Unauthorized entry.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Unauthorized entry. 1048.3 Section 1048.3 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.3 Unauthorized entry. Unauthorized entry into or upon an SPR facility or real property...
10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Unauthorized introduction of weapons or dangerous materials. 160.4 Section 160.4 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying...
10 CFR 1048.3 - Unauthorized entry.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Unauthorized entry. 1048.3 Section 1048.3 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.3 Unauthorized entry. Unauthorized entry into or upon an SPR facility or real property...
10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Unauthorized introduction of weapons or dangerous materials. 160.4 Section 160.4 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying...
10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Unauthorized introduction of weapons or dangerous materials. 160.4 Section 160.4 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying...
10 CFR 1048.3 - Unauthorized entry.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Unauthorized entry. 1048.3 Section 1048.3 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.3 Unauthorized entry. Unauthorized entry into or upon an SPR facility or real property...
10 CFR 1048.3 - Unauthorized entry.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Unauthorized entry. 1048.3 Section 1048.3 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.3 Unauthorized entry. Unauthorized entry into or upon an SPR facility or real property...
10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous materials. 160.4 Section 160.4 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying...
10 CFR 160.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Unauthorized introduction of weapons or dangerous materials. 160.4 Section 160.4 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying...
43 CFR 3601.71 - What constitutes unauthorized use?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false What constitutes unauthorized use? 3601.71 Section 3601.71 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND... Materials Disposal; General Provisions Unauthorized Use § 3601.71 What constitutes unauthorized use? (a...
43 CFR 3601.71 - What constitutes unauthorized use?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false What constitutes unauthorized use? 3601.71 Section 3601.71 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND... Materials Disposal; General Provisions Unauthorized Use § 3601.71 What constitutes unauthorized use? (a...
10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Unauthorized introduction of weapons or dangerous materials. 860.4 Section 860.4 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting...
10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Unauthorized introduction of weapons or dangerous materials. 860.4 Section 860.4 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting...
10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Unauthorized introduction of weapons or dangerous materials. 860.4 Section 860.4 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting...
10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Unauthorized introduction of weapons or dangerous materials. 860.4 Section 860.4 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting...
10 CFR 860.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous materials. 860.4 Section 860.4 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.4 Unauthorized introduction of weapons or dangerous materials. Unauthorized carrying, transporting...
7 CFR 1951.707 - Determination of the amount of unauthorized assistance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY... Business Programs. § 1951.707 Determination of the amount of unauthorized assistance. (a) Unauthorized loan... unauthorized principal at the note interest rate until the date paid unless otherwise agreed in writing by...
10 CFR 1002.31 - Unauthorized uses of the seal and flag.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized uses of the seal and flag. 1002.31 Section 1002.31 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) OFFICIAL SEAL AND DISTINGUISHING FLAG Unauthorized Uses § 1002.31 Unauthorized uses of the seal and flag. The official seal and distinguishing flag...
10 CFR 1002.31 - Unauthorized uses of the seal and flag.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Unauthorized uses of the seal and flag. 1002.31 Section 1002.31 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) OFFICIAL SEAL AND DISTINGUISHING FLAG Unauthorized Uses § 1002.31 Unauthorized uses of the seal and flag. The official seal and distinguishing flag...
32 CFR 776.57 - Unauthorized practice of law.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Unauthorized practice of law. 776.57 Section 776... Rules of Professional Conduct § 776.57 Unauthorized practice of law. (a) Unauthorized practice of law. A... law in a jurisdiction where doing so is prohibited by the regulations of the legal profession in that...
32 CFR 776.57 - Unauthorized practice of law.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Unauthorized practice of law. 776.57 Section 776... Rules of Professional Conduct § 776.57 Unauthorized practice of law. (a) Unauthorized practice of law. A... law in a jurisdiction where doing so is prohibited by the regulations of the legal profession in that...
37 CFR 1.939 - Unauthorized papers in inter partes reexamination.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Unauthorized papers in inter... Unauthorized papers in inter partes reexamination. (a) If an unauthorized paper is filed by any party at any...) Unless otherwise authorized, no paper shall be filed prior to the initial Office action on the merits of...
43 CFR 4150.4-3 - Notice of public sale.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Notice of public sale. 4150.4-3 Section... Unauthorized Grazing Use § 4150.4-3 Notice of public sale. Following the impoundment of livestock under this... agents, or both, shall be notified in writing by certified mail or by personal delivery of the sale and...
43 CFR 4150.4-3 - Notice of public sale.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Notice of public sale. 4150.4-3 Section... Unauthorized Grazing Use § 4150.4-3 Notice of public sale. Following the impoundment of livestock under this... agents, or both, shall be notified in writing by certified mail or by personal delivery of the sale and...
43 CFR 4150.4-3 - Notice of public sale.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Notice of public sale. 4150.4-3 Section... Unauthorized Grazing Use § 4150.4-3 Notice of public sale. Following the impoundment of livestock under this... agents, or both, shall be notified in writing by certified mail or by personal delivery of the sale and...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2014 CFR
2014-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2012 CFR
2012-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2013 CFR
2013-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
7 CFR 4288.135 - Unauthorized payments and offsets.
Code of Federal Regulations, 2014 CFR
2014-01-01
...-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE PAYMENT PROGRAMS Advanced Biofuel... unauthorized assistance has been made to an advanced biofuel producer under this Program, the Agency reserves... the producer. Upon determination that unauthorized assistance has been made to an advanced biofuel...
14 CFR 221.5 - Unauthorized air transportation.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications shall not contain fares or charges, or their governing provisions, applicable to foreign air...
14 CFR 221.5 - Unauthorized air transportation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications shall not contain fares or charges, or their governing provisions, applicable to foreign air...
14 CFR 221.5 - Unauthorized air transportation.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications shall not contain fares or charges, or their governing provisions, applicable to foreign air...
14 CFR 221.5 - Unauthorized air transportation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications shall not contain fares or charges, or their governing provisions, applicable to foreign air...
14 CFR 221.5 - Unauthorized air transportation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Unauthorized air transportation. 221.5... PROCEEDINGS) ECONOMIC REGULATIONS TARIFFS General § 221.5 Unauthorized air transportation. Tariff publications... Department's granting authority to perform the foreign air transportation covered by such tariff publications...
7 CFR 766.252 - Unauthorized assistance resulting from submission of false information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... false information. 766.252 Section 766.252 Agriculture Regulations of the Department of Agriculture... Unauthorized Assistance § 766.252 Unauthorized assistance resulting from submission of false information. A... behalf, submits information to the Agency that the borrower knows to be false. ...
How Do Tougher Immigration Measures Affect Unauthorized Immigrants?
Amuedo-Dorantes, Catalina; Puttitanun, Thitima; Martinez-Donate, Ana P.
2013-01-01
The recent impetus of tougher immigration-related measures passed at the state level raises concerns about the impact of such measures on the migration experience, trajectory, and future plans of unauthorized immigrants. In a recent and unique survey of Mexican unauthorized immigrants interviewed upon their voluntary return or deportation to Mexico, almost a third reported experiencing difficulties in obtaining social or government services, finding legal assistance, or obtaining health care services. Additionally, half of these unauthorized immigrants reported fearing deportation. When we assess how the enactment of punitive measures against unauthorized immigrants, such as E-Verify mandates, has affected their migration experience, we find no evidence of a statistically significant association between these measures and the difficulties reported by unauthorized immigrants in accessing a variety of services. However, the enactment of these mandates infuses deportation fear, reduces interstate mobility among voluntary returnees during their last migration spell, and helps curb deportees’ intent to return to the United States in the near future. PMID:23532619
How do tougher immigration measures affect unauthorized immigrants?
Amuedo-Dorantes, Catalina; Puttitanun, Thitima; Martinez-Donate, Ana P
2013-06-01
The recent impetus of tougher immigration-related measures passed at the state level raises concerns about the impact of such measures on the migration experience, trajectory, and future plans of unauthorized immigrants. In a recent and unique survey of Mexican unauthorized immigrants interviewed upon their voluntary return or deportation to Mexico, almost a third reported experiencing difficulties in obtaining social or government services, finding legal assistance, or obtaining health care services. Additionally, half of these unauthorized immigrants reported fearing deportation. When we assess how the enactment of punitive measures against unauthorized immigrants, such as E-Verify mandates, has affected their migration experience, we find no evidence of a statistically significant association between these measures and the difficulties reported by unauthorized immigrants in accessing a variety of services. However, the enactment of these mandates infuses deportation fear, reduces interstate mobility among voluntary returnees during their last migration spell, and helps curb deportees' intent to return to the United States in the near future.
46 CFR 350.6 - Unauthorized sale, manufacture, possession or display.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 8 2010-10-01 2010-10-01 false Unauthorized sale, manufacture, possession or display... SEAMEN'S SERVICE AWARDS § 350.6 Unauthorized sale, manufacture, possession or display. The sale, manufacture, possession or display of any Merchant Marine decoration, or colorable imitations thereof, by...
32 CFR 732.15 - Unauthorized care.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Unauthorized care. 732.15 Section 732.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NONNAVAL MEDICAL AND DENTAL CARE Medical and Dental Care From Nonnaval Sources § 732.15 Unauthorized care. The following are...
32 CFR 732.15 - Unauthorized care.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 5 2014-07-01 2014-07-01 false Unauthorized care. 732.15 Section 732.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NONNAVAL MEDICAL AND DENTAL CARE Medical and Dental Care From Nonnaval Sources § 732.15 Unauthorized care. The following are...
32 CFR 732.15 - Unauthorized care.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 5 2012-07-01 2012-07-01 false Unauthorized care. 732.15 Section 732.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NONNAVAL MEDICAL AND DENTAL CARE Medical and Dental Care From Nonnaval Sources § 732.15 Unauthorized care. The following are...
32 CFR 732.15 - Unauthorized care.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Unauthorized care. 732.15 Section 732.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NONNAVAL MEDICAL AND DENTAL CARE Medical and Dental Care From Nonnaval Sources § 732.15 Unauthorized care. The following are...
32 CFR 732.15 - Unauthorized care.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 5 2013-07-01 2013-07-01 false Unauthorized care. 732.15 Section 732.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NONNAVAL MEDICAL AND DENTAL CARE Medical and Dental Care From Nonnaval Sources § 732.15 Unauthorized care. The following are...
32 CFR 855.14 - Unauthorized landings.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Unauthorized landings. 855.14 Section 855.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Civil Aircraft Landing Permits § 855.14 Unauthorized landings...
32 CFR 766.12 - Unauthorized landings.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 5 2011-07-01 2011-07-01 false Unauthorized landings. 766.12 Section 766.12 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY MISCELLANEOUS RULES USE OF DEPARTMENT OF THE NAVY AVIATION FACILITIES BY CIVIL AIRCRAFT § 766.12 Unauthorized landings. An aircraft that...
12 CFR 1005.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2012 CFR
2012-01-01
... transfers. 1005.6 Section 1005.6 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION ELECTRONIC FUND TRANSFERS (REGULATION E) § 1005.6 Liability of consumer for unauthorized transfers. (a) Conditions for..., for an unauthorized electronic fund transfer involving the consumer's account only if the financial...
12 CFR 1005.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2014 CFR
2014-01-01
... transfers. 1005.6 Section 1005.6 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION ELECTRONIC FUND TRANSFERS (REGULATION E) General § 1005.6 Liability of consumer for unauthorized transfers. (a) Conditions... this section, for an unauthorized electronic fund transfer involving the consumer's account only if the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-14
... for Unauthorized Access to Customer Information and Customer Notice AGENCY: Office of Thrift...: Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice... physical safeguards to: (1) Ensure the security and confidentiality of customer records and information; (2...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-10
... for Unauthorized Access to Customer Information and Customer Notice AGENCY: Office of Thrift... for Unauthorized Access to Customer Information and Customer Notice. OMB Number: 1550-0110. Form...) Ensure the security and confidentiality of customer records and information; (2) protect against any...
14 CFR 61.37 - Knowledge tests: Cheating or other unauthorized conduct.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 2 2011-01-01 2011-01-01 false Knowledge tests: Cheating or other unauthorized conduct. 61.37 Section 61.37 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....37 Knowledge tests: Cheating or other unauthorized conduct. (a) An applicant for a knowledge test may...
14 CFR 61.37 - Knowledge tests: Cheating or other unauthorized conduct.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Knowledge tests: Cheating or other unauthorized conduct. 61.37 Section 61.37 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....37 Knowledge tests: Cheating or other unauthorized conduct. (a) An applicant for a knowledge test may...
32 CFR 766.12 - Unauthorized landings.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 5 2010-07-01 2010-07-01 false Unauthorized landings. 766.12 Section 766.12... DEPARTMENT OF THE NAVY AVIATION FACILITIES BY CIVIL AIRCRAFT § 766.12 Unauthorized landings. An aircraft that... authority, except in a bona fide emergency, is in violation of this part. Civil aircraft landing in...
37 CFR 11.505 - Unauthorized practice of law.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 37 Patents, Trademarks, and Copyrights 1 2014-07-01 2014-07-01 false Unauthorized practice of law... Rules of Professional Conduct Law Firms and Associations § 11.505 Unauthorized practice of law. A practitioner shall not practice law in a jurisdiction in violation of the regulation of the legal profession in...
10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Unauthorized introduction of weapons or dangerous materials. 1048.4 Section 1048.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous...
10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Unauthorized introduction of weapons or dangerous materials. 1048.4 Section 1048.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous...
10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Unauthorized introduction of weapons or dangerous materials. 1048.4 Section 1048.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous...
10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Unauthorized introduction of weapons or dangerous materials. 1048.4 Section 1048.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous...
10 CFR 1048.4 - Unauthorized introduction of weapons or dangerous materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Unauthorized introduction of weapons or dangerous materials. 1048.4 Section 1048.4 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.4 Unauthorized introduction of weapons or dangerous...
The Educational Rights of Unauthorized Immigrant Students
ERIC Educational Resources Information Center
Russo, Charles J.
2012-01-01
A 2007 report from the Congressional Budget Office (CBO 2007) estimated that 12 million "unauthorized immigrants" lived in the United States, defining the term "unauthorized immigrants" as "foreign citizens residing in the United States illegally." Without providing exact numbers, in his 2011 State of the Union address, President Obama addressed…
13 CFR 314.4 - Unauthorized Use of Property.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Unauthorized Use of Property. 314.4 Section 314.4 Business Credit and Assistance ECONOMIC DEVELOPMENT ADMINISTRATION, DEPARTMENT OF COMMERCE PROPERTY General § 314.4 Unauthorized Use of Property. (a) Except as provided in §§ 314.3...
32 CFR 643.15 - Unauthorized use.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 4 2010-07-01 2010-07-01 true Unauthorized use. 643.15 Section 643.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) REAL PROPERTY REAL ESTATE General § 643.15 Unauthorized use. Whenever it is observed that real estate under the control of the DA is...
12 CFR 1005.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2013 CFR
2013-01-01
... transfers. 1005.6 Section 1005.6 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION ELECTRONIC FUND TRANSFERS (REGULATION E) General § 1005.6 Liability of consumer for unauthorized transfers. (a) Conditions... this section, for an unauthorized electronic fund transfer involving the consumer's account only if the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... weapons, explosives, or other dangerous materials. § 1204.1005 Section § 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... description of the consequences for unauthorized introduction of firearms or weapons, explosives, or other...
25 CFR 304.1 - Penalties for imitation or unauthorized use.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 2 2010-04-01 2010-04-01 false Penalties for imitation or unauthorized use. 304.1 Section 304.1 Indians INDIAN ARTS AND CRAFTS BOARD, DEPARTMENT OF THE INTERIOR NAVAJO, PUEBLO, AND HOPI SILVER, USE OF GOVERNMENT MARK § 304.1 Penalties for imitation or unauthorized use. The use of Government...
Code of Federal Regulations, 2013 CFR
2013-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
Code of Federal Regulations, 2014 CFR
2014-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
Code of Federal Regulations, 2012 CFR
2012-01-01
... authenticate and permit access only to authorized individuals and controls to prevent employees from providing member information to unauthorized individuals who may seek to obtain this information through fraudulent... unauthorized individuals have gained access to member information systems, including appropriate reports to...
25 CFR 11.419 - Unauthorized use of automobiles and other vehicles.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Unauthorized use of automobiles and other vehicles. 11... OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.419 Unauthorized use of automobiles and other vehicles. A person commits a misdemeanor if he or she operates another person's automobile...
25 CFR 11.419 - Unauthorized use of automobiles and other vehicles.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Unauthorized use of automobiles and other vehicles. 11... OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.419 Unauthorized use of automobiles and other vehicles. A person commits a misdemeanor if he or she operates another person's automobile...
25 CFR 11.419 - Unauthorized use of automobiles and other vehicles.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of automobiles and other vehicles. 11... OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.419 Unauthorized use of automobiles and other vehicles. A person commits a misdemeanor if he or she operates another person's automobile...
25 CFR 11.419 - Unauthorized use of automobiles and other vehicles.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Unauthorized use of automobiles and other vehicles. 11... OF INDIAN OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.419 Unauthorized use of automobiles and other vehicles. A person commits a misdemeanor if he or she operates another person's automobile...
25 CFR 11.419 - Unauthorized use of automobiles and other vehicles.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Unauthorized use of automobiles and other vehicles. 11.419... OFFENSES AND LAW AND ORDER CODE Criminal Offenses § 11.419 Unauthorized use of automobiles and other vehicles. A person commits a misdemeanor if he or she operates another person's automobile, airplane...
14 CFR 1204.1407 - Procedure in the event of an unauthorized use.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Procedure in the event of an unauthorized use. 1204.1407 Section 1204.1407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... the Federal Government § 1204.1407 Procedure in the event of an unauthorized use. Any aircraft not...
14 CFR 1204.1407 - Procedure in the event of an unauthorized use.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Procedure in the event of an unauthorized use. 1204.1407 Section 1204.1407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... the Federal Government § 1204.1407 Procedure in the event of an unauthorized use. Any aircraft not...
14 CFR 1204.1407 - Procedure in the event of an unauthorized use.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Procedure in the event of an unauthorized use. 1204.1407 Section 1204.1407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... the Federal Government § 1204.1407 Procedure in the event of an unauthorized use. Any aircraft not...
14 CFR 1204.1407 - Procedure in the event of an unauthorized use.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Procedure in the event of an unauthorized use. 1204.1407 Section 1204.1407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... the Federal Government § 1204.1407 Procedure in the event of an unauthorized use. Any aircraft not...
25 CFR 11.422 - Unauthorized use of credit cards.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...
25 CFR 11.422 - Unauthorized use of credit cards.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...
25 CFR 11.422 - Unauthorized use of credit cards.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...
25 CFR 11.422 - Unauthorized use of credit cards.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...
25 CFR 11.422 - Unauthorized use of credit cards.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...
Code of Federal Regulations, 2010 CFR
2010-07-01
... reimbursement affected if I make an unauthorized cash purchase of common carrier transportation? 301-51.102... transportation reimbursement affected if I make an unauthorized cash purchase of common carrier transportation... cost of the transportation. In all other instances, your reimbursement will be limited to the cost of...
9 CFR 592.330 - Unauthorized use or disposition of approved labels.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 9 Animals and Animal Products 2 2012-01-01 2012-01-01 false Unauthorized use or disposition of approved labels. 592.330 Section 592.330 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION VOLUNTARY INSPECTION OF EGG PRODUCTS Identifying and Marking Products § 592.330 Unauthorized use...
9 CFR 592.330 - Unauthorized use or disposition of approved labels.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Unauthorized use or disposition of approved labels. 592.330 Section 592.330 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION VOLUNTARY INSPECTION OF EGG PRODUCTS Identifying and Marking Products § 592.330 Unauthorized use...
9 CFR 592.330 - Unauthorized use or disposition of approved labels.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 9 Animals and Animal Products 2 2013-01-01 2013-01-01 false Unauthorized use or disposition of approved labels. 592.330 Section 592.330 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION VOLUNTARY INSPECTION OF EGG PRODUCTS Identifying and Marking Products § 592.330 Unauthorized use...
9 CFR 592.330 - Unauthorized use or disposition of approved labels.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 2 2014-01-01 2014-01-01 false Unauthorized use or disposition of approved labels. 592.330 Section 592.330 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION VOLUNTARY INSPECTION OF EGG PRODUCTS Identifying and Marking Products § 592.330 Unauthorized use...
Protecting unauthorized immigrant mothers improves their children’s mental health
Hainmueller, Jens; Lawrence, Duncan; Martén, Linna; Black, Bernard; Figueroa, Lucila; Hotard, Michael; Jiménez, Tomás R.; Mendoza, Fernando; Rodriguez, Maria I.; Swartz, Jonas J.; Laitin, David D.
2018-01-01
The United States is embroiled in a debate about whether to protect or deport its estimated 11 million unauthorized immigrants, but the fact that these immigrants are also parents to more than 4 million U.S.-born children is often overlooked. We provide causal evidence of the impact of parents’ unauthorized immigration status on the health of their U.S. citizen children. The Deferred Action for Childhood Arrivals (DACA) program granted temporary protection from deportation to more than 780,000 unauthorized immigrants. We used Medicaid claims data from Oregon and exploited the quasi-random assignment of DACA eligibility among mothers with birthdates close to the DACA age qualification cutoff. Mothers’ DACA eligibility significantly decreased adjustment and anxiety disorder diagnoses among their children. Parents’ unauthorized status is thus a substantial barrier to normal child development and perpetuates health inequalities through the intergenerational transmission of disadvantage. PMID:28860206
ERIC Educational Resources Information Center
Villarraga-Orjuela, Alexander; Kerr, Brinck
2017-01-01
This research examines the effects of state laws banning access to in-state resident tuition for unauthorized immigrant students in the United States. These laws were implemented between 2005 and 2012. We evaluate the policy effects on (a) college enrollment, (b) school dropout rates of unauthorized immigrants, and (c) the enrollment of U.S.…
Code of Federal Regulations, 2012 CFR
2012-07-01
... unauthorized use of a rental automobile obtained with Government funds? 301-10.453 Section 301-10.453 Public... ALLOWABLE TRAVEL EXPENSES 10-TRANSPORTATION EXPENSES Special Conveyances Rental Automobiles § 301-10.453 What is my liability for unauthorized use of a rental automobile obtained with Government funds? You...
Code of Federal Regulations, 2010 CFR
2010-07-01
... unauthorized use of a rental automobile obtained with Government funds? 301-10.453 Section 301-10.453 Public... ALLOWABLE TRAVEL EXPENSES 10-TRANSPORTATION EXPENSES Special Conveyances Rental Automobiles § 301-10.453 What is my liability for unauthorized use of a rental automobile obtained with Government funds? You...
Code of Federal Regulations, 2011 CFR
2011-07-01
... unauthorized use of a rental automobile obtained with Government funds? 301-10.453 Section 301-10.453 Public... ALLOWABLE TRAVEL EXPENSES 10-TRANSPORTATION EXPENSES Special Conveyances Rental Automobiles § 301-10.453 What is my liability for unauthorized use of a rental automobile obtained with Government funds? You...
Code of Federal Regulations, 2013 CFR
2013-07-01
... unauthorized use of a rental automobile obtained with Government funds? 301-10.453 Section 301-10.453 Public... ALLOWABLE TRAVEL EXPENSES 10-TRANSPORTATION EXPENSES Special Conveyances Rental Automobiles § 301-10.453 What is my liability for unauthorized use of a rental automobile obtained with Government funds? You...
Code of Federal Regulations, 2014 CFR
2014-07-01
... unauthorized use of a rental automobile obtained with Government funds? 301-10.453 Section 301-10.453 Public... ALLOWABLE TRAVEL EXPENSES 10-TRANSPORTATION EXPENSES Special Conveyances Rental Automobiles § 301-10.453 What is my liability for unauthorized use of a rental automobile obtained with Government funds? You...
14 CFR § 1204.1407 - Procedure in the event of an unauthorized use.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Procedure in the event of an unauthorized use. § 1204.1407 Section § 1204.1407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... the Benefit of the Federal Government § 1204.1407 Procedure in the event of an unauthorized use. Any...
Unauthorized Appropriations and Expiring Authorizations
2015-01-15
other purposes P.L. 109-338 John H. Chafee Blackstone River Valley National Heritage Corridor Reauthorization Act of 2006 (sec. 702(f), 16 U.S.C. 461...Indefinite Unauthorized FY 2015 Appropriations: 1,120,235,000 Upper Klamath Basin Ecological Restoration projects (sec. 1024)* FY 2002 Appropriation... Ethics Authorization Act of 2001P.L. 107-119 Office of Government Ethics * FY 2006 Appropriation Authorized: Indefinite Unauthorized FY 2015 Appropriations
Protecting unauthorized immigrant mothers improves their children's mental health.
Hainmueller, Jens; Lawrence, Duncan; Martén, Linna; Black, Bernard; Figueroa, Lucila; Hotard, Michael; Jiménez, Tomás R; Mendoza, Fernando; Rodriguez, Maria I; Swartz, Jonas J; Laitin, David D
2017-09-08
The United States is embroiled in a debate about whether to protect or deport its estimated 11 million unauthorized immigrants, but the fact that these immigrants are also parents to more than 4 million U.S.-born children is often overlooked. We provide causal evidence of the impact of parents' unauthorized immigration status on the health of their U.S. citizen children. The Deferred Action for Childhood Arrivals (DACA) program granted temporary protection from deportation to more than 780,000 unauthorized immigrants. We used Medicaid claims data from Oregon and exploited the quasi-random assignment of DACA eligibility among mothers with birthdates close to the DACA age qualification cutoff. Mothers' DACA eligibility significantly decreased adjustment and anxiety disorder diagnoses among their children. Parents' unauthorized status is thus a substantial barrier to normal child development and perpetuates health inequalities through the intergenerational transmission of disadvantage. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.
NASA Astrophysics Data System (ADS)
Memon, Nasir D.; Wong, Ping W.
1999-04-01
Digital watermarks have recently been proposed for the purposes of copy protection and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer resells unauthorized copies of the watermarked content, then these copies can be traced to the unlawful reseller (original buyer) using a watermark detection algorithm. One problem with such an approach is that the original buyer whose watermark has been found on unauthorized copies can claim that the unauthorized copy was created or caused (for example, by a security breach) by the original seller. In this paper we propose an interactive buyer-seller protocol for invisible watermarking in which the seller does not get to know the exact watermarked copy that the buyer receives. Hence the seller cannot create copies of the original content containing the buyer's watermark. In cases where the seller finds an unauthorized copy, the seller can identify the buyer from a watermark in the unauthorized copy, and furthermore the seller can prove this fact to a third party using a dispute resolution protocol. This prevents the buyer from claiming that an unauthorized copy may have originated from the seller.
Perreira, Krista; Spees, Lisa
2015-01-01
Latino immigrant adolescents have the highest high school dropout rates of any race-ethnic or nativity group in the United States. One potential reason for high dropout rates among Latino immigrant youth is that many are unauthorized entrants. These unauthorized Latino immigrant youth have few opportunities to attend college, and, as they become aware of barriers to their educational progress and employment, they may lower their educational expectations. Using data from the Latino Adolescent Migration, Health, and Adaptation Project (N=275), we examine the association of unauthorized entry into the U.S. with the educational expectations of Latino immigrant youth. We find that adolescents entering the U.S. without authorization have lower educational expectations than those who enter with authorization. These differences in their expectations persist after controlling for differences in their pre-migration, migration, and post-migration experiences. Policies and programs that reduce barriers to higher education and labor market opportunities can potentially help to foster higher educational expectations among unauthorized immigrant youth and may promote their high school completion. PMID:26451064
Brouwer, Jelmer; van der Woude, Maartje; van der Leun, Joanne
2017-01-01
In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actually strongly decreased in the years before the proposal, and this coverage was moreover increasingly less negative. This study thus nuances the somewhat popular belief that unauthorized migrants are increasingly portrayed in negative ways and shows that the framing of migrants as criminals is a more diffuse process in which the media seem to follow rather than fuel politics and policy.
Brouwer, Jelmer; van der Woude, Maartje; van der Leun, Joanne
2017-01-01
In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actually strongly decreased in the years before the proposal, and this coverage was moreover increasingly less negative. This study thus nuances the somewhat popular belief that unauthorized migrants are increasingly portrayed in negative ways and shows that the framing of migrants as criminals is a more diffuse process in which the media seem to follow rather than fuel politics and policy. PMID:28596711
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of...
32 CFR 700.840 - Unauthorized persons on board.
Code of Federal Regulations, 2014 CFR
2014-07-01
... REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers Afloat § 700.840 Unauthorized persons on board. The commanding officer shall satisfy him...
32 CFR 700.840 - Unauthorized persons on board.
Code of Federal Regulations, 2010 CFR
2010-07-01
... REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers Afloat § 700.840 Unauthorized persons on board. The commanding officer shall satisfy him...
32 CFR 700.840 - Unauthorized persons on board.
Code of Federal Regulations, 2011 CFR
2011-07-01
... REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers Afloat § 700.840 Unauthorized persons on board. The commanding officer shall satisfy him...
32 CFR 700.840 - Unauthorized persons on board.
Code of Federal Regulations, 2012 CFR
2012-07-01
... REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers Afloat § 700.840 Unauthorized persons on board. The commanding officer shall satisfy him...
32 CFR 700.840 - Unauthorized persons on board.
Code of Federal Regulations, 2013 CFR
2013-07-01
... REGULATIONS AND OFFICIAL RECORDS UNITED STATES NAVY REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers Afloat § 700.840 Unauthorized persons on board. The commanding officer shall satisfy him...
32 CFR 855.14 - Unauthorized landings.
Code of Federal Regulations, 2012 CFR
2012-07-01
... equipment and tools, and so forth, to include, but not limited to: (A) Spreading foam on the runway. (B... increase reporting, processing, and staffing costs; therefore, the unauthorized landing fee for paragraph...
78 FR 14072 - Trestle Forest Health Project, Eldorado National Forest, El Dorado County, CA
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-04
... compaction, restore infiltration, and discourage unauthorized motor vehicle use. Approximately 70 existing..., restore infiltration, and discourage unauthorized motor vehicle use. Remove approximately 26 miles of...
36 CFR 264.13 - Unauthorized use.
Code of Federal Regulations, 2010 CFR
2010-07-01
... MANAGEMENT Mount St. Helens National Volcanic Monument Symbol § 264.13 Unauthorized use. Except as provided... St. Helens National Volcanic Monument may be subject to criminal penalty under 18 U.S.C. 701. ...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
Detection and response to unauthorized access to a communication device
Smith, Rhett; Gordon, Colin
2015-09-08
A communication gateway consistent with the present disclosure may detect unauthorized physical or electronic access and implement security actions in response thereto. A communication gateway may provide a communication path to an intelligent electronic device (IED) using an IED communications port configured to communicate with the IED. The communication gateway may include a physical intrusion detection port and a network port. The communication gateway may further include control logic configured to evaluate physical intrusion detection signal. The control logic may be configured to determine that the physical intrusion detection signal is indicative of an attempt to obtain unauthorized access to one of the communication gateway, the IED, and a device in communication with the gateway; and take a security action based upon the determination that the indication is indicative of the attempt to gain unauthorized access.
Can We Spin Straw Into Gold? An Evaluation of Immigrant Legal Status Imputation Approaches
Van Hook, Jennifer; Bachmeier, James D.; Coffman, Donna; Harel, Ofer
2014-01-01
Researchers have developed logical, demographic, and statistical strategies for imputing immigrants’ legal status, but these methods have never been empirically assessed. We used Monte Carlo simulations to test whether, and under what conditions, legal status imputation approaches yield unbiased estimates of the association of unauthorized status with health insurance coverage. We tested five methods under a range of missing data scenarios. Logical and demographic imputation methods yielded biased estimates across all missing data scenarios. Statistical imputation approaches yielded unbiased estimates only when unauthorized status was jointly observed with insurance coverage; when this condition was not met, these methods overestimated insurance coverage for unauthorized relative to legal immigrants. We next showed how bias can be reduced by incorporating prior information about unauthorized immigrants. Finally, we demonstrated the utility of the best-performing statistical method for increasing power. We used it to produce state/regional estimates of insurance coverage among unauthorized immigrants in the Current Population Survey, a data source that contains no direct measures of immigrants’ legal status. We conclude that commonly employed legal status imputation approaches are likely to produce biased estimates, but data and statistical methods exist that could substantially reduce these biases. PMID:25511332
42 CFR 480.108 - Penalties for unauthorized disclosure.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) General Provisions § 480.108 Penalties for unauthorized disclosure. A person who discloses information not...
42 CFR 480.108 - Penalties for unauthorized disclosure.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) General Provisions § 480.108 Penalties for unauthorized disclosure. A person who discloses information not...
42 CFR 480.108 - Penalties for unauthorized disclosure.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION INFORMATION Utilization and Quality Control Quality Improvement Organizations (QIOs) General Provisions § 480.108 Penalties for unauthorized disclosure. A person who discloses information not...
Unauthorized Mexican workers in the 1990 Los Angeles County labour force.
Marcelli, E A; Heer, D M
1997-01-01
"By analysing how unauthorized Mexicans compare with seven other ethno-racial groups in Los Angeles County, separately and collectively, by educational attainment and time spent in the U.S., we find that unauthorized Mexicans had relatively fewer years of formal education (either in the U.S. or in Mexico) and had been in the U.S. a relatively fewer number of years than in-migrants of other ethno-racial backgrounds in 1990. These findings are then used as proxies to compare the human capital endowments of different ethno-racial groups. We next estimate the number of unauthorized Mexicans by occupation, industry and class of worker, and compare these distributions with the total labour force and with the other ethno-racial groups in Los Angeles County.... Results show that amounts of human capital are positively related to the kinds of occupations filled." (SUMMARY IN FRE AND SPA) excerpt
Framing unauthorized immigrants: the effects of labels on evaluations.
Ommundsen, Reidar; Van der Veer, Kees; Larsen, Knud S; Eilertsen, Dag-Erik
2014-04-01
In the U.S. media, unauthorized immigrants are often interchangeably referred to as "illegal aliens," "illegal immigrants," and undocumented immigrants." In spite of formal equivalence, these terms carry different connotations, but the effects of these labels on people's attitudes toward immigrants are not well documented. In this replication study, 274 undergraduate students in psychology responded to one of three randomly distributed versions of a 20-item scale measuring attitudes toward unauthorized immigration. The items in the three scale versions varyingly referred to immigrants using the three terms. Results showed differences in attitudes toward unauthorized immigration between all experimental conditions. The label "illegal immigrants" yielded significantly less positive attitudes compared to the label "undocumented immigrants," and respondents exposed to the label "illegal aliens" showed the most positive attitudes. Furthermore, the effects of the experimental conditions were not moderated by the respondents' patriotism, sex, or own immigrant background.
Code of Federal Regulations, 2010 CFR
2010-10-01
... that information requires, in the interest of national security, protection against unauthorized... of protection, and the unauthorized disclosure of which could reasonably be expected to cause exceptionally grave damage to the national security that the original classification authority is able to...
21 CFR 1311.215 - Internal audit trail.
Code of Federal Regulations, 2011 CFR
2011-04-01
... ORDERS AND PRESCRIPTIONS Electronic Prescriptions § 1311.215 Internal audit trail. (a) The pharmacy... minimum, include the following: (1) Attempted unauthorized access to the pharmacy application, or successful unauthorized access to the pharmacy application where the determination of such is feasible. (2...
21 CFR 1311.215 - Internal audit trail.
Code of Federal Regulations, 2012 CFR
2012-04-01
... ORDERS AND PRESCRIPTIONS Electronic Prescriptions § 1311.215 Internal audit trail. (a) The pharmacy... minimum, include the following: (1) Attempted unauthorized access to the pharmacy application, or successful unauthorized access to the pharmacy application where the determination of such is feasible. (2...
21 CFR 1311.215 - Internal audit trail.
Code of Federal Regulations, 2014 CFR
2014-04-01
... ORDERS AND PRESCRIPTIONS Electronic Prescriptions § 1311.215 Internal audit trail. (a) The pharmacy... minimum, include the following: (1) Attempted unauthorized access to the pharmacy application, or successful unauthorized access to the pharmacy application where the determination of such is feasible. (2...
21 CFR 1311.215 - Internal audit trail.
Code of Federal Regulations, 2013 CFR
2013-04-01
... ORDERS AND PRESCRIPTIONS Electronic Prescriptions § 1311.215 Internal audit trail. (a) The pharmacy... minimum, include the following: (1) Attempted unauthorized access to the pharmacy application, or successful unauthorized access to the pharmacy application where the determination of such is feasible. (2...
32 CFR 2001.48 - Loss, possible compromise or unauthorized disclosure.
Code of Federal Regulations, 2010 CFR
2010-07-01
... governments normally will not be advised of any security system vulnerabilities that contributed to the... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.48 Loss, possible compromise or unauthorized disclosure. (a...
78 FR 16045 - Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-13
... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2013-0019; Notice No. 13-03] Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Safety Advisory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-08
... information collection titled, ``Notice Regarding Unauthorized Access to Customer Information.'' DATES... collection: Title: Notice Regarding Unauthorized Access to Customer Information. OMB Control No.: 1557-0227...) To insure the security and confidentiality of customer records and information; (2) to protect...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Violations. 1048.5 Section 1048.5 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.5 Violations. Willful unauthorized entry, or willful unauthorized introduction of weapons or...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Violations. 1048.5 Section 1048.5 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.5 Violations. Willful unauthorized entry, or willful unauthorized introduction of weapons or...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Violations. 1048.5 Section 1048.5 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.5 Violations. Willful unauthorized entry, or willful unauthorized introduction of weapons or...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Violations. 1048.5 Section 1048.5 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.5 Violations. Willful unauthorized entry, or willful unauthorized introduction of weapons or...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Violations. 1048.5 Section 1048.5 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) TRESPASSING ON STRATEGIC PETROLEUM RESERVE FACILITIES AND OTHER PROPERTY § 1048.5 Violations. Willful unauthorized entry, or willful unauthorized introduction of weapons or...
48 CFR 1401.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Ratification of unauthorized commitments. 1401.602-3 Section 1401.602-3 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL DEPARTMENT OF THE INTERIOR ACQUISITION REGULATION SYSTEM Career Development...
76 FR 55736 - Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-08
... Hazardous Materials Safety Administration, U.S. Department of Transportation, 820 Bear Tavern Road, Suite... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No. PHMSA-2011-0198, Notice No. 11-8] Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders...
48 CFR 801.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... VETERANS AFFAIRS GENERAL DEPARTMENT OF VETERANS AFFAIRS ACQUISITION REGULATION SYSTEM Career Development... individual responsible for the unauthorized commitment. (2) The contracting officer will review the file and... approving authority determines that a legal review would be desirable, the approving authority will...
48 CFR 3404.170 - Ratification of unauthorized contract awards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Ratification of unauthorized contract awards. 3404.170 Section 3404.170 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 3404.170 Ratification of...
2 CFR 176.130 - Noncompliance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... apparent unauthorized use of foreign iron, steel, and/or manufactured goods and request a reply, to include... iron, steel, and/or manufactured goods without authorization, take appropriate action, including one or... the unauthorized foreign iron, steel, and/or manufactured goods. (3) If removal and replacement of...
2 CFR 176.130 - Noncompliance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... apparent unauthorized use of foreign iron, steel, and/or manufactured goods and request a reply, to include... iron, steel, and/or manufactured goods without authorization, take appropriate action, including one or... the unauthorized foreign iron, steel, and/or manufactured goods. (3) If removal and replacement of...
75 FR 67947 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-04
... DEPARTMENT OF COMMERCE Submission for OMB Review; Comment Request The Department of Commerce will... unauthorized areas. Fishermen marking their gear correctly ultimately benefit, as unauthorized and illegal... Paperwork Clearance Officer, (202) 482-0266, Department of Commerce, Room 6616, 14th and Constitution Avenue...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Trespass. 1204.1004 Section 1204.1004... Inspection of Persons and Personal Effects at NASA Installations or on NASA Property; Trespass or Unauthorized Introduction of Weapons or Dangerous Materials § 1204.1004 Trespass. Unauthorized entry upon any...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Trespass. 1204.1004 Section 1204.1004... Inspection of Persons and Personal Effects at NASA Installations or on NASA Property; Trespass or Unauthorized Introduction of Weapons or Dangerous Materials § 1204.1004 Trespass. Unauthorized entry upon any...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Trespass. 1204.1004 Section 1204.1004... Inspection of Persons and Personal Effects at NASA Installations or on NASA Property; Trespass or Unauthorized Introduction of Weapons or Dangerous Materials § 1204.1004 Trespass. Unauthorized entry upon any...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 5 2012-01-01 2012-01-01 false Trespass. 1204.1004 Section 1204.1004... Inspection of Persons and Personal Effects at NASA Installations or on NASA Property; Trespass or Unauthorized Introduction of Weapons or Dangerous Materials § 1204.1004 Trespass. Unauthorized entry upon any...
14 CFR 1203.203 - Degree of protection.
Code of Federal Regulations, 2010 CFR
2010-01-01
... classified documents or materials except as expressly provided by statute or by NASA Directives. (1) Top Secret. Top Secret is the designation applied to information or material the unauthorized disclosure of... security. (2) Secret. Secret is the designation applied to information or material the unauthorized...
9 CFR 351.18 - Official identifications; unauthorized use.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Official identifications; unauthorized use. 351.18 Section 351.18 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION...
2 CFR 176.130 - Noncompliance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... recipient of the apparent unauthorized use of foreign iron, steel, and/or manufactured goods and request a... subrecipient has used foreign iron, steel, and/or manufactured goods without authorization, take appropriate... removal and replacement of the unauthorized foreign iron, steel, and/or manufactured goods. (3) If removal...
2 CFR 176.130 - Noncompliance.
Code of Federal Regulations, 2014 CFR
2014-01-01
...; (b) Unless fraud is suspected, notify the recipient of the apparent unauthorized use of foreign iron... the review reveals that a recipient or subrecipient has used foreign iron, steel, and/or manufactured... with § 176.120. (2) Consider requiring the removal and replacement of the unauthorized foreign iron...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1985-11-01
This US Nuclear Regulatory Commission report documents the circumstances surrounding the March 26, 1985, confiscation and subsequent decontamination activities related to the use of unauthorized quantities of americium-241 at the John C. Haynes Company (licensee) of Newark, Ohio. It focuses on the period from early February to July 26, 1985. The incident started when NRC Region III recieved information that John C. Haynes possessed unauthorized quantities of americium-241 and was conducting unauthorized activities (diamond irradiation). By July 26, 1985, the decontamination activities at the licensee's laboratory were concluded. The licensee's actions with diamond irradiation resulted in contamination in restricted andmore » unrestricted areas of the facility. The confiscation and decontamination activities required the combined efforts of NRC, Federal Bureau of Investigation, US Department of Energy, Oak Ridge Associated Universities, the State of Ohio, and the US Environmental Protection Agency. The report describes the factual information and significant findings associated with the confiscation and decontamination activities.« less
Nanopore sequencing technology: a new route for the fast detection of unauthorized GMO.
Fraiture, Marie-Alice; Saltykova, Assia; Hoffman, Stefan; Winand, Raf; Deforce, Dieter; Vanneste, Kevin; De Keersmaecker, Sigrid C J; Roosens, Nancy H C
2018-05-21
In order to strengthen the current genetically modified organism (GMO) detection system for unauthorized GMO, we have recently developed a new workflow based on DNA walking to amplify unknown sequences surrounding a known DNA region. This DNA walking is performed on transgenic elements, commonly found in GMO, that were earlier detected by real-time PCR (qPCR) screening. Previously, we have demonstrated the ability of this approach to detect unauthorized GMO via the identification of unique transgene flanking regions and the unnatural associations of elements from the transgenic cassette. In the present study, we investigate the feasibility to integrate the described workflow with the MinION Next-Generation-Sequencing (NGS). The MinION sequencing platform can provide long read-lengths and deal with heterogenic DNA libraries, allowing for rapid and efficient delivery of sequences of interest. In addition, the ability of this NGS platform to characterize unauthorized and unknown GMO without any a priori knowledge has been assessed.
48 CFR 1201.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... procurement decisions shall be made only by Government officials having authority to carry out such acquisitions. Procurement decisions made by other than authorized personnel are contrary to Departmental policy and may be considered matters of serious misconduct on the part of the employee making an unauthorized...
7 CFR 4288.135 - Unauthorized payments and offsets.
Code of Federal Regulations, 2012 CFR
2012-01-01
...-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE PAYMENT PROGRAMS Advanced Biofuel... assistance has been made to an advanced biofuel producer under this Program, the Agency reserves the right to... determination that unauthorized assistance has been made to an advanced biofuel producer under this Program, the...
7 CFR 4288.135 - Unauthorized payments and offsets.
Code of Federal Regulations, 2013 CFR
2013-01-01
...-COOPERATIVE SERVICE AND RURAL UTILITIES SERVICE, DEPARTMENT OF AGRICULTURE PAYMENT PROGRAMS Advanced Biofuel... assistance has been made to an advanced biofuel producer under this Program, the Agency reserves the right to... determination that unauthorized assistance has been made to an advanced biofuel producer under this Program, the...
36 CFR 331.21 - Unauthorized structures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Unauthorized structures. 331.21 Section 331.21 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY REGULATIONS GOVERNING THE PROTECTION, USE AND MANAGEMENT OF THE FALLS OF THE OHIO NATIONAL WILDLIFE...
36 CFR 331.21 - Unauthorized structures.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Unauthorized structures. 331.21 Section 331.21 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY REGULATIONS GOVERNING THE PROTECTION, USE AND MANAGEMENT OF THE FALLS OF THE OHIO NATIONAL WILDLIFE...
36 CFR 331.21 - Unauthorized structures.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Unauthorized structures. 331.21 Section 331.21 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY REGULATIONS GOVERNING THE PROTECTION, USE AND MANAGEMENT OF THE FALLS OF THE OHIO NATIONAL WILDLIFE...
27 CFR 555.204 - Inspection of magazines.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Inspection of magazines... of magazines. Any person storing explosive materials shall inspect his magazines at least every seven... been unauthorized entry or attempted entry into the magazines, or unauthorized removal of the contents...
ERIC Educational Resources Information Center
Association of Data Processing Service Organizations, Arlington, VA.
The problem of unauthorized computer software duplication impedes the production of upgraded products by software developers, who find thousands of illegal computer program copies have been made by customers who either innocently believe they are doing nothing wrong, or simply choose to ignore the law. Unauthorized duplication and use of software…
48 CFR 1501.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Paid Advertisements. (1) EPA is generally not authorized to ratify improperly ordered paid advertisements. The ratifying official, however, may determine payment is proper subject to the limitations in FAR 1.602-3(c) if the individual responsible for the unauthorized commitment acted in good faith to...
48 CFR 2901.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... preclude further unauthorized commitments (e.g., ethics, purchase card, or administrative procedures...) Steps to be followed Below the micro-purchase threshold Head of the Contracting Office 1 through 5 & 7... placed on notice by the contracting officer, in writing, that the purchase may be inappropriate because...
2 CFR 176.130 - Noncompliance.
Code of Federal Regulations, 2011 CFR
2011-01-01
...; (b) Unless fraud is suspected, notify the recipient of the apparent unauthorized use of foreign iron... the review reveals that a recipient or subrecipient has used foreign iron, steel, and/or manufactured... with § 176.120. (2) Consider requiring the removal and replacement of the unauthorized foreign iron...
Aberrant use and poor quality of trypanocides: a risk for drug resistance in south western Ethiopia.
Tekle, T; Terefe, G; Cherenet, T; Ashenafi, H; Akoda, K G; Teko-Agbo, A; Van Den Abbeele, J; Gari, G; Clausen, P-H; Hoppenheit, A; Mattioli, R C; Peter, R; Marcotty, T; Cecchi, G; Delespaux, V
2018-01-05
Trypanocidal drugs have been used to control African animal trypanosomosis for several decades. In Ethiopia, these drugs are available from both authorized (legal) and unauthorized (illegal) sources but documentation on utilization practices and quality of circulating products is scanty. This study looked at the practices of trypanocidal drug utilization by farmers and the integrity of active ingredient in trypanocides sold in Gurage zone, south western Ethiopia. The surveys were based on a structured questionnaire and drug quality determination of commonly used brands originating from European and Asian companies and sold at both authorized and unauthorized markets. One hundred farmers were interviewed and 50 drug samples were collected in 2013 (Diminazene aceturate = 33 and Isometamidium chloride = 17; 25 from authorized and 25 from unauthorized sources). Samples were tested at the OIE-certified Veterinary Drug Control Laboratory (LACOMEV) in Dakar, Senegal, by using galenic standards and high performance liquid chromatography. Trypanosomosis was found to be a major threat according to all interviewed livestock keepers in the study area. Diminazene aceturate and isometamidium chloride were preferred by 79% and 21% of the respondents respectively, and 85% of them indicated that an animal receives more than six treatments per year. About 60% of these treatments were reported to be administered by untrained farmers. Trypanocidal drug sources included both unauthorized outlets (56%) and authorized government and private sources (44%). A wide availability and usage of substandard quality drugs was revealed. Twenty eight percent of trypanocidal drugs tested failed to comply with quality requirements. There was no significant difference in the frequency of non-compliance between diminazene-based and isometamidium chloride products (P = 0.87) irrespective of the marketing channel (official and unofficial). However, higher rates of non-compliant trypanocides were detected for drugs originating from Asia than from Europe (P = 0.029). The findings revealed the presence of risk factors for the development of drug resistance, i.e. wide distribution of poor quality drugs as well as substandard administration practices. Therefore, it is strongly recommended to enforce regulatory measures for quality control of veterinary drugs, to expand and strengthen veterinary services and to undertake trypanocidal drug efficacy studies of wider coverage.
37 CFR 10.47 - Aiding unauthorized practice of law.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Aiding unauthorized practice of law. 10.47 Section 10.47 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE REPRESENTATION OF OTHERS BEFORE THE PATENT AND TRADEMARK OFFICE Patent and...
12 CFR 205.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... transfers. 205.6 Section 205.6 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM ELECTRONIC FUND TRANSFERS (REGULATION E) § 205.6 Liability of consumer for unauthorized transfers. (a) Conditions for liability. A consumer may be held liable, within the limitations described in...
12 CFR 205.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2012 CFR
2012-01-01
... transfers. 205.6 Section 205.6 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM ELECTRONIC FUND TRANSFERS (REGULATION E) § 205.6 Liability of consumer for unauthorized transfers. (a) Conditions for liability. A consumer may be held liable, within the limitations described in...
Code of Federal Regulations, 2010 CFR
2010-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
Code of Federal Regulations, 2013 CFR
2013-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
Code of Federal Regulations, 2012 CFR
2012-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
Code of Federal Regulations, 2011 CFR
2011-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
8 CFR 274a.3 - Continuing employment of unauthorized aliens.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...
8 CFR 274a.3 - Continuing employment of unauthorized aliens.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...
8 CFR 274a.3 - Continuing employment of unauthorized aliens.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...
8 CFR 274a.3 - Continuing employment of unauthorized aliens.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...
8 CFR 274a.3 - Continuing employment of unauthorized aliens.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Continuing employment of unauthorized aliens. 274a.3 Section 274a.3 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS CONTROL OF EMPLOYMENT OF ALIENS Employer Requirements § 274a.3 Continuing employment of...
14 CFR § 1204.1004 - Trespass.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Trespass. § 1204.1004 Section § 1204.1004... Inspection of Persons and Personal Effects at NASA Installations or on NASA Property; Trespass or Unauthorized Introduction of Weapons or Dangerous Materials § 1204.1004 Trespass. Unauthorized entry upon any...
32 CFR Appendix D to Part 552 - Unauthorized Activities in Fort Lewis Maneuver Areas
Code of Federal Regulations, 2011 CFR
2011-07-01
... Areas D Appendix D to Part 552 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY... Appendix D to Part 552—Unauthorized Activities in Fort Lewis Maneuver Areas Civilian paramilitary...-detecting, including recovery of ammunition residue of fragments, archaeological or cultural artifacts, or...
Code of Federal Regulations, 2010 CFR
2010-01-01
...: Unauthorized sale of security. Purchase of security with intent to defraud and without payment of the purchase... loan funds for an unauthorized purpose; Decision after obtaining a loan to use and using the funds for... related instruments. Some examples of default or factors to consider in determining whether a borrower is...
9 CFR 592.330 - Unauthorized use or disposition of approved labels.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Unauthorized use or disposition of approved labels. 592.330 Section 592.330 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE EGG PRODUCTS INSPECTION VOLUNTARY INSPECTION OF EGG PRODUCTS Identifying and...
37 CFR 10.47 - Aiding unauthorized practice of law.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 37 Patents, Trademarks, and Copyrights 1 2012-07-01 2012-07-01 false Aiding unauthorized practice of law. 10.47 Section 10.47 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE REPRESENTATION OF OTHERS BEFORE THE PATENT AND TRADEMARK OFFICE Patent and...
ERIC Educational Resources Information Center
Fleming, Antoine
2017-01-01
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
32 CFR Appendix D to Part 552 - Unauthorized Activities in Fort Lewis Maneuver Areas
Code of Federal Regulations, 2010 CFR
2010-07-01
... Areas D Appendix D to Part 552 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Pt. 552, App. D Appendix D to Part 552—Unauthorized Activities in Fort Lewis Maneuver Areas Civilian paramilitary...
12 CFR 205.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2014 CFR
2014-01-01
... transfers. 205.6 Section 205.6 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM ELECTRONIC FUND TRANSFERS (REGULATION E) § 205.6 Liability of consumer for unauthorized transfers. (a) Conditions for liability. A consumer may be held liable, within the limitations described in...
12 CFR 205.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... transfers. 205.6 Section 205.6 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM ELECTRONIC FUND TRANSFERS (REGULATION E) § 205.6 Liability of consumer for unauthorized transfers. (a) Conditions for liability. A consumer may be held liable, within the limitations described in...
12 CFR 205.6 - Liability of consumer for unauthorized transfers.
Code of Federal Regulations, 2013 CFR
2013-01-01
... transfers. 205.6 Section 205.6 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM ELECTRONIC FUND TRANSFERS (REGULATION E) § 205.6 Liability of consumer for unauthorized transfers. (a) Conditions for liability. A consumer may be held liable, within the limitations described in...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-01
... services provided, cost of operation and maintenance, market assessment, and public comment. Funds from fees would be used for the continued operation and maintenance of these recreation sites. Lake Canyon... development of numerous unauthorized roads and camping. The restoration project has closed unauthorized trails...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... information, is protected from unauthorized or other improper use.\\4\\ \\4\\ FINRA has emphasized that its... card, checking account, or savings account). If such personal information were to be intercepted by an... requests will help ensure that personal information is protected from improper use by unauthorized third...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-30
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket Nos. 11-116 and 09-158; CC Docket No. 98-170; FCC 11-106; DA 11-1860] Empowering Consumers to Prevent and Detect Billing for Unauthorized Charges (``Cramming''); Consumer Information and Disclosure; Truth-in-Billing and Billing Format AGENCY...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket Nos. 11-116 and 09-158; CC Docket No. 98-170; FCC 12-42] Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges (``Cramming''); Consumer Information and Disclosure; Truth-in-Billing Format AGENCY: Federal Communications...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-30
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket Nos. 11-116 and 09-158; CC Docket No. 98-170; FCC 12-42] Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges (``Cramming''); Consumer Information and Disclosure; Truth-in-Billing Format AGENCY: Federal Communications...
43 CFR 9239.0-7 - Penalty for unauthorized removal of material.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.0-7 Penalty for unauthorized removal of material. The extraction, severance, injury, or... Department, is an act of trespass. Trespassers will be liable in damages to the United States, and will be...
43 CFR 9239.0-7 - Penalty for unauthorized removal of material.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.0-7 Penalty for unauthorized removal of material. The extraction, severance, injury, or... Department, is an act of trespass. Trespassers will be liable in damages to the United States, and will be...
43 CFR 9239.0-7 - Penalty for unauthorized removal of material.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.0-7 Penalty for unauthorized removal of material. The extraction, severance, injury, or... Department, is an act of trespass. Trespassers will be liable in damages to the United States, and will be...
43 CFR 9239.0-7 - Penalty for unauthorized removal of material.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.0-7 Penalty for unauthorized removal of material. The extraction, severance, injury, or... Department, is an act of trespass. Trespassers will be liable in damages to the United States, and will be...
Code of Federal Regulations, 2012 CFR
2012-01-01
... sensitive but unclassified (SBU) information/material to the news media. 1213.107 Section 1213.107... INFORMATION MEDIA § 1213.107 Preventing unauthorized release of sensitive but unclassified (SBU) information/material to the news media. (a) All NASA SBU information requires accountability and approval for release...
Code of Federal Regulations, 2010 CFR
2010-01-01
... sensitive but unclassified (SBU) information/material to the news media. 1213.107 Section 1213.107... INFORMATION MEDIA § 1213.107 Preventing unauthorized release of sensitive but unclassified (SBU) information/material to the news media. (a) All NASA SBU information requires accountability and approval for release...
Code of Federal Regulations, 2011 CFR
2011-01-01
... but unclassified (SBU) information/material to the news media. 1213.107 Section 1213.107 Aeronautics... MEDIA § 1213.107 Preventing unauthorized release of sensitive but unclassified (SBU) information/material to the news media. (a) All NASA SBU information requires accountability and approval for release...
Code of Federal Regulations, 2013 CFR
2013-01-01
... sensitive but unclassified (SBU) information/material to the news media. 1213.107 Section 1213.107... INFORMATION MEDIA § 1213.107 Preventing unauthorized release of sensitive but unclassified (SBU) information/material to the news media. (a) All NASA SBU information requires accountability and approval for release...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
.... 98-170; FCC 12-42] Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges..., [email protected]fcc.gov or (202) 418-2887, of the Consumer and Governmental Affairs Bureau. SUPPLEMENTARY... information collection requirements contained in the Commission's Report and Order, FCC 12-42, published at 77...
32 CFR Appendix D to Subpart M of... - Unauthorized Activities in Maneuver Training Areas
Code of Federal Regulations, 2011 CFR
2011-07-01
... Areas D Appendix D to Subpart M of Part 552 National Defense Department of Defense (Continued.... D Appendix D to Subpart M of Part 552—Unauthorized Activities in Maneuver Training Areas 1. Fort... metal-detecting, including recovery of ammunition residue or fragments, archaeological or cultural...
18 CFR 1304.406 - Removal of unauthorized, unsafe, and derelict structures or facilities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Removal of unauthorized, unsafe, and derelict structures or facilities. 1304.406 Section 1304.406 Conservation of Power and Water... flood control) is anchored, installed, constructed, or moored in a manner inconsistent with this part...
36 CFR 327.20 - Unauthorized structures.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Unauthorized structures. 327.20 Section 327.20 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY... nailed or screwed into trees and are removed at the end of a day's hunt may be used. [65 FR 6902, Feb. 11...
36 CFR 327.20 - Unauthorized structures.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Unauthorized structures. 327.20 Section 327.20 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY... nailed or screwed into trees and are removed at the end of a day's hunt may be used. [65 FR 6902, Feb. 11...
36 CFR 327.20 - Unauthorized structures.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Unauthorized structures. 327.20 Section 327.20 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY... nailed or screwed into trees and are removed at the end of a day's hunt may be used. [65 FR 6902, Feb. 11...
36 CFR 327.20 - Unauthorized structures.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Unauthorized structures. 327.20 Section 327.20 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE ARMY... nailed or screwed into trees and are removed at the end of a day's hunt may be used. [65 FR 6902, Feb. 11...
12 CFR 911.3 - Prohibition on unauthorized use and disclosure of unpublished information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Prohibition on unauthorized use and disclosure of unpublished information. 911.3 Section 911.3 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.3...
12 CFR 911.3 - Prohibition on unauthorized use and disclosure of unpublished information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Prohibition on unauthorized use and disclosure of unpublished information. 911.3 Section 911.3 Banks and Banking FEDERAL HOUSING FINANCE BOARD FEDERAL HOUSING FINANCE BOARD ORGANIZATION AND OPERATIONS AVAILABILITY OF UNPUBLISHED INFORMATION § 911.3...
49 CFR 392.60 - Unauthorized persons not to be transported.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 5 2010-10-01 2010-10-01 false Unauthorized persons not to be transported. 392.60... transported. (a) Unless specifically authorized in writing to do so by the motor carrier under whose authority the commercial motor vehicle is being operated, no driver shall transport any person or permit any...
49 CFR 392.60 - Unauthorized persons not to be transported.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 5 2011-10-01 2011-10-01 false Unauthorized persons not to be transported. 392.60... transported. (a) Unless specifically authorized in writing to do so by the motor carrier under whose authority the commercial motor vehicle is being operated, no driver shall transport any person or permit any...
Piracy among Undergraduate and Graduate Students: Influences on Unauthorized Book Copies
ERIC Educational Resources Information Center
Dionisio, Pedro; Leal, Carmo; Pereira, Helia; Salgueiro, Maria Fatima
2013-01-01
The unauthorized duplication of books through photocopies and Internet downloads, especially in the case of academic books, is currently one of the most challenging problems facing the publishing industry. Photocopying has become widespread with these texts, apparently without major ethical concerns on the part of students. The purpose of this…
ERIC Educational Resources Information Center
Antony, Laljith
2016-01-01
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Fish with bottom or pelagic longline and shark gillnet gear for HMS without adhering to the gear... workshop in violation of § 635.8. (12) Fish for Atlantic sharks with unauthorized gear or possess Atlantic sharks on board a vessel with unauthorized gear on board as specified in § 635.21(e)(3). (13) Fish for...
ERIC Educational Resources Information Center
Valdez, Carmen R.; Padilla, Brian; Valentine, Jessa Lewis
2013-01-01
This study explores the consequences of increasingly restrictive immigration policies on social capital among Mexican mothers with unauthorized immigrant status in Arizona. Three focus groups conducted in Arizona explore how mothers' experiences with immigration policies have affected their neighborhood, community, and family ties. Focus group…
Warren, Robert; Warren, John Robert
2013-06-01
We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error.
A passive RFID-based location system for personnel and asset monitoring.
Hsiao, Rong-Shue; Kao, Chun-Hao; Chen, Tian-Xiang; Chen, Jui-Lun
2018-01-01
Typical radio frequency identification (RFID) access control system can be ineffective if an unauthorized person tailgates an authorized person through an access area. To propose a system by using indoor locating and tracking techniques address this problem, which is to prevent unauthorized Alzheimer's and dementia patients from getting lost including by tailgating. To achieve accurate target location, passive RFID deployment strategy is studied and a fingerprinting based passive RFID localization algorithm is proposed. The proposed system was evaluated in a building environment to simulate the performance of access control. RFID reader was installed on ceiling near the access area and tags were stitched on both shoulders of the experiment subject's garments. The probability of the error distance within 0.3 m achieved 97% in the warning area; the location precision achieved 97% within 0.4 m in the monitoring area. The result showed that if an unauthorized person enters the restricted area, the system can initiate an alert signal accurately. Therefore, the proposed system is very suitable to be used in nursing home or hospital to prevent unauthorized personnel and assets entering/exiting a confined location.
Willen, Sarah S
2012-03-01
Do unauthorized im/migrants have a right to health? Do they deserve health care, or health protection, or access to the social determinants of good health? Are they party to prevailing social contracts, or does their exclusion from mainstream systems of health promotion, prevention, and care "make sense"? Questions like these, which generate considerable attention in multiple spheres of scholarship, policy, and public debate, revolve around an issue that merits substantially greater consideration among social scientists of health: health-related "deservingness." In addition to putting the issue of health-related deservingness squarely on the map as an object of analysis, this article further argues that we cannot focus solely on those with power, influence, and public voice. Rather, we also must investigate how deservingness is reckoned in relation to--and, furthermore, from the perspectives of-- unauthorized im/migrants and members of other groups commonly constructed in public and policy discourse as undeserving. Additionally, we must consider the complicated relationship between universalizing juridical arguments about formal entitlement to health rights, on one hand, and situationally specific, vernacular moral arguments about deservingness, on the other. The paper analyzes findings from a 29-month mixed-methods study conducted in Tel Aviv, Israel, that approached unauthorized im/migrants as subjects, rather than simply objects, of ethical deliberation. Participants' conceptions of health-related deservingness are investigated using two sources of data: (1) quantitative findings from a self-administered, closed-ended survey conducted with 170 im/migrant patients at an NGO-run Open Clinic (2002-2003), and (2) qualitative findings from the larger ethnographic study of which the survey was part (2000-2010). The study findings both (1) contradict commonly circulating assumptions that unauthorized im/migrants are "freeloaders," and (2) highlight the need for rigorous investigation of how unauthorized im/migrants, among other marginalized and vulnerable groups, conceptualize their own relative deservingness of health-related concern and investment. Copyright © 2011 Elsevier Ltd. All rights reserved.
Koutentakis, Konstantinos; Rosales-Statkus, María Elena; Hoyos, Juan; Fernández-Balbuena, Sonia; Ruiz, Mónica; Agustí, Cristina; de la Fuente, Luis; Belza, María José
2016-07-08
Shortly after the approval of an over-the-counter HIV self-test in the US, we conducted a study to estimate the proportion of men who have sex with men (MSM) in Spain who knew that unauthorized HIV self-tests could be purchased online, and the proportion that had already used these tests, as well as their socio-demographic and behavioural correlates. Between September 2012 and February 2013, MSM users of gay dating websites were invited to complete an online questionnaire. We calculated estimates of the knowledge and use of unauthorized HIV self-testing and assessed the associated factors by rare event logit regression models. Among 8620 participants, 4.2 % (95 % CI:3.8-4.6) knew they could buy an unauthorized HIV self-test kit online, and 12.7 % (95 % CI:12.0-13.4) thought that such a test might exist, although they had never seen one. Only 0.7 % (95 % CI:0.5-0.9) had ever self-tested. In the multivariable analysis, knowledge of online availability of self-tests was associated with being a non-Latin American foreigner, having at least two previous HIV tests, intending to test for HIV in the next year, and knowing about U.S. approval of self-testing. Ever-use of HIV self-testing was associated with being over 34 years of age, living outside Spain during the last 12 months, and knowing about U.S. approval of self-testing. Both knowledge and use of unauthorized HIV self-testing among MSM in Spain was very low among HIV negative or untested MSM in Spain. The recent approval in the United Kingdom and France might increase the number of MSM seeking such testing and possibly using unauthorized test kits not meeting quality standards.
75 FR 28818 - Notice of Realty Action: Proposed Sale of Public Land, Wyoming
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... the fair market value, to resolve an unintentional unauthorized use of public lands. DATES: Comments... these lands suitable for disposal. The lands contain no other known public values. Conveyance of the... unauthorized use of the property by other parties. No warranty of any kind, express or implied, is given by the...
43 CFR 9239.1-1 - Unauthorized cutting, removal, or injury.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.1-1 Unauthorized cutting, removal, or injury. (a) All of the definitions in § 5400.0-5 of... this title constitutes a trespass. [56 FR 10176, Mar. 11, 1991, as amended at 60 FR 50451, Sept. 29...
43 CFR 9239.1-1 - Unauthorized cutting, removal, or injury.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.1-1 Unauthorized cutting, removal, or injury. (a) All of the definitions in § 5400.0-5 of... this title constitutes a trespass. [56 FR 10176, Mar. 11, 1991, as amended at 60 FR 50451, Sept. 29...
43 CFR 9239.1-1 - Unauthorized cutting, removal, or injury.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.1-1 Unauthorized cutting, removal, or injury. (a) All of the definitions in § 5400.0-5 of... this title constitutes a trespass. [56 FR 10176, Mar. 11, 1991, as amended at 60 FR 50451, Sept. 29...
43 CFR 9239.1-1 - Unauthorized cutting, removal, or injury.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR TECHNICAL SERVICES (9000) TRESPASS Kinds of Trespass § 9239.1-1 Unauthorized cutting, removal, or injury. (a) All of the definitions in § 5400.0-5 of... this title constitutes a trespass. [56 FR 10176, Mar. 11, 1991, as amended at 60 FR 50451, Sept. 29...
Evolution of Biomedical Research During Combat Operations
2013-08-01
Lippincott Williams & Wilkins. Unauthorized reproduction of this article is prohibited. Report Documentation Page Form ApprovedOMB No. 0704-0188...2Hatzfeld et al. S116 * 2013 Lippincott Williams & Wilkins Copyright © 2013 Lippincott Williams & Wilkins. Unauthorized reproduction of this article is...N = 300 Data/samples collected Clinical data Clinical data Clinical data Neuropsychological tests Quantitative electroencephalogram In-theater
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-20
... supports: The addition of 331 miles of unauthorized routes to the National Forest Transportation System... Maintenance Level 3 (ML3) roads to allow for mixed use by both highway legal and non-highway legal vehicles... proposes to add 331 miles of unauthorized routes to the National Forest Transportation System (NFTS) on the...
36 CFR § 327.20 - Unauthorized structures.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Unauthorized structures. § 327.20 Section § 327.20 Parks, Forests, and Public Property CORPS OF ENGINEERS, DEPARTMENT OF THE... not nailed or screwed into trees and are removed at the end of a day's hunt may be used. [65 FR 6902...
Addressing Postsecondary Access for Undocumented Students. ECS Education Trends
ERIC Educational Resources Information Center
Anderson, Lexi
2015-01-01
In 2012, there were an estimated 11.2 million undocumented individuals living in the United States. The peak of unauthorized immigrant population occurred in 2007 with 12.2 million, a stark rise from original estimates of 3.5 million in 1990. Although down from its peak, a sizeable and stable population of unauthorized individuals resides in the…
9 CFR 381.138 - Unauthorized use or disposition of approved labeling or devices.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 9 Animals and Animal Products 2 2014-01-01 2014-01-01 false Unauthorized use or disposition of approved labeling or devices. 381.138 Section 381.138 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION AND VOLUNTARY INSPECTION...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 4 2010-10-01 2010-10-01 false What are the consequences for unauthorized use of the Corporation's national service insignia? 2540.520 Section 2540.520 Public Welfare Regulations... ADMINISTRATIVE PROVISIONS Restrictions on Use of National Service Insignia § 2540.520 What are the consequences...
32 CFR Appendix D to Subpart M of... - Unauthorized Activities in Maneuver Training Areas
Code of Federal Regulations, 2010 CFR
2010-07-01
... Areas D Appendix D to Subpart M of Part 552 National Defense Department of Defense (Continued.... D Appendix D to Subpart M of Part 552—Unauthorized Activities in Maneuver Training Areas 1. Fort... camping outside of DPCA sites (camping on DPCA sites is open to DoD members only, per above). Consumption...
Facial and Periorbital Cellulitis due to Skin Peeling with Jet Stream by an Unauthorized Person.
Kaptanoglu, Asli Feride; Mullaaziz, Didem; Suer, Kaya
2014-01-01
Technologies and devices for cosmetic procedures are developing with each passing day. However, increased and unauthorized use of such emerging technologies may also lead to increases in unexpected results and complications as well. Here, we report a case of facial cellulitis after a "beauty parlor" session of skin cleaning with jet stream peeling device in 19-year old female patient for the first time. Complications due to improper and unauthorized use of jet stream peeling devices may also cause doubts about the safety and impair the reputation of the technology as well. In order to avoid irreversible complications, local authorities should follow the technology and update the regulations where the dermatologists should take an active role.
How Can We Better Detect Unauthorized GMOs in Food and Feed Chains?
Fraiture, Marie-Alice; Herman, Philippe; De Loose, Marc; Debode, Frédéric; Roosens, Nancy H
2017-06-01
Current GMO detection systems have limited abilities to detect unauthorized genetically modified organisms (GMOs). Here, we propose a new workflow, based on next-generation sequencing (NGS) technology, to overcome this problem. In providing information about DNA sequences, this high-throughput workflow can distinguish authorized and unauthorized GMOs by strengthening the tools commonly used by enforcement laboratories with the help of NGS technology. In addition, thanks to its massive sequencing capacity, this workflow could be used to monitor GMOs present in the food and feed chain. In view of its potential implementation by enforcement laboratories, we discuss this innovative approach, its current limitations, and its sustainability of use over time. Copyright © 2017 Elsevier Ltd. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [CG Docket Nos. 11-116 and 09-158; CC Docket No. 98-170; FCC 12-42; DA 12-1039] Empowering Consumers To Prevent and Detect Billing for Unauthorized..., which extends the reply comment filing deadline established in the FNPRM, FCC 12-42, published at 77 FR...
ERIC Educational Resources Information Center
Glowacki, Margaret L.; And Others
The purpose of this study was to determine the nature and extent of unauthorized copying of microcomputer software by university students. The sample consisted of 392 university students ranging in age from 18 to 35. A survey instrument administered to all students contained 20 Likert-type questions designed to gather data on students' behavior,…
Growing up in the Shadows: The Developmental Implications of Unauthorized Status
ERIC Educational Resources Information Center
Suarez-Orozco, Carola; Yoshikawa, Hirokazu; Teranishi, Robert T.; Suarez-Orozco, Marcelo M.
2011-01-01
Unauthorized immigrants account for approximately one-fourth of all immigrants in the United States, yet they dominate public perceptions and are at the heart of a policy impasse. Caught in the middle are the children of these immigrants--youth who are coming of age and living in the shadows. An estimated 5.5 million children and adolescents are…
In-State-Tuition for Unauthorized Residents: Teaching a Person to Fish
ERIC Educational Resources Information Center
Dryden, Joe; Martinez, Cristina
2014-01-01
Illegal immigration has become one of the most important issues we face as a nation, and as greater attention is focused on the sociological and economic impact of illegal immigration, policies related to in-state-tuition for unauthorized residents are in a state of flux. Since 2005, the number of states offering in-state-tuition for unauthorized…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-03
.... 98-170; DA 13-1807] Empowering Consumers To Prevent and Detect Billing for Unauthorized Charges... Notice DA 13-1807, released August 27, 2013 in CG Docket Nos. 11-116 and 09-158, and CC Docket No. 98-170. The full text of document DA 13- 1807 and copies of any subsequently filed documents in this matter...
ERIC Educational Resources Information Center
Sulkowski, Michael L.
2017-01-01
Overlooking Ellis Island, the famous port of entry for millions of U.S. immigrants, is the Statue of Liberty. Miss Liberty's lamp has welcomed millions of immigrants to the United States. However, in light of recent executive orders against immigration as well as efforts to detain and deport millions of unauthorized immigrants, one might wonder…
Attitudes toward unauthorized immigrants, authorized immigrants, and refugees.
Murray, Kate E; Marx, David M
2013-07-01
Rates of human migration are steadily rising and have resulted in significant sociopolitical debates over how to best respond to increasing cultural diversity and changing migration patterns. Research on prejudicial attitudes toward immigrants has focused on the attitudes and beliefs that individuals in the receiving country hold about immigrants. The current study enhances this literature by examining how young adults view authorized and unauthorized immigrants and refugees. Using a between-groups design of 191 undergraduates, we found that participants consistently reported more prejudicial attitudes, greater perceived realistic threats, and greater intergroup anxiety when responding to questions about unauthorized compared with authorized immigrants. Additionally, there were differences in attitudes depending on participants' generational status, with older-generation participants reporting greater perceived realistic and symbolic threat, prejudice, and anxiety than newer-generation students. In some instances, these effects were moderated by participant race/ethnicity and whether they were evaluating authorized or unauthorized immigrants. Lastly, perceived realistic threat, symbolic threat, and intergroup anxiety were significant predictors of prejudicial attitudes. Overall, participants reported positive attitudes toward refugees and resettlement programs in the United States. These findings have implications for future research and interventions focused on immigration and prejudice toward migrant groups. PsycINFO Database Record (c) 2013 APA, all rights reserved.
Warren, Robert; Warren, John Robert
2013-01-01
We describe a method for producing annual estimates of the unauthorized immigrant population in the United Sates and components of population change, for each state and D.C., for 1990 to 2010. We quantify a sharp drop in the number of unauthorized immigrants arriving since 2000, and we demonstrate the role of departures from the population (emigration, adjustment to legal status, removal by the Department of Homeland Security (DHS), and deaths) in reducing population growth from one million in 2000 to population losses in 2008 and 2009. The number arriving in the U.S. peaked at more than one million in 1999 to 2001, and then declined rapidly through 2009. We provide evidence that population growth stopped after 2007 primarily because entries declined and not because emigration increased during the economic crisis. Our estimates of the total unauthorized immigrant population in the U.S. and in the top ten states are comparable to those produced by DHS and the Pew Hispanic Center. For the remaining states and D.C., our data and methods produce estimates with smaller ranges of sampling error. PMID:23956482
Valdez, Carmen R.; Padilla, Brian; Valentine, Jessa Lewis
2013-01-01
This study explores the consequences of increasingly restrictive immigration policies on social capital among Mexican mothers with unauthorized immigrant status in Arizona. Three focus groups conducted in Arizona explore how mothers’ experiences with immigration policies have affected their neighborhood, community, and family ties. Focus group content and interactions revealed that perceived racial profiling was common among mothers and led to fear of family separation. Several described direct experiences with detention and deportation. Although detention and deportation strengthened social ties between mothers and other unauthorized immigrants, these experiences were detrimental to social ties between mothers and members of the mainstream society, including their children's teachers. Finally, immigration policies were perceived to affect parent-child ties negatively, as mothers reported family stress, financial hardship, and decreased parental availability. PMID:24371370
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...
Antecedent control in the treatment of brain-injured clients.
Zencius, A H; Wesolowski, M D; Burke, W H; McQuade, P
1989-01-01
Three brain-injured clients failed to respond significantly to consequence management programmes designed to increase attendance, use of a cane, and to reduce unauthorized breaks. When antecedent stimulus control procedures were applied, attendance and use of a cane increased and unauthorized breaks decreased. The study shows that antecedent control may be the treatment of choice when treating brain-injured clients with memory loss.
Soldier Data Tag Study Effort.
1985-06-10
interested in protecting it. The tag itself is difficult--though not impossible--to counterfeit . Also, it (’• iii 71 -, potentially improves the data...attacks during the design, manufacture, and distribution processes, counterfeiting , unauthorized access/alteration of tag data, and use of the tag to...45 3.3.2 Hijacking of SOT System Shipments, or Large- Scale Counterfeit of SOT Systems ....................... 46 3.3.3 Unauthorized Alteration
Ogbonnaya, Ijeoma Nwabuzor; Finno-Velasquez, Megan; Kohl, Patricia L
2015-01-01
Many children involved with the child welfare system witness parental domestic violence. The association between children's domestic violence exposure and child welfare involvement may be influenced by certain socio-cultural factors; however, minimal research has examined this relationship. The current study compares domestic violence experiences and case outcomes among Latinas who are legal immigrants (n=39), unauthorized immigrants (n=77), naturalized citizens (n=30), and US-born citizen mothers (n=383) reported for child maltreatment. This analysis used data from the second round of the National Survey of Child and Adolescent Well-being. Mothers were asked about whether they experienced domestic violence during the past year. In addition, data were collected to assess if (a) domestic violence was the primary abuse type reported and, if so, (b) the maltreatment allegation was substantiated. Results show that naturalized citizens, legal residents, and unauthorized immigrants did not differ from US-born citizens in self-reports of domestic violence; approximately 33% of mothers reported experiences of domestic violence within the past year. Yet, unauthorized immigrants were 3.76 times more likely than US-born citizens to have cases with allegations of domestic violence as the primary abuse type. Despite higher rates of alleged domestic violence, unauthorized citizens were not more likely than US-born citizens to have these cases substantiated for domestic violence (F(2.26, 153.99)=0.709, p=.510). Findings highlight that domestic violence is not accurately accounted for in families with unauthorized immigrant mothers. We recommend child welfare workers are trained to properly assess and fulfill the needs of immigrant families, particularly as it relates to domestic violence. Copyright © 2014 Elsevier Ltd. All rights reserved.
Quality of sunglasses available in the Iranian market; a study with emphasis on sellers’ license
Bazzazi, Nooshin; Heydarian, Samira; Vahabi, Reihaneh; Akbarzadeh, Siamak; Fouladi, Daniel F
2015-01-01
Context: Sunglasses should follow minimum requirements to sufficiently protect eyes. It is not known whether all items obtainable from the market are appropriately designed. Aims: To compare ultraviolet (UV)-protective properties of commercially available sunglasses obtained from authorized and unauthorized Iranian sellers. Settings and Study Design: An analytic-descriptive study performed in a metropolitan area (Tehran). Materials and Methods: Using a UV-visible standard spectrophotometer, the percentage transmittance was scanned between 280 and 400 nm in 348 pairs of nonprescription sunglasses (price range: 20–80 US$) obtained anonymously and randomly from authorized (permitted by the Ministry of Health, 189 pairs) and unauthorized (159 pairs) sellers in the Iranian capital city, Tehran. The Australian/New Zealand Standard (AS/NZS) and the American National Standards Institute [ANSI] standards were followed. Statistical Analysis: Chi-square test, independent samples t-test or Mann–Whitney U-test. Results: UV-protective properties of the sunglasses obtained from authorized sellers complied with AS/NZS and ANSI guidelines in 92.6% and 95.2% of items, respectively. The corresponding rates for sunglasses obtained from unauthorized sellers were 0% and 8.2%, respectively (P < 0.001 for both). The rate of defective polarizing capability of lenses was 27.4% in sunglasses obtained from authorized sellers versus 90.4% in sunglasses obtained from unauthorized sellers (P < 0.001). Neither brand nor price played significant contributions to UV protection/lens polarizing capability of sunglasses obtained from authorized sellers. Conclusions: Sunglasses provided by unauthorized sellers are alarmingly unreliable and could be potentially hazardous for the eye. Brand and price do not guarantee optimal protection against UV radiation or polarizing performance of the lens. PMID:25827547
Leveraging Observations of Security Force Assistance in Afghanistan for Global Operations
2013-01-01
commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under...copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use . For...contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of
NASA Astrophysics Data System (ADS)
Coughlan, Michael R.
2016-05-01
Forest managers are increasingly recognizing the value of disturbance-based land management techniques such as prescribed burning. Unauthorized, "arson" fires are common in the southeastern United States where a legacy of agrarian cultural heritage persists amidst an increasingly forest-dominated landscape. This paper reexamines unauthorized fire-setting in the state of Georgia, USA from a historical ecology perspective that aims to contribute to historically informed, disturbance-based land management. A space-time permutation analysis is employed to discriminate systematic, management-oriented unauthorized fires from more arbitrary or socially deviant fire-setting behaviors. This paper argues that statistically significant space-time clusters of unauthorized fire occurrence represent informal management regimes linked to the legacy of traditional land management practices. Recent scholarship has pointed out that traditional management has actively promoted sustainable resource use and, in some cases, enhanced biodiversity often through the use of fire. Despite broad-scale displacement of traditional management during the 20th century, informal management practices may locally circumvent more formal and regionally dominant management regimes. Space-time permutation analysis identified 29 statistically significant fire regimes for the state of Georgia. The identified regimes are classified by region and land cover type and their implications for historically informed disturbance-based resource management are discussed.
Coughlan, Michael R
2016-05-01
Forest managers are increasingly recognizing the value of disturbance-based land management techniques such as prescribed burning. Unauthorized, "arson" fires are common in the southeastern United States where a legacy of agrarian cultural heritage persists amidst an increasingly forest-dominated landscape. This paper reexamines unauthorized fire-setting in the state of Georgia, USA from a historical ecology perspective that aims to contribute to historically informed, disturbance-based land management. A space-time permutation analysis is employed to discriminate systematic, management-oriented unauthorized fires from more arbitrary or socially deviant fire-setting behaviors. This paper argues that statistically significant space-time clusters of unauthorized fire occurrence represent informal management regimes linked to the legacy of traditional land management practices. Recent scholarship has pointed out that traditional management has actively promoted sustainable resource use and, in some cases, enhanced biodiversity often through the use of fire. Despite broad-scale displacement of traditional management during the 20th century, informal management practices may locally circumvent more formal and regionally dominant management regimes. Space-time permutation analysis identified 29 statistically significant fire regimes for the state of Georgia. The identified regimes are classified by region and land cover type and their implications for historically informed disturbance-based resource management are discussed.
Improving Army Basic Research: Report of an Expert Panel on the Future of Army Laboratories
2012-01-01
commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under...complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND website is prohibited. RAND...Inspired senior scientists and technologists with vision will be essential in research as well as in the design , development, evaluation, and
2009-01-01
representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is...duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND Web site is prohibited. RAND documents are protected under...Employment; Manpower, Personnel, and Train- ing; Resource Management; and Strategy and Doctrine. Additional information about PAF is available on our Web
Reflecting Warfighter Needs in Air Force Programs: Prototype Analysis
2010-01-01
representation of RAND intellectual property is provided for non -commercial use only. Unauthorized posting of RAND PDFs to a non -RAND Web site is prohibited...duplicated for commercial purposes. Unauthorized posting of RAND documents to a non -RAND website is prohibited. RAND documents are protected under...Secretary of Defense for Acqui- sition, Technology, and Logistics (USD/AT&L). Step One is to sharpen understanding of the mission area and its seams
Gambling with life: Masculinity, risk, and danger in the lives of unauthorized migrant roofers.
Chávez, Sergio; Altman, Claire E
2017-06-01
This paper examines the occupational experiences of unauthorized immigrants employed in one of the most dangerous occupations in the United States: roofing. We draw on 40 in-depth interviews with return migrants in Guanajuato, Mexico, to examine how the adoption of masculinity, dangerous working conditions, the labor market structure, and absence of legal status exacerbates injuries for unauthorized roofers. Undocumented men return to Mexico injured with chronic pain, health complications, and trauma. We find that men "do gender" that is adopt masculine beliefs, when they skirt safety practices, police each other's behaviors, withhold their emotions, experience heightened stress, and engage in poor health behaviors. It is a combination of dangerous working conditions, economic insecurity, and men seeking to fulfill their masculine roles that all combine to create unsafe working conditions and lead to injuries. © 2017 Wiley Periodicals, Inc.
Martínez, Daniel E; Slack, Jeremy; Beyerlein, Kraig; Vandervoet, Prescott; Klingman, Kristin; Molina, Paola; Manning, Shiras; Burham, Melissa; Walzak, Kylie; Valencia, Kristen; Gamboa, Lorenzo
2017-07-01
Increased border enforcement efforts have redistributed unauthorized Mexican migration to the United States (US) away from traditional points of crossing, such as San Diego and El Paso, and into more remote areas along the US-Mexico border, including southern Arizona. Yet relatively little quantitative scholarly work exists examining Mexican migrants' crossing, apprehension, and repatriation experiences in southern Arizona. We contend that if scholars truly want to understand the experiences of unauthorized migrants in transit, such migrants should be interviewed either at the border after being removed from the US, or during their trajectories across the border, or both. This paper provides a methodological overview of the Migrant Border Crossing Study (MBCS), a unique data source on Mexican migrants who attempted an unauthorized crossing along the Sonora-Arizona border, were apprehended, and repatriated to Nogales, Sonora in 2007-09. We also discuss substantive and theoretical contributions of the MBCS.
Akiyama, Hiroshi; Nakamura, Fumi; Yamada, Chihiro; Nakamura, Kosuke; Nakajima, Osamu; Kawakami, Hiroshi; Harikai, Naoki; Furui, Satoshi; Kitta, Kazumi; Teshima, Reiko
2009-11-01
To screen for unauthorized genetically modified organisms (GMO) in the various crops, we developed a multiplex real-time polymerase chain reaction high-resolution melting-curve analysis method for the simultaneous qualitative detection of 35S promoter sequence of cauliflower mosaic virus (35SP) and the nopaline synthase terminator (NOST) in several crops. We selected suitable primer sets for the simultaneous detection of 35SP and NOST and designed the primer set for the detection of spiked ColE1 plasmid to evaluate the validity of the polymerase chain reaction (PCR) analyses. In addition, we optimized the multiplex PCR conditions using the designed primer sets and EvaGreen as an intercalating dye. The contamination of unauthorized GMO with single copy similar to NK603 maize can be detected as low as 0.1% in a maize sample. Furthermore, we showed that the present method would be applicable in identifying GMO in various crops and foods like authorized GM soybean, authorized GM potato, the biscuit which is contaminated with GM soybeans and the rice which is contaminated with unauthorized GM rice. We consider this method to be a simple and reliable assay for screening for unauthorized GMO in crops and the processing food products.
Hwang, Hsin-Ginn; Han, Hwai-En; Kuo, Kuang-Ming; Liu, Chung-Feng
2012-12-01
This study explores whether Internet users have different privacy concerns regarding the information contained in electronic medical records (EMRs) according to gender, age, occupation, education, and EMR awareness. Based on the Concern for Information Privacy (CFIP) scale developed by Smith and colleagues in 1996, we conducted an online survey using 15 items in four dimensions, namely, collection, unauthorized access, secondary use, and errors, to investigate Internet users' concerns regarding the privacy of EMRs under health information exchanges (HIE). We retrieved 213 valid questionnaires. The results indicate that the respondents had substantial privacy concerns regarding EMRs and their educational level and EMR awareness significantly influenced their privacy concerns regarding unauthorized access and secondary use of EMRs. This study recommends that the Taiwanese government organizes a comprehensive EMR awareness campaign, emphasizing unauthorized access and secondary use of EMRs. Additionally, to cultivate the public's understanding of EMRs, the government should employ various media, especially Internet channels, to promote EMR awareness, thereby enabling the public to accept the concept and use of EMRs. People who are highly educated and have superior EMR awareness should be given a comprehensive explanation of how hospitals protect patients' EMRs from unauthorized access and secondary use to address their concerns. Thus, the public can comprehend, trust, and accept the use of EMRs, reducing their privacy concerns, which should facilitate the future implementation of HIE.
2015-06-01
Katherine Herbig, Espionage by the Numbers: A Statistical Overview, accessed April 14, 2015, http://www.wright.edu/rsp/Security/Treason/Numbers.htm 5...submitted for top-secret clearances with “derogatory financial information.”43 The debt amount reviewed was $500 in delinquency for at least 120 days, which...Investigative Service’s (DIS) “ delinquent debt criteria with amount of delinquent debt” and Defense Central Index of Investigation’s (DCII) final
Bean, Frank D; Leach, Mark A; Brown, Susan K; Bachmeier, James D; Hipp, John R
2011-01-01
This research compares several national-origin groups in terms of how parents’ entry, legalization and naturalization (i.e., membership) statuses relate to their children’s educational attainment. In the case of Asian groups, the members of which predominantly come to the United States as permanent legal migrants, we hypothesize (1) that father’s and mother’s statuses will be relatively homogenous and few in number and (2) that these will exert minimal net effects on second-generation attainment. For Mexicans, many of whom initially come as temporary unauthorized migrants, we hypothesize (1) that parental status combinations will be heterogeneous and greater in number and (2) that marginal membership statuses will exert negative net effects on education in the second generation. To assess these ideas, we analyze unique intergenerational data from Los Angeles on the young adult members of second-generation national-origin groups and their parents. The findings show that Asian immigrant groups almost universally exhibit similar father–mother migration statuses and high educational attainment among children. By contrast, Mexicans manifest more numerous discrepant father–mother combinations, with those in which the mother remains unauthorized carrying negative implications for children’s schooling. The paper discusses the theoretical and policy implications of the delays in incorporation that result from Mexican Americans needing extra time and resources compared to the members of other groups to overcome their handicap of marginal membership status (i.e., being more likely to enter and remain unauthorized).
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao, Yongjian; He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-10
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
He, Yichuan; Li, Fagen; Jiang, Shaoquan; Zhou, Shijie
2018-01-01
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. PMID:29320418
Transfer of Invasive Species Associated with the Movement of Military Equipment and Personnel
2007-07-01
are examples of each type of violation, and what actions to take upon discovery of the violation. 3.7.1. Petty Violations: 3.7.1.1. Pornographic ...ERDC/EL TR-07-8 64 4.5.2.1. Pornographic magazines 4.5.2.2. A small quantity of an unauthorized war trophy. 4.5.2.3. Ammunition. 4.5.2.4. A...upon discovery of the violation. 5.6.2. Petty Violations: 5.6.2.1. Pornographic magazines 5.6.2.2. A small quantity of an unauthorized war trophy
Gaiser, Hilary; Ho, Connie; Janier, Nicole; Wee, Amy; Johnson, Catherine; Watanabe, Ronald
2017-03-01
To describe practitioner experiences regarding ocular complications in patients wearing decorative contact lenses, and to investigate the compliance of unauthorized distributors of decorative contact lenses to current Food and Drug Administration (FDA) and Federal Trade Commission (FTC) regulations. Also, to provide data to support a more targeted public health approach to reducing the incidence of illegal contact lens sales and associated ocular complications. An institutional review board-approved online survey was distributed through mass email to a list of 98 optometrists in the Boston, MA area. Concurrently, an empirical evaluation of independent, online decorative contact lens sellers who were not associated with FDA-approved contact lens manufacturers was performed to determine their adherence to FDA and FTC guidelines. The first 18 noncoincidental websites that resulted from a Google search for "costume contact lens sellers" and "cosmetic contact lens sellers" were examined as to the brands and parameters of lenses being sold, whether or not a valid prescription was required or verified, and if consumer education was provided. Twenty-two optometrists completed the online survey. Seventy-seven percent of respondents reported having patients with complications from decorative contact lenses that were purchased both legally and illegally. The most common age group for complications was 18 to 25 years (61%). One third of complications were seen in first-time lens wearers, half of whom never received proper care instructions or were unaware that care instructions existed. One quarter of the lenses were purchased illegally with unlicensed stores being the most common place of purchase. Of the 18 online sites examined, 72% of sellers failed to adhere to FTC and FDA regulations. A significant number of individuals who obtain contact lenses illegally from unauthorized sources are young adults. Most unauthorized sellers reviewed did not adhere to the proper protocol for selling contact lenses or instruct their customers on proper lens wear and care. A significant percentage of optometrists responding to the survey reported complications associated with contact lenses purchased through unauthorized sources, suggesting that the risk of contact lens-related complications increases when the lenses are purchased from one of these sources.
Sapkota, Sanjeeb; Kohl, Harold W; Gilchrist, Julie; McAuliffe, Jay; Parks, Bruce; England, Bob; Flood, Tim; Sewell, C Mack; Perrotta, Dennis; Escobedo, Miguel; Stern, Corrine E; Zane, David; Nolte, Kurt B
2006-07-01
We examined the major causes of and risk factors for death among migrants who died while making unauthorized border crossings into the United States from Mexico. Decedents were included in the study if (1) their remains were found between January 1, 2002, and December 31, 2003, in any US county along the 650-mi (1040-km) section of the US-Mexican border from Yuma, Ariz, to El Paso, Tex; (2) their immigration status was unauthorized; and (3) they were believed to have died during transit from Mexico to the United States. Characteristics of the decedents and causes of and risk factors for their deaths were examined. Among the 409 decedents meeting our inclusion criteria, environmental heat exposure (n=250; 61.1%) was the leading cause of death, followed by vehicle crashes (n=33; 8.1%) and drownings (n=24; 5.9%). Male decedents (n= 298; 72.8%) outnumbered female decedents (n = 105; 25.6%) nearly 3 to 1. More than half of the decedents were known to be Mexican nationals (n=235; 57.5%) and were aged 20 to 39 years (n=213; 52.0%); the nationality of 148 (36.2%) decedents was undetermined. Deaths among migrants making unauthorized crossings of the US-Mexican border are due to causes that are largely preventable. Prevention strategies should target young Mexican men, and focus on preventing them from conceiving plans to cross the border, discouraging them from using dangerous routes as crossing points, and providing search-and-rescue teams to locate lost or injured migrant crossers.
Unauthorized Border Crossings and Migrant Deaths: Arizona, New Mexico, and El Paso, Texas, 2002–2003
Sapkota, Sanjeeb; Kohl, Harold W.; Gilchrist, Julie; McAuliffe, Jay; Parks, Bruce; England, Bob; Flood, Tim; Sewell, C. Mack; Perrotta, Dennis; Escobedo, Miguel; Stern, Corrine E.; Zane, David; Nolte, Kurt B.
2006-01-01
Objectives. We examined the major causes of and risk factors for death among migrants who died while making unauthorized border crossings into the United States from Mexico. Methods. Decedents were included in the study if (1) their remains were found between January 1, 2002, and December 31, 2003, in any US county along the 650-mi (1040-km) section of the US–Mexican border from Yuma, Ariz, to El Paso, Tex; (2) their immigration status was unauthorized; and (3) they were believed to have died during transit from Mexico to the United States. Characteristics of the decedents and causes of and risk factors for their deaths were examined. Results. Among the 409 decedents meeting our inclusion criteria, environmental heat exposure (n=250; 61.1%) was the leading cause of death, followed by vehicle crashes (n=33; 8.1%) and drownings (n=24; 5.9%). Male decedents (n= 298; 72.8%) outnumbered female decedents (n = 105; 25.6%) nearly 3 to 1. More than half of the decedents were known to be Mexican nationals (n=235; 57.5%) and were aged 20 to 39 years (n=213; 52.0%); the nationality of 148 (36.2%) decedents was undetermined. Conclusions. Deaths among migrants making unauthorized crossings of the US–Mexican border are due to causes that are largely preventable. Prevention strategies should target young Mexican men, and focus on preventing them from conceiving plans to cross the border, discouraging them from using dangerous routes as crossing points, and providing search-and-rescue teams to locate lost or injured migrant crossers. PMID:16735618
Gnanashanmugam, G.; Balakrishnan, R.; Somasundaram, S. P.; Parimalam, N.; Rajmohan, P.; Pranesh, M. B.
2018-01-01
Context: Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. Subjects and Methods: This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC)-CASPR2 Ab in selected patients. Results: Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100%) had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25%) patients had fasciculations and myokymia. Fifteen patients (46.86%) had autonomic dysfunction (postural hypotension and resting tachycardia). Nine (28.12%) patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Conclusions: Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines. PMID:29720798
Gnanashanmugam, G; Balakrishnan, R; Somasundaram, S P; Parimalam, N; Rajmohan, P; Pranesh, M B
2018-01-01
Mercury is used extensively in the preparation of Siddha medicines, after purification. In this study, we present 32 patients of mercury toxicity following unauthorized Siddha medicine intake who mimicked neuromyotonia clinically. We analyzed the clinical features of these patients, the role of autoimmunity in etiopathology, and compared it with acquired neuromyotonia. This is a retrospective study to analyze inpatients in a tertiary care center, admitted with mercury toxicity following Siddha medicine intake from August 2012 to October 2016. We analyzed the clinical features, laboratory data including mercury, arsenic and lead levels in blood, and serum voltage-gated potassium channels (VGKC)-CASPR2 Ab in selected patients. Thirty-two patients who had high blood mercury levels following Siddha medicine intake were included in the study. All patients (100%) had severe intractable neuropathic pain predominantly involving lower limbs. Twenty-six (81.25%) patients had fasciculations and myokymia. Fifteen patients (46.86%) had autonomic dysfunction (postural hypotension and resting tachycardia). Nine (28.12%) patients had encephalopathic features such as dullness, apathy, drowsiness, or delirium. Anti-VGKC Ab was positive in 12 patients with myokymia. All the patients in the study consumed Siddha medicines obtained from unauthorized dealers. Mercury toxicity following Siddha medicine intake closely mimics acquired neuromyotonia; severe intolerable neuropathic pain is the hallmark feature; Positive VGKC-CASPR2 antibody in some patients must be due to triggered autoimmunity secondary to mercury toxicity due to Siddha medicine intake. The government should establish licensing system to prevent distribution of unauthorized Siddha medicines.
Ultra Safe And Secure Blasting System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hart, M M
2009-07-27
The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less
Kim, Jae-Hwan; Park, Saet-Byul; Roh, Hyo-Jeong; Park, Sunghoon; Shin, Min-Ki; Moon, Gui Im; Hong, Jin-Hwan; Kim, Hae-Yeong
2015-06-01
With the increasing number of genetically modified (GM) events, unauthorized GMO releases into the food market have increased dramatically, and many countries have developed detection tools for them. This study described the qualitative and quantitative detection methods of unauthorized the GM wheat MON71800 with a reference plasmid (pGEM-M71800). The wheat acetyl-CoA carboxylase (acc) gene was used as the endogenous gene. The plasmid pGEM-M71800, which contains both the acc gene and the event-specific target MON71800, was constructed as a positive control for the qualitative and quantitative analyses. The limit of detection in the qualitative PCR assay was approximately 10 copies. In the quantitative PCR assay, the standard deviation and relative standard deviation repeatability values ranged from 0.06 to 0.25 and from 0.23% to 1.12%, respectively. This study supplies a powerful and very simple but accurate detection strategy for unauthorized GM wheat MON71800 that utilizes a single calibrator plasmid. Copyright © 2014 Elsevier Ltd. All rights reserved.
Trusted Computing Technologies, Intel Trusted Execution Technology.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Guise, Max Joseph; Wendt, Jeremy Daniel
2011-01-01
We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorizedmore » users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.« less
Development of unauthorized airborne emission source identification procedure
NASA Astrophysics Data System (ADS)
Shtripling, L. O.; Bazhenov, V. V.; Varakina, N. S.; Kupriyanova, N. P.
2018-01-01
The paper presents the procedure for searching sources of unauthorized airborne emissions. To make reasonable regulation decisions on airborne pollutant emissions and to ensure the environmental safety of population, the procedure provides for the determination of a pollutant mass emission value from the source being the cause of high pollution level and the search of a previously unrecognized contamination source in a specified area. To determine the true value of mass emission from the source, the minimum of the mean-root-square mismatch criterion between the computed and measured pollutant concentration in the given location is used.
Self-control program in the treatment of obesity.
Rosen, L W
1981-06-01
In a pilot study utilizing self-control techniques for the purpose of modifying the cue-reactive eating habits of obese patients, three subjects maintained a continuous weight loss throughout the first year of treatment. Techniques included goal setting, self-monitoring, brief delay and self-confrontation prior to eating unauthorized food and direct observation of oneself in a mirror when eating unauthorized food. All patients are expected to remain in treatment for the foreseeable future with no termination of the program despite apparent success with regard to control of their feeding disturbance. The rationale for this approach is discussed.
Detecting un-authorized genetically modified organisms (GMOs) and derived materials.
Holst-Jensen, Arne; Bertheau, Yves; de Loose, Marc; Grohmann, Lutz; Hamels, Sandrine; Hougs, Lotte; Morisset, Dany; Pecoraro, Sven; Pla, Maria; Van den Bulcke, Marc; Wulff, Doerte
2012-01-01
Genetically modified plants, in the following referred to as genetically modified organisms or GMOs, have been commercially grown for almost two decades. In 2010 approximately 10% of the total global crop acreage was planted with GMOs (James, 2011). More than 30 countries have been growing commercial GMOs, and many more have performed field trials. Although the majority of commercial GMOs both in terms of acreage and specific events belong to the four species: soybean, maize, cotton and rapeseed, there are another 20+ species where GMOs are commercialized or in the pipeline for commercialization. The number of GMOs cultivated in field trials or for commercial production has constantly increased during this time period. So have the number of species, the number of countries involved, the diversity of novel (added) genetic elements and the global trade. All of these factors contribute to the increasing complexity of detecting and correctly identifying GMO derived material. Many jurisdictions, including the European Union (EU), legally distinguish between authorized (and therefore legal) and un-authorized (and therefore illegal) GMOs. Information about the developments, field trials, authorizations, cultivation, trade and observations made in the official GMO control laboratories in different countries around the world is often limited, despite several attempts such as the OECD BioTrack for voluntary dissemination of data. This lack of information inevitably makes it challenging to detect and identify GMOs, especially the un-authorized GMOs. The present paper reviews the state of the art technologies and approaches in light of coverage, practicability, sensitivity and limitations. Emphasis is put on exemplifying practical detection of un-authorized GMOs. Although this paper has a European (EU) bias when examples are given, the contents have global relevance. Copyright © 2012 Elsevier Inc. All rights reserved.
Analysis of factors associated with traffic injury severity on rural roads in Iran.
Kashani, Ali Tavakoli; Shariat-Mohaymany, Afshin; Ranjbari, Andishe
2012-01-01
Iran is a country with one of the highest rates of traffic crash fatality and injury, and seventy percent of these fatalities happen on rural roads. The objective of this study is to identify the significant factors influencing injury severity among drivers involved in crashes on two kinds of major rural roads in Iran: two-lane, two-way roads and freeways. According to the dataset, 213569 drivers were involved in rural road crashes in Iran, over the 3 years from 2006 to 2008. The Classification And Regression Tree method (CART) was applied for 13 independent variables, and one target variable of injury severity with 3 classes of no-injury, injury and fatality. Some of the independent variables were cause of crash, collision type, weather conditions, road surface conditions, driver's age and gender and seat belt usage. The CART model was trained by 70% of these data, and tested with the rest. It was indicated that seat belt use is the most important safety factor for two-lane, two-way rural roads, but on freeways, the importance of this variable is less. Cause of crash, also turned out to be the next most important variable. The results showed that for two-lane, two-way rural roads, "improper overtaking" and "speeding", and for rural freeways, "inattention to traffic ahead", "vehicle defect", and "movement of pedestrians, livestock and unauthorized vehicles on freeways" are the most serious causes of increasing injury severity. The analysis results revealed seat belt use, cause of crash and collision type as the most important variables influencing the injury severity of traffic crashes. To deal with these problems, intensifying police enforcement by means of mobile patrol vehicles, constructing overtaking lanes where necessary, and prohibiting the crossing of pedestrians and livestock and the driving of unauthorized vehicles on freeways are necessary. Moreover, creating a rumble strip on the two edges of roads, and paying attention to the design consistency of roads can be a helpful factor in order to prevent events such as "overturning" and improve the overall safety of freeways.
Marcelli, E A; Heer, D M
1998-01-01
"Using a unique 1994 Los Angeles County Household Survey of foreign-born Mexicans and the March 1994 and 1995 Current Population Surveys, we estimate the number of unauthorized Mexican immigrants (UMIs) residing in Los Angeles County, and compare their use of seven welfare programs with that of other non-U.S. citizens and U.S. citizens. Non-U.S. citizens were found to be no more likely than U.S. citizens to have used welfare, and UMIs were 11% (14%) less likely than other non-citizens (U.S.-born citizens).... We demonstrate how results differ depending on the unit of analysis employed, and on which programs constitute ¿welfare'." excerpt
Cybersecurity for Connected Diabetes Devices
Klonoff, David C.
2015-01-01
Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. PMID:25883162
Cybersecurity for Connected Diabetes Devices.
Klonoff, David C
2015-04-16
Diabetes devices are increasingly connected wirelessly to each other and to data-displaying reader devices. Threats to the accurate flow of information and commands may compromise the function of these devices and put their users at risk of health complications. Sound cybersecurity of connected diabetes devices is necessary to maintain confidentiality, integrity, and availability of the data and commands. Diabetes devices can be hacked by unauthorized agents and also by patients themselves to extract data that are not automatically provided by product software. Unauthorized access to connected diabetes devices has been simulated and could happen in reality. A cybersecurity standard designed specifically for connected diabetes devices will improve the safety of these products and increase confidence of users that the products will be secure. © 2015 Diabetes Technology Society.
Code of Federal Regulations, 2010 CFR
2010-10-01
... designated. One of the following classifications will be shown: (1) Top secret means information, the... national security. (2) Secret means information, the unauthorized disclosure of which reasonably could be...
Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks
Xiong, Ke; Zhang, Yu; Li, Dandan; Zhong, Zhangdui
2013-01-01
This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user's reception. We formulate the joint beamforming and AN (BFA) design into an optimization problem such that the received signal-to-interference-ratio (SINR) at the two legitimate users is over a predefined QoS threshold while limiting the received SINR at the unauthorized user which is under a certain secure threshold. The objective of the optimization problem is to seek the optimal AN and beamforming vectors to minimize the total power consumed by the relay node. Since the optimization problem is nonconvex, we solve it by using semidefinite program (SDP) relaxation. For comparison, we also study the optimal relay beamforming without using AN (BFO) under the same QoS discrimination constraints. Simulation results show that both the proposed BFA and BFO can achieve the QoS discrimination of the two-way transmission. However, the proposed BFA yields significant power savings and lower infeasible rates compared with the BFO method. PMID:24391459
Scholtens, Ingrid; Laurensse, Emile; Molenaar, Bonnie; Zaaijer, Stephanie; Gaballo, Heidi; Boleij, Peter; Bak, Arno; Kok, Esther
2013-09-25
Nowadays most animal feed products imported into Europe have a GMO (genetically modified organism) label. This means that they contain European Union (EU)-authorized GMOs. For enforcement of these labeling requirements, it is necessary, with the rising number of EU-authorized GMOs, to perform an increasing number of analyses. In addition to this, it is necessary to test products for the potential presence of EU-unauthorized GMOs. Analysis for EU-authorized and -unauthorized GMOs in animal feed has thus become laborious and expensive. Initial screening steps may reduce the number of GMO identification methods that need to be applied, but with the increasing diversity also screening with GMO elements has become more complex. For the present study, the application of an informative detailed 24-element screening and subsequent identification strategy was applied in 50 animal feed samples. Almost all feed samples were labeled as containing GMO-derived materials. The main goal of the study was therefore to investigate if a detailed screening strategy would reduce the number of subsequent identification analyses. An additional goal was to test the samples in this way for the potential presence of EU-unauthorized GMOs. Finally, to test the robustness of the approach, eight of the samples were tested in a concise interlaboratory study. No significant differences were found between the results of the two laboratories.
Cannabis for therapeutic purposes: patient characteristics, access, and reasons for use.
Walsh, Zach; Callaway, Robert; Belle-Isle, Lynne; Capler, Rielle; Kay, Robert; Lucas, Philippe; Holtzman, Susan
2013-11-01
The authorized and unauthorized use of cannabis for therapeutic purposes (CTP) has increased dramatically in recent years, and physicians have called for further research to better clarify the parameters of effective and appropriate use. We report findings from a large cross-sectional study of the use of CTP in Canada and compare use across medical conditions and across authorized and unauthorized users. We examined cannabis use history, medical conditions and symptoms, patterns of current use of CTP, modes of access and perceived effectiveness among 628 self-selected Canadians consumers of CTP. Participants were recruited from medical cannabis dispensaries and from organizations that assist users of CTP. Patients reported using cannabis to treat multiple symptoms, with sleep, pain, and anxiety being the most common. Cannabis was perceived to provide effective symptoms relief across medical conditions. Patterns of use were also consistent across medical conditions. Notable differences were observed with regard to modes of access. Across medical conditions respondents reported using cannabis to effectively address diverse symptoms. Results indicate a substantial disconnect between the therapeutic use of cannabis and research on the risks and benefits of such use; particularly with regard to the anxiolytic and sedative use of cannabis. Authorized and unauthorized users exhibited few meaningful differences with regard to medical conditions and patterns of use, but faced substantial differences regarding access. Copyright © 2013 Elsevier B.V. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-07-01
... characteristics. (e) Information. Any fact or concept regardless of the physical form or characteristics of the... material control measures designed to deter, prevent, detect, and respond to unauthorized possession, use...
5 CFR 1312.4 - Classified designations.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Top Secret. This classification shall be applied only to information the unauthorized disclosure of... original classification authority is able to identify or describe. (2) Secret. This classification shall be...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
6 CFR 27.230 - Risk-based performance standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... countersurveillance, frustration of opportunity to observe potential targets, surveillance and sensing systems, and..., including by preventing unauthorized onsite or remote access to critical process controls, such as...
33 CFR 51.8 - Relevant considerations.
Code of Federal Regulations, 2010 CFR
2010-07-01
...; qualification for reenlistment; capability to adjust to military service; and family or personal problems. (c... received; promotions and demotions; prior military service and type of discharge; records of unauthorized...
7 CFR 3560.750 - OMB control number.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.750 OMB control number..., including time for reviewing instructions, searching existing data sources, gathering and maintaining the...
7 CFR 3560.750 - OMB control number.
Code of Federal Regulations, 2013 CFR
2013-01-01
... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.750 OMB control number..., including time for reviewing instructions, searching existing data sources, gathering and maintaining the...
7 CFR 3560.750 - OMB control number.
Code of Federal Regulations, 2011 CFR
2011-01-01
... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.750 OMB control number..., including time for reviewing instructions, searching existing data sources, gathering and maintaining the...
7 CFR 3560.750 - OMB control number.
Code of Federal Regulations, 2012 CFR
2012-01-01
... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.750 OMB control number..., including time for reviewing instructions, searching existing data sources, gathering and maintaining the...
7 CFR 3560.750 - OMB control number.
Code of Federal Regulations, 2014 CFR
2014-01-01
... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Unauthorized Assistance § 3560.750 OMB control number..., including time for reviewing instructions, searching existing data sources, gathering and maintaining the...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2011 CFR
2011-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2010 CFR
2010-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2014 CFR
2014-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2012 CFR
2012-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
31 CFR 31.217 - Confidentiality of information.
Code of Federal Regulations, 2013 CFR
2013-07-01
... facilities and storage containers where nonpublic information is stored. (2) Security measures to detect and prevent unauthorized access to computer equipment and data storage devices that store or transmit...
Code of Federal Regulations, 2011 CFR
2011-07-01
... include, but are not limited to: indicators of wetland hydrology, hydric soils, and hydrophytic plant... any person who appeals an approved JD associated with an unauthorized activity or applies for an after...
Code of Federal Regulations, 2010 CFR
2010-07-01
... include, but are not limited to: indicators of wetland hydrology, hydric soils, and hydrophytic plant... any person who appeals an approved JD associated with an unauthorized activity or applies for an after...
ERIC Educational Resources Information Center
Wright, Marie A.
1993-01-01
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
7 CFR 1980.398 - Unauthorized assistance and other deficiencies.
Code of Federal Regulations, 2011 CFR
2011-01-01
... proper change orders. (3) Fraud or misrepresentation. A deficiency that involves an action by the Lender... debarment. Examples of this type of deficiency include falsified Verifications of Employment, false...
Code of Federal Regulations, 2010 CFR
2010-04-01
... against unauthorized disclosure and is marked to indicate its classified status when in documentary form... documentary material, regardless of its physical form or characteristics that is owned by, produced by or for... Management. ...
77 FR 5778 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
..., unauthorized destinations or sell to debarred/ Bidder Experience List firms or individuals. The EUC informs the... identified as Munitions List Items and Commerce Control List Items through: Purchase, exchange/trade, or...
7 CFR 3560.707 - Program participation and corrective actions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... tenant, who has received unauthorized assistance, may continue to participate in the project if they have the legal and financial capabilities to do so. Approval considerations for such forbearance and...
31 CFR 321.9 - Specific limitations on payment authority.
Code of Federal Regulations, 2010 CFR
2010-07-01
... FINANCIAL INSTITUTIONS OF UNITED STATES SAVINGS BONDS AND UNITED STATES SAVINGS NOTES (FREEDOM SHARES) Scope..., incomplete or unauthorized inscription, issue date, or issuing agent's validating data, or if any essential...
10 CFR Appendix G to Part 73 - Reportable Safeguards Events
Code of Federal Regulations, 2010 CFR
2010-01-01
... vulnerability in a safeguard system that could allow unauthorized or undetected access to a protected area... the safeguards event log. (a) Any failure, degradation, or discovered vulnerability in a safeguards...
47 CFR 1.80 - Forfeiture proceedings.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Unauthorized substantial transfer of control 8,000 Violation of children's television commercialization or.... 223(b) Dial-a-Porn 75,000/day. Sec. 227(e) 10,000/violation.30,000/day for each day of continuing...
47 CFR 1.80 - Forfeiture proceedings.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unauthorized substantial transfer of control 8,000 Violation of children's television commercialization or.... Sec. 223(b) Dial-a-Porn 80,000/day. Sec. 227(e) 10,000/violation. 30,000/day for each day of...
47 CFR 1.80 - Forfeiture proceedings.
Code of Federal Regulations, 2012 CFR
2012-10-01
... discrimination 9,000 Unauthorized substantial transfer of control 8,000 Violation of children's television...,320. Sec. 220(d) Common Carrier Records & Accounts 9,600/day. Sec. 223(b) Dial-a-Porn 75,000/day. Sec...
47 CFR 1.80 - Forfeiture proceedings.
Code of Federal Regulations, 2014 CFR
2014-10-01
... discrimination 9,000 Unauthorized substantial transfer of control 8,000 Violation of children's television...,320. Sec. 220(d) Common Carrier Records & Accounts 9,600/day. Sec. 223(b) Dial-a-Porn 80,000/day. Sec...
5 CFR 1312.4 - Classified designations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... describe. (3) Confidential. This classification shall be applied only to information the unauthorized... 1312.4 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and...
5 CFR 1312.4 - Classified designations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... describe. (3) Confidential. This classification shall be applied only to information the unauthorized... 1312.4 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and...
5 CFR 1312.4 - Classified designations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... describe. (3) Confidential. This classification shall be applied only to information the unauthorized... 1312.4 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CLASSIFICATION, DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and...
Make safety awareness a priority: Use a login software in your research facility
Camino, Fernando E.
2017-01-21
We report on a facility login software, whose objective is to improve safety in multi-user research facilities. Its most important safety features are: 1) blocks users from entering the lab after being absent for more than a predetermined number of days; 2) gives users a random safety quiz question, which they need to answer satisfactorily in order to use the facility; 3) blocks unauthorized users from using the facility afterhours; and 4) displays the current users in the facility. Besides restricting access to unauthorized users, the software keeps users mindful of key safety concepts. In addition, integration of the softwaremore » with a door controller system can convert it into an effective physical safety mechanism. Depending on DOE approval, the code may be available as open source.« less
Spy the Lie: Detecting Malicious Insiders
DOE Office of Scientific and Technical Information (OSTI.GOV)
Noonan, Christine F.
Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthorized recipients. Inadvertent action or inaction without malicious intent (e.g., disposing of sensitive documents incorrectly) can also cause harm to an organization. This review article will explore insider threat,more » specifically behaviors, beliefs, and current debates within the field. Additionally particular focus is given to deception, a significant behavioral component of the malicious insider. Finally, research and policy implications for law enforcement and the intelligence community are addressed.« less
Make safety awareness a priority: Use a login software in your research facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Camino, Fernando E.
We report on a facility login software, whose objective is to improve safety in multi-user research facilities. Its most important safety features are: 1) blocks users from entering the lab after being absent for more than a predetermined number of days; 2) gives users a random safety quiz question, which they need to answer satisfactorily in order to use the facility; 3) blocks unauthorized users from using the facility afterhours; and 4) displays the current users in the facility. Besides restricting access to unauthorized users, the software keeps users mindful of key safety concepts. In addition, integration of the softwaremore » with a door controller system can convert it into an effective physical safety mechanism. Depending on DOE approval, the code may be available as open source.« less
Wireless LAN security management with location detection capability in hospitals.
Tanaka, K; Atarashi, H; Yamaguchi, I; Watanabe, H; Yamamoto, R; Ohe, K
2012-01-01
In medical institutions, unauthorized access points and terminals obstruct the stable operation of a large-scale wireless local area network (LAN) system. By establishing a real-time monitoring method to detect such unauthorized wireless devices, we can improve the efficiency of security management. We detected unauthorized wireless devices by using a centralized wireless LAN system and a location detection system at 370 access points at the University of Tokyo Hospital. By storing the detected radio signal strength and location information in a database, we evaluated the risk level from the detection history. We also evaluated the location detection performance in our hospital ward using Wi-Fi tags. The presence of electric waves outside the hospital and those emitted from portable game machines with wireless communication capability was confirmed from the detection result. The location detection performance showed an error margin of approximately 4 m in detection accuracy and approximately 5% in false detection. Therefore, it was effective to consider the radio signal strength as both an index of likelihood at the detection location and an index for the level of risk. We determined the location of wireless devices with high accuracy by filtering the detection results on the basis of radio signal strength and detection history. Results of this study showed that it would be effective to use the developed location database containing radio signal strength and detection history for security management of wireless LAN systems and more general-purpose location detection applications.
McConnell, Eileen Diaz
2013-01-01
Housing costs are a substantial component of U.S. household expenditures. Those who allocate a large proportion of their income to housing often have to make difficult financial decisions with significant short-term and long-term implications for adults and children. This study employs cross-sectional data from the first wave of the Los Angeles Family and Neighborhood Survey (L.A.FANS) collected between 2000 and 2002 to examine the most common U.S. standard of housing affordability, the likelihood of spending thirty percent or more of income on shelter costs. Multivariate analyses of a low-income sample of U.S. born Latinos, Whites, African Americans, authorized Latino immigrants and unauthorized Latino immigrants focus on baseline and persistent differences in the likelihood of being cost burdened by race, nativity and legal status. Nearly half or more of each group of low-income respondents experience housing affordability problems. The results suggest that immigrants’ legal status is the primary source of disparities among those examined, with the multivariate analyses revealing large and persistent disparities for unauthorized Latino immigrants relative to most other groups. Moreover, the higher odds of housing cost burden observed for unauthorized immigrants compared with their authorized immigrant counterparts remains substantial, accounting for traditional indicators of immigrant assimilation. These results are consistent with emerging scholarship regarding the role of legal status in shaping immigrant outcomes in the United States. PMID:24077641
Wesco Operating Inc., Lander Field NPDES Proposed Permit
Indian Country, Minor, indust., non-discharge, proposed permit WY-0000221 establishes monitoring and reporting provisions should an unauthorized release of produced water occur from the Wesco Operating, Inc., Lander Field NW Discharge oil production site.
December 1990 EPA/Corps Enforcement Priorities Guidance
Document from 1990 providing guidance to EPA Regions and Army Corps of Engineers on enforcement priorities for unauthorized discharges of dredged or fill materials in violation of section 301 of the Clean Water Act (CWA).
26 CFR 301.7433-1 - Civil cause of action for certain unauthorized collection actions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... disbursements for printing and witnesses; (4) Fees for exemplification and copies of paper necessarily obtained..., certified public accountant, enrolled actuary, or any other person permitted to represent the taxpayer...
26 CFR 301.7433-1 - Civil cause of action for certain unauthorized collection actions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... disbursements for printing and witnesses; (4) Fees for exemplification and copies of paper necessarily obtained..., certified public accountant, enrolled actuary, or any other person permitted to represent the taxpayer...
26 CFR 301.7433-1 - Civil cause of action for certain unauthorized collection actions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... disbursements for printing and witnesses; (4) Fees for exemplification and copies of paper necessarily obtained..., certified public accountant, enrolled actuary, or any other person permitted to represent the taxpayer...
26 CFR 301.7433-1 - Civil cause of action for certain unauthorized collection actions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... disbursements for printing and witnesses; (4) Fees for exemplification and copies of paper necessarily obtained..., certified public accountant, enrolled actuary, or any other person permitted to represent the taxpayer...
78 FR 49653 - Reviewing Our Global Signals Intelligence Collection and Communications Technologies
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-15
... national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. Within 60...
48 CFR 52.245-9 - Use and Charges.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the property to its condition prior to rental (less normal wear and tear). (b) Use of Government... property to its pre-rental condition (less normal wear and tear), or both. (h) Unauthorized use. The...
5 CFR 630.206 - Minimum charge.
Code of Federal Regulations, 2010 CFR
2010-01-01
... reason, may excuse him without charge to leave. (b) When an employee is charged with leave for an unauthorized absence or tardiness, the agency may not require him to perform work for any part of the leave...
10 CFR 835.502 - High and very high radiation areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... device that functions automatically to prevent use or operation of the radiation source or field while... gain unauthorized or inadvertent access to very high radiation areas. (d) No control(s) shall be...
10 CFR 835.502 - High and very high radiation areas.
Code of Federal Regulations, 2013 CFR
2013-01-01
... device that functions automatically to prevent use or operation of the radiation source or field while... gain unauthorized or inadvertent access to very high radiation areas. (d) No control(s) shall be...
42 CFR 482.24 - Condition of participation: Medical record services.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Hospital Functions § 482.24 Condition of participation: Medical record services. The hospital must have a... individuals, and the hospital must ensure that unauthorized individuals cannot gain access to or alter patient...
10 CFR 835.502 - High and very high radiation areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... device that functions automatically to prevent use or operation of the radiation source or field while... gain unauthorized or inadvertent access to very high radiation areas. (d) No control(s) shall be...
10 CFR 835.502 - High and very high radiation areas.
Code of Federal Regulations, 2012 CFR
2012-01-01
... device that functions automatically to prevent use or operation of the radiation source or field while... gain unauthorized or inadvertent access to very high radiation areas. (d) No control(s) shall be...
10 CFR 835.502 - High and very high radiation areas.
Code of Federal Regulations, 2014 CFR
2014-01-01
... device that functions automatically to prevent use or operation of the radiation source or field while... gain unauthorized or inadvertent access to very high radiation areas. (d) No control(s) shall be...
Runway incursion severity risk analysis.
DOT National Transportation Integrated Search
2012-09-14
Runway incursions are defined as the unauthorized presence of a vehicle, pedestrian, or aircraft on a runway. Identifying situations or conditions in which runway incursions are more likely to be severe can suggest policy implications and areas for f...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.13 Safeguarding. Specific controls on the use, processing, storage, reproduction, and transmittal of classified information within the Department to provide protection for such information and to prevent access by unauthorized...
42 CFR 480.108 - Penalties for unauthorized disclosure.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Section 480.108 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION REVIEW INFORMATION Utilization and Quality Control Quality Improvement Organizations...
CD-ROM and Metering--An Overview.
ERIC Educational Resources Information Center
Shear, Victor
1992-01-01
Discusses the need for security and metering features for CD-ROM products. Topics covered include user productivity issues, pricing problems, integrated information resources, advantages of CD-ROM distribution systems, unauthorized use, content encryption, and multiple simultaneous meters. (MES)
Code of Federal Regulations, 2010 CFR
2010-04-01
... Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.13 Safeguarding. Specific controls on the use, processing, storage, reproduction, and transmittal of classified information within the Department to provide protection for such information and to prevent access by unauthorized...
Code of Federal Regulations, 2014 CFR
2014-10-01
... the defense agencies. Electronic part means an integrated circuit, a discrete electronic component... electronic part means an unlawful or unauthorized reproduction, substitution, or alteration that has been knowingly mismarked, misidentified, or otherwise misrepresented to be an authentic, unmodified electronic...
Code of Federal Regulations, 2013 CFR
2013-10-01
... designated. One of the following classifications will be shown: (1) Top secret means information, the... expected to cause serious damage to national security. (3) Confidential means information, the unauthorized... an event which would eliminate the need for continued classification. ...
Code of Federal Regulations, 2014 CFR
2014-10-01
... designated. One of the following classifications will be shown: (1) Top secret means information, the... expected to cause serious damage to national security. (3) Confidential means information, the unauthorized... an event which would eliminate the need for continued classification. ...
Code of Federal Regulations, 2011 CFR
2011-10-01
... designated. One of the following classifications will be shown: (1) Top secret means information, the... expected to cause serious damage to national security. (3) Confidential means information, the unauthorized... an event which would eliminate the need for continued classification. ...
Code of Federal Regulations, 2012 CFR
2012-10-01
... designated. One of the following classifications will be shown: (1) Top secret means information, the... expected to cause serious damage to national security. (3) Confidential means information, the unauthorized... an event which would eliminate the need for continued classification. ...
NASA Astrophysics Data System (ADS)
Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.
2017-11-01
Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.
DNA enrichment approaches to identify unauthorized genetically modified organisms (GMOs).
Arulandhu, Alfred J; van Dijk, Jeroen P; Dobnik, David; Holst-Jensen, Arne; Shi, Jianxin; Zel, Jana; Kok, Esther J
2016-07-01
With the increased global production of different genetically modified (GM) plant varieties, chances increase that unauthorized GM organisms (UGMOs) may enter the food chain. At the same time, the detection of UGMOs is a challenging task because of the limited sequence information that will generally be available. PCR-based methods are available to detect and quantify known UGMOs in specific cases. If this approach is not feasible, DNA enrichment of the unknown adjacent sequences of known GMO elements is one way to detect the presence of UGMOs in a food or feed product. These enrichment approaches are also known as chromosome walking or gene walking (GW). In recent years, enrichment approaches have been coupled with next generation sequencing (NGS) analysis and implemented in, amongst others, the medical and microbiological fields. The present review will provide an overview of these approaches and an evaluation of their applicability in the identification of UGMOs in complex food or feed samples.
The migration response to the Legal Arizona Workers Act
Ellis, Mark; Wright, Richard; Townley, Matthew; Copeland, Kristy
2014-01-01
The 2008 Legal Arizona Workers Act (LAWA) requires all public and private employers to authenticate the legal status of their workers using the federal employment verification system known as E-Verify. With LAWA, Arizona became the first state to have a universal mandate for employment verification. While LAWA targets unauthorized workers, most of whom are Latino immigrants, other groups could experience LAWA’s effects, such as those who share households with undocumented workers. In addition, employers may seek to minimize their risk of LAWA penalties by not hiring those who appear to them as more likely to be unauthorized, such as naturalized Latino immigrants and US-born Latinos. Existing research has found a reduction in foreign-born Latino employment and population in response to LAWA. This paper asks a different question: have groups that are most likely to be affected by the law migrated to other states? We find a significant and sustained increase in the internal outmigration rate from Arizona of foreign-born, noncitizen Latinos - the group most likely to include the unauthorized - after the passage of LAWA. There was no significant LAWA internal migration response by foreign-born Latino citizens. US-born Latinos showed some signs of a LAWA-induced internal migration response after the law went into effect, but it is not sustained. The results indicate that local and state immigration policy can alter the settlement geography of the foreign born. This leads us to speculate about how immigrant settlement may adjust in the coming years to the intersecting geographies of post-recession economic opportunity and tiered immigration policies. PMID:25018590
NASA Astrophysics Data System (ADS)
Laurie, Ronald S.
1995-04-01
The arrival of the information super highway has introduced a number of problems, both for the owners of copyrighted images and for those who would like to legitimately use those images. The digitization of all content, whether still image, animation, video, music, or text, has made copying infinitely easier and cheaper. Further, the instantaneous access to this wealth of digital copyrighted material by millions of potential users, and would-be pirates, has the potential to greatly proliferate the number of unauthorized copies being made. For most of this century, technology has facilitated the unauthorized, and thus uncompensated, use of copyrighted material. Thus, xerography, audio and video recording systems, and personal computers have all contributed to the problem. However, we are entering a new era, where encryption techniques will not only prevent unauthorized use of copyrighted material but facilitate the use of that material by those that are willing to pay a commercially reasonable fee for such use. The technology, referred to as 'information metering,' allows usage fees to be based on a variety of use parameters. Thus, the material can either be 'rented' for a single use or a fixed number of uses, or it can be 'purchased' for an unlimited number of future uses. One price can be charged for on-screen viewing, with a higher price for hard copy print-out. In the case of digital images, the browsing function can be free, while the price of the print-out function can be based on the resolution of the image.
Belza, M José; Figueroa, Carmen; Rosales-Statkus, M Elena; Ruiz, Mónica; Vallejo, Fernando; de la Fuente, Luis
2014-08-01
The objectives of this study were to estimate the percentage of potential users who know that unauthorized HIV self-tests can be purchased online and the percentage of those who have already used them, and to determine socio-demographic and behavioural correlates. A self-administered questionnaire was employed to collect data from attendees at a street-based HIV testing programme. Logistic regression for rare events was performed. Of the 3340 participants, 5.3% (95% confidence interval (CI) 4.5-6.0%) had knowledge of self-tests being sold online and 7.5% (95% CI 6.6-8.5%) thought they existed but had never seen them; only 0.6% (95% CI 0.3-0.9%) had ever used one. Knowing that self-tests are sold online (odds ratio (OR) 3.6, 95% CI 2.4-5.4) and using them (OR 7.3, 95% CI 2.2-23.8) were associated with having undergone more than two previous HIV tests. Use was also associated with being neither Spanish nor Latin American (OR 3.8, 95% CI 1.2-12.0) and with having a university degree (OR 0.2, 95% CI 0.1-0.7). At the time of the study, the impact on the population of issues related to the use of unauthorized tests was very low. However, media coverage following the approval of self-testing in the USA might have changed the situation. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-04
... DEPARTMENT OF COMMERCE United States Patent and Trademark Office Legal Processes ACTION: Proposed... former employees of the United States Patent and Trademark Office (USPTO). The rules for these legal... employee testimony and production of documents in legal proceedings, reports of unauthorized testimony...
Code of Federal Regulations, 2010 CFR
2010-07-01
... United States; or (iv) A corporation, partnership, association, trust, joint venture, limited liability company, limited liability partnership, or any other legal entity, created and authorized to own vessels... NATIONAL VESSEL AND FACILITY CONTROL MEASURES AND LIMITED ACCESS AREAS Unauthorized Entry Into Cuban...
40 CFR 147.2903 - Prohibition of unauthorized injection.
Code of Federal Regulations, 2011 CFR
2011-07-01
... sources of drinking water and the well bore is prohibited. .... 147.2903 Section 147.2903 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... any contaminant into underground sources of drinking water, if the presence of that contaminant may...
40 CFR 147.2903 - Prohibition of unauthorized injection.
Code of Federal Regulations, 2013 CFR
2013-07-01
... sources of drinking water and the well bore is prohibited. .... 147.2903 Section 147.2903 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... any contaminant into underground sources of drinking water, if the presence of that contaminant may...
40 CFR 147.2903 - Prohibition of unauthorized injection.
Code of Federal Regulations, 2012 CFR
2012-07-01
... sources of drinking water and the well bore is prohibited. .... 147.2903 Section 147.2903 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... any contaminant into underground sources of drinking water, if the presence of that contaminant may...
40 CFR 147.2903 - Prohibition of unauthorized injection.
Code of Federal Regulations, 2010 CFR
2010-07-01
... sources of drinking water and the well bore is prohibited. .... 147.2903 Section 147.2903 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... any contaminant into underground sources of drinking water, if the presence of that contaminant may...
40 CFR 147.2903 - Prohibition of unauthorized injection.
Code of Federal Regulations, 2014 CFR
2014-07-01
... sources of drinking water and the well bore is prohibited. .... 147.2903 Section 147.2903 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) WATER... any contaminant into underground sources of drinking water, if the presence of that contaminant may...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Security Information § 0.501 General. Executive Order 12356 requires that information relating to national security be protected against unauthorized disclosure as long as required by national security considerations. The Order also provides that all information classified under Executive Order 12356 or...
26 CFR 301.7209-1 - Unauthorized use or sale of stamps.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., transfers, takes or gives in exchange, or pledges or gives in pledge, except as authorized in the Code or in regulations made pursuant thereto, any stamp, coupon, ticket, book, or other device prescribed by the...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Security Information § 0.501 General. Executive Order 12356 requires that information relating to national security be protected against unauthorized disclosure as long as required by national security considerations. The Order also provides that all information classified under Executive Order 12356 or...
78 FR 58604 - Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-24
... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... AGENCY: Pipeline and Hazardous Materials Safety Administration (PHMSA), DOT. ACTION: Safety Advisory... Investigator, Eastern Region, Office of Hazardous Materials Safety, Pipeline and Hazardous Materials Safety...
Uzbekistan: Recent Developments and U.S. Interests
2005-05-02
the December 26, 2004, Legislative Chamber elections, the government restricted freedom of speech and assembly. In February 2004, the government...5,500. The government severely restricted freedom of speech and the press and continued to prohibit unauthorized public meetings and demonstrations
42 CFR 485.721 - Condition of participation: Clinical records.
Code of Federal Regulations, 2012 CFR
2012-10-01
... information and retrieval of records for research or administrative action. (f) Standard: Location and... information. (a) Standard: Protection of clinical record information. The organization recognizes the confidentiality of clinical record information and provides safeguards against loss, destruction, or unauthorized...
42 CFR 485.721 - Condition of participation: Clinical records.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information and retrieval of records for research or administrative action. (f) Standard: Location and... information. (a) Standard: Protection of clinical record information. The organization recognizes the confidentiality of clinical record information and provides safeguards against loss, destruction, or unauthorized...
42 CFR 485.721 - Condition of participation: Clinical records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information and retrieval of records for research or administrative action. (f) Standard: Location and... information. (a) Standard: Protection of clinical record information. The organization recognizes the confidentiality of clinical record information and provides safeguards against loss, destruction, or unauthorized...
42 CFR 485.721 - Condition of participation: Clinical records.
Code of Federal Regulations, 2014 CFR
2014-10-01
... information and retrieval of records for research or administrative action. (f) Standard: Location and... information. (a) Standard: Protection of clinical record information. The organization recognizes the confidentiality of clinical record information and provides safeguards against loss, destruction, or unauthorized...
42 CFR 485.721 - Condition of participation: Clinical records.
Code of Federal Regulations, 2013 CFR
2013-10-01
... information and retrieval of records for research or administrative action. (f) Standard: Location and... information. (a) Standard: Protection of clinical record information. The organization recognizes the confidentiality of clinical record information and provides safeguards against loss, destruction, or unauthorized...
U.S. Immigration Policy and Globalization.
ERIC Educational Resources Information Center
Martin, Philip; Martin, Susan
2001-01-01
Focuses on U.S. immigration, exploring global issues that affect immigration, such as: economic trends, post-cold war events, and transnationalism. Addresses legal immigration, including permanent and temporary status, refugees and asylees, unauthorized migration, integrating immigrants, and administration of immigration programs. (CMK)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-25
... DEPARTMENT OF COMMERCE Patent and Trademark Office Legal Processes ACTION: Proposed collection... legal processes may be found under 37 CFR Part 104, which outlines procedures for service of process, demands for employee testimony and production of documents in legal proceedings, reports of unauthorized...
46 CFR 503.59 - Safeguarding classified information.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Information Security Program § 503.59 Safeguarding classified information. (a) All classified information... security; (2) Takes appropriate steps to protect classified information from unauthorized disclosure or... security check; (2) To protect the classified information in accordance with the provisions of Executive...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Trespass. 160.3 Section 160.3 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Trespass. 160.3 Section 160.3 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Trespass. 160.3 Section 160.3 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Trespass. 160.3 Section 160.3 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
78 FR 58604 - Safety Advisory: Unauthorized Filling of Compressed Gas Cylinders
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-24
... questions the condition of all of the cylinders owned and filled by Komer Carbonic Corp. in the past 5 years... through a visual inspection and a pressure test at least once every 5 years. Cylinders that are not...
42 CFR 480.108 - Penalties for unauthorized disclosure.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SERVICES (CONTINUED) QUALITY IMPROVEMENT ORGANIZATIONS ACQUISITION, PROTECTION, AND DISCLOSURE OF QUALITY IMPROVEMENT ORGANIZATION REVIEW INFORMATION Utilization and Quality Control Quality Improvement Organizations... information not authorized under Title XI Part B of the Act or the regulations of this part will, upon...
An analysis of runway-taxiway transgressions at controlled airports
DOT National Transportation Integrated Search
1981-04-01
The purpose of this study was to determine the cause of aircraft making inadvertent or unauthorized takeoffs and transgressions onto active runways during takeoff and landing operations. The study was conducted in four phases: (1) Prior studies by FA...
Code of Federal Regulations, 2010 CFR
2010-07-01
... receiving any credible information that records are at risk of actual, impending, or threatened damage, alienation, or unauthorized destruction, NARA will contact the agency as follows: (a) If the threat has not...
NASA Technical Reports Server (NTRS)
Burley, Richard K.; Guirguis, Kamal S.
1991-01-01
Simple, cheap device locks valve stem so its setting cannot be changed by unauthorized people. Device covers valve stem; cover locked in place with standard padlock. Valve lock made of PVC pipe and packing band. Shears, drill or punch, and forming rod only tools needed.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Trespass. 160.3 Section 160.3 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) TRESPASSING ON COMMISSION PROPERTY § 160.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-26
... improve its sewage collection system including addressing Unauthorized Discharges such as sanitary sewer... used in the sewage collection system. The Department of Justice will receive for a period of thirty (30...
40 CFR 271.12 - Requirements for hazardous waste management facilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and 266. These standards shall include: (a) Technical standards for tanks, containers, waste piles...-closure monitoring and maintenance; (e) Groundwater monitoring; (f) Security to prevent unauthorized access to the facility; (g) Facility personnel training; (h) Inspections, monitoring, recordkeeping, and...
40 CFR 271.12 - Requirements for hazardous waste management facilities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... and 266. These standards shall include: (a) Technical standards for tanks, containers, waste piles...-closure monitoring and maintenance; (e) Groundwater monitoring; (f) Security to prevent unauthorized access to the facility; (g) Facility personnel training; (h) Inspections, monitoring, recordkeeping, and...
40 CFR 271.12 - Requirements for hazardous waste management facilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... and 266. These standards shall include: (a) Technical standards for tanks, containers, waste piles...-closure monitoring and maintenance; (e) Groundwater monitoring; (f) Security to prevent unauthorized access to the facility; (g) Facility personnel training; (h) Inspections, monitoring, recordkeeping, and...
40 CFR 271.12 - Requirements for hazardous waste management facilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... and 266. These standards shall include: (a) Technical standards for tanks, containers, waste piles...-closure monitoring and maintenance; (e) Groundwater monitoring; (f) Security to prevent unauthorized access to the facility; (g) Facility personnel training; (h) Inspections, monitoring, recordkeeping, and...
40 CFR 271.12 - Requirements for hazardous waste management facilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... and 266. These standards shall include: (a) Technical standards for tanks, containers, waste piles...-closure monitoring and maintenance; (e) Groundwater monitoring; (f) Security to prevent unauthorized access to the facility; (g) Facility personnel training; (h) Inspections, monitoring, recordkeeping, and...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2013 CFR
2013-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2014 CFR
2014-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2012 CFR
2012-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
49 CFR 40.351 - What confidentiality requirements apply to service agents?
Code of Federal Regulations, 2011 CFR
2011-10-01
... confidentiality and security measures to ensure that confidential employee records are not available to unauthorized persons. This includes protecting the physical security of records, access controls, and computer security measures to safeguard confidential data in electronic data bases. ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security Program...) National security means the national defense or foreign relations of the United States. (m) Need to know... new form into a new document. (s) Unauthorized disclosure means a communication or physical transfer...
78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... Smart Power Distribution Junction Box (SPDJB), the PEPS/RFA module, the power train control module and a... listed in Sec. 543.6(a)(3): promoting activation; attracting attention to the efforts of unauthorized...
33 CFR 105.260 - Security measures for restricted areas.
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance systems to detect unauthorized entry or movement within restricted areas; (7) Directing the parking...
33 CFR 105.260 - Security measures for restricted areas.
Code of Federal Regulations, 2011 CFR
2011-07-01
...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance systems to detect unauthorized entry or movement within restricted areas; (7) Directing the parking...
33 CFR 326.3 - Unauthorized activities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... requiring permits, district engineers should make the best use of all available resources. Corps employees... required, the district engineer should consider whether serious jeopardy to life, property, or important... detrimental impacts to the satisfaction of the district engineer. (ii) No permit application will be accepted...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2012 CFR
2012-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... prevents unauthorized retrieval, such as shredding or incineration. (f) Transmission of information. PCII... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected Critical...
48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., record, and data communications, including management information systems and local data networks that...) Sensitive information means any information the loss, misuse, or modification of which, or unauthorized... subcontractors to transmit— (i) Classified or sensitive information; (ii) Matters involving intelligence...
48 CFR 2452.239-70 - Access to HUD systems.
Code of Federal Regulations, 2013 CFR
2013-10-01
... information of which the loss, misuse, or unauthorized access to, or modification of, could adversely affect... normally includes hardware, software, information, data, applications, communications, and people (see OMB..., using, or operating the system or applications(s). (c) Citizenship-related requirements. Each affected...
22 CFR 9.4 - Original classification.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 22 Foreign Relations 1 2014-04-01 2014-04-01 false Original classification. 9.4 Section 9.4... classification. (a) Definition. Original classification is the initial determination that certain information... classification. (b) Classification levels. (1) Top Secret shall be applied to information the unauthorized...
22 CFR 9.4 - Original classification.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 22 Foreign Relations 1 2013-04-01 2013-04-01 false Original classification. 9.4 Section 9.4... classification. (a) Definition. Original classification is the initial determination that certain information... classification. (b) Classification levels. (1) Top Secret shall be applied to information the unauthorized...
22 CFR 9.4 - Original classification.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 22 Foreign Relations 1 2012-04-01 2012-04-01 false Original classification. 9.4 Section 9.4... classification. (a) Definition. Original classification is the initial determination that certain information... classification. (b) Classification levels. (1) Top Secret shall be applied to information the unauthorized...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Trespass. 860.3 Section 860.3 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Trespass. 860.3 Section 860.3 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Trespass. 860.3 Section 860.3 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Trespass. 860.3 Section 860.3 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Trespass. 860.3 Section 860.3 Energy DEPARTMENT OF ENERGY TRESPASSING ON DEPARTMENT OF ENERGY PROPERTY § 860.3 Trespass. Unauthorized entry upon any facility, installation or real property subject to this part is prohibited. ...
31 CFR 31.211 - Organizational conflicts of interest.
Code of Federal Regulations, 2014 CFR
2014-07-01
... prevent unauthorized people from learning nonpublic information relating to the arrangement and isolate key individuals from learning how their performance under the arrangement could affect the financial... learning of a potential organizational conflict of interest, disclose the potential conflict of interest in...
31 CFR 31.211 - Organizational conflicts of interest.
Code of Federal Regulations, 2011 CFR
2011-07-01
... prevent unauthorized people from learning nonpublic information relating to the arrangement and isolate key individuals from learning how their performance under the arrangement could affect the financial... report any potential organizational conflict of interest. Within five (5) business days after learning of...
31 CFR 31.211 - Organizational conflicts of interest.
Code of Federal Regulations, 2013 CFR
2013-07-01
... prevent unauthorized people from learning nonpublic information relating to the arrangement and isolate key individuals from learning how their performance under the arrangement could affect the financial... learning of a potential organizational conflict of interest, disclose the potential conflict of interest in...
31 CFR 31.211 - Organizational conflicts of interest.
Code of Federal Regulations, 2012 CFR
2012-07-01
... prevent unauthorized people from learning nonpublic information relating to the arrangement and isolate key individuals from learning how their performance under the arrangement could affect the financial... learning of a potential organizational conflict of interest, disclose the potential conflict of interest in...
22 CFR 9.4 - Original classification.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Original classification. 9.4 Section 9.4... classification. (a) Definition. Original classification is the initial determination that certain information... classification. (b) Classification levels. (1) Top Secret shall be applied to information the unauthorized...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
7 CFR 272.4 - Program administration and personnel requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administration offices, community action agencies, planning agencies, migrant service organizations, and school... area. (c) Internal controls—(1) Requirements. In order to safeguard certification and issuance records... unit to another, supervisory controls should be sufficient to assure that the unauthorized creation or...
32 CFR 2400.9 - Classification requirements.
Code of Federal Regulations, 2014 CFR
2014-07-01
....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...
32 CFR 2400.9 - Classification requirements.
Code of Federal Regulations, 2011 CFR
2011-07-01
....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...
32 CFR 2400.9 - Classification requirements.
Code of Federal Regulations, 2012 CFR
2012-07-01
....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...
32 CFR 2400.9 - Classification requirements.
Code of Federal Regulations, 2010 CFR
2010-07-01
....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...
32 CFR 2400.9 - Classification requirements.
Code of Federal Regulations, 2013 CFR
2013-07-01
....9 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY... unauthorized disclosure as determined by the Director, Office of Science and Technology Policy. Each such...
12 CFR 403.1 - General policies and definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information requires, in the interest of national security, protection against unauthorized disclosure... SAFEGUARDING OF NATIONAL SECURITY INFORMATION § 403.1 General policies and definitions. (a) This regulation of..., declassification, and safeguarding of national security information and material of the United States. This...
ERIC Educational Resources Information Center
Splitt, David A.
1985-01-01
To avoid expensive and time-consuming negligence suits, schools everywhere should take thorough precautions against assaults on or near their premises; measures against unauthorized visitors are particulary important. School staff should register and monitor authorized visitors, and strangers in or near the school should be reported immediately.…
48 CFR 301.602-3 - Ratification of unauthorized commitments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SERVICES GENERAL HHS ACQUISITION REGULATION SYSTEM Career Development, Contracting Authority, and... legal review is necessary, the HCA or CCO shall coordinate the request for ratification with the Office...) The Contracting Officer shall review the submitted material and, if the Contracting Officer determines...
76 FR 22849 - DoD Unclassified Controlled Nuclear Information (UCNI)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-25
... computer or other information technology systems shall enforce protection from unauthorized disclosure or..., and control of the Under Secretary of Defense for Acquisition, Technology and Logistics, shall: (1... slides) containing DoD UCNI shall be conspicuously marked ``DOD UNCLASSIFIED CONTROLLED NUCLEAR...
19 CFR 19.34 - Customs supervision.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Wheat § 19.34 Customs supervision. Port directors shall exercise such supervision and control over the... imported wheat and no unauthorized mixing, blending, or commingling of such imported wheat. Importers... wheat in continuous Customs custody shall maintain such records as will enable Customs officers to...
Expanding Prenatal Care to Unauthorized Immigrant Women and the Effects on Infant Health.
Swartz, Jonas J; Hainmueller, Jens; Lawrence, Duncan; Rodriguez, Maria I
2017-11-01
To measure the effect of access to prenatal care on unauthorized and low-income, new legal permanent resident immigrant women and their offspring. We used a difference-in-differences design that leverages the staggered rollout of Emergency Medicaid Plus by county from 2008 to 2013 as a natural experiment to estimate the effect on health service utilization for women and health outcomes for their infants. Regular Medicaid pregnancies were used as an additional control in a triple difference design. Our sample included pregnancies covered by Emergency Medicaid (35,182), Emergency Medicaid Plus (12,510), and Medicaid (166,054). After expansion of access to prenatal care, there was an increase in prenatal visits (7.2 more visits, 95% CI 6.45-7.96), receipt of adequate prenatal care (28% increased rate, CI 26-31), rates of diabetes screening (61% increased rate, CI 56-66), and fetal ultrasonograms (74% increased rate, CI 72-76). Maternal access to prenatal care was also associated with an increased number of well child visits (0.24 more visits, CI 0.07-0.41), increased rates of recommended screenings and vaccines (0.04 increased probability, CI 0.002-0.074), and reduced infant mortality (-1.01/1,000, CI -1.42 to -0.60) and rates of extremely low birth weight (less than 1,000 g) (-1.33/1,000, CI -2.44 to -0.21). Our results provide evidence of increased utilization and improved health outcomes for unauthorized immigrants and their children who are U.S. citizens after introduction of prenatal care expansion in Oregon. This study contributes to the debate around reauthorization of the Children's Health Insurance Program in 2017.
Code of Federal Regulations, 2011 CFR
2011-10-01
... contractor how to transmit the application to the United States Patent Office in accordance with procedures... REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.203-1 General. (a) Unauthorized disclosure of classified subject matter, whether in patent applications or resulting from the issuance of a...
12 CFR 268.601 - EEO group statistics.
Code of Federal Regulations, 2014 CFR
2014-01-01
... race, national origin, sex and disability(ies) of its employees. (b) Data on race, national origin and sex shall be collected by voluntary self-identification. If an employee does not voluntarily provide... prevent its unauthorized disclosure. If, thereafter, the employee declines to change the apparently...
12 CFR 268.601 - EEO group statistics.
Code of Federal Regulations, 2013 CFR
2013-01-01
... race, national origin, sex and disability(ies) of its employees. (b) Data on race, national origin and sex shall be collected by voluntary self-identification. If an employee does not voluntarily provide... prevent its unauthorized disclosure. If, thereafter, the employee declines to change the apparently...
12 CFR 268.601 - EEO group statistics.
Code of Federal Regulations, 2012 CFR
2012-01-01
... race, national origin, sex and disability(ies) of its employees. (b) Data on race, national origin and sex shall be collected by voluntary self-identification. If an employee does not voluntarily provide... prevent its unauthorized disclosure. If, thereafter, the employee declines to change the apparently...
Mexican Women, Migration and Sex Roles.
ERIC Educational Resources Information Center
Baca, Reynaldo; Dexter, Bryan
1985-01-01
Compares Mexican women involved in migration to understand how their sex roles and status have been affected. Uses data from two separate studies: ethnography on migrants' wives left at home in a Mexican village and a survey of unauthorized immigrants in the Los Angeles area. (SA)
32 CFR 1901.52 - Criminal penalties.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Criminal penalties. 1901.52 Section 1901.52 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1901.52 Criminal penalties. (a) Unauthorized disclosure...
32 CFR 1901.52 - Criminal penalties.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Criminal penalties. 1901.52 Section 1901.52 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE AGENCY PUBLIC RIGHTS UNDER THE PRIVACY ACT OF 1974 Prohibitions § 1901.52 Criminal penalties. (a) Unauthorized disclosure...
12 CFR 555.210 - What precautions must I take?
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Implement security measures designed to ensure secure operations. Such measures must be adequate to: (1) Prevent unauthorized access to your records and your customers' records; (2) Prevent financial fraud through the use of electronic means or facilities; and (3) Comply with applicable security devices...
30 CFR 250.300 - Pollution prevention.
Code of Federal Regulations, 2012 CFR
2012-07-01
... environment. No petroleum-based substances, including diesel fuel, may be added to the drilling mud system... Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... oil and gas or sulphur, the lessee shall take measures to prevent unauthorized discharge of pollutants...
30 CFR 250.300 - Pollution prevention.
Code of Federal Regulations, 2013 CFR
2013-07-01
... environment. No petroleum-based substances, including diesel fuel, may be added to the drilling mud system... Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... oil and gas or sulphur, the lessee shall take measures to prevent unauthorized discharge of pollutants...
30 CFR 250.300 - Pollution prevention.
Code of Federal Regulations, 2014 CFR
2014-07-01
... environment. No petroleum-based substances, including diesel fuel, may be added to the drilling mud system... Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... oil and gas or sulphur, the lessee shall take measures to prevent unauthorized discharge of pollutants...
47 CFR 80.290 - Auxiliary receiving antenna.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 47 Telecommunication 5 2013-10-01 2013-10-01 false Auxiliary receiving antenna. 80.290 Section 80... antenna. An auxiliary receiving antenna must be provided when necessary to avoid unauthorized interruption or reduced efficiency of the required watch because the normal receiving antenna is not available...
47 CFR 80.290 - Auxiliary receiving antenna.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 47 Telecommunication 5 2011-10-01 2011-10-01 false Auxiliary receiving antenna. 80.290 Section 80... antenna. An auxiliary receiving antenna must be provided when necessary to avoid unauthorized interruption or reduced efficiency of the required watch because the normal receiving antenna is not available...
47 CFR 80.290 - Auxiliary receiving antenna.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 5 2014-10-01 2014-10-01 false Auxiliary receiving antenna. 80.290 Section 80... antenna. An auxiliary receiving antenna must be provided when necessary to avoid unauthorized interruption or reduced efficiency of the required watch because the normal receiving antenna is not available...
47 CFR 80.290 - Auxiliary receiving antenna.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 5 2012-10-01 2012-10-01 false Auxiliary receiving antenna. 80.290 Section 80... antenna. An auxiliary receiving antenna must be provided when necessary to avoid unauthorized interruption or reduced efficiency of the required watch because the normal receiving antenna is not available...
47 CFR 80.290 - Auxiliary receiving antenna.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 47 Telecommunication 5 2010-10-01 2010-10-01 false Auxiliary receiving antenna. 80.290 Section 80... antenna. An auxiliary receiving antenna must be provided when necessary to avoid unauthorized interruption or reduced efficiency of the required watch because the normal receiving antenna is not available...
32 CFR Appendix D to Subpart M of... - Unauthorized Activities in Maneuver Training Areas
Code of Federal Regulations, 2013 CFR
2013-07-01
... Lewis: Civilian paramilitary activities and combat games. Off-pavement motorcycle riding. Off-road... of alcoholic beverages. 2. Yakima Training Center: Civilian paramilitary activities and combat games... combat games. Off-pavement motorcycle riding. Off-road vehicle operation. Hang gliding. Ultralight...
32 CFR Appendix D to Subpart M of... - Unauthorized Activities in Maneuver Training Areas
Code of Federal Regulations, 2012 CFR
2012-07-01
... Lewis: Civilian paramilitary activities and combat games. Off-pavement motorcycle riding. Off-road... of alcoholic beverages. 2. Yakima Training Center: Civilian paramilitary activities and combat games... combat games. Off-pavement motorcycle riding. Off-road vehicle operation. Hang gliding. Ultralight...
32 CFR Appendix D to Subpart M of... - Unauthorized Activities in Maneuver Training Areas
Code of Federal Regulations, 2014 CFR
2014-07-01
... Lewis: Civilian paramilitary activities and combat games. Off-pavement motorcycle riding. Off-road... of alcoholic beverages. 2. Yakima Training Center: Civilian paramilitary activities and combat games... combat games. Off-pavement motorcycle riding. Off-road vehicle operation. Hang gliding. Ultralight...
32 CFR 701.104 - Responsibility and authority.
Code of Federal Regulations, 2014 CFR
2014-07-01
... or unauthorized disclosure can result in both civil and criminal penalties.” (6) Not maintaining... authority. (1) Assistant Secretary of the Navy (Manpower & Reserve Affairs) (ASN(M&RA)) is designated to act... anticipated threats or hazards that could result in substantial harm, embarrassment, inconvenience, or...
32 CFR 701.104 - Responsibility and authority.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or unauthorized disclosure can result in both civil and criminal penalties.” (6) Not maintaining... authority. (1) Assistant Secretary of the Navy (Manpower & Reserve Affairs) (ASN(M&RA)) is designated to act... anticipated threats or hazards that could result in substantial harm, embarrassment, inconvenience, or...
32 CFR 701.104 - Responsibility and authority.
Code of Federal Regulations, 2012 CFR
2012-07-01
... or unauthorized disclosure can result in both civil and criminal penalties.” (6) Not maintaining... authority. (1) Assistant Secretary of the Navy (Manpower & Reserve Affairs) (ASN(M&RA)) is designated to act... anticipated threats or hazards that could result in substantial harm, embarrassment, inconvenience, or...
32 CFR 701.104 - Responsibility and authority.
Code of Federal Regulations, 2010 CFR
2010-07-01
... or unauthorized disclosure can result in both civil and criminal penalties.” (6) Not maintaining... authority. (1) Assistant Secretary of the Navy (Manpower & Reserve Affairs) (ASN(M&RA)) is designated to act... anticipated threats or hazards that could result in substantial harm, embarrassment, inconvenience, or...
32 CFR 701.104 - Responsibility and authority.
Code of Federal Regulations, 2013 CFR
2013-07-01
... or unauthorized disclosure can result in both civil and criminal penalties.” (6) Not maintaining... authority. (1) Assistant Secretary of the Navy (Manpower & Reserve Affairs) (ASN(M&RA)) is designated to act... anticipated threats or hazards that could result in substantial harm, embarrassment, inconvenience, or...
48 CFR 227.7108 - Contractor data repositories.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Technical Data 227.7108 Contractor data repositories. (a) Contractor data repositories may be established... procedures for protecting technical data delivered to or stored at the repository from unauthorized release... disclosure of technical data from the repository to third parties consistent with the Government's rights in...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... Customer Information.'' DATES: You should submit comments by April 5, 2010. ADDRESSES: Communications... approval of the following information collection: Title: Notice Regarding Unauthorized Access to Customer..., and physical safeguards to: (1) Insure the security and confidentiality of customer records and...
33 CFR 104.265 - Security measures for access control.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices...
77 FR 1975 - Safety Advisory: Unauthorized Marking of Compressed Gas Cylinders
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-12
... Jackson Plaza, Ann Arbor, MI improperly requalified and marked high pressure compressed gas cylinders... DOT specification cylinders after its authority to requalifiy high pressure cylinders expired on... that Spears Fire & Safety continued to requalify and mark high pressure cylinders after their authority...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Storage. 2001.43 Section 2001.43 National... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Safeguarding § 2001.43 Storage... detect unauthorized access to the information. Storage at overseas locations shall be at U.S. Government...