Sample records for universally optimal privacy

  1. Fast implementation of length-adaptive privacy amplification in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Chun-Mei; Li, Mo; Huang, Jing-Zheng; Patcharapong, Treeviriyanupab; Li, Hong-Wei; Li, Fang-Yi; Wang, Chuan; Yin, Zhen-Qiang; Chen, Wei; Keattisak, Sripimanwat; Han, Zhen-Fu

    2014-09-01

    Post-processing is indispensable in quantum key distribution (QKD), which is aimed at sharing secret keys between two distant parties. It mainly consists of key reconciliation and privacy amplification, which is used for sharing the same keys and for distilling unconditional secret keys. In this paper, we focus on speeding up the privacy amplification process by choosing a simple multiplicative universal class of hash functions. By constructing an optimal multiplication algorithm based on four basic multiplication algorithms, we give a fast software implementation of length-adaptive privacy amplification. “Length-adaptive” indicates that the implementation of privacy amplification automatically adapts to different lengths of input blocks. When the lengths of the input blocks are 1 Mbit and 10 Mbit, the speed of privacy amplification can be as fast as 14.86 Mbps and 10.88 Mbps, respectively. Thus, it is practical for GHz or even higher repetition frequency QKD systems.

  2. Model-based Assessment for Balancing Privacy Requirements and Operational Capabilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knirsch, Fabian; Engel, Dominik; Frincu, Marc

    2015-02-17

    The smart grid changes the way energy is produced and distributed. In addition both, energy and information is exchanged bidirectionally among participating parties. Therefore heterogeneous systems have to cooperate effectively in order to achieve a common high-level use case, such as smart metering for billing or demand response for load curtailment. Furthermore, a substantial amount of personal data is often needed for achieving that goal. Capturing and processing personal data in the smart grid increases customer concerns about privacy and in addition, certain statutory and operational requirements regarding privacy aware data processing and storage have to be met. An increasemore » of privacy constraints, however, often limits the operational capabilities of the system. In this paper, we present an approach that automates the process of finding an optimal balance between privacy requirements and operational requirements in a smart grid use case and application scenario. This is achieved by formally describing use cases in an abstract model and by finding an algorithm that determines the optimum balance by forward mapping privacy and operational impacts. For this optimal balancing algorithm both, a numeric approximation and – if feasible – an analytic assessment are presented and investigated. The system is evaluated by applying the tool to a real-world use case from the University of Southern California (USC) microgrid.« less

  3. Privacy Preservation in Distributed Subgradient Optimization Algorithms.

    PubMed

    Lou, Youcheng; Yu, Lean; Wang, Shouyang; Yi, Peng

    2017-07-31

    In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show that the distributed subgradient synchronous homogeneous-stepsize algorithm is not privacy preserving in the sense that the malicious agent can asymptotically discover other agents' subgradients by transmitting untrue estimates to its neighbors. Then a distributed subgradient asynchronous heterogeneous-stepsize projection algorithm is proposed and accordingly its convergence and optimality is established. In contrast to the synchronous homogeneous-stepsize algorithm, in the new algorithm agents make their optimization updates asynchronously with heterogeneous stepsizes. The introduced two mechanisms of projection operation and asynchronous heterogeneous-stepsize optimization can guarantee that agents' privacy can be effectively protected.

  4. Achieving Optimal Privacy in Trust-Aware Social Recommender Systems

    NASA Astrophysics Data System (ADS)

    Dokoohaki, Nima; Kaleli, Cihan; Polat, Huseyin; Matskin, Mihhail

    Collaborative filtering (CF) recommenders are subject to numerous shortcomings such as centralized processing, vulnerability to shilling attacks, and most important of all privacy. To overcome these obstacles, researchers proposed for utilization of interpersonal trust between users, to alleviate many of these crucial shortcomings. Till now, attention has been mainly paid to strong points about trust-aware recommenders such as alleviating profile sparsity or calculation cost efficiency, while least attention has been paid on investigating the notion of privacy surrounding the disclosure of individual ratings and most importantly protection of trust computation across social networks forming the backbone of these systems. To contribute to addressing problem of privacy in trust-aware recommenders, within this paper, first we introduce a framework for enabling privacy-preserving trust-aware recommendation generation. While trust mechanism aims at elevating recommender's accuracy, to preserve privacy, accuracy of the system needs to be decreased. Since within this context, privacy and accuracy are conflicting goals we show that a Pareto set can be found as an optimal setting for both privacy-preserving and trust-enabling mechanisms. We show that this Pareto set, when used as the configuration for measuring the accuracy of base collaborative filtering engine, yields an optimized tradeoff between conflicting goals of privacy and accuracy. We prove this concept along with applicability of our framework by experimenting with accuracy and privacy factors, and we show through experiment how such optimal set can be inferred.

  5. Effective Management of Information Security and Privacy

    ERIC Educational Resources Information Center

    Anderson, Alicia

    2006-01-01

    No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…

  6. Users or Students? Privacy in University MOOCS.

    PubMed

    Jones, Meg Leta; Regner, Lucas

    2016-10-01

    Two terms, student privacy and Massive Open Online Courses, have received a significant amount of attention recently. Both represent interesting sites of change in entrenched structures, one educational and one legal. MOOCs represent something college courses have never been able to provide: universal access. Universities not wanting to miss the MOOC wave have started to build MOOC courses and integrate them into the university system in various ways. However, the design and scale of university MOOCs create tension for privacy laws intended to regulate information practices exercised by educational institutions. Are MOOCs part of the educational institutions these laws and policies aim to regulate? Are MOOC users students whose data are protected by aforementioned laws and policies? Many university researchers and faculty members are asked to participate as designers and instructors in MOOCs but may not know how to approach the issues proposed. While recent scholarship has addressed the disruptive nature of MOOCs, student privacy generally, and data privacy in the K-12 system, we provide an in-depth description and analysis of the MOOC phenomenon and the privacy laws and policies that guide and regulate educational institutions today. We offer privacy case studies of three major MOOC providers active in the market today to reveal inconsistencies among MOOC platform and the level and type of legal uncertainty surrounding them. Finally, we provide a list of organizational questions to pose internally to navigate the uncertainty presented to university MOOC teams.

  7. Privacy Issues in the Development of a Virtual Mental Health Clinic for University Students: A Qualitative Study.

    PubMed

    Gulliver, Amelia; Bennett, Kylie; Bennett, Anthony; Farrer, Louise M; Reynolds, Julia; Griffiths, Kathleen M

    2015-01-01

    There is a growing need to develop online services for university students with the capacity to complement existing services and efficiently address student mental health problems. Previous research examining the development and acceptability of online interventions has revealed that issues such as privacy critically impact user willingness to engage with these services. To explore university student perspectives on privacy issues related to using an online mental health service within the context of the development of an online, university-based virtual mental health clinic. There were two stages of data collection. The first stage consisted of four 1.5-hour focus groups conducted with university students (n=19; 10 female, 9 male, mean age = 21.6 years) to determine their ideas about the virtual clinic including privacy issues. The second stage comprised three 1-hour prototype testing sessions conducted with university students (n=6; 3 male, 3 female, mean age = 21.2 years) using participatory design methods to develop and refine a service model for the virtual clinic and determine student views on privacy within this context. The students raised a number of issues related to privacy in relation to the development of the university virtual clinic. Major topics included the types of personal information they would be willing to provide (minimal information and optional mental health data), concern about potential access to their personal data by the university, the perceived stigma associated with registering for the service, and privacy and anonymity concerns related to online forums contained within the virtual clinic. Students would be more comfortable providing personal information and engaging with the virtual clinic if they trust the privacy and security of the service. Implications of this study include building the clinic in a flexible way to accommodate user preferences.

  8. A Utility Maximizing and Privacy Preserving Approach for Protecting Kinship in Genomic Databases.

    PubMed

    Kale, Gulce; Ayday, Erman; Tastan, Oznur

    2017-09-12

    Rapid and low cost sequencing of genomes enabled widespread use of genomic data in research studies and personalized customer applications, where genomic data is shared in public databases. Although the identities of the participants are anonymized in these databases, sensitive information about individuals can still be inferred. One such information is kinship. We define two routes kinship privacy can leak and propose a technique to protect kinship privacy against these risks while maximizing the utility of shared data. The method involves systematic identification of minimal portions of genomic data to mask as new participants are added to the database. Choosing the proper positions to hide is cast as an optimization problem in which the number of positions to mask is minimized subject to privacy constraints that ensure the familial relationships are not revealed.We evaluate the proposed technique on real genomic data. Results indicate that concurrent sharing of data pertaining to a parent and an offspring results in high risks of kinship privacy, whereas the sharing data from further relatives together is often safer. We also show arrival order of family members have a high impact on the level of privacy risks and on the utility of sharing data. Available at: https://github.com/tastanlab/Kinship-Privacy. erman@cs.bilkent.edu.tr or oznur.tastan@cs.bilkent.edu.tr. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  9. Distributed Combinatorial Optimization Using Privacy on Mobile Phones

    NASA Astrophysics Data System (ADS)

    Ono, Satoshi; Katayama, Kimihiro; Nakayama, Shigeru

    This paper proposes a method for distributed combinatorial optimization which uses mobile phones as computers. In the proposed method, an ordinary computer generates solution candidates and mobile phones evaluates them by referring privacy — private information and preferences. Users therefore does not have to send their privacy to any other computers and does not have to refrain from inputting their preferences. They therefore can obtain satisfactory solution. Experimental results have showed the proposed method solved room assignment problems without sending users' privacy to a server.

  10. Students at Public Universities Have a Constitutional Right to Privacy in Their Dormitory Rooms

    ERIC Educational Resources Information Center

    Fossey, Richard

    2018-01-01

    College students who reside in campus dormitories at public universities have a reasonable expectation of privacy in their dorm rooms that is protected by the fourth amendment; and officials cannot search these rooms for law enforcement purposes without a valid warrant. Non-students, however, have no such reasonable expectation of privacy in…

  11. Factors Influencing Facebook Usage and Facebook Addictive Tendency in University Students: The Role of Online Psychological Privacy and Facebook Usage Motivation.

    PubMed

    Hong, Fu-Yuan; Chiu, Su-Lin

    2016-04-01

    There are few studies analysing the influence of personal traits and motivation factors on Facebook usage and Facebook addictive tendency as seen in university students. In this study, 225 Taiwanese university students completed a questionnaire to determine their online psychological privacy scale, Facebook usage motivation scale, Facebook usage scale and Facebook addictive tendency scale, in order to evaluate the items that can be conceptualized as the effect of university students' online psychological privacy personal trait and motive factors, and Facebook usage motivation with respect to Facebook usage and Facebook addictive tendency. The study found that a desire for more online psychological privacy correlates with a stronger motivation to use Facebook and more Facebook usage behaviour among university students who may become high-risk groups for Facebook addictive tendency. The study found that a desire for or an acceptance of a lower online psychological privacy correlates with a stronger motivation to use Facebook among university students who may have more Facebook usage behaviour. This study can help understand university students' Facebook usage and Facebook addictive tendency and provide feature indicators for those who may become high-risk groups for Facebook addictive tendency. Finally, this study conducts discussion and proposes relevant suggestions for future study. Copyright © 2014 John Wiley & Sons, Ltd.

  12. 32 CFR 315.1 - Source of regulations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... PROGRAM UNIFORMED SERVICES UNIVERSITY OF HEALTH SCIENCES, PRIVACY ACT OF 1974 § 315.1 Source of regulations. The Uniformed Services University of the Health Sciences, is governed by the Privacy Act...

  13. 32 CFR 315.1 - Source of regulations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... PROGRAM UNIFORMED SERVICES UNIVERSITY OF HEALTH SCIENCES, PRIVACY ACT OF 1974 § 315.1 Source of regulations. The Uniformed Services University of the Health Sciences, is governed by the Privacy Act...

  14. 32 CFR 315.1 - Source of regulations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... PROGRAM UNIFORMED SERVICES UNIVERSITY OF HEALTH SCIENCES, PRIVACY ACT OF 1974 § 315.1 Source of regulations. The Uniformed Services University of the Health Sciences, is governed by the Privacy Act...

  15. 32 CFR 315.1 - Source of regulations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... PROGRAM UNIFORMED SERVICES UNIVERSITY OF HEALTH SCIENCES, PRIVACY ACT OF 1974 § 315.1 Source of regulations. The Uniformed Services University of the Health Sciences, is governed by the Privacy Act...

  16. 32 CFR 315.1 - Source of regulations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... PROGRAM UNIFORMED SERVICES UNIVERSITY OF HEALTH SCIENCES, PRIVACY ACT OF 1974 § 315.1 Source of regulations. The Uniformed Services University of the Health Sciences, is governed by the Privacy Act...

  17. Context-Aware Generative Adversarial Privacy

    NASA Astrophysics Data System (ADS)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  18. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  19. Quantifying the costs and benefits of privacy-preserving health data publishing.

    PubMed

    Khokhar, Rashid Hussain; Chen, Rui; Fung, Benjamin C M; Lui, Siu Man

    2014-08-01

    Cost-benefit analysis is a prerequisite for making good business decisions. In the business environment, companies intend to make profit from maximizing information utility of published data while having an obligation to protect individual privacy. In this paper, we quantify the trade-off between privacy and data utility in health data publishing in terms of monetary value. We propose an analytical cost model that can help health information custodians (HICs) make better decisions about sharing person-specific health data with other parties. We examine relevant cost factors associated with the value of anonymized data and the possible damage cost due to potential privacy breaches. Our model guides an HIC to find the optimal value of publishing health data and could be utilized for both perturbative and non-perturbative anonymization techniques. We show that our approach can identify the optimal value for different privacy models, including K-anonymity, LKC-privacy, and ∊-differential privacy, under various anonymization algorithms and privacy parameters through extensive experiments on real-life data. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Protecting privacy in a clinical data warehouse.

    PubMed

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  1. Topological Privacy: Lattice Structures and Information Bubbles for Inference and Obfuscation

    DTIC Science & Technology

    2016-12-19

    AFRL-AFOSR-VA-TR-2017-0036 Topological Privacy Michael Erdmann CARNEGIE MELLON UNIVERSITY 5000 FORBES AVENUE PITTSBURGH, PA 15213-3815 02/22/2017...PERSON 19b. TELEPHONE NUMBER (Include area code) 19-12-2016 Final 15-10-2013 - 14-10-2016 Topological Privacy Erdmann, Michael, A. Carnegie Mellon...Michael Erdmann Carnegie Mellon University me@cs.cmu.edu December 19, 2016 Abstract Information has intrinsic geometric and topological structure, arising

  2. An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming

    NASA Astrophysics Data System (ADS)

    Zhao, Baokang; Wang, Dan; Shao, Zili; Cao, Jiannong; Chan, Keith C. C.; Su, Jinshu

    In wireless sensor networks, preserving location privacy under successive inference attacks is extremely critical. Although this problem is NP-complete in general cases, we propose a dynamic programming based algorithm and prove it is optimal in special cases where the correlation only exists between p immediate adjacent observations.

  3. College and University Privacy Leadership

    ERIC Educational Resources Information Center

    Showalter, Rodney J.

    2009-01-01

    Beginning in the late 1990s, international corporations began hiring Chief Privacy Officers (CPOs). By 2002, large universities responded to this trend by creating this distinct position or modifying an existing job description to include CPO responsibilities. While not every registrar assumes the role of CPO, increasing practical and legislative…

  4. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites

    ERIC Educational Resources Information Center

    Tufekci, Zeynep

    2008-01-01

    The prevailing paradigm in Internet privacy literature, treating privacy within a context merely of rights and violations, is inadequate for studying the Internet as a social realm. Following Goffman on self-presentation and Altman's theorizing of privacy as an optimization between competing pressures for disclosure and withdrawal, the author…

  5. Federal Judge Says 1974 Privacy-Protection Law Does Not Bar Colleges from Airing Crime Data.

    ERIC Educational Resources Information Center

    Jaschik, Scott

    1991-01-01

    The first federal court decision on campus privacy protection law (the Buckley Amendment) contradicts the interpretation of the law used by the United States Department of Education and most colleges and universities. The case, against Southwest Missouri State University, offers encouragement to campus journalists wishing to publicize campus crime…

  6. Asymptotically Optimal and Private Statistical Estimation

    NASA Astrophysics Data System (ADS)

    Smith, Adam

    Differential privacy is a definition of "privacy" for statistical databases. The definition is simple, yet it implies strong semantics even in the presence of an adversary with arbitrary auxiliary information about the database.

  7. Speech privacy and annoyance considerations in the acoustic environment of passenger cars of high-speed trains.

    PubMed

    Jeon, Jin Yong; Hong, Joo Young; Jang, Hyung Suk; Kim, Jae Hyeon

    2015-12-01

    It is necessary to consider not only annoyance of interior noises but also speech privacy to achieve acoustic comfort in a passenger car of a high-speed train because speech from other passengers can be annoying. This study aimed to explore an optimal acoustic environment to satisfy speech privacy and reduce annoyance in a passenger car. Two experiments were conducted using speech sources and compartment noise of a high speed train with varying speech-to-noise ratios (SNRA) and background noise levels (BNL). Speech intelligibility was tested in experiment I, and in experiment II, perceived speech privacy, annoyance, and acoustic comfort of combined sounds with speech and background noise were assessed. The results show that speech privacy and annoyance were significantly influenced by the SNRA. In particular, the acoustic comfort was evaluated as acceptable when the SNRA was less than -6 dB for both speech privacy and noise annoyance. In addition, annoyance increased significantly as the BNL exceeded 63 dBA, whereas the effect of the background-noise level on the speech privacy was not significant. These findings suggest that an optimal level of interior noise in a passenger car might exist between 59 and 63 dBA, taking normal speech levels into account.

  8. Student Perceptions of Privacy Principles for Learning Analytics

    ERIC Educational Resources Information Center

    Ifenthaler, Dirk; Schumacher, Clara

    2016-01-01

    The purpose of this study was to examine student perceptions of privacy principles related to learning analytics. Privacy issues for learning analytics include how personal data are collected and stored as well as how they are analyzed and presented to different stakeholders. A total of 330 university students participated in an exploratory study…

  9. Predicting user concerns about online privacy in Hong Kong.

    PubMed

    Yao, Mike Z; Zhang, Jinguang

    2008-12-01

    Empirical studies on people's online privacy concerns have largely been conducted in the West. The global threat of privacy violations on the Internet calls for similar studies to be done in non-Western regions. To fill this void, the current study develops a path model to investigate the influence of people's Internet use-related factors, their beliefs in the right to privacy, and psychological need for privacy on Hong Kong people's concerns about online privacy. Survey responses from 332 university students were analyzed. Results from this study show that people's belief in the right to privacy was the most important predictor of their online privacy concerns. It also significantly mediated the relationship between people's psychological need for privacy and their concerns with privacy violations online. Moreover, while frequent use of the Internet may increase concerns about online privacy issues, Internet use diversity may actually reduce such worries. The final model, well supported by the observed data, successfully explained 25% of the variability in user concerns about online privacy.

  10. The Family Educational Rights and Privacy Act and Permissive Disclosure: What Information Are Post-Secondary Institutions Disclosing and Why?

    ERIC Educational Resources Information Center

    Greer, Christine Glah

    2012-01-01

    This study focuses on the response of universities to the permissive disclosure clauses of the Family Educational Rights and Privacy Act (FERPA). FERPA has been amended nine times; some of these amendments permit universities to disclose personally identifiable information without the permission of students. The purpose of this study is to…

  11. 76 FR 51954 - Procurement List Additions And Deletions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ...Phone NSN: 7045-00-NIB-0327--Glare Shield for Blackberry Bold NSN: 7045-00-NIB-0328--Glare Shield for Blackberry Storm2 NSN: 7045-00-NIB-0329--Universal PDA Glare Shield NSN: 7045-00-NIB-0330--Privacy Shield for iPhone NSN: 7045-00-NIB-0331--Privacy Shield for Blackberry Bold NSN: 7045-00-NIB-0332--Privacy...

  12. Education Department Gives Colleges New Flexibility on Student-Privacy Law

    ERIC Educational Resources Information Center

    Lipka, Sara

    2008-01-01

    New regulations may expand the thicket of student-privacy law, but the U.S. Department of Education hopes that an in-depth guide will help colleges and universities find their way. Last week the department released new rules on the Family Educational Rights and Privacy Act (Ferpa), which governs the disclosure of student records. The regulations…

  13. From Data Privacy to Location Privacy

    NASA Astrophysics Data System (ADS)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  14. Employees' satisfaction as influenced by acoustic and visual privacy in the open office environment

    NASA Astrophysics Data System (ADS)

    Soules, Maureen Jeanette

    The purpose of this study was to examine the relationship between employees' acoustic and visual privacy issues and their perceived satisfaction in their open office work environments while in focus work mode. The study examined the Science Teaching Student Services Building at the University of Minnesota Minneapolis. The building houses instructional classrooms and administrative offices that service UMN students. The Sustainable Post-Occupancy Evaluation Survey was used to collect data on overall privacy conditions, acoustic and visual privacy conditions, and employees' perceived privacy conditions while in their primary workplace. Paired T-tests were used to analyze the relationships between privacy conditions and employees' perceptions of privacy. All hypotheses are supported indicating that the privacy variables are correlated to the employees' perception of satisfaction within the primary workplace. The findings are important because they can be used to inform business leaders, designers, educators and future research in the field of office design.

  15. Balancing digital information-sharing and patient privacy when engaging families in the intensive care unit.

    PubMed

    Brown, Samuel M; Aboumatar, Hanan J; Francis, Leslie; Halamka, John; Rozenblum, Ronen; Rubin, Eileen; Sarnoff Lee, Barbara; Sugarman, Jeremy; Turner, Kathleen; Vorwaller, Micah; Frosch, Dominick L

    2016-09-01

    Patients in intensive care units (ICUs) may lack decisional capacity and may depend on proxy decision makers (PDMs) to make medical decisions on their behalf. High-quality information-sharing with PDMs, including through such means as health information technology, could improve communication and decision making and could potentially minimize the psychological consequences of an ICU stay for both patients and their family members. However, alongside these anticipated benefits of information-sharing are risks of unwanted disclosure of sensitive information. Approaches to identifying the optimal balance between access to digital health information to facilitate engagement and protecting patient privacy are urgently needed. We identified eight themes that should be considered in balancing health information access and patient privacy: 1) potential benefits to patients from PDM data access; 2) potential harms to patients from such access; 3) the moral status of families within the patient-clinician relationship; 4) the scope of relevant information provided to PDMs; 5) issues around defining PDMs' authority; 6) methods for eliciting and documenting patient preferences about their family's information access; 7) the relevance of methods for ascertaining the identity of PDMs; and 8) the obligations of hospitals to prevent privacy breaches by PDMs. We conclude that PDMs should typically have access to health information from the current episode of care when the patient is decisionally impaired, unless the patient has previously expressed a clear preference that PDMs not have such access. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. A private DNA motif finding algorithm.

    PubMed

    Chen, Rui; Peng, Yun; Choi, Byron; Xu, Jianliang; Hu, Haibo

    2014-08-01

    With the increasing availability of genomic sequence data, numerous methods have been proposed for finding DNA motifs. The discovery of DNA motifs serves a critical step in many biological applications. However, the privacy implication of DNA analysis is normally neglected in the existing methods. In this work, we propose a private DNA motif finding algorithm in which a DNA owner's privacy is protected by a rigorous privacy model, known as ∊-differential privacy. It provides provable privacy guarantees that are independent of adversaries' background knowledge. Our algorithm makes use of the n-gram model and is optimized for processing large-scale DNA sequences. We evaluate the performance of our algorithm over real-life genomic data and demonstrate the promise of integrating privacy into DNA motif finding. Copyright © 2014 Elsevier Inc. All rights reserved.

  17. Acquisition of a High Performance Computing Instrument for Big Data Research and Education

    DTIC Science & Technology

    2015-12-03

    Security and Privacy , University of Texas at Dallas, TX, September 16-17, 2014. • Chopade, P., Zhan, J., Community Detection in Large Scale Big Data...Security and Privacy in Communication Networks, Beijing, China, September 24-26, 2014. • Pravin Chopade, Kenneth Flurchick, Justin Zhan and Marwan...Balkirat Kaur, Malcolm Blow, and Justin Zhan, Digital Image Authentication in Social Media, The Sixth ASE International Conference on Privacy

  18. Ownership, Privacy, Confidentiality, and Security Data.

    ERIC Educational Resources Information Center

    Staman, E. Michael

    1986-01-01

    One of the areas most often neglected by those responsible for information systems in colleges and universities relates to ownership, privacy, confidentiality, and security of data. Background information and definitions are provided, and a suggested environment is described. Model recommendations for institutional policy are offered. (MLW)

  19. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre

    Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.

  20. Privacy Preserving Nearest Neighbor Search

    NASA Astrophysics Data System (ADS)

    Shaneck, Mark; Kim, Yongdae; Kumar, Vipin

    Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this chapter we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification. We prove the security of these algorithms under the semi-honest adversarial model, and describe methods that can be used to optimize their performance. Keywords: Privacy Preserving Data Mining, Nearest Neighbor Search, Outlier Detection, Clustering, Classification, Secure Multiparty Computation

  1. Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection

    NASA Astrophysics Data System (ADS)

    Sakuma, Jun; Wright, Rebecca N.

    Privacy-preserving classification is the task of learning or training a classifier on the union of privately distributed datasets without sharing the datasets. The emphasis of existing studies in privacy-preserving classification has primarily been put on the design of privacy-preserving versions of particular data mining algorithms, However, in classification problems, preprocessing and postprocessing— such as model selection or attribute selection—play a prominent role in achieving higher classification accuracy. In this paper, we show generalization error of classifiers in privacy-preserving classification can be securely evaluated without sharing prediction results. Our main technical contribution is a new generalized Hamming distance protocol that is universally applicable to preprocessing and postprocessing of various privacy-preserving classification problems, such as model selection in support vector machine and attribute selection in naive Bayes classification.

  2. Privacy and occupational health services

    PubMed Central

    Heikkinen, A; Launis, V; Wainwright, P; Leino‐Kilpi, H

    2006-01-01

    Privacy is a key ethical principle in occupational health services. Its importance is emphasised in several laws, in ethical codes of conduct as well as in the literature, yet there is only very limited empirical research on privacy in the occupational health context. Conceptual questions on privacy in the occupational health context are discussed. The baseline assumption is that, in this context, privacy cannot be approached and examined only from the employee's (an individual) vantage point but the employer's (a group) point of view must also be taken into account, and that the concept has several dimensions (physical, social, informational and psychological). Even though privacy is a basic human need, there is no universally accepted definition of the concept and no consensus on whether an organisation can have privacy in the same way as people do. Many of the challenges surrounding privacy in the context of occupational health seem to be associated with the dual loyalties of occupational health professionals towards the employee and employer and with their simultaneous duties of disseminating and protecting information (informational privacy). Privacy is thus not an absolute value, but more research is needed to understand its multidimensional nature in the context of occupational health. PMID:16943333

  3. Privacy and Technology: Counseling Institutions of Higher Education.

    ERIC Educational Resources Information Center

    Cranman, Kevin A.

    1998-01-01

    Examines the challenges to colleges and universities associated with maintaining privacy as use of technology increases and technology advances. Lapses in security, types of information needing protection, liability under federal laws, other relevant laws and pending legislation, ethics, and policy implementation in the electronic age are…

  4. Privacy Statement for Nova Southeastern University

    Science.gov Websites

    and information sciences, and pharmacy. Professional Programs in high demand fields such as medicine conducted at NSU. Translational Research and Economic Development Information on basic, applied, and privacy and recognizes the importance of your personal information. We are committed to protecting your

  5. Somali asylum seekers' perceptions of privacy in healthcare.

    PubMed

    Eklöf, Niina; Abdulkarim, Hibag; Hupli, Maija; Leino-Kilpi, Helena

    2016-08-01

    Privacy has been recognized as a basic human right and a part of quality of care. However, little is known about the privacy of Somali asylum seekers in healthcare, even though they are one of the largest asylum seeker groups in the world. The aim of the study was to describe the content and importance of privacy and its importance in healthcare from the perspective of Somali asylum seekers. The data of this explorative qualitative study were collected by four focus group interviews with 18 Somali asylum seekers with the help of an interpreter. The data were analysed by inductive content analysis. Research permissions were obtained from the director of the reception centre and from the Department of Social Services. Ethical approval was obtained from the Ethics Committee of Turku University. The content of privacy includes visual privacy, physical privacy and informational privacy. All contents can be shared with healthcare professionals. The importance of privacy includes respect, dignity and freedom. Privacy is strongly connected to the collectivism of Somali culture and religion. Unlike the Western cultures, privacy is not important only for the individual; most of all, it is seen to support collectivism. Even though all contents of privacy can be shared with healthcare professionals, it is important to recognize the cultural aspect of privacy especially when using interpreters with Somali background. © The Author(s) 2015.

  6. Understanding and Designing for Interactional Privacy Needs within Social Networking Sites

    ERIC Educational Resources Information Center

    Wisniewski, Pamela J.

    2012-01-01

    "Interpersonal boundary regulation" is a way to optimize social interactions when sharing and connecting through Social Networking Sites (SNSs). The theoretical foundation of much of my research comes from Altman's work on privacy management in the physical world. Altman believed that "we should attempt to design responsive…

  7. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  8. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss.

    PubMed

    Kohlmayer, Florian; Prasser, Fabian; Kuhn, Klaus A

    2015-12-01

    With the ARX data anonymization tool structured biomedical data can be de-identified using syntactic privacy models, such as k-anonymity. Data is transformed with two methods: (a) generalization of attribute values, followed by (b) suppression of data records. The former method results in data that is well suited for analyses by epidemiologists, while the latter method significantly reduces loss of information. Our tool uses an optimal anonymization algorithm that maximizes output utility according to a given measure. To achieve scalability, existing optimal anonymization algorithms exclude parts of the search space by predicting the outcome of data transformations regarding privacy and utility without explicitly applying them to the input dataset. These optimizations cannot be used if data is transformed with generalization and suppression. As optimal data utility and scalability are important for anonymizing biomedical data, we had to develop a novel method. In this article, we first confirm experimentally that combining generalization with suppression significantly increases data utility. Next, we proof that, within this coding model, the outcome of data transformations regarding privacy and utility cannot be predicted. As a consequence, existing algorithms fail to deliver optimal data utility. We confirm this finding experimentally. The limitation of previous work can be overcome at the cost of increased computational complexity. However, scalability is important for anonymizing data with user feedback. Consequently, we identify properties of datasets that may be predicted in our context and propose a novel and efficient algorithm. Finally, we evaluate our solution with multiple datasets and privacy models. This work presents the first thorough investigation of which properties of datasets can be predicted when data is anonymized with generalization and suppression. Our novel approach adopts existing optimization strategies to our context and combines different search methods. The experiments show that our method is able to efficiently solve a broad spectrum of anonymization problems. Our work shows that implementing syntactic privacy models is challenging and that existing algorithms are not well suited for anonymizing data with transformation models which are more complex than generalization alone. As such models have been recommended for use in the biomedical domain, our results are of general relevance for de-identifying structured biomedical data. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  9. Availability and quality of mobile health app privacy policies.

    PubMed

    Sunyaev, Ali; Dehling, Tobias; Taylor, Patrick L; Mandl, Kenneth D

    2015-04-01

    Mobile health (mHealth) customers shopping for applications (apps) should be aware of app privacy practices so they can make informed decisions about purchase and use. We sought to assess the availability, scope, and transparency of mHealth app privacy policies on iOS and Android. Over 35,000 mHealth apps are available for iOS and Android. Of the 600 most commonly used apps, only 183 (30.5%) had privacy policies. Average policy length was 1755 (SD 1301) words with a reading grade level of 16 (SD 2.9). Two thirds (66.1%) of privacy policies did not specifically address the app itself. Our findings show that currently mHealth developers often fail to provide app privacy policies. The privacy policies that are available do not make information privacy practices transparent to users, require college-level literacy, and are often not focused on the app itself. Further research is warranted to address why privacy policies are often absent, opaque, or irrelevant, and to find a remedy. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  10. Facebook: When Education Meets Privacy

    ERIC Educational Resources Information Center

    Bruneel, Steven; De Wit, Kurt; Verhoeven, Jef C.; Elen, Jan

    2013-01-01

    The use of social networking sites (SNSs) has become commonplace amongst students. In this research, we aim to shed light upon the educational use and privacy issues on Facebook from the perspective of role theory and reference group theory. 15 bachelor students of the University of Leuven (KU Leuven) in Flanders, Belgium, were interviewed in…

  11. 77 FR 25991 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-02

    ... DEPARTMENT OF DEFENSE Department of the Army [Docket ID: USA-2012-0008] Privacy Act of 1974; System of Records AGENCY: Defense Information Systems Agency, DoD. ACTION: Notice to Add a New System of... Federal Register Liaison Officer, Department of Defense. A0350-1 ARNG System name: Guard University (Guard...

  12. Differentially Private Empirical Risk Minimization

    PubMed Central

    Chaudhuri, Kamalika; Monteleoni, Claire; Sarwate, Anand D.

    2011-01-01

    Privacy-preserving machine learning algorithms are crucial for the increasingly common setting in which personal data, such as medical or financial records, are analyzed. We provide general techniques to produce privacy-preserving approximations of classifiers learned via (regularized) empirical risk minimization (ERM). These algorithms are private under the ε-differential privacy definition due to Dwork et al. (2006). First we apply the output perturbation ideas of Dwork et al. (2006), to ERM classification. Then we propose a new method, objective perturbation, for privacy-preserving machine learning algorithm design. This method entails perturbing the objective function before optimizing over classifiers. If the loss and regularizer satisfy certain convexity and differentiability criteria, we prove theoretical results showing that our algorithms preserve privacy, and provide generalization bounds for linear and nonlinear kernels. We further present a privacy-preserving technique for tuning the parameters in general machine learning algorithms, thereby providing end-to-end privacy guarantees for the training process. We apply these results to produce privacy-preserving analogues of regularized logistic regression and support vector machines. We obtain encouraging results from evaluating their performance on real demographic and benchmark data sets. Our results show that both theoretically and empirically, objective perturbation is superior to the previous state-of-the-art, output perturbation, in managing the inherent tradeoff between privacy and learning performance. PMID:21892342

  13. Respecting the privacy of hospitalized patients: An integrative review.

    PubMed

    Hasan Tehrani, Tayebeh; Seyed Bagher Maddah, Sadat; Fallahi-Khoshknab, Masoud; Ebadi, Abbas; Mohammadi Shahboulaghi, Farahnaz; Gillespie, Mark

    2018-01-01

    Privacy is a complicated and obscure concept, which has special meanings in the healthcare environment; therefore, it is essential for healthcare providers to fully understand this concept. However, there is no universally accepted definition for this concept in the texts, and it has been interpreted differently, based on its application. To analyze and provide a clear and scientific definition for respect of privacy of hospitalized patients and identify the common aspects of this concept. This study was conducted using the Whittemore and Knafl's modified framework as a conceptual analysis method. Ethical consideration: This study was approved by the Research Council of the University of Social Welfare and Rehabilitation Sciences. We have respected the ethical requirements required regarding the sources and authorship. Research context and data sources: Using integrative review, a search was performed using national and international databases, including CINAHL, Scopus, Medline, Web of Science, and ISI (with no date restriction). The keywords employed during the search process were "privacy of patients," "confidentiality," "and patients' rights." In total, 1345 articles were retrieved from the databases. After the elimination of repetitive studies and with regard to the study objectives, 124 articles, 3 books, and 4 theses were entered into the study. The data were analyzed using the conventional content analysis approach. The results were extracted in the form of four, seven, and two themes related to attributes such as physical, informational, social, and psychological and the antecedents and consequences of respecting patient privacy, respectively. Respect for hospitalized patient privacy contains multiple dimensions. Factors affecting the achievement of this concept include individual backgrounds, nature of the disease, and rule of paternalism. The fulfillment of patient privacy leads to such consequences as protection and improvement of human dignity as well as improved communication between the patient and the health team.

  14. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    PubMed Central

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  15. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    PubMed

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  16. Privacy Protection and Compliance in Higher Education: The Role of the CPO

    ERIC Educational Resources Information Center

    Steinfeld, Lauren; Archuleta, Kathleen Sutherland

    2006-01-01

    Privacy--and the loss of it--attracts attention. Few issues enjoy a higher national profile. In the growing list of data breaches reported over the last year, the leading industry sector has been higher education. Colleges and universities now find themselves in the spotlight as they grapple with an increasingly complex legal and regulatory…

  17. Protecting User Privacy in the Age of Digital Libraries

    ERIC Educational Resources Information Center

    Coombs, Karen A.

    2005-01-01

    In this article, the author discusses how she and the other librarians at State University of New York (SUNY) Cortland learned to "scrub" their records so that patrons remained protected, but the librarians still had access to useful statistics. The topic of library privacy regulations is complex. There is a host of legislation at both…

  18. Police in the Dorms: Student Safety or Privacy Infringement?

    ERIC Educational Resources Information Center

    Hoover, Eric

    2008-01-01

    Since 1970, officers on the Seattle campus have regularly patrolled the hallways of dormitories of the University of Washington. It is a community-policing strategy, a low-key way to engage students. However, the practice might cease this fall. In June, the state's Court of Appeals ruled that students have the same right to privacy in dormitory…

  19. What We Can Learn from the Suits

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2006-01-01

    This article discusses what colleges and universities can learn from Uncle Sam and corporate America when it comes to designing secure networks and ensuring privacy. After all, schools face many of the same privacy and information security challenges seen in the business and government sectors. The fact of the matter is, in the age of cyber crime…

  20. Quarked! Adventures in the Subatomic Universe

    Science.gov Websites

    Project | Glossary | Outreach | Contact Us | Links Privacy Policy | © 2013 The University of Kansas Quarked Club Ask Mr. Marks Subatomic Roadmap Parents Previous Slide Next Slide Home | About the Quarked

  1. 75 FR 28240 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... for the Uniformed Services University of the Health Sciences; and E.O. 9397 (SSN), as amended... Associate Dean for Recruitment and Admissions, Uniformed Services University of the Health Sciences, 4301...: Associate Dean for Recruitment and Admissions, Uniformed Services University of the Health Sciences, 4301...

  2. Privacy-Enhancing Technologies for the Internet

    DTIC Science & Technology

    1997-01-01

    http://www.communities.com/paper/swamp.html 7 David Chaum , ``Untraceable Electronic Mail, Return addresses, and Digital Pseudonyms,’’ Communications of...the ACM, February 1981, vol. 24 no. 2. http://www.eskimo.com/~weidai/mix-net.txt 8 David Chaum , ``Blind Signatures for Untraceable Payments...Privacy-enhancing technologies for the Internet Ian Goldberg David Wagner Eric Brewer University of California, Berkeley {iang,daw,brewer

  3. Privacy, Security, & Compliance: Strange Bedfellows or a Marriage Made in Heaven?

    ERIC Educational Resources Information Center

    Corn, Michael; Rosenthal, Jane

    2013-01-01

    Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…

  4. A Quantum Private Query Protocol for Enhancing both User and Database Privacy

    NASA Astrophysics Data System (ADS)

    Zhou, Yi-Hua; Bai, Xue-Wei; Li, Lei-Lei; Shi, Wei-Min; Yang, Yu-Guang

    2018-01-01

    In order to protect the privacy of query user and database, some QKD-based quantum private query (QPQ) protocols were proposed. Unfortunately some of them cannot resist internal attack from database perfectly; some others can ensure better user privacy but require a reduction of database privacy. In this paper, a novel two-way QPQ protocol is proposed to ensure the privacy of both sides of communication. In our protocol, user makes initial quantum states and derives the key bit by comparing initial quantum state and outcome state returned from database by ctrl or shift mode instead of announcing two non-orthogonal qubits as others which may leak part secret information. In this way, not only the privacy of database be ensured but also user privacy is strengthened. Furthermore, our protocol can also realize the security of loss-tolerance, cheat-sensitive, and resisting JM attack etc. Supported by National Natural Science Foundation of China under Grant Nos. U1636106, 61572053, 61472048, 61602019, 61502016; Beijing Natural Science Foundation under Grant Nos. 4152038, 4162005; Basic Research Fund of Beijing University of Technology (No. X4007999201501); The Scientific Research Common Program of Beijing Municipal Commission of Education under Grant No. KM201510005016

  5. Social Networking Sites: College Students' Patterns of Use and Concerns for Privacy and Trust by Gender, Ethnicity, and Employment Status

    ERIC Educational Resources Information Center

    Kyei-Blankson, Lydia; Iyer, Kamakshi S.; Subramanian, Lavanya

    2016-01-01

    Social Networking Sites (SNSs) are web-based facilities that allow for social interaction, sharing, communication and collaboration in today's world. In the current study, patterns of use of social media among students at a public Midwestern university are examined. In addition, students were surveyed regarding concerns for privacy and trust and…

  6. Privacy and equality in diagnostic genetic testing.

    PubMed

    Nyrhinen, Tarja; Hietala, Marja; Puukka, Pauli; Leino-Kilpi, Helena

    2007-05-01

    This study aimed to determine the extent to which the principles of privacy and equality were observed during diagnostic genetic testing according to views held by patients or child patients' parents (n = 106) and by staff (n = 162) from three Finnish university hospitals. The data were collected through a structured questionnaire and analysed using the SAS 8.1 statistical software. In general, the two principles were observed relatively satisfactorily in clinical practice. According to patients/parents, equality in the post-analytic phase and, according to staff, privacy in the pre-analytic phase, involved the greatest ethical problems. The two groups differed in their views concerning pre-analytic privacy. Although there were no major problems regarding the two principles, the differences between the testing phases require further clarification. To enhance privacy protection and equality, professionals need to be given more genetics/ethics training, and patients individual counselling by genetics units staff, giving more consideration to patients' world-view, the purpose of the test and the test result.

  7. Information Warfare: Legal, Regulatory, Policy and Organizational Considerations for Assurance. Second Edition.

    DTIC Science & Technology

    1996-07-04

    of Information Warfare and Strategy graduated 32 students from its 10-month senior level (war college ) program on 12 June 1996. The event marked the...1989 prosecution of Robert Tappan Morris, a Cornell University graduate student who, on November 2, 1988, released a computer worm across the...2-25 2-2-1 Constitutional Amendments with Privacy Implications .................................... 2-28 2-2-2 Privacy and Access to Government

  8. Efficient Secure and Privacy-Preserving Route Reporting Scheme for VANETs

    NASA Astrophysics Data System (ADS)

    Zhang, Yuanfei; Pei, Qianwen; Dai, Feifei; Zhang, Lei

    2017-10-01

    Vehicular ad-hoc network (VANET) is a core component of intelligent traffic management system which could provide various of applications such as accident prediction, route reporting, etc. Due to the problems caused by traffic congestion, route reporting becomes a prospective application which can help a driver to get optimal route to save her travel time. Before enjoying the convenience of route reporting, security and privacy-preserving issues need to be concerned. In this paper, we propose a new secure and privacy-preserving route reporting scheme for VANETs. In our scheme, only an authenticated vehicle can use the route reporting service provided by the traffic management center. Further, a vehicle may receive the response from the traffic management center with low latency and without violating the privacy of the vehicle. Experiment results show that our scheme is much more efficiency than the existing one.

  9. Young adult females' views regarding online privacy protection at two time points.

    PubMed

    Moreno, Megan A; Kelleher, Erin; Ameenuddin, Nusheen; Rastogi, Sarah

    2014-09-01

    Risks associated with adolescent Internet use include exposure to inappropriate information and privacy violations. Privacy expectations and policies have changed over time. Recent Facebook security setting changes heighten these risks. The purpose of this study was to investigate views and experiences with Internet safety and privacy protection among older adolescent females at two time points, in 2009 and 2012. Two waves of focus groups were conducted, one in 2009 and the other in 2012. During these focus groups, female university students discussed Internet safety risks and strategies and privacy protection. All focus groups were audio recorded and manually transcribed. Qualitative analysis was conducted at the end of each wave and then reviewed and combined in a separate analysis using the constant comparative method. A total of 48 females participated across the two waves. The themes included (1) abundant urban myths, such as the ability for companies to access private information; (2) the importance of filtering one's displayed information; and (3) maintaining age limits on social media access to avoid younger teens' presence on Facebook. The findings present a complex picture of how adolescents view privacy protection and online safety. Older adolescents may be valuable partners in promoting safe and age-appropriate Internet use for younger teens in the changing landscape of privacy. Copyright © 2014. Published by Elsevier Inc.

  10. Examining Self-Disclosure on Social Networking Sites: A Flow Theory and Privacy Perspective.

    PubMed

    Ampong, George Oppong Appiagyei; Mensah, Aseda; Adu, Adolph Sedem Yaw; Addae, John Agyekum; Omoregie, Osaretin Kayode; Ofori, Kwame Simpe

    2018-06-06

    Social media and other web 2.0 tools have provided users with the platform to interact with and also disclose personal information to not only their friends and acquaintances but also relative strangers with unprecedented ease. This has enhanced the ability of people to share more about themselves, their families, and their friends through a variety of media including text, photo, and video, thus developing and sustaining social and business relationships. The purpose of the paper is to identify the factors that predict self-disclosure on social networking sites from the perspective of privacy and flow. Data was collected from 452 students in three leading universities in Ghana and analyzed with Partial Least Square-Structural Equation Modeling. Results from the study revealed that privacy risk was the most significant predictor. We also found privacy awareness, privacy concerns, and privacy invasion experience to be significant predictors of self-disclosure. Interaction and perceived control were found to have significant effect on self-disclosure. In all, the model accounted for 54.6 percent of the variance in self-disclosure. The implications and limitations of the current study are discussed, and directions for future research proposed.

  11. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    PubMed

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  12. Nurses' and patients' perceptions of privacy protection behaviours and information provision.

    PubMed

    Kim, Kyunghee; Han, Yonghee; Kim, Ji-Su

    2017-08-01

    With increased attention to patient privacy and autonomy, privacy protection and information provision for patients are becoming increasingly important. The aim of this study was to identify and analyse nurses' and patients' perceptions of the importance and performance of protecting patients' privacy and providing them with relevant information. This study is a descriptive cross-sectional investigation. Participants and research context: Participants were 168 patients hospitalised in medical and surgical wards and 176 nurses who cared for them. Ethical consideration: This study was approved by the Chung-Ang University Bioethics Committee, and informed written consent was collected from all participants. Nurses' recognition of the importance of protecting patients' privacy and providing adequate information was higher compared to their actual performance, and the nurses' level of performance was higher in comparison with the patients' recognition of its importance. Although a holistic approach to patient privacy protection and information provision is needed, the medical field has not embraced this model of care. These findings provide empirical data to create an ethical environment for the future, as considerable attention has been devoted to patients' rights and medical institutions' liability for providing explanations to patients.

  13. Building an ethical environment improves patient privacy and satisfaction in the crowded emergency department: a quasi-experimental study.

    PubMed

    Lin, Yen-Ko; Lee, Wei-Che; Kuo, Liang-Chi; Cheng, Yuan-Chia; Lin, Chia-Ju; Lin, Hsing-Lin; Chen, Chao-Wen; Lin, Tsung-Ying

    2013-02-20

    To evaluate the effectiveness of a multifaceted intervention in improving emergency department (ED) patient privacy and satisfaction in the crowded ED setting. A pre- and post-intervention study was conducted. A multifaceted intervention was implemented in a university-affiliated hospital ED. The intervention developed strategies to improve ED patient privacy and satisfaction, including redesigning the ED environment, process management, access control, and staff education and training, and encouraging ethics consultation. The effectiveness of the intervention was evaluated using patient surveys. Eligibility data were collected after the intervention and compared to data collected before the intervention. Differences in patient satisfaction and patient perception of privacy were adjusted for predefined covariates using multivariable ordinal logistic regression. Structured questionnaires were collected with 313 ED patients before the intervention and 341 ED patients after the intervention. There were no important covariate differences, except for treatment area, between the two groups. Significant improvements were observed in patient perception of "personal information overheard by others", being "seen by irrelevant persons", having "unintentionally heard inappropriate conversations from healthcare providers", and experiencing "providers' respect for my privacy". There was significant improvement in patient overall perception of privacy and satisfaction. There were statistically significant correlations between the intervention and patient overall perception of privacy and satisfaction on multivariable analysis. Significant improvements were achieved with an intervention. Patients perceived significantly more privacy and satisfaction in ED care after the intervention. We believe that these improvements were the result of major philosophical, administrative, and operational changes aimed at respecting both patient privacy and satisfaction.

  14. Someone to Watch Over Me? Privacy and Governance Strategies for CCTV and Emerging Surveillance Technologies

    DTIC Science & Technology

    2008-03-01

    Zoufal Colonel, United States Army Reserve B.A., University of Illinois, 1978 M.A.P.A., University of Illinois, 1980 J.D., University of Illinois...9 6. Case Studies of the United Kingdom, France, and Germany........11 7. The Chicago Experience...E. PROBLEM STATEMENT ...........................................................................14 1. The Rise of CCTV Surveillance in the United

  15. The University of Minnesota's Internet Gopher System: A Tool for Accessing Network-Based Electronic Information.

    ERIC Educational Resources Information Center

    Wiggins, Rich

    1993-01-01

    Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…

  16. Security and Privacy in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fink, Glenn A.; Edgar, Thomas W.; Rice, Theora R.

    As you have seen from the previous chapters, cyber-physical systems (CPS) are broadly used across technology and industrial domains. While these systems enable process optimization and efficiency and allow previously impossible functionality, security and privacy are key concerns for their design, development, and operation. CPS have been key components utilized in some of the highest publicized security breaches over the last decade. In this chapter, we will look over the CPS described in the previous chapters from a security perspective. In this chapter, we explain classical information and physical security fundamentals in the context of CPS and contextualize them acrossmore » application domains. We give examples where the interplay of functionality and diverse communication can introduce unexpected vulnerabilities and produce larger impacts. We will discuss how CPS security and privacy is inherently different from that of pure cyber or physical systems and what may be done to secure these systems, considering their emergent cyber-physical properties. Finally, we will discuss security and privacy implications of merging infrastructural and personal CPS. Our hope is to impart the knowledge of what CPS security and privacy are, why they are important, and explain existing processes and challenges.« less

  17. The Social and Legal Status of Gay and Lesbian Students: An Update for Colleges and Universities.

    ERIC Educational Resources Information Center

    Liddell, Debora L.; Douvanis, Costas J.

    1994-01-01

    Describes current social and legal status of gay students. Examines scope of the problem; defines legal issues; and cites relevant cases regarding students' rights of association, access to university services/facilities, and privacy. Discusses homosexuality as "illegal act" and notes differences between private and public institutions. Discusses…

  18. The Privacy and Security Policy Vacuum in Higher Education

    ERIC Educational Resources Information Center

    Cate, Fred H.

    2006-01-01

    Colleges and universities face heightened responsibilities. They possess a large volume and variety of sensitive information on a wide range of individuals, and demands for this information are growing. The students that are educated, housed, and/or employed by colleges and universities tend to be in a vulnerable age cohort: eighteen- to…

  19. Gender differences in quality of care experiences during hospital stay: A contribution to patient-centered healthcare for both men and women.

    PubMed

    Teunissen, T A M; Rotink, M E; Lagro-Janssen, A L M

    2016-04-01

    Studies demonstrate that there are important gender differences in perceptions of medicinal care. Our aim is to investigate whether there are also gender differences in patients'quality of care experiences during their hospital stay. In a cross-sectional survey, patients who were admitted to a university hospital were invited to complete a questionnaire. Answers were compared between men and women of different ages, education levels, and health assessments, using the independent t-test. A linear regression model was performed to investigate the relationship between patient characteristics and hospital assessments 4169 questionnaires were sent (41.8% returned). Women rated the hospital significantly (P=0.007) lower than men, especially higher educated women and women between the ages of 18 and 44 years. Behaviors of nurses were perceived to be unsatisfactory by significantly more female patients than male patients (P=0.016). One in six women wanted more privacy compared with one in ten men (P<0.001), and ten percent more women suffered from pain (P<0.001). Women, particularly those higher educated and between 45 and 64 years of age, assess hospital care significantly lower than men. To optimize patients' assessments of hospital care, women require more gender-sensitive nursing care, more privacy, and better pain management than they receive at present. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  20. An automated approach for tone mapping operator parameter adjustment in security applications

    NASA Astrophysics Data System (ADS)

    Krasula, LukáÅ.¡; Narwaria, Manish; Le Callet, Patrick

    2014-05-01

    High Dynamic Range (HDR) imaging has been gaining popularity in recent years. Different from the traditional low dynamic range (LDR), HDR content tends to be visually more appealing and realistic as it can represent the dynamic range of the visual stimuli present in the real world. As a result, more scene details can be faithfully reproduced. As a direct consequence, the visual quality tends to improve. HDR can be also directly exploited for new applications such as video surveillance and other security tasks. Since more scene details are available in HDR, it can help in identifying/tracking visual information which otherwise might be difficult with typical LDR content due to factors such as lack/excess of illumination, extreme contrast in the scene, etc. On the other hand, with HDR, there might be issues related to increased privacy intrusion. To display the HDR content on the regular screen, tone-mapping operators (TMO) are used. In this paper, we present the universal method for TMO parameters tuning, in order to maintain as many details as possible, which is desirable in security applications. The method's performance is verified on several TMOs by comparing the outcomes from tone-mapping with default and optimized parameters. The results suggest that the proposed approach preserves more information which could be of advantage for security surveillance but, on the other hand, makes us consider possible increase in privacy intrusion.

  1. Differential privacy-based evaporative cooling feature selection and classification with relief-F and random forests.

    PubMed

    Le, Trang T; Simmons, W Kyle; Misaki, Masaya; Bodurka, Jerzy; White, Bill C; Savitz, Jonathan; McKinney, Brett A

    2017-09-15

    Classification of individuals into disease or clinical categories from high-dimensional biological data with low prediction error is an important challenge of statistical learning in bioinformatics. Feature selection can improve classification accuracy but must be incorporated carefully into cross-validation to avoid overfitting. Recently, feature selection methods based on differential privacy, such as differentially private random forests and reusable holdout sets, have been proposed. However, for domains such as bioinformatics, where the number of features is much larger than the number of observations p≫n , these differential privacy methods are susceptible to overfitting. We introduce private Evaporative Cooling, a stochastic privacy-preserving machine learning algorithm that uses Relief-F for feature selection and random forest for privacy preserving classification that also prevents overfitting. We relate the privacy-preserving threshold mechanism to a thermodynamic Maxwell-Boltzmann distribution, where the temperature represents the privacy threshold. We use the thermal statistical physics concept of Evaporative Cooling of atomic gases to perform backward stepwise privacy-preserving feature selection. On simulated data with main effects and statistical interactions, we compare accuracies on holdout and validation sets for three privacy-preserving methods: the reusable holdout, reusable holdout with random forest, and private Evaporative Cooling, which uses Relief-F feature selection and random forest classification. In simulations where interactions exist between attributes, private Evaporative Cooling provides higher classification accuracy without overfitting based on an independent validation set. In simulations without interactions, thresholdout with random forest and private Evaporative Cooling give comparable accuracies. We also apply these privacy methods to human brain resting-state fMRI data from a study of major depressive disorder. Code available at http://insilico.utulsa.edu/software/privateEC . brett-mckinney@utulsa.edu. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  2. Development of a HIPAA-compliant environment for translational research data and analytics.

    PubMed

    Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C

    2014-01-01

    High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.

  3. Developing genetic privacy legislation: the South Carolina experience.

    PubMed

    Edwards, J G; Young, S R; Brooks, K A; Aiken, J H; Patterson, E D; Pritchett, S T

    1998-01-01

    The availability of presymptomatic and predisposition genetic testing has spawned the need for legislation prohibiting health insurance discrimination on the basis of genetic information. The federal effort, the Health Insurance Portability and Accountability Act (HIPAA) of 1996, falls short by protecting only those who access insurance through group plans. A committee of University of South Carolina professionals convened in 1996 to develop legislation in support of genetic privacy for the state of South Carolina. The legislation prevents health insurance companies from denying coverage or setting insurance rates on the basis of genetic information. It also protects the privacy of genetic information and prohibits performance of genetic tests without specific informed consent. In preparing the bill, genetic privacy laws from other states were reviewed, and a modified version of the Virginia law adopted. The South Carolina Committee for the Protection of Genetic Privacy version went a step further by including enforcement language and excluding Virginia's sunset clause. The definition of genetic information encompassed genetic test results, and importantly, includes family history of genetic disease. Our experience in navigating through the state legislature and working through opposition from the health insurance lobby is detailed herein.

  4. A community effort to protect genomic data sharing, collaboration and outsourcing.

    PubMed

    Wang, Shuang; Jiang, Xiaoqian; Tang, Haixu; Wang, Xiaofeng; Bu, Diyue; Carey, Knox; Dyke, Stephanie Om; Fox, Dov; Jiang, Chao; Lauter, Kristin; Malin, Bradley; Sofia, Heidi; Telenti, Amalio; Wang, Lei; Wang, Wenhao; Ohno-Machado, Lucila

    2017-01-01

    The human genome can reveal sensitive information and is potentially re-identifiable, which raises privacy and security concerns about sharing such data on wide scales. In 2016, we organized the third Critical Assessment of Data Privacy and Protection competition as a community effort to bring together biomedical informaticists, computer privacy and security researchers, and scholars in ethical, legal, and social implications (ELSI) to assess the latest advances on privacy-preserving techniques for protecting human genomic data. Teams were asked to develop novel protection methods for emerging genome privacy challenges in three scenarios: Track (1) data sharing through the Beacon service of the Global Alliance for Genomics and Health. Track (2) collaborative discovery of similar genomes between two institutions; and Track (3) data outsourcing to public cloud services. The latter two tracks represent continuing themes from our 2015 competition, while the former was new and a response to a recently established vulnerability. The winning strategy for Track 1 mitigated the privacy risk by hiding approximately 11% of the variation in the database while permitting around 160,000 queries, a significant improvement over the baseline. The winning strategies in Tracks 2 and 3 showed significant progress over the previous competition by achieving multiple orders of magnitude performance improvement in terms of computational runtime and memory requirements. The outcomes suggest that applying highly optimized privacy-preserving and secure computation techniques to safeguard genomic data sharing and analysis is useful. However, the results also indicate that further efforts are needed to refine these techniques into practical solutions.

  5. Employee rights to privacy and access to personnel records: a new look.

    PubMed

    Linowes, D F

    1978-01-01

    Do employees really enjoy a so-called right to privacy in their employment relationship? To what extent are their rights violated by the pre-employment screening process? These are the questions discussed in this article by David F. Linowes, Boeschenstein Professor of Political Economy and Public Policy and Science at the University of Illinois and recently chairman of the Privacy Protection Study Commission. Citing the availability of data to a prospective employer through credit card companies, banks, insurance companies, mailing lists, health records, and investigative reporting agencies, Professor Linowes makes the point that little is left unknoun when the investigative process is completed. There is no clear line separating what is relevant and what is privileged. The Study Commission's report to Congress suggests guidelines that would insure fairness to all parties.

  6. Building an ethical environment improves patient privacy and satisfaction in the crowded emergency department: a quasi-experimental study

    PubMed Central

    2013-01-01

    Background To evaluate the effectiveness of a multifaceted intervention in improving emergency department (ED) patient privacy and satisfaction in the crowded ED setting. Methods A pre- and post-intervention study was conducted. A multifaceted intervention was implemented in a university-affiliated hospital ED. The intervention developed strategies to improve ED patient privacy and satisfaction, including redesigning the ED environment, process management, access control, and staff education and training, and encouraging ethics consultation. The effectiveness of the intervention was evaluated using patient surveys. Eligibility data were collected after the intervention and compared to data collected before the intervention. Differences in patient satisfaction and patient perception of privacy were adjusted for predefined covariates using multivariable ordinal logistic regression. Results Structured questionnaires were collected with 313 ED patients before the intervention and 341 ED patients after the intervention. There were no important covariate differences, except for treatment area, between the two groups. Significant improvements were observed in patient perception of “personal information overheard by others”, being “seen by irrelevant persons”, having “unintentionally heard inappropriate conversations from healthcare providers”, and experiencing “providers’ respect for my privacy”. There was significant improvement in patient overall perception of privacy and satisfaction. There were statistically significant correlations between the intervention and patient overall perception of privacy and satisfaction on multivariable analysis. Conclusions Significant improvements were achieved with an intervention. Patients perceived significantly more privacy and satisfaction in ED care after the intervention. We believe that these improvements were the result of major philosophical, administrative, and operational changes aimed at respecting both patient privacy and satisfaction. PMID:23421603

  7. Berkeley Lab Search - Search engine for Berkeley Lab

    Science.gov Websites

    twitter instagram google plus facebook youtube A U.S. Department of Energy National Laboratory Managed by the University of California Questions & Comments Privacy & Security Notice twitter instagram

  8. Relating quantum privacy and quantum coherence: an operational approach.

    PubMed

    Devetak, I; Winter, A

    2004-08-20

    Given many realizations of a state or a channel as a resource, two parties can generate a secret key as well as entanglement. We describe protocols to perform the secret key distillation (as it turns out, with optimal rate). Then we show how to achieve optimal entanglement generation rates by "coherent" implementation of a class of secret key agreement protocols, proving the long-conjectured "hashing inequality."

  9. Individual differences in satisfaction with activity-based work environments

    PubMed Central

    Ernst, Anja F.; Albers, Casper J.; Mobach, Mark P.; Van Yperen, Nico W.

    2018-01-01

    Satisfaction with activity-based work environments (ABW environments) often falls short of expectations, with striking differences among individual workers. A better understanding of these differences may provide clues for optimising satisfaction with ABW environments and associated organisational outcomes. The current study was designed to examine how specific psychological needs, job characteristics, and demographic variables relate to satisfaction with ABW environments. Survey data collected at seven organizations in the Netherlands (N = 551) were examined using correlation and regression analyses. Significant correlates of satisfaction with ABW environments were found: need for relatedness (positive), need for privacy (negative), job autonomy (positive), social interaction (positive), internal mobility (positive), and age (negative). Need for privacy appeared to be a powerful predictor of individual differences in satisfaction with ABW environments. These findings underline the importance of providing work environments that allow for different work styles, in alignment with different psychological need strengths, job characteristics, and demographic variables. Improving privacy, especially for older workers and for workers high in need for privacy, seems key to optimizing satisfaction with ABW environments. PMID:29518104

  10. Assessing privacy risks in population health publications using a checklist-based approach.

    PubMed

    O'Keefe, Christine M; Ickowicz, Adrien; Churches, Tim; Westcott, Mark; O'Sullivan, Maree; Khan, Atikur

    2017-11-10

    Recent growth in the number of population health researchers accessing detailed datasets, either on their own computers or through virtual data centers, has the potential to increase privacy risks. In response, a checklist for identifying and reducing privacy risks in population health analysis outputs has been proposed for use by researchers themselves. In this study we explore the usability and reliability of such an approach by investigating whether different users identify the same privacy risks on applying the checklist to a sample of publications. The checklist was applied to a sample of 100 academic population health publications distributed among 5 readers. Cohen's κ was used to measure interrater agreement. Of the 566 instances of statistical output types found in the 100 publications, the most frequently occurring were counts, summary statistics, plots, and model outputs. Application of the checklist identified 128 outputs (22.6%) with potential privacy concerns. Most of these were associated with the reporting of small counts. Among these identified outputs, the readers found no substantial actual privacy concerns when context was taken into account. Interrater agreement for identifying potential privacy concerns was generally good. This study has demonstrated that a checklist can be a reliable tool to assist researchers with anonymizing analysis outputs in population health research. This further suggests that such an approach may have the potential to be developed into a broadly applicable standard providing consistent confidentiality protection across multiple analyses of the same data. © The Author 2017. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  11. Genomics and privacy: implications of the new reality of closed data for the field.

    PubMed

    Greenbaum, Dov; Sboner, Andrea; Mu, Xinmeng Jasmine; Gerstein, Mark

    2011-12-01

    Open source and open data have been driving forces in bioinformatics in the past. However, privacy concerns may soon change the landscape, limiting future access to important data sets, including personal genomics data. Here we survey this situation in some detail, describing, in particular, how the large scale of the data from personal genomic sequencing makes it especially hard to share data, exacerbating the privacy problem. We also go over various aspects of genomic privacy: first, there is basic identifiability of subjects having their genome sequenced. However, even for individuals who have consented to be identified, there is the prospect of very detailed future characterization of their genotype, which, unanticipated at the time of their consent, may be more personal and invasive than the release of their medical records. We go over various computational strategies for dealing with the issue of genomic privacy. One can "slice" and reformat datasets to allow them to be partially shared while securing the most private variants. This is particularly applicable to functional genomics information, which can be largely processed without variant information. For handling the most private data there are a number of legal and technological approaches-for example, modifying the informed consent procedure to acknowledge that privacy cannot be guaranteed, and/or employing a secure cloud computing environment. Cloud computing in particular may allow access to the data in a more controlled fashion than the current practice of downloading and computing on large datasets. Furthermore, it may be particularly advantageous for small labs, given that the burden of many privacy issues falls disproportionately on them in comparison to large corporations and genome centers. Finally, we discuss how education of future genetics researchers will be important, with curriculums emphasizing privacy and data security. However, teaching personal genomics with identifiable subjects in the university setting will, in turn, create additional privacy issues and social conundrums. © 2011 Greenbaum et al.

  12. Data Anonymization that Leads to the Most Accurate Estimates of Statistical Characteristics: Fuzzy-Motivated Approach

    PubMed Central

    Xiang, G.; Ferson, S.; Ginzburg, L.; Longpré, L.; Mayorga, E.; Kosheleva, O.

    2013-01-01

    To preserve privacy, the original data points (with exact values) are replaced by boxes containing each (inaccessible) data point. This privacy-motivated uncertainty leads to uncertainty in the statistical characteristics computed based on this data. In a previous paper, we described how to minimize this uncertainty under the assumption that we use the same standard statistical estimates for the desired characteristics. In this paper, we show that we can further decrease the resulting uncertainty if we allow fuzzy-motivated weighted estimates, and we explain how to optimally select the corresponding weights. PMID:25187183

  13. Big data privacy protection model based on multi-level trusted system

    NASA Astrophysics Data System (ADS)

    Zhang, Nan; Liu, Zehua; Han, Hongfeng

    2018-05-01

    This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority". Thus ensuring that the low-priority data privacy leak does not affect the disclosure of high-priority data privacy. This paper inherits the multi-level trustworthy system model of Trojan horse and divides seven different risk levels. The priority level 1˜7 represent the low to high value of user data privacy, and realize seven kinds of encryption with different execution efficiency Algorithm, the higher the priority, the greater the value of user data privacy, at the expense of efficiency under the premise of choosing a more encrypted encryption algorithm to ensure data security. For enterprises, the price point is determined by the unit equipment users to decide the length of time. The higher the risk sub-group algorithm, the longer the encryption time. The model assumes that users prefer the lower priority encryption algorithm to ensure efficiency. This paper proposes a privacy cost model for each of the seven risk subgroups. Among them, the higher the privacy cost, the higher the priority of the risk sub-group, the higher the price the user needs to pay to ensure the privacy of the data. Furthermore, by introducing the existing pricing model of economics and the human traffic model proposed by this paper and fluctuating with the market demand, this paper improves the price of unit products when the market demand is low. On the other hand, when the market demand increases, the profit of the enterprise will be guaranteed under the guidance of the government by reducing the price per unit of product. Then, this paper introduces the dynamic factors of consumers' mood and age to optimize. At the same time, seven algorithms are selected from symmetric and asymmetric encryption algorithms to define the enterprise costs at different levels. Therefore, the proposed model solves the continuous influence caused by cascading events and ensures that the disclosure of low-level data privacy of users does not affect the high-level data privacy, thus greatly improving the safety of the private information of user.

  14. Privacy-preserving data cube for electronic medical records: An experimental evaluation.

    PubMed

    Kim, Soohyung; Lee, Hyukki; Chung, Yon Dohn

    2017-01-01

    The aim of this study is to evaluate the effectiveness and efficiency of privacy-preserving data cubes of electronic medical records (EMRs). An EMR data cube is a complex of EMR statistics that are summarized or aggregated by all possible combinations of attributes. Data cubes are widely utilized for efficient big data analysis and also have great potential for EMR analysis. For safe data analysis without privacy breaches, we must consider the privacy preservation characteristics of the EMR data cube. In this paper, we introduce a design for a privacy-preserving EMR data cube and the anonymization methods needed to achieve data privacy. We further focus on changes in efficiency and effectiveness that are caused by the anonymization process for privacy preservation. Thus, we experimentally evaluate various types of privacy-preserving EMR data cubes using several practical metrics and discuss the applicability of each anonymization method with consideration for the EMR analysis environment. We construct privacy-preserving EMR data cubes from anonymized EMR datasets. A real EMR dataset and demographic dataset are used for the evaluation. There are a large number of anonymization methods to preserve EMR privacy, and the methods are classified into three categories (i.e., global generalization, local generalization, and bucketization) by anonymization rules. According to this classification, three types of privacy-preserving EMR data cubes were constructed for the evaluation. We perform a comparative analysis by measuring the data size, cell overlap, and information loss of the EMR data cubes. Global generalization considerably reduced the size of the EMR data cube and did not cause the data cube cells to overlap, but incurred a large amount of information loss. Local generalization maintained the data size and generated only moderate information loss, but there were cell overlaps that could decrease the search performance. Bucketization did not cause cells to overlap and generated little information loss; however, the method considerably inflated the size of the EMR data cubes. The utility of anonymized EMR data cubes varies widely according to the anonymization method, and the applicability of the anonymization method depends on the features of the EMR analysis environment. The findings help to adopt the optimal anonymization method considering the EMR analysis environment and goal of the EMR analysis. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  15. A Model for Calculated Privacy and Trust in pHealth Ecosystems.

    PubMed

    Ruotsalainen, Pekka; Blobel, Bernd

    2018-01-01

    A pHealth ecosystem is a community of service users and providers. It is also a dynamic socio-technical system. One of its main goals is to help users to maintain their personal health status. Another goal is to give economic benefit to stakeholders which use personal health information existing in the ecosystem. In pHealth ecosystems, a huge amount of health related data is collected and used by service providers such as data extracted from the regulated health record and information related to personal characteristics, genetics, lifestyle and environment. In pHealth ecosystems, there are different kinds of service providers such as regulated health care service providers, unregulated health service providers, ICT service providers, researchers and industrial organizations. This fact together with the multidimensional personal health data used raises serious privacy concerns. Privacy is a necessary enabler for successful pHealth, but it is also an elastic concept without any universally agreed definition. Regardless of what kind of privacy model is used in dynamic socio-technical systems, it is difficult for a service user to know the privacy level of services in real life situations. As privacy and trust are interrelated concepts, the authors have developed a hybrid solution where knowledge got from regulatory privacy requirements and publicly available privacy related documents is used for calculation of service providers' specific initial privacy value. This value is then used as an estimate for the initial trust score. In this solution, total trust score is a combination of recommended trust, proposed trust and initial trust. Initial privacy level is a weighted arithmetic mean of knowledge and user selected weights. The total trust score for any service provider in the ecosystem can be calculated deploying either a beta trust model or the Fuzzy trust calculation method. The prosed solution is easy to use and to understand, and it can be also automated. It is possible to develop a computer application that calculates a situation-specific trust score, and to make it freely available on the Internet.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knirsch, Fabian; Engel, Dominik; Neureiter, Christian

    In a smart grid, data and information are transported, transmitted, stored, and processed with various stakeholders having to cooperate effectively. Furthermore, personal data is the key to many smart grid applications and therefore privacy impacts have to be taken into account. For an effective smart grid, well integrated solutions are crucial and for achieving a high degree of customer acceptance, privacy should already be considered at design time of the system. To assist system engineers in early design phase, frameworks for the automated privacy evaluation of use cases are important. For evaluation, use cases for services and software architectures needmore » to be formally captured in a standardized and commonly understood manner. In order to ensure this common understanding for all kinds of stakeholders, reference models have recently been developed. In this paper we present a model-driven approach for the automated assessment of such services and software architectures in the smart grid that builds on the standardized reference models. The focus of qualitative and quantitative evaluation is on privacy. For evaluation, the framework draws on use cases from the University of Southern California microgrid.« less

  17. Considerations for use of dental photography and electronic media in dental education and clinical practice.

    PubMed

    Stieber, Jane C; Nelson, Travis; Huebner, Colleen E

    2015-04-01

    Photography and electronic media are indispensable tools for dental education and clinical practice. Although previous research has focused on privacy issues and general strategies to protect patient privacy when sharing clinical photographs for educational purposes, there are no published recommendations for developing a functional, privacy-compliant institutional framework for the capture, storage, transfer, and use of clinical photographs and other electronic media. The aims of this study were to research patient rights relating to electronic media and propose a framework for the use of patient media in education and clinical care. After a review of the relevant literature and consultation with the University of Washington's director of privacy and compliance and assistant attorney general, the researchers developed a privacy-compliant framework to ensure appropriate capture, storage, transfer, and use of clinical photography and electronic media. A four-part framework was created to guide the use of patient media that reflects considerations of patient autonomy and privacy, informed consent, capture and storage of media, and its transfer, use, and display. The best practices proposed for capture, storage, transfer, and use of clinical photographs and electronic media adhere to the health care code of ethics (based on patient autonomy, nonmaleficence, beneficence, justice, and veracity), which is most effectively upheld by a practical framework designed to protect patients and limit institutional liability. Educators have the opportunity and duty to convey these principles to students who will become the next generation of dentists, researchers, and educators.

  18. Privacy preserving interactive record linkage (PPIRL).

    PubMed

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  19. 76 FR 26310 - National Cancer Institute; Notice of Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-06

    ... Support; 93.398, Cancer Research Manpower; 93.399, Cancer Control, National Institutes of Health, HHS... personal privacy. Name of Committee: National Cancer Institute Special Emphasis Panel, Population-based Research Optimizing Screening through Personalized Regimens (PROSPR) for Cancer and Statistical...

  20. NOAA Photo Library - Meet the Photographers - Lt. Elizabeth Crapo

    Science.gov Websites

    Operations Public Affairs. She holds a BS in Atmospheric Science form the University of Arizona. She is an Publication of the National Oceanic & Atmospheric Administration (NOAA), NOAA Central Library NOAA Privacy

  1. Breathing Room in Monitored Space: The Impact of Passive Monitoring Technology on Privacy in Independent Living.

    PubMed

    Berridge, Clara

    2016-10-01

    This study examines articulations of the relationship between privacy and passive monitoring by users and former users of a sensor-based remote monitoring system. A new conceptualization of privacy provides a framework for a constructive analysis of the study's findings with practical implications. Forty-nine in-depth semistructured interviews were conducted with elder residents, family members, and staff of 6 low-income independent living residence apartment buildings where the passive monitoring system had been offered for 6 years. Transcribed interviews were coded into the Dedoose software service and were analyzed using methods of grounded theory. Five diverse articulations of the relationship between privacy and passive monitoring emerged. The system produced new knowledge about residents and enabled staff to decide how much of that knowledge to disclose to residents. They chose not to disclose to residents their reason for following up on system-generated alerts for 2 reasons: concern that feelings of privacy invasion may arise and cause dissatisfaction with the technology, and the knowledge that many resident users did not comprehend the extent of its features and would be alarmed. This research reveals the importance and challenges of obtaining informed consent. It identifies where boundary intrusion can occur in the use of passive monitoring as well as how changes to technology design and practice could create opportunities for residents to manage their own boundaries according to their privacy needs. The diversity of approaches to privacy supports the need for "opportunity for boundary management" to be employed as both a design and practice principle. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  2. Youthful Lust and Violation of Mobile Phone Rule in a Private Christian Mission University, South West Nigeria

    ERIC Educational Resources Information Center

    Ojo, Omonijo Dare; Ugochukwu, Nnedum Obiajulu Anthony; Obinna, Ezeokana Jude

    2011-01-01

    This study aims at discovering the difference in the perceived lack of privacy in communication and violation of mobile phone rule among students in a Private Christian Mission University, South-West Nigeria. It equally tries to discover if there is a difference in the perceived students' desire to express love to the opposite sex and violation of…

  3. The Relationship between Parental Notification and Recidivism and Retention of Students Who Violated the University Alcohol Policy

    ERIC Educational Resources Information Center

    Cruise, Christie Ann

    2009-01-01

    A 1998 amendment to the Family Educational Rights and Privacy Act was clear in permitting colleges and universities to notify parents of students under age 21 when they have been found responsible for "a disciplinary violation with respect to such use or possession" of alcohol or any controlled substance (FERPA, 20 U.S.C. section 1232g,…

  4. The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases.

    PubMed

    Burnett, Leslie; Barlow-Stewart, Kris; Proos, Anné L; Aizenberg, Harry

    2003-05-01

    This article describes a generic model for access to samples and information in human genetic databases. The model utilises a "GeneTrustee", a third-party intermediary independent of the subjects and of the investigators or database custodians. The GeneTrustee model has been implemented successfully in various community genetics screening programs and has facilitated research access to genetic databases while protecting the privacy and confidentiality of research subjects. The GeneTrustee model could also be applied to various types of non-conventional genetic databases, including neonatal screening Guthrie card collections, and to forensic DNA samples.

  5. Space in Space: Designing for Privacy in the Workplace

    NASA Technical Reports Server (NTRS)

    Akin, Jonie

    2015-01-01

    Privacy is cultural, socially embedded in the spatial, temporal, and material aspects of the lived experience. Definitions of privacy are as varied among scholars as they are among those who fight for their personal rights in the home and the workplace. Privacy in the workplace has become a topic of interest in recent years, as evident in discussions on Big Data as well as the shrinking office spaces in which people work. An article in The New York Times published in February of this year noted that "many companies are looking to cut costs, and one way to do that is by trimming personal space". Increasingly, organizations ranging from tech start-ups to large corporations are downsizing square footage and opting for open-office floorplans hoping to trim the budget and spark creative, productive communication among their employees. The question of how much is too much to trim when it comes to privacy, is one that is being actively addressed by the National Aeronautics and Space Administration (NASA) as they explore habitat designs for future space missions. NASA recognizes privacy as a design-related stressor impacting human health and performance. Given the challenges of sustaining life in an isolated, confined, and extreme environment such as Mars, NASA deems it necessary to determine the acceptable minimal amount for habitable volume for activities requiring at least some level of privacy in order to support optimal crew performance. Ethnographic research was conducted in 2013 to explore perceptions of privacy and privacy needs among astronauts living and working in space as part of a long-distance, long-duration mission. The allocation of space, or habitable volume, becomes an increasingly complex issue in outer space due to the costs associated with maintaining an artificial, confined environment bounded by limitations of mass while located in an extreme environment. Privacy in space, or space in space, provides a unique case study of the complex notions of privacy, the impact of design and others on achieving it, and the sensemaking that occurs when privacy is less than expected. The findings show that privacy is not just a personal, individual need but is also a need that is shared among teams and groups. Moreover, the case of space in space reveals the influence the design of the built and social environments have on privacy needs and on achieving privacy. When the level of privacy is less than expected, sensemaking occurs and the lack of privacy is dealt with by means of absencing the present. creating new social norms, and "making space" by manipulating the spatial, temporal, material aspects of the lived experience. Although the Mars habitat study represents an extreme case of privacy in the workplace, lessons learned from outer space are applicable to life in the Earth-bound workplace. A mini-case study was conducted to evaluate office space at the headquarters of a major American airline that illustrates the usefulness of building unexpected bridges between the unknown, unfamiliar Mars habitat and the everyday workplace. The comparative studies reveal insight into the interconnected, social nature of the spatial, temporal, and material aspects of the lived experience and how users of the habitat and office workspace view privacy, self, and others through an embodied, design interaction.

  6. Privacy, Trainee Rights, and Accountability in Radiology Education.

    PubMed

    Pfeifer, Cory M

    2017-06-01

    Academic radiologists commonly hold multiple simultaneous roles within the landscape of physician training. This paper analyzes theoretical scenarios describing relationships between medical students, residents, and physician educators in radiology. The scenarios presented involve medical student supervision, radiology resident recruitment, and resident termination with respect to relevant ethical, regulatory, and legal considerations. Legal precedents and the medical social contract are addressed. The Family Educational Rights and Privacy Act defines a framework for the privacy practices of medical schools, but it does not confer individual rights. Resident physicians rarely win wrongful termination lawsuits. Physician educators are ethically bound to act in the best interest of society. Courts have ruled that medicine is intended to be a self-regulatory profession. Such a power requires that physicians remain accountable to the public while providing a fair learning environment for medical trainees. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  7. Real World, Pretend Universities.

    ERIC Educational Resources Information Center

    Ericson, Jon

    1993-01-01

    Corruption in college athletics requires immediate attention through monitoring and publication of student-athletes' academic records. Privacy can be protected three ways: modification of federal law concerning student records; implementing voluntary disclosure; and exposing exploitation of African-American student athletes by examining their…

  8. Efficient and secure outsourcing of genomic data storage.

    PubMed

    Sousa, João Sá; Lefebvre, Cédric; Huang, Zhicong; Raisaro, Jean Louis; Aguilar-Melchor, Carlos; Killijian, Marc-Olivier; Hubaux, Jean-Pierre

    2017-07-26

    Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related to privacy and security. This calls for new sophisticated techniques that ensure data protection from untrusted cloud providers and that still enable researchers to obtain useful information. We present a novel privacy-preserving algorithm for fully outsourcing the storage of large genomic data files to a public cloud and enabling researchers to efficiently search for variants of interest. In order to protect data and query confidentiality from possible leakage, our solution exploits optimal encoding for genomic variants and combines it with homomorphic encryption and private information retrieval. Our proposed algorithm is implemented in C++ and was evaluated on real data as part of the 2016 iDash Genome Privacy-Protection Challenge. Results show that our solution outperforms the state-of-the-art solutions and enables researchers to search over millions of encrypted variants in a few seconds. As opposed to prior beliefs that sophisticated privacy-enhancing technologies (PETs) are unpractical for real operational settings, our solution demonstrates that, in the case of genomic data, PETs are very efficient enablers.

  9. Optimal attacks on qubit-based Quantum Key Recycling

    NASA Astrophysics Data System (ADS)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  10. Confidentiality of College and University Faculty Personnel Files: Its Appropriate Role in Institutional Affairs [and] Statement on Access to and Disclosures from Employee Records. Self-Regulation Initiatives: Guidelines for Colleges and Universities, Nos. 7 and 8.

    ERIC Educational Resources Information Center

    American Council on Education, Washington, DC.

    Guidelines for colleges concerning the privacy of employee records are presented in two policy statements. Institutional policy should minimize intrusiveness, maximize fairness, and create legitimate expectations of confidentiality. In addition to strengthening professional equity of treatment, confidentiality permits consideration of both adverse…

  11. The Internet Use for Health Information Seeking among Ghanaian University Students: A Cross-Sectional Study

    PubMed Central

    Boakye Dankwah, Augustina

    2017-01-01

    The aim of the study was to investigate university students' use of the Internet for health purpose in the Ghanaian context. The study employed a quantitative cross-sectional design. A total of 650 out of 740 students selected from 3 different universities participated, giving a response rate of 87.7% (650/740). Data were obtained using questionnaires and frequency and percentages were used to analyze data. The results show that university students are active users of the Internet as 78.3% (509/650) used Internet daily and 67.7% (440/650) use Internet for health purposes, for reasons including availability and ease of accessing information, privacy, confidentiality, and affordability. Use of Internet was constrained by unreliable and slow connection, high cost of Internet, and unreliable power supply. Also, 72.4% (315/435) used the online health information obtained as a basis for lifestyle change and only 39.5% (170/430) consulted health professionals after obtaining online information. The study concludes that students use Internet to seek online health support. The use of Internet to communicate with young people in relation to their health must therefore be explored. There is the need to be aware of online safety issues for young adults, including the need to provide information on privacy options. PMID:29225620

  12. ASPPRC

    Science.gov Websites

    ; Current Students: Go inside.mines Home Operations Summary Corporate Sponsors Sponsor Access Staff Students fifty Industry/University Cooperative Research Centers. Thanks to corporate supporters from all over the corporate sponsors. © 2018 Colorado School of Mines | | Equal Opportunity | Privacy Policy | Directories

  13. Privacy preserving interactive record linkage (PPIRL)

    PubMed Central

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Objective Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human–machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. Methods In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. Results We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Conclusions Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human–machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility. PMID:24201028

  14. Patient Privacy in the Era of Big Data.

    PubMed

    Kayaalp, Mehmet

    2018-01-20

    Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules and responsibilities such as requesting and granting only the amount of health information that is necessary for the scientific study. On the other hand, developers of de-identification systems provide guidelines to use different modes of operations to maximize the effectiveness of their tools and the success of de-identification. Institutions with clinical repositories need to follow these rules and guidelines closely to successfully protect patient privacy. To open the gates of big data to scientific communities, healthcare institutions need to be supported in their de-identification and data sharing efforts by the public, scientific communities, and local, state, and federal legislators and government agencies.

  15. Patient Privacy in the Era of Big Data

    PubMed Central

    Kayaalp, Mehmet

    2018-01-01

    Privacy was defined as a fundamental human right in the Universal Declaration of Human Rights at the 1948 United Nations General Assembly. However, there is still no consensus on what constitutes privacy. In this review, we look at the evolution of privacy as a concept from the era of Hippocrates to the era of social media and big data. To appreciate the modern measures of patient privacy protection and correctly interpret the current regulatory framework in the United States, we need to analyze and understand the concepts of individually identifiable information, individually identifiable health information, protected health information, and de-identification. The Privacy Rule of the Health Insurance Portability and Accountability Act defines the regulatory framework and casts a balance between protective measures and access to health information for secondary (scientific) use. The rule defines the conditions when health information is protected by law and how protected health information can be de-identified for secondary use. With the advents of artificial intelligence and computational linguistics, computational text de-identification algorithms produce de-identified results nearly as well as those produced by human experts, but much faster, more consistently and basically for free. Modern clinical text de-identification systems now pave the road to big data and enable scientists to access de-identified clinical information while firmly protecting patient privacy. However, clinical text de-identification is not a perfect process. In order to maximize the protection of patient privacy and to free clinical and scientific information from the confines of electronic healthcare systems, all stakeholders, including patients, health institutions and institutional review boards, scientists and the scientific communities, as well as regulatory and law enforcement agencies must collaborate closely. On the one hand, public health laws and privacy regulations define rules and responsibilities such as requesting and granting only the amount of health information that is necessary for the scientific study. On the other hand, developers of de-identification systems provide guidelines to use different modes of operations to maximize the effectiveness of their tools and the success of de-identification. Institutions with clinical repositories need to follow these rules and guidelines closely to successfully protect patient privacy. To open the gates of big data to scientific communities, healthcare institutions need to be supported in their de-identification and data sharing efforts by the public, scientific communities, and local, state, and federal legislators and government agencies. PMID:28903886

  16. Privacy-preserving techniques of genomic data-a survey.

    PubMed

    Aziz, Md Momin Al; Sadat, Md Nazmus; Alhadidi, Dima; Wang, Shuang; Jiang, Xiaoqian; Brown, Cheryl L; Mohammed, Noman

    2017-11-07

    Genomic data hold salient information about the characteristics of a living organism. Throughout the past decade, pinnacle developments have given us more accurate and inexpensive methods to retrieve genome sequences of humans. However, with the advancement of genomic research, there is a growing privacy concern regarding the collection, storage and analysis of such sensitive human data. Recent results show that given some background information, it is possible for an adversary to reidentify an individual from a specific genomic data set. This can reveal the current association or future susceptibility of some diseases for that individual (and sometimes the kinship between individuals) resulting in a privacy violation. Regardless of these risks, our genomic data hold much importance in analyzing the well-being of us and the future generation. Thus, in this article, we discuss the different privacy and security-related problems revolving around human genomic data. In addition, we will explore some of the cardinal cryptographic concepts, which can bring efficacy in secure and private genomic data computation. This article will relate the gaps between these two research areas-Cryptography and Genomics. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. Pork Choppers, Presidents, and Perverts: The Response of Two University Presidents to Attacks on the Privacy and Academic Freedom of Professors by the Florida Legislative Investigation Committee, 1956 to 1965

    ERIC Educational Resources Information Center

    Anderson, Jennifer Paul; O'Brien, Thomas V.

    2016-01-01

    In the United States in the 1950s and 1960s, several states followed the lead of Joseph McCarthy and formed committees to investigate Americans considered to be potentially subversive within states' governments. Students and professors fell victim to the "lavender scare," as public universities forced them to make concessions to their…

  18. 78 FR 36035 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ... is provided by the interactive Web-based survey, telephone, or paper submission and response type... organizational research experts. Such use of such data is explicitly limited to a specific requestor, project... and information may be used in research and management studies that support optimal functioning of VA...

  19. The double-edged sword of electronic health records: implications for patient disclosure.

    PubMed

    Campos-Castillo, Celeste; Anthony, Denise L

    2015-04-01

    Electronic health record (EHR) systems are linked to improvements in quality of care, yet also privacy and security risks. Results from research studies are mixed about whether patients withhold personal information from their providers to protect against the perceived EHR privacy and security risks. This study seeks to reconcile the mixed findings by focusing on whether accounting for patients' global ratings of care reveals a relationship between EHR provider-use and patient non-disclosure. A nationally representative sample from the 2012 Health Information National Trends Survey was analyzed using bivariate and multivariable logit regressions to examine whether global ratings of care suppress the relationship between EHR provider-use and patient non-disclosure. 13% of respondents reported having ever withheld information from a provider because of privacy/security concerns. Bivariate analysis showed that withholding information was unrelated to whether respondents' providers used an EHR. Multivariable analysis showed that accounting for respondents' global ratings of care revealed a positive relationship between having a provider who uses an EHR and withholding information. After accounting for global ratings of care, findings suggest that patients may non-disclose to providers to protect against the perceived EHR privacy and security risks. Despite evidence that EHRs inhibit patient disclosure, their advantages for promoting quality of care may outweigh the drawbacks. Clinicians should leverage the EHR's value in quality of care and discuss patients' privacy concerns during clinic visits, while policy makers should consider how to address the real and perceived privacy and security risks of EHRs. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  20. 75 FR 57458 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-21

    ... viewing on the Internet at http://www.regulations.gov as they are received without change, including any... University (NDU) Student Data Files (October 1, 2008; 73 FR 57080). Changes: * * * * * System location..., international military and civilian fellow, contractor, and private industry students attached to the National...

  1. 77 FR 40865 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-11

    ...://www.regulations.gov as they are received without change, including any personal identifiers or contact.... NM01500-13 System Name: Naval Postgraduate School Education Management System (PYTHON) System Location: U.S. Naval Postgraduate School (NPS), 1 University Circle, Monterey, CA 93943-5100. Categories of...

  2. Background Checks

    ERIC Educational Resources Information Center

    Fields, Cheryl

    2005-01-01

    In this era when many Americans seem resigned to greater encroachments on their personal privacy due to the growth and ubiquity of electronic databases with information about almost every aspect of their lives, a recent statement from the American Association of University Professors (AAUP) seems timely. The statement highlighted the issue of…

  3. Global Complexity: Information, Chaos, and Control at ASIS 1996 Annual Meeting.

    ERIC Educational Resources Information Center

    Jacob, M. E. L.

    1996-01-01

    Discusses proceedings of the 1996 ASIS (American Society for Information Science) annual meeting in Baltimore (Maryland), including chaos theory; electronic universities; distance education; intellectual property, including information privacy on the Internet; the need for leadership in libraries and information centers; information warfare and…

  4. Who Owns Your E-mail?

    ERIC Educational Resources Information Center

    Panepinto, Joe

    1995-01-01

    Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)

  5. Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets.

    PubMed

    Brown, Adrian P; Borgs, Christian; Randall, Sean M; Schnell, Rainer

    2017-06-08

    Integrating medical data using databases from different sources by record linkage is a powerful technique increasingly used in medical research. Under many jurisdictions, unique personal identifiers needed for linking the records are unavailable. Since sensitive attributes, such as names, have to be used instead, privacy regulations usually demand encrypting these identifiers. The corresponding set of techniques for privacy-preserving record linkage (PPRL) has received widespread attention. One recent method is based on Bloom filters. Due to superior resilience against cryptographic attacks, composite Bloom filters (cryptographic long-term keys, CLKs) are considered best practice for privacy in PPRL. Real-world performance of these techniques using large-scale data is unknown up to now. Using a large subset of Australian hospital admission data, we tested the performance of an innovative PPRL technique (CLKs using multibit trees) against a gold-standard derived from clear-text probabilistic record linkage. Linkage time and linkage quality (recall, precision and F-measure) were evaluated. Clear text probabilistic linkage resulted in marginally higher precision and recall than CLKs. PPRL required more computing time but 5 million records could still be de-duplicated within one day. However, the PPRL approach required fine tuning of parameters. We argue that increased privacy of PPRL comes with the price of small losses in precision and recall and a large increase in computational burden and setup time. These costs seem to be acceptable in most applied settings, but they have to be considered in the decision to apply PPRL. Further research on the optimal automatic choice of parameters is needed.

  6. The Law, Digitally Speaking

    ERIC Educational Resources Information Center

    Chronicle of Higher Education, 2008

    2008-01-01

    As new technologies emerge on campuses, how can colleges avoid legal land mines? What are the areas of greatest risk, and how should higher-education leaders deal with them? In this article, three experts offered their advice at the Technology Forum: Beth Cate, associate general counsel at Indiana University, on data privacy and security; Steven…

  7. Honest broker protocol streamlines research access to data while safeguarding patient privacy.

    PubMed

    Silvey, Scott A; Silvey, Scott Andrew; Schulte, Janet; Smaltz, Detlev H; Smaltz, Detlev Herb; Kamal, Jyoti

    2008-11-06

    At Ohio State University Medical Center, The Honest Broker Protocol provides a streamlined mechanism whereby investigators can obtain de-identified clinical data for non-FDA research without having to invest the significant time and effort necessary to craft a formalized protocol for IRB approval.

  8. Holistic Network Defense: Fusing Host and Network Features for Attack Classification

    DTIC Science & Technology

    2011-03-01

    Measures for Anomaly Detection," IEEE Symposium on Security and Privacy, Oakland, CA, (May 2001). 33. Mahoney , Matthew V, and Phillip K. Chan...University of London, August 2005. 44. Newman , Daniel, Kristina M. Manalo, and Ed Tittel. "Intrusion Detection Overview," InformIT, (June 2004). 20 Feb

  9. East Bay Consortium of Educational Institutions Visits Berkeley Lab

    Science.gov Websites

    ) Website Submit Comment Connect twitter instagram LinkedIn facebook youtube Calendar Instructions »  facebook youtube A U.S. Department of Energy National Laboratory Managed by the University of California Questions & Comments Privacy & Security Notice twitter instagram LinkedIn facebook youtube

  10. 77 FR 24925 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-26

    ... CES Personnel Information System database of NIFA. This database is updated annually from data provided by 1862 and 1890 land-grant universities. This database is maintained by the Agricultural Research... reviewer. NIFA maintains a database of potential reviewers. Information in the database is used to match...

  11. Shifting the Paradigm: Using HIV Surveillance Data as a Foundation for Improving HIV Care and Preventing HIV Infection

    PubMed Central

    Sweeney, Patricia; Gardner, Lytt I; Buchacz, Kate; Garland, Pamela Morse; Mugavero, Michael J; Bosshart, Jeffrey T; Shouse, R Luke; Bertolli, Jeanne

    2013-01-01

    Context Reducing HIV incidence in the United States and improving health outcomes for people living with HIV hinge on improving access to highly effective treatment and overcoming barriers to continuous treatment. Using laboratory tests routinely reported for HIV surveillance to monitor individuals’ receipt of HIV care and contacting them to facilitate optimal care could help achieve these objectives. Historically, surveillance-based public health intervention with individuals for HIV control has been controversial because of concerns that risks to privacy and autonomy could outweigh benefits. But with the availability of lifesaving, transmission-interrupting treatment for HIV infection, some health departments have begun surveillance-based outreach to facilitate HIV medical care. Methods Guided by ethics frameworks, we explored the ethical arguments for changing the uses of HIV surveillance data. To identify ethical, procedural, and strategic considerations, we reviewed the activities of health departments that are using HIV surveillance data to contact persons identified as needing assistance with initiating or returning to care. Findings Although privacy concerns surrounding the uses of HIV surveillance data still exist, there are ethical concerns associated with not using HIV surveillance to maximize the benefits from HIV medical care and treatment. Early efforts to use surveillance data to facilitate optimal HIV medical care illustrate how the ethical burdens may vary depending on the local context and the specifics of implementation. Health departments laid the foundation for these activities by engaging stakeholders to gain their trust in sharing sensitive information; establishing or strengthening legal, policy and governance infrastructure; and developing communication and follow-up protocols that protect privacy. Conclusions We describe a shift toward using HIV surveillance to facilitate optimal HIV care. Health departments should review the considerations outlined before implementing new uses of HIV surveillance data, and they should commit to an ongoing review of activities with the objective of balancing beneficence, respect for persons, and justice. PMID:24028699

  12. iPad integration in plastic surgical training: optimizing clinical efficiency, education, and compliance with the health insurance portability and accountability act.

    PubMed

    Gerstle, Theodore; Hassanein, Aladdin H; Eriksson, Elof

    2015-01-01

    The authors share their experience with the issuance of iPads to all residents, faculty, and physician extenders in their plastic surgical division. They found that these devices (1) optimized compliance with the Health Insurance Portability and Accountability Act by eliminating the use of paper service lists; (2) improved clinical efficiency; and (3) promoted resident education. They believe the use of these devices in residency is cost-effective when considering mitigating patient privacy risk and enriching educational value.

  13. Variability in adolescent portal privacy features: how the unique privacy needs of the adolescent patient create a complex decision-making process.

    PubMed

    Sharko, Marianne; Wilcox, Lauren; Hong, Matthew K; Ancker, Jessica S

    2018-05-17

    Medical privacy policies, which are clear-cut for adults and young children, become ambiguous during adolescence. Yet medical organizations must establish unambiguous rules about patient and parental access to electronic patient portals. We conducted a national interview study to characterize the diversity in adolescent portal policies across a range of institutions and determine the factors influencing decisions about these policies. Within a sampling framework that ensured diversity of geography and medical organization type, we used purposive and snowball sampling to identify key informants. Semi-structured interviews were conducted and analyzed with inductive thematic analysis, followed by a member check. We interviewed informants from 25 medical organizations. Policies established different degrees of adolescent access (from none to partial to complete), access ages (from 10 to 18 years), degrees of parental access, and types of information considered sensitive. Federal and state law did not dominate policy decisions. Other factors in the decision process were: technology capabilities; differing patient population needs; resources; community expectations; balance between information access and privacy; balance between promoting autonomy and promoting family shared decision-making; and tension between teen privacy and parental preferences. Some informants believed that clearer standards would simplify policy-making; others worried that standards could restrict high-quality polices. In the absence of universally accepted standards, medical organizations typically undergo an arduous decision-making process to develop teen portal policies, weighing legal, economic, social, clinical, and technological factors. As a result, portal access policies are highly inconsistent across the United States and within individual states.

  14. The Electronic FERPA: Access in the Digital Age

    ERIC Educational Resources Information Center

    McConahay, Mark; Hanson, Karen; West, Ann; Woodbeck, Dean

    2009-01-01

    On every college and university campus, common themes weave throughout identity and access management (IAM) and its relationship to Family Educational Rights and Privacy Act (FERPA). Institutions approach IAM differently as there is not a one-size-fits-all solution. Nevertheless, all face common elements. Over the past few years, a number of…

  15. Privacy Impact Assessment for the Training Registration and Administration Records for the Office of Criminal Enforcement, Forensics and Training and the National Enforcement Training Institute

    EPA Pesticide Factsheets

    This system collects student data for NETI's online university, including contact information and course data. Learn how this data is collected, used, accessed, the purpose of data collection, and record retention policies for the data.

  16. Obstetric Patients Who Select and Those Who Refuse Medical Students' Participation in Their Care.

    ERIC Educational Resources Information Center

    Magrane, Diane; And Others

    1994-01-01

    A survey of 222 obstetrics patients assisted by medical clerkship students from the University of Vermont and 78 who refused student participation found privacy the primary motivation for refusal and a desire to contribute to students' education a primary reason for accepting student participation. Patients frequently erroneously anticipated the…

  17. Nitash Balsara

    Science.gov Websites

    NPBalsara@lbl.gov 510-642-8973 Research profile » A U.S. Department of Energy National Laboratory Operated by the University of California UC logo Questions & Comments * Privacy & Security Notice Computational Study of Excited-State Phenomena in Energy Materials Center for X-ray Optics MSD Facilities Ion

  18. Ting Xu

    Science.gov Websites

    California, Berkeley tingxu@berkeley.edu 510-642-1632 Research profile » A U.S. Department of Energy National Laboratory Operated by the University of California UC logo Questions & Comments * Privacy Computational Study of Excited-State Phenomena in Energy Materials Center for X-ray Optics MSD Facilities Ion

  19. "Ingraham v. Wright" and the Decline of Due Process.

    ERIC Educational Resources Information Center

    Clark, Gerard J.

    1978-01-01

    Suggests that the constitutional questions in "Ingraham vs Wright" lend credence to a concern that the Court is seeking to eliminate all due process intervention outside of the incorporation and privacy cases and to limit even these cases to defenses of a criminal prosecution. Available from Suffolk University Law Review Office, 41…

  20. Is Big Brother Watching the Wired Campus? Information Technologies Undermine the Climate of Freedom in Academia.

    ERIC Educational Resources Information Center

    Earls, Alan R.

    2000-01-01

    Explores privacy issues raised by information technology at colleges and universities. Drawing on accounts and opinions of faculty and staff members, provides examples of current practices and policies on Internet and e-mail use and discusses the possible need for more developed policies. (EV)

  1. 78 FR 57170 - Endangered and Threatened Wildlife and Plants; Recovery Permit Applications

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-17

    ....gov (email). SUPPLEMENTARY INFORMATION: Background The Act (16 U.S.C. 1531 et seq.) prohibits... available for review, subject to the requirements of the Privacy Act (5 U.S.C. 552a) and Freedom of Information Act (5 U.S.C. 552). Permit Application Number: TE046795 Applicant: Colorado State University...

  2. Balancing Good Intentions: Protecting the Privacy of Electronic Health Information

    ERIC Educational Resources Information Center

    McClanahan, Kitty

    2008-01-01

    Electronic information is a vital but complex component in the modern health care system, fueling ongoing efforts to develop a universal electronic health record infrastructure. This innovation creates a substantial tension between two desirable values: the increased quality and utility of patient medical records and the protection of the privacy…

  3. Fermilab | Science | Questions for the Universe

    Science.gov Websites

    Book Newsroom Newsroom News and features Press releases Photo gallery Fact sheets and brochures Media media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Symposium Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at Work For

  4. Global Information Justice: Rights, Responsibilities, and Caring Connections.

    ERIC Educational Resources Information Center

    Smith, Martha

    2001-01-01

    Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)

  5. Using a Combination of UML, C2RM, XML, and Metadata Registries to Support Long-Term Development/Engineering

    DTIC Science & Technology

    2003-01-01

    Authenticat’n (XCBF) Authorizat’n (XACML) (SAML) Privacy (P3P) Digital Rights Management (XrML) Content Mngmnt (DASL) (WebDAV) Content Syndicat’n...Registry/ Repository BPSS eCommerce XML/EDI Universal Business Language (UBL) Internet & Computing Human Resources (HR-XML) Semantic KEY XML SPECIFICATIONS

  6. Identity, Context Collapse, and Facebook Use in Higher Education: Putting Presence and Privacy at Odds

    ERIC Educational Resources Information Center

    Dennen, Vanessa P.; Burner, Kerry J.

    2017-01-01

    This study examines university student's attitudes toward Facebook use, focusing specifically on how they feel about using a social network that encourages the performance of personal and social identity to support learning and interaction among classmates and instructors. Two surveys elicited student habits, preferences, and beliefs related to…

  7. Disaster at a University: A Case Study in Information Security

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Tyks, Jonathan

    2012-01-01

    Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…

  8. Universal ethical principles in a diverse universe: a commentary on Monshi and Zieglmayer's case study.

    PubMed

    DuBois, James M

    2004-01-01

    Monshi and Zieglmayer's case study presents Sri Lankan participants as having views on the privacy of health information that differ radically from those commonly found in Western nations. This article explores 2 questions that their case study raises for the ethical review of research in international settings: First, are allegedly universal ethical principles--of the sort promulgated in the Belmont Report (National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 1978)--useful in international settings?, and second, how should research oversight bodies address the challenges that arise in international behavioral and social science research?

  9. SecureMA: protecting participant privacy in genetic association meta-analysis.

    PubMed

    Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A

    2014-12-01

    Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  10. "I spy, with my little sensor": fair data handling practices for robots between privacy, copyright and security

    NASA Astrophysics Data System (ADS)

    Schafer, Burkhard; Edwards, Lilian

    2017-07-01

    The paper suggests an amendment to Principle 4 of ethical robot design, and a demand for "transparency by design". It argues that while misleading vulnerable users as to the nature of a robot is a serious ethical issue, other forms of intentionally deceptive or unintentionally misleading aspects of robotic design pose challenges that are on the one hand more universal and harmful in their application, on the other more difficult to address consistently through design choices. The focus will be on transparent design regarding the sensory capacities of robots. Intuitive, low-tech but highly efficient privacy preserving behaviour is regularly dependent on an accurate understanding of surveillance risks. Design choices that hide, camouflage or misrepresent these capacities can undermine these strategies. However, formulating an ethical principle of "sensor transparency" is not straightforward, as openness can also lead to greater vulnerability and with that security risks. We argue that the discussion on sensor transparency needs to be embedded in a broader discussion of "fair data handling principles" for robots that involve issues of privacy, but also intellectual property rights such as copyright.

  11. "An Absolute Prerequisite": The Importance of User Privacy and Trust in Maintaining Academic Freedom at the Library

    ERIC Educational Resources Information Center

    Sutlieff, Lisa; Chelin, Jackie

    2010-01-01

    This research investigated the importance of user-library trust in ensuring vital freedom of inquiry in academic libraries, exploring its strength through comparison with attitudes towards the National Identity Card Scheme (NICS) within the various libraries of a large UK university. An online survey of students and interviews with librarians…

  12. Model-Based Engineering for Supply Chain Risk Management

    DTIC Science & Technology

    2015-09-30

    Privacy, 2009 [19] Julien Delange Wheel Brake System Example using AADL; Feiler, Peter; Hansson, Jörgen; de Niz, Dionisio; & Wrage, Lutz. System ...University Software Engineering Institute Abstract—Expanded use of commercial components has increased the complexity of system assurance...verification. Model- based engineering (MBE) offers a means to design, develop, analyze, and maintain a complex system architecture. Architecture Analysis

  13. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    ERIC Educational Resources Information Center

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  14. Fermilab | Science | Questions for the Universe | Einstein's Dream of

    Science.gov Websites

    Toggle Search Search Home About Science Jobs Contact Phone Book Newsroom Newsroom News and features Press process For the media Video of shutdown event Guest book Tevatron Impact June 11, 2012 About the symposium Office of Science Security, Privacy, Legal Use of Cookies Quick Links Home Contact Phone Book Fermilab at

  15. Instructor's Privacy in Distance (Online) Teaching: Where Do You Draw the Line?

    ERIC Educational Resources Information Center

    Storey, Valerie A.; Tebes, Mary L.

    2008-01-01

    The exponential growth of distance learning provision in the past forty years poses pertinent and critical ethical issues. Students participating in distance education via an online course are required to recognize and resolve various ethical issues, some of which focus on the instructor's actions. The university, too, as it supports students and…

  16. 75 FR 43566 - University of Maryland; Notice of Acceptance for Docketing and Opportunity for Hearing on the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... documents over the Internet, or in some cases to mail copies on electronic storage media. Participants may... Friday, excluding government holidays. Participants who believe that they have a good cause for not.... Participants are requested not to include personal privacy information, such as social security numbers, home...

  17. Austerity-Privacy & Fossil Fuel Divestment Activism at Canadian Universities

    ERIC Educational Resources Information Center

    McGray, Robert; Turcotte-Summers, Jonathan

    2017-01-01

    Austerity has signalled several political and cultural changes in the past ten years. One frequent and highly criticised change has been the increasing privatisation that has occurred as part of the agenda. This has occurred in most levels of formal education. One related, but under-investigated, aspect of austerity has been the feature of privacy…

  18. Anatomisation with slicing: a new privacy preservation approach for multiple sensitive attributes.

    PubMed

    Susan, V Shyamala; Christopher, T

    2016-01-01

    An enormous quantity of personal health information is available in recent decades and tampering of any part of this information imposes a great risk to the health care field. Existing anonymization methods are only apt for single sensitive and low dimensional data to keep up with privacy specifically like generalization and bucketization. In this paper, an anonymization technique is proposed that is a combination of the benefits of anatomization, and enhanced slicing approach adhering to the principle of k-anonymity and l-diversity for the purpose of dealing with high dimensional data along with multiple sensitive data. The anatomization approach dissociates the correlation observed between the quasi identifier attributes and sensitive attributes (SA) and yields two separate tables with non-overlapping attributes. In the enhanced slicing algorithm, vertical partitioning does the grouping of the correlated SA in ST together and thereby minimizes the dimensionality by employing the advanced clustering algorithm. In order to get the optimal size of buckets, tuple partitioning is conducted by MFA. The experimental outcomes indicate that the proposed method can preserve privacy of data with numerous SA. The anatomization approach minimizes the loss of information and slicing algorithm helps in the preservation of correlation and utility which in turn results in reducing the data dimensionality and information loss. The advanced clustering algorithms prove its efficiency by minimizing the time and complexity. Furthermore, this work sticks to the principle of k-anonymity, l-diversity and thus avoids privacy threats like membership, identity and attributes disclosure.

  19. Papers in Discourse and Contrastive Discourse Analysis. Jyvaskyla Contrastive Studies, 5. Reports from the Department of English, University of Jyvaskyla, No 6.

    ERIC Educational Resources Information Center

    Sajavaara, Kari, Ed.; Lehtonen, Jaakko, Ed.

    The following papers and reports are included: (1) "Prisoners of Code-Centred Privacy: Reflections on Contrastive Analysis and Related Disciplines" by Kari Sajavaara and Jaakko Lehtonen; (2) "The Methodology and Practice of Contrastive Discourse Analysis" by Sajavaara, Lehtonen, and Liisa Korpimies; (3) "Interactional Activities in Discourse…

  20. Ethical issues in bipolar disorders pedigree research: privacy concerns, informed consent, and grounds for waiver.

    PubMed

    Parker, Lisa S

    2002-02-01

    Focusing on bipolar disorders research, this article considers ethical issues of informed consent and privacy arising in genetic pedigree research at two stages: the construction of tentative pedigrees to determine family eligibility for study and, subsequently, the enrollment of subjects in and conduct of the family study. Increasing concern to protect the privacy of family members of primary subjects or probands, following ethical controversy over a survey study at Virginia Commonwealth University, has led some researchers and Institutional Review Boards (IRBs) to apply informed consent requirements to those represented on a tentative pedigree at the initial stage of research. This article analyzes the possible benefits, risks, and burdens to prospective subjects of seeking prospective consent for pedigree construction at this initial stage. It argues that the likely risk-benefit ratio favors granting a waiver of consent requirements for this stage of pedigree research and presents grounds for IRBs to grant such a waiver. The article closes by considering particular ethical concerns that should be addressed in the informed consent discussion when enrolling subjects in pedigree studies of bipolar disorder, including concerns about subjects' competence to consent, management of interim and incidental findings, and issues particular to psychiatric research.

  1. Privacy-preserving microbiome analysis using secure computation.

    PubMed

    Wagner, Justin; Paulson, Joseph N; Wang, Xiao; Bhattacharjee, Bobby; Corrada Bravo, Héctor

    2016-06-15

    Developing targeted therapeutics and identifying biomarkers relies on large amounts of research participant data. Beyond human DNA, scientists now investigate the DNA of micro-organisms inhabiting the human body. Recent work shows that an individual's collection of microbial DNA consistently identifies that person and could be used to link a real-world identity to a sensitive attribute in a research dataset. Unfortunately, the current suite of DNA-specific privacy-preserving analysis tools does not meet the requirements for microbiome sequencing studies. To address privacy concerns around microbiome sequencing, we implement metagenomic analyses using secure computation. Our implementation allows comparative analysis over combined data without revealing the feature counts for any individual sample. We focus on three analyses and perform an evaluation on datasets currently used by the microbiome research community. We use our implementation to simulate sharing data between four policy-domains. Additionally, we describe an application of our implementation for patients to combine data that allows drug developers to query against and compensate patients for the analysis. The software is freely available for download at: http://cbcb.umd.edu/∼hcorrada/projects/secureseq.html Supplementary data are available at Bioinformatics online. hcorrada@umiacs.umd.edu. © The Author 2016. Published by Oxford University Press.

  2. Symmetrically private information retrieval based on blind quantum computing

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling

    2015-05-01

    Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.

  3. Antecedents of positive self-disclosure online: an empirical study of US college students' Facebook usage.

    PubMed

    Chen, Hongliang

    2017-01-01

    This study investigates the factors predicting positive self-disclosure on social networking sites (SNSs). There is a formidable body of empirical research relating to online self-disclosure, but very few studies have assessed the antecedents of positive self-disclosure. To address this literature gap, the current study tests the effects of self-esteem, life satisfaction, social anxiety, privacy concerns, public self-consciousness (SC), and perceived collectivism on positive self-disclosure on SNSs. Data were collected online via Qualtrics in April 2013. Respondents were undergraduate students from the University of Connecticut. Using ordinary least squares regression, the current study found that self-esteem and perceived collectivism increased positive self-disclosure, life satisfaction, and privacy concerns decreased positive self-disclosure, and the effects of social anxiety and public SC were not significant.

  4. Antecedents of positive self-disclosure online: an empirical study of US college students’ Facebook usage

    PubMed Central

    Chen, Hongliang

    2017-01-01

    This study investigates the factors predicting positive self-disclosure on social networking sites (SNSs). There is a formidable body of empirical research relating to online self-disclosure, but very few studies have assessed the antecedents of positive self-disclosure. To address this literature gap, the current study tests the effects of self-esteem, life satisfaction, social anxiety, privacy concerns, public self-consciousness (SC), and perceived collectivism on positive self-disclosure on SNSs. Data were collected online via Qualtrics in April 2013. Respondents were undergraduate students from the University of Connecticut. Using ordinary least squares regression, the current study found that self-esteem and perceived collectivism increased positive self-disclosure, life satisfaction, and privacy concerns decreased positive self-disclosure, and the effects of social anxiety and public SC were not significant. PMID:28579840

  5. The evaluation of reflective learning from the nursing student's point of view: A mixed method approach.

    PubMed

    Fernández-Peña, Rosario; Fuentes-Pumarola, Concepció; Malagón-Aguilera, M Carme; Bonmatí-Tomàs, Anna; Bosch-Farré, Cristina; Ballester-Ferrando, David

    2016-09-01

    Adapting university programmes to European Higher Education Area criteria has required substantial changes in curricula and teaching methodologies. Reflective learning (RL) has attracted growing interest and occupies an important place in the scientific literature on theoretical and methodological aspects of university instruction. However, fewer studies have focused on evaluating the RL methodology from the point of view of nursing students. To assess nursing students' perceptions of the usefulness and challenges of RL methodology. Mixed method design, using a cross-sectional questionnaire and focus group discussion. The research was conducted via self-reported reflective learning questionnaire complemented by focus group discussion. Students provided a positive overall evaluation of RL, highlighting the method's capacity to help them better understand themselves, engage in self-reflection about the learning process, optimize their strengths and discover additional training needs, along with searching for continuous improvement. Nonetheless, RL does not help them as much to plan their learning or identify areas of weakness or needed improvement in knowledge, skills and attitudes. Among the difficulties or challenges, students reported low motivation and lack of familiarity with this type of learning, along with concerns about the privacy of their reflective journals and about the grading criteria. In general, students evaluated RL positively. The results suggest areas of needed improvement related to unfamiliarity with the methodology, ethical aspects of developing a reflective journal and the need for clear evaluation criteria. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. A secure steganography for privacy protection in healthcare system.

    PubMed

    Liu, Jing; Tang, Guangming; Sun, Yifeng

    2013-04-01

    Private data in healthcare system require confidentiality protection while transmitting. Steganography is the art of concealing data into a cover media for conveying messages confidentially. In this paper, we propose a steganographic method which can provide private data in medical system with very secure protection. In our method, a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then divided into non-overlapping embedding units with three consecutive pixels. We use adaptive pixel pair match (APPM) method to embed digits in the pixel value differences (PVD) of the three pixels and the base of embedded digits is dependent on the differences among the three pixels. By solving an optimization problem, minimal distortion of the pixel ternaries caused by data embedding can be obtained. The experimental results show our method is more suitable to privacy protection of healthcare system than prior steganographic works.

  7. Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies

    DTIC Science & Technology

    2005-07-01

    policies in pervasive computing environments. In this context, the owner of information sources (e.g. user, sensor, application, or organization...work in decentralized trust management and semantic web technologies . Section 3 introduces an Information Disclosure Agent architecture for...Norman Sadeh July 2005 CMU-ISRI-05-113 School of Computer Science, Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA, 15213

  8. Finding the SurPriSe: A Case Study of a Faculty Learning Community

    ERIC Educational Resources Information Center

    Michel, Roberta M.

    2014-01-01

    This article details a faculty learning community (FLC) that started in 2009 on the campus of a Midwestern University and has evolved into an interdisciplinary research, teaching and social community of practice and learning called SurPriSe. SurPriSe is an acronym that reflects the interest area of the FLC; Sur for surveillance, Pri for privacy,…

  9. Patient attitudes towards medical students at Damascus University teaching hospitals.

    PubMed

    Sayed-Hassan, Rima M; Bashour, Hyam N; Koudsi, Abir Y

    2012-03-22

    The cooperation of patients and their consent to involve medical students in their care is vital to clinical education, but large numbers of students and lack of experience as well as loss of privacy may evoke negative attitudes of patients, which may sometimes adversely affect the clinical teaching environment. This study aimed to explore the attitudes of patients towards medical students at Damascus University hospitals, and to explore the determinants of those attitudes thus discussing possible implications applicable to clinical teaching. This cross-sectional study was conducted at three teaching hospitals affiliated to the Faculty of Medicine at Damascus University. Four hundred patients were interviewed between March and April 2011 by a trained sociologist using a structured questionnaire. Of the patients interviewed, 67.8% approved the presence of medical students during the medical consultation and 58.2% of them felt comfortable with the presence of students, especially among patients with better socio-economic characteristics. 81.5% of the patients agreed to be examined by students in the presence of the supervisor, while 40.2% gave agreement even in the absence of the supervisor. Privacy was the most important factor in the patients' reticence towards examination by the students, whilst the relative safety and comfort if a supervisor was available determined patients' agreement. The study concluded overall positive attitudes to the medical students' involvement in medical education. However, it is essential that students and clinical supervisors understand and adhere to professional and ethical conduct when involving patients in medical education.

  10. The Promise of Information and Communication Technology in Healthcare: Extracting Value From the Chaos.

    PubMed

    Mamlin, Burke W; Tierney, William M

    2016-01-01

    Healthcare is an information business with expanding use of information and communication technologies (ICTs). Current ICT tools are immature, but a brighter future looms. We examine 7 areas of ICT in healthcare: electronic health records (EHRs), health information exchange (HIE), patient portals, telemedicine, social media, mobile devices and wearable sensors and monitors, and privacy and security. In each of these areas, we examine the current status and future promise, highlighting how each might reach its promise. Steps to better EHRs include a universal programming interface, universal patient identifiers, improved documentation and improved data analysis. HIEs require federal subsidies for sustainability and support from EHR vendors, targeting seamless sharing of EHR data. Patient portals must bring patients into the EHR with better design and training, greater provider engagement and leveraging HIEs. Telemedicine needs sustainable payment models, clear rules of engagement, quality measures and monitoring. Social media needs consensus on rules of engagement for providers, better data mining tools and approaches to counter disinformation. Mobile and wearable devices benefit from a universal programming interface, improved infrastructure, more rigorous research and integration with EHRs and HIEs. Laws for privacy and security need updating to match current technologies, and data stewards should share information on breaches and standardize best practices. ICT tools are evolving quickly in healthcare and require a rational and well-funded national agenda for development, use and assessment. Copyright © 2016 Southern Society for Clinical Investigation. Published by Elsevier Inc. All rights reserved.

  11. Privacy, professionalism and Facebook: a dilemma for young doctors.

    PubMed

    MacDonald, Joanna; Sohn, Sangsu; Ellis, Pete

    2010-08-01

    This study aimed to examine the nature and extent of use of the social networking service Facebook by young medical graduates, and their utilisation of privacy options. We carried out a cross-sectional survey of the use of Facebook by recent medical graduates, accessing material potentially available to a wider public. Data were then categorised and analysed. Survey subjects were 338 doctors who had graduated from the University of Otago in 2006 and 2007 and were registered with the Medical Council of New Zealand. Main outcome measures were Facebook membership, utilisation of privacy options, and the nature and extent of the material revealed. A total of 220 (65%) graduates had Facebook accounts; 138 (63%) of these had activated their privacy options, restricting their information to 'Friends'. Of the remaining 82 accounts that were more publicly available, 30 (37%) revealed users' sexual orientation, 13 (16%) revealed their religious views, 35 (43%) indicated their relationship status, 38 (46%) showed photographs of the users drinking alcohol, eight (10%) showed images of the users intoxicated and 37 (45%) showed photographs of the users engaged in healthy behaviours. A total of 54 (66%) members had used their accounts within the last week, indicating active use. Young doctors are active members of Facebook. A quarter of the doctors in our survey sample did not use the privacy options, rendering the information they revealed readily available to a wider public. This information, although it included some healthy behaviours, also revealed personal information that might cause distress to patients or alter the professional boundary between patient and practitioner, as well as information that could bring the profession into disrepute (e.g. belonging to groups like 'Perverts united'). Educators and regulators need to consider how best to advise students and doctors on societal changes in the concepts of what is public and what is private.

  12. Experimental demonstration of blind quantum computing

    NASA Astrophysics Data System (ADS)

    Barz, Stefanie; Kashefi, Elham; Broadbent, Anne; Fitzsimons, Joe; Zeilinger, Anton; Walther, Philip

    2012-02-01

    Quantum computers are among the most promising applications of quantum-enhanced technologies. Quantum effects such as superposition and entanglement enable computational speed-ups that are unattainable using classical computers. The challenges in realising quantum computers suggest that in the near future, only a few facilities worldwide will be capable of operating such devices. In order to exploit these computers, users would seemingly have to give up their privacy. It was recently shown that this is not the case and that, via the universal blind quantum computation protocol, quantum mechanics provides a way to guarantee that the user's data remain private. Here, we demonstrate the first experimental version of this protocol using polarisation-entangled photonic qubits. We demonstrate various blind one- and two-qubit gate operations as well as blind versions of the Deutsch's and Grover's algorithms. When the technology to build quantum computers becomes available, this will become an important privacy-preserving feature of quantum information processing.

  13. Safe teleradiology: information assurance as project planning methodology.

    PubMed

    Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2005-01-01

    The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.

  14. Privacy and Technology: Folk Definitions and Perspectives

    PubMed Central

    Kwasny, Michelle N.; Caine, Kelly E.; Rogers, Wendy A.; Fisk, Arthur D.

    2017-01-01

    In this paper we present preliminary results from a study of individual differences in privacy beliefs, as well as relate folk definitions of privacy to extant privacy theory. Focus groups were conducted with young adults aged 18–28 and older adults aged 65–75. Participants first shared their individual definitions of privacy, followed by a discussion of privacy in six scenarios chosen to represent a range of potentially invasive situations. Taken together, Westin’s and Altman’s theories of privacy accounted for both younger and older adults’ ideas about privacy, however, neither theory successfully accounted for findings across all age and gender groups. Whereas males tended to think of privacy in terms of personal needs and convenience, females focused more on privacy in terms of others, respecting privacy rights, and safety. Older adults tended to be more concerned about privacy of space rather than information privacy. Initial results reinforce the notion that targeting HCI design to the user population, even with respect to privacy, is critically important. PMID:29057397

  15. Multi-centric universal pseudonymisation for secondary use of the EHR.

    PubMed

    Lo Iacono, Luigi

    2007-01-01

    This paper discusses the importance of protecting the privacy of patient data kept in an Electronic Health Record (EHR) in the case, where it leaves the control- and protection-sphere of the health care realm for secondary uses such as clinical or epidemiological research projects, health care research, assessment of treatment quality or economic assessments. The paper focuses on multi-centric studies, where various data sources are linked together using Grid technologies. It introduces a pseudonymisation system which enables a multi-centric universal pseudonymisation, meaning that a patient's identity will result in the same pseudonym, regardless of which participating study center the patient data is collected.

  16. Secrecy and Democracy: The Conflict between American Ideals and American Institutions

    DTIC Science & Technology

    2014-05-22

    challenge to the necessity of secrecy are the ideals of transparency and publicity. Modern society, particularly in America , has conceived of...Haven CT: Yale University Press, 2011), 47-54. See also Jeffrey Rosen, The Unwanted Gaze: The Destruction of Privacy in America (New York: Vintage Books...Disappearance of Social Capital in America ,” PS: Political Science and Politics 28, no. 4 (December 1995): 664-683. 36

  17. Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery.

    PubMed

    Zhao, Yongan; Wang, Xiaofeng; Jiang, Xiaoqian; Ohno-Machado, Lucila; Tang, Haixu

    2015-01-01

    To propose a new approach to privacy preserving data selection, which helps the data users access human genomic datasets efficiently without undermining patients' privacy. Our idea is to let each data owner publish a set of differentially-private pilot data, on which a data user can test-run arbitrary association-test algorithms, including those not known to the data owner a priori. We developed a suite of new techniques, including a pilot-data generation approach that leverages the linkage disequilibrium in the human genome to preserve both the utility of the data and the privacy of the patients, and a utility evaluation method that helps the user assess the value of the real data from its pilot version with high confidence. We evaluated our approach on real human genomic data using four popular association tests. Our study shows that the proposed approach can help data users make the right choices in most cases. Even though the pilot data cannot be directly used for scientific discovery, it provides a useful indication of which datasets are more likely to be useful to data users, who can therefore approach the appropriate data owners to gain access to the data. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  18. Legal & ethical compliance when sharing biospecimen.

    PubMed

    Klingstrom, Tomas; Bongcam-Rudloff, Erik; Reichel, Jane

    2018-01-01

    When obtaining samples from biobanks, resolving ethical and legal concerns is a time-consuming task where researchers need to balance the needs of privacy, trust and scientific progress. The Biobanking and Biomolecular Resources Research Infrastructure-Large Prospective Cohorts project has resolved numerous such issues through intense communication between involved researchers and experts in its mission to unite large prospective study sets in Europe. To facilitate efficient communication, it is useful for nonexperts to have an at least basic understanding of the regulatory system for managing biological samples.Laws regulating research oversight are based on national law and normally share core principles founded on international charters. In interview studies among donors, chief concerns are privacy, efficient sample utilization and access to information generated from their samples. Despite a lack of clear evidence regarding which concern takes precedence, scientific as well as public discourse has largely focused on privacy concerns and the right of donors to control the usage of their samples.It is therefore important to proactively deal with ethical and legal issues to avoid complications that delay or prevent samples from being accessed. To help biobank professionals avoid making unnecessary mistakes, we have developed this basic primer covering the relationship between ethics and law, the concept of informed consent and considerations for returning findings to donors. © The Author 2017. Published by Oxford University Press.

  19. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    ERIC Educational Resources Information Center

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  20. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    ERIC Educational Resources Information Center

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  1. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-17

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-092)] Privacy Act of 1974; Privacy Act... retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to cancel the following Privacy Act system of records notice...

  2. Partitioning-based mechanisms under personalized differential privacy.

    PubMed

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-05-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t -round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms.

  3. Partitioning-based mechanisms under personalized differential privacy

    PubMed Central

    Li, Haoran; Xiong, Li; Ji, Zhanglong; Jiang, Xiaoqian

    2017-01-01

    Differential privacy has recently emerged in private statistical aggregate analysis as one of the strongest privacy guarantees. A limitation of the model is that it provides the same privacy protection for all individuals in the database. However, it is common that data owners may have different privacy preferences for their data. Consequently, a global differential privacy parameter may provide excessive privacy protection for some users, while insufficient for others. In this paper, we propose two partitioning-based mechanisms, privacy-aware and utility-based partitioning, to handle personalized differential privacy parameters for each individual in a dataset while maximizing utility of the differentially private computation. The privacy-aware partitioning is to minimize the privacy budget waste, while utility-based partitioning is to maximize the utility for a given aggregate analysis. We also develop a t-round partitioning to take full advantage of remaining privacy budgets. Extensive experiments using real datasets show the effectiveness of our partitioning mechanisms. PMID:28932827

  4. Patient attitudes towards medical students at Damascus University teaching hospitals

    PubMed Central

    2012-01-01

    Background The cooperation of patients and their consent to involve medical students in their care is vital to clinical education, but large numbers of students and lack of experience as well as loss of privacy may evoke negative attitudes of patients, which may sometimes adversely affect the clinical teaching environment. This study aimed to explore the attitudes of patients towards medical students at Damascus University hospitals, and to explore the determinants of those attitudes thus discussing possible implications applicable to clinical teaching. Methods This cross-sectional study was conducted at three teaching hospitals affiliated to the Faculty of Medicine at Damascus University. Four hundred patients were interviewed between March and April 2011 by a trained sociologist using a structured questionnaire. Results Of the patients interviewed, 67.8% approved the presence of medical students during the medical consultation and 58.2% of them felt comfortable with the presence of students, especially among patients with better socio-economic characteristics. 81.5% of the patients agreed to be examined by students in the presence of the supervisor, while 40.2% gave agreement even in the absence of the supervisor. Privacy was the most important factor in the patients' reticence towards examination by the students, whilst the relative safety and comfort if a supervisor was available determined patients' agreement. Conclusions The study concluded overall positive attitudes to the medical students' involvement in medical education. However, it is essential that students and clinical supervisors understand and adhere to professional and ethical conduct when involving patients in medical education. PMID:22439893

  5. Altered states: state health privacy laws and the impact of the Federal Health Privacy Rule.

    PubMed

    Pritts, Joy L

    2002-01-01

    Although the Federal Health Privacy Rule has evened out some of the inconsistencies between states' health privacy laws, gaps in protection still remain. Furthermore, the Federal Rule contains some lax standards for the disclosure of health information. State laws can play a vital role in filling these gaps and strengthening the protections afforded health information. By enacting legislation that has higher privacy-protective standards than the Federal Health Privacy Rule, states can play three important roles. First, because they can directly regulate entities that are beyond HHS's mandate, states can afford their citizens a broader degree of privacy protection than the Federal Health Privacy Rule. Second, by having state health privacy laws, states can enforce privacy protections at the local level. Finally, action by the states can positively influence health privacy policies at the federal level by raising the standard as to what constitutes sufficient privacy protection. High privacy protections imposed by states may serve as the standard for comprehensive federal legislation, if and when Congress reconsiders the issue. So far, states' reactions to the Federal Privacy Rule have been mixed. Only time will tell whether states will assume the mantle of leadership on health privacy or relinquish their role as the primary protectors of health information.

  6. Preserving privacy whilst maintaining robust epidemiological predictions.

    PubMed

    Werkman, Marleen; Tildesley, Michael J; Brooks-Pollock, Ellen; Keeling, Matt J

    2016-12-01

    Mathematical models are invaluable tools for quantifying potential epidemics and devising optimal control strategies in case of an outbreak. State-of-the-art models increasingly require detailed individual farm-based and sensitive data, which may not be available due to either lack of capacity for data collection or privacy concerns. However, in many situations, aggregated data are available for use. In this study, we systematically investigate the accuracy of predictions made by mathematical models initialised with varying data aggregations, using the UK 2001 Foot-and-Mouth Disease Epidemic as a case study. We consider the scenario when the only data available are aggregated into spatial grid cells, and develop a metapopulation model where individual farms in a single subpopulation are assumed to behave uniformly and transmit randomly. We also adapt this standard metapopulation model to capture heterogeneity in farm size and composition, using farm census data. Our results show that homogeneous models based on aggregated data overestimate final epidemic size but can perform well for predicting spatial spread. Recognising heterogeneity in farm sizes improves predictions of the final epidemic size, identifying risk areas, determining the likelihood of epidemic take-off and identifying the optimal control strategy. In conclusion, in cases where individual farm-based data are not available, models can still generate meaningful predictions, although care must be taken in their interpretation and use. Copyright © 2016. Published by Elsevier B.V.

  7. Through Patients' Eyes: Regulation, Technology, Privacy, and the Future.

    PubMed

    Petersen, Carolyn

    2018-04-22

    Privacy is commonly regarded as a regulatory requirement achieved via technical and organizational management practices. Those working in the field of informatics often play a role in privacy preservation as a result of their expertise in information technology, workflow analysis, implementation science, or related skills. Viewing privacy from the perspective of patients whose protected health information is at risk broadens the considerations to include the perceived duality of privacy; the existence of privacy within a context unique to each patient; the competing needs inherent within privacy management; the need for particular consideration when data are shared; and the need for patients to control health information in a global setting. With precision medicine, artificial intelligence, and other treatment innovations on the horizon, health care professionals need to think more broadly about how to preserve privacy in a health care environment driven by data sharing. Patient-reported privacy preferences, privacy portability, and greater transparency around privacy-preserving functionalities are potential strategies for ensuring that privacy regulations are met and privacy is preserved. Georg Thieme Verlag KG Stuttgart.

  8. Privacy protection and public goods: building a genetic database for health research in Newfoundland and Labrador

    PubMed Central

    Pullman, Daryl; Perrot-Daley, Astrid; Hodgkinson, Kathy; Street, Catherine; Rahman, Proton

    2013-01-01

    Objective To provide a legal and ethical analysis of some of the implementation challenges faced by the Population Therapeutics Research Group (PTRG) at Memorial University (Canada), in using genealogical information offered by individuals for its genetics research database. Materials and methods This paper describes the unique historical and genetic characteristics of the Newfoundland and Labrador founder population, which gave rise to the opportunity for PTRG to build the Newfoundland Genealogy Database containing digitized records of all pre-confederation (1949) census records of the Newfoundland founder population. In addition to building the database, PTRG has developed the Heritability Analytics Infrastructure, a data management structure that stores genotype, phenotype, and pedigree information in a single database, and custom linkage software (KINNECT) to perform pedigree linkages on the genealogy database. Discussion A newly adopted legal regimen in Newfoundland and Labrador is discussed. It incorporates health privacy legislation with a unique research ethics statute governing the composition and activities of research ethics boards and, for the first time in Canada, elevating the status of national research ethics guidelines into law. The discussion looks at this integration of legal and ethical principles which provides a flexible and seamless framework for balancing the privacy rights and welfare interests of individuals, families, and larger societies in the creation and use of research data infrastructures as public goods. Conclusion The complementary legal and ethical frameworks that now coexist in Newfoundland and Labrador provide the legislative authority, ethical legitimacy, and practical flexibility needed to find a workable balance between privacy interests and public goods. Such an approach may also be instructive for other jurisdictions as they seek to construct and use biobanks and related research platforms for genetic research. PMID:22859644

  9. Privacy protection and public goods: building a genetic database for health research in Newfoundland and Labrador.

    PubMed

    Kosseim, Patricia; Pullman, Daryl; Perrot-Daley, Astrid; Hodgkinson, Kathy; Street, Catherine; Rahman, Proton

    2013-01-01

    To provide a legal and ethical analysis of some of the implementation challenges faced by the Population Therapeutics Research Group (PTRG) at Memorial University (Canada), in using genealogical information offered by individuals for its genetics research database. This paper describes the unique historical and genetic characteristics of the Newfoundland and Labrador founder population, which gave rise to the opportunity for PTRG to build the Newfoundland Genealogy Database containing digitized records of all pre-confederation (1949) census records of the Newfoundland founder population. In addition to building the database, PTRG has developed the Heritability Analytics Infrastructure, a data management structure that stores genotype, phenotype, and pedigree information in a single database, and custom linkage software (KINNECT) to perform pedigree linkages on the genealogy database. A newly adopted legal regimen in Newfoundland and Labrador is discussed. It incorporates health privacy legislation with a unique research ethics statute governing the composition and activities of research ethics boards and, for the first time in Canada, elevating the status of national research ethics guidelines into law. The discussion looks at this integration of legal and ethical principles which provides a flexible and seamless framework for balancing the privacy rights and welfare interests of individuals, families, and larger societies in the creation and use of research data infrastructures as public goods. The complementary legal and ethical frameworks that now coexist in Newfoundland and Labrador provide the legislative authority, ethical legitimacy, and practical flexibility needed to find a workable balance between privacy interests and public goods. Such an approach may also be instructive for other jurisdictions as they seek to construct and use biobanks and related research platforms for genetic research.

  10. [The Comparison of the Difference Between the Emphasis on and the Receipt of Patient Privacy in the Hospital Setting].

    PubMed

    Li, Chiu-Kuel; Lin, Chiou-Fen

    2015-10-01

    Privacy is a unique privilege for humans. Enhancing the balance between the importance given to patient privacy and the receipt of this privacy by patients is one key approach to improving the relationship between patients and the hospital. This study compared the difference between the importance of patient privacy and receipt of this privacy by patients as a reference for future patient privacy policy planning. This study was a cross-sectional design. We randomly sampled three hospitals in northern Taiwan and investigated patients using a questionnaire. The questionnaire was self-designed and verified for reliability and validity. We used frequency and percentage to describe demographic data and used a t-test to compare the deviation between the emphasis on and receipt of patient privacy. There were 296 valid samples in this study and the effective rate was 84.57%. The highest degree of importance was information privacy and the lowest was physical privacy. Physical privacy (t = 3.04, p < .001) and mental privacy (t = 2.42, p < .01) exhibited significant differences between emphasis and receipt. Demographic data on gender, age, education level, marital status, and occupation. Type of hospital and ward level correlated with the emphasis and receipt of privacy. The importance of privacy for physical and mental wellbeing was higher than the actual receipt of this privacy among the patient sample. The importance of privacy for married individuals and young women with high education levels was higher, while males and less-educated individuals scored lower in terms of privacy receipt. Medical agencies must provide higher levels of physical and mental privacy in order to enhance patient satisfaction.

  11. Informational privacy and the public's health: the Model State Public Health Privacy Act.

    PubMed

    Gostin, L O; Hodge, J G; Valdiserri, R O

    2001-09-01

    Protecting public health requires the acquisition, use, and storage of extensive health-related information about individuals. The electronic accumulation and exchange of personal data promises significant public health benefits but also threatens individual privacy; breaches of privacy can lead to individual discrimination in employment, insurance, and government programs. Individuals concerned about privacy invasions may avoid clinical or public health tests, treatments, or research. Although individual privacy protections are critical, comprehensive federal privacy protections do not adequately protect public health data, and existing state privacy laws are inconsistent and fragmented. The Model State Public Health Privacy Act provides strong privacy safeguards for public health data while preserving the ability of state and local public health departments to act for the common good.

  12. Disclosing medical mistakes: a communication management plan for physicians.

    PubMed

    Petronio, Sandra; Torke, Alexia; Bosslet, Gabriel; Isenberg, Steven; Wocial, Lucia; Helft, Paul R

    2013-01-01

    There is a growing consensus that disclosure of medical mistakes is ethically and legally appropriate, but such disclosures are made difficult by medical traditions of concern about medical malpractice suits and by physicians' own emotional reactions. Because the physician may have compelling reasons both to keep the information private and to disclose it to the patient or family, these situations can be conceptualized as privacy dilemmas. These dilemmas may create barriers to effectively addressing the mistake and its consequences. Although a number of interventions exist to address privacy dilemmas that physicians face, current evidence suggests that physicians tend to be slow to adopt the practice of disclosing medical mistakes. This discussion proposes a theoretically based, streamlined, two-step plan that physicians can use as an initial guide for conversations with patients about medical mistakes. The mistake disclosure management plan uses the communication privacy management theory. The steps are 1) physician preparation, such as talking about the physician's emotions and seeking information about the mistake, and 2) use of mistake disclosure strategies that protect the physician-patient relationship. These include the optimal timing, context of disclosure delivery, content of mistake messages, sequencing, and apology. A case study highlighted the disclosure process. This Mistake Disclosure Management Plan may help physicians in the early stages after mistake discovery to prepare for the initial disclosure of a medical mistakes. The next step is testing implementation of the procedures suggested.

  13. Limited privacy protection and poor sensitivity: Is it time to move on from the statistical linkage key-581?

    PubMed

    Randall, Sean M; Ferrante, Anna M; Boyd, James H; Brown, Adrian P; Semmens, James B

    2016-08-01

    The statistical linkage key (SLK-581) is a common tool for record linkage in Australia, due to its ability to provide some privacy protection. However, newer privacy-preserving approaches may provide greater privacy protection, while allowing high-quality linkage. To evaluate the standard SLK-581, encrypted SLK-581 and a newer privacy-preserving approach using Bloom filters, in terms of both privacy and linkage quality. Linkage quality was compared by conducting linkages on Australian health datasets using these three techniques and examining results. Privacy was compared qualitatively in relation to a series of scenarios where privacy breaches may occur. The Bloom filter technique offered greater privacy protection and linkage quality compared to the SLK-based method commonly used in Australia. The adoption of new privacy-preserving methods would allow both greater confidence in research results, while significantly improving privacy protection. © The Author(s) 2016.

  14. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    PubMed

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  15. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  16. Data Sharing in DHT Based P2P Systems

    NASA Astrophysics Data System (ADS)

    Roncancio, Claudia; Del Pilar Villamil, María; Labbé, Cyril; Serrano-Alvarado, Patricia

    The evolution of peer-to-peer (P2P) systems triggered the building of large scale distributed applications. The main application domain is data sharing across a very large number of highly autonomous participants. Building such data sharing systems is particularly challenging because of the “extreme” characteristics of P2P infrastructures: massive distribution, high churn rate, no global control, potentially untrusted participants... This article focuses on declarative querying support, query optimization and data privacy on a major class of P2P systems, that based on Distributed Hash Table (P2P DHT). The usual approaches and the algorithms used by classic distributed systems and databases for providing data privacy and querying services are not well suited to P2P DHT systems. A considerable amount of work was required to adapt them for the new challenges such systems present. This paper describes the most important solutions found. It also identifies important future research trends in data management in P2P DHT systems.

  17. Privacy and Data Protection in Japan.

    ERIC Educational Resources Information Center

    Srinivasan, Srinija

    1992-01-01

    Discussion of individual rights and privacy in Japan focuses on the Privacy Protection Act, which acknowledges the threat posed by government databases to the individual's right of privacy. Characteristics of the Japanese legal system are described, origins of privacy in Japanese law are examined, and privacy and government databases are…

  18. 76 FR 19107 - Privacy Act of 1974; Department of Homeland Security Federal Emergency Management Agency-011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... Ellen Callahan, Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... (703-235- 0780), Chief Privacy Officer, Privacy Office, Department of Homeland Security, Washington, DC... Chief Privacy Officer and Chief Freedom of Information Act Officer, Department of Homeland Security, 245...

  19. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  20. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  1. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices that you...

  2. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  3. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  4. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  5. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  6. 6 CFR 1002.4 - Responses to Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Responses to Privacy Act requests. 1002.4 Section 1002.4 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.4 Responses to Privacy Act requests. (a) Acknowledgement. The Privacy Act Officer...

  7. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  8. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  9. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  10. 16 CFR 313.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Annual privacy notice to customers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.5 Annual privacy... customers that accurately reflects your privacy policies and practices not less than annually during the...

  11. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  12. 16 CFR 313.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.4 Initial privacy... notice that accurately reflects your privacy policies and practices to: (1) Customer. An individual who...

  13. 32 CFR 1701.4 - Privacy Act responsibilities/policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act responsibilities/policy. 1701.4... NATIONAL INTELLIGENCE ADMINISTRATION OF RECORDS UNDER THE PRIVACY ACT OF 1974 Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 1701.4 Privacy Act responsibilities/policy...

  14. The Privacy Jungle:On the Market for Data Protection in Social Networks

    NASA Astrophysics Data System (ADS)

    Bonneau, Joseph; Preibusch, Sören

    We have conducted the first thorough analysis of the market for privacy practices and policies in online social networks. From an evaluation of 45 social networking sites using 260 criteria we find that many popular assumptions regarding privacy and social networking need to be revisited when considering the entire ecosystem instead of only a handful of well-known sites. Contrary to the common perception of an oligopolistic market, we find evidence of vigorous competition for new users. Despite observing many poor security practices, there is evidence that social network providers are making efforts to implement privacy enhancing technologies with substantial diversity in the amount of privacy control offered. However, privacy is rarely used as a selling point, even then only as auxiliary, nondecisive feature. Sites also failed to promote their existing privacy controls within the site. We similarly found great diversity in the length and content of formal privacy policies, but found an opposite promotional trend: though almost all policies are not accessible to ordinary users due to obfuscating legal jargon, they conspicuously vaunt the sites' privacy practices. We conclude that the market for privacy in social networks is dysfunctional in that there is significant variation in sites' privacy controls, data collection requirements, and legal privacy policies, but this is not effectively conveyed to users. Our empirical findings motivate us to introduce the novel model of a privacy communication game, where the economically rational choice for a site operator is to make privacy control available to evade criticism from privacy fundamentalists, while hiding the privacy control interface and privacy policy to maximize sign-up numbers and encourage data sharing from the pragmatic majority of users.

  15. Computer modeling and design of diagnostic workstations and radiology reading rooms

    NASA Astrophysics Data System (ADS)

    Ratib, Osman M.; Amato, Carlos L.; Balbona, Joseph A.; Boots, Kevin; Valentino, Daniel J.

    2000-05-01

    We used 3D modeling techniques to design and evaluate the ergonomics of diagnostic workstation and radiology reading room in the planning phase of building a new hospital at UCLA. Given serious space limitations, the challenge was to provide more optimal working environment for radiologists in a crowded and busy environment. A particular attention was given to flexibility, lighting condition and noise reduction in rooms shared by multiple users performing diagnostic tasks as well as regular clinical conferences. Re-engineering workspace ergonomics rely on the integration of new technologies, custom designed cabinets, indirect lighting, sound-absorbent partitioning and geometric arrangement of workstations to allow better privacy while optimizing space occupation. Innovations included adjustable flat monitors, integration of videoconferencing and voice recognition, control monitor and retractable keyboard for optimal space utilization. An overhead compartment protecting the monitors from ambient light is also used as accessory lightbox and rear-view projection screen for conferences.

  16. 13 CFR 102.39 - SBA's exempt Privacy Act systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA's exempt Privacy Act systems... DISCLOSURE AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.39 SBA's exempt Privacy Act systems of records. (a) Systems of records subject to investigatory...

  17. 12 CFR 1204.2 - What do the terms in this part mean?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... appeals. Privacy Act Officer means the FHFA employee who has primary responsibility for privacy and data... Section 1204.2 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS PRIVACY ACT... Enterprise Oversight. Privacy Act means the Privacy Act of 1974, as amended (5 U.S.C. 552a). Privacy Act...

  18. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  19. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  20. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  1. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  2. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  3. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  4. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this...

  5. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  6. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  7. 17 CFR 160.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Delivering privacy and opt out... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out notices...

  8. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  9. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  10. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 13 Business Credit and Assistance 1 2012-01-01 2012-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  11. 16 CFR 313.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...

  12. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  13. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  14. 12 CFR 216.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Information to be included in privacy notices... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy...

  15. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  16. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  17. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this...

  18. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  19. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  20. 16 CFR 313.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...

  1. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 13 Business Credit and Assistance 1 2014-01-01 2014-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  2. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  3. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  4. 16 CFR 313.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Information to be included in privacy... OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.6 Information to be included in privacy notices. (a) General rule. The initial, annual, and revised privacy notices...

  5. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  6. 16 CFR 313.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Delivering privacy and opt out notices. 313... CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  7. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...

  8. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  9. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 13 Business Credit and Assistance 1 2013-01-01 2013-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  10. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Model privacy form and... (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of...

  11. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions...

  12. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  13. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  14. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  15. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  16. 12 CFR 332.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Information to be included in privacy notices... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.6 Information to be included in privacy notices. (a) General rule. The initial, annual and revised privacy...

  17. 13 CFR 102.36 - Privacy Act standards of conduct.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Privacy Act standards of conduct... AND PRIVACY Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974 § 102.36 Privacy Act standards of conduct. Each Program/Support Office Head or designee shall inform its...

  18. 12 CFR 216.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Model privacy form and examples. 216.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 216.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the...

  19. 17 CFR 160.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Model privacy form and... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 160.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  20. 16 CFR 313.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Model privacy form and examples. 313.2... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 313.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendix A of this part, consistent with the instructions in appendix...

  1. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice (11-109)] Privacy Act of 1974; Privacy Act... proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is issuing public...

  2. 12 CFR 332.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Revised privacy notices. 332.8 Section 332.8... PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.8 Revised privacy notices. (a... described in your prior notice. (c) Delivery. When you are required to deliver a revised privacy notice by...

  3. 32 CFR 806b.4 - Privacy Act complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy Act complaints. 806b.4 Section 806b.4 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT PROGRAM Overview of the Privacy Act Program § 806b.4 Privacy Act complaints. (a) Process Privacy Act...

  4. 12 CFR 332.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Model privacy form and examples. 332.2 Section... POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 332.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions...

  5. 12 CFR 716.5 - Annual privacy notice to members required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Annual privacy notice to members required. 716... UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.5 Annual privacy... members that accurately reflects your privacy policies and practices not less than annually during the...

  6. 75 FR 7979 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... privacy issues please contact: Mary Ellen Callahan (703-235-0780), Chief Privacy Officer, Privacy Office...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The History of the Department of Homeland Security System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  7. 32 CFR 311.7 - OSD/JS Privacy Office Processes.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false OSD/JS Privacy Office Processes. 311.7 Section...) PRIVACY PROGRAM OFFICE OF THE SECRETARY OF DEFENSE AND JOINT STAFF PRIVACY PROGRAM § 311.7 OSD/JS Privacy Office Processes. The OSD/JS Privacy Office shall: (a) Exercise oversight and administrative control of...

  8. The role of privacy protection in healthcare information systems adoption.

    PubMed

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  9. Biobank research and the right to privacy.

    PubMed

    Ursin, Lars Oystein

    2008-01-01

    What is privacy? What does privacy mean in relation to biobanking, in what way do the participants have an interest in privacy, (why) is there a right to privacy, and how should the privacy issue be regulated when it comes to biobank research? A relational view of privacy is argued for in this article, which takes as its basis a general discussion of several concepts of privacy and attempts at grounding privacy rights. In promoting and protecting the rights that participants in biobank research might have to privacy, it is argued that their interests should be related to the specific context of the provision and reception of health care that participation in biobank research is connected with. Rather than just granting participants an exclusive right to or ownership of their health information, which must be waived in order to make biobank research possible, the privacy aspect of health information should be viewed in light of the moral rights and duties that accompany any involvement in a research based system of health services.

  10. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in appendixA of this part, consistent with the instructions in appendixA...

  11. 12 CFR 332.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Delivering privacy and opt out notices. 332.9... GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  12. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...

  13. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...

  14. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  15. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  16. 12 CFR 216.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Delivering privacy and opt out notices. 216.9... PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.9 Delivering privacy and opt out notices. (a) How to provide notices. You must provide any privacy notices and opt out...

  17. 41 CFR 105-64.801 - How to file a privacy complaint.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false How to file a privacy... Administration 64-GSA PRIVACY ACT RULES 64.8-Privacy Complaints § 105-64.801 How to file a privacy complaint. E-mail your complaint to [email protected] or send to: GSA Privacy Act Officer (CIB), General...

  18. 12 CFR 716.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Model privacy form and examples. 716.2 Section... PRIVACY OF CONSUMER FINANCIAL INFORMATION § 716.2 Model privacy form and examples. (a) Model privacy form. Use of the model privacy form in Appendix A of this part, consistent with the instructions in Appendix...

  19. Realizing privacy preserving genome-wide association studies.

    PubMed

    Simmons, Sean; Berger, Bonnie

    2016-05-01

    As genomics moves into the clinic, there has been much interest in using this medical data for research. At the same time the use of such data raises many privacy concerns. These circumstances have led to the development of various methods to perform genome-wide association studies (GWAS) on patient records while ensuring privacy. In particular, there has been growing interest in applying differentially private techniques to this challenge. Unfortunately, up until now all methods for finding high scoring SNPs in a differentially private manner have had major drawbacks in terms of either accuracy or computational efficiency. Here we overcome these limitations with a substantially modified version of the neighbor distance method for performing differentially private GWAS, and thus are able to produce a more viable mechanism. Specifically, we use input perturbation and an adaptive boundary method to overcome accuracy issues. We also design and implement a convex analysis based algorithm to calculate the neighbor distance for each SNP in constant time, overcoming the major computational bottleneck in the neighbor distance method. It is our hope that methods such as ours will pave the way for more widespread use of patient data in biomedical research. A python implementation is available at http://groups.csail.mit.edu/cb/DiffPriv/ bab@csail.mit.edu Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  20. Couldn't or wouldn't? The influence of privacy concerns and self-efficacy in privacy management on privacy protection.

    PubMed

    Chen, Hsuan-Ting; Chen, Wenghong

    2015-01-01

    Sampling 515 college students, this study investigates how privacy protection, including profile visibility, self-disclosure, and friending, are influenced by privacy concerns and efficacy regarding one's own ability to manage privacy settings, a factor that researchers have yet to give a great deal of attention to in the context of social networking sites (SNSs). The results of this study indicate an inconsistency in adopting strategies to protect privacy, a disconnect from limiting profile visibility and friending to self-disclosure. More specifically, privacy concerns lead SNS users to limit their profile visibility and discourage them from expanding their network. However, they do not constrain self-disclosure. Similarly, while self-efficacy in privacy management encourages SNS users to limit their profile visibility, it facilitates self-disclosure. This suggests that if users are limiting their profile visibility and constraining their friending behaviors, it does not necessarily mean they will reduce self-disclosure on SNSs because these behaviors are predicted by different factors. In addition, the study finds an interaction effect between privacy concerns and self-efficacy in privacy management on friending. It points to the potential problem of increased risk-taking behaviors resulting from high self-efficacy in privacy management and low privacy concerns.

  1. 78 FR 40515 - Privacy Act of 1974; Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [Notice 13-071] Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy... training associated with [[Page 40516

  2. Bio Computing and Information Systems: A Quest

    DTIC Science & Technology

    2003-06-01

    on Security and Privacy, 1996 4) Dawkins , R. The Selfish Gene . Oxford University Press, 1989 5) Dumpert, K. The Social Biology of Ants...mechanisms of genetic control, which switch genes on and off. The archetypal example of genetic regulation in bacteria is the lac operon of E. coli...first studied in the 1950s by Jacques Monod and François Jacob. The lac operon is a set of genes and regulatory sequences involved in the metabolism of

  3. Reflections on forty years of rendering medical care to women.

    PubMed Central

    Stuermer, V. M.

    1995-01-01

    This paper provides a brief account of events leading to the establishment of the constitutional right to privacy in the case known as Griswold vs. State of Connecticut. It also discusses changes in the training of residents in the Department of Obstetrics and Gynecology at Yale University School of Medicine and the evolving role of women in the residency program. It concludes with reflections and speculations about new directions in medical care for women. PMID:8903042

  4. Camelot 3: Habitability criteria space research and design studio

    NASA Technical Reports Server (NTRS)

    Arroyo, F.; Budet, O.; Garcia, A.; Lee, J.; Lopez, R.; Lugo, R.; Mateo, A.; Mellado, R.; Mendez, H.; Ortiz, N.

    1989-01-01

    Acknowledging the importance of human beings on a mission to Mars, the University of Puerto Rico studied both psychological and physiological aspects. Different conditions necessary for human health and well-being were considered. As a result, habitability criteria were developed. The criteria are as follows: personal identification; social interaction; unpredictable conditions; contact with nature; mental landscapes; privacy; equalitarian conditions; variety; functionality; sensory stimulation; music and environmental sound; stability and security; comfort; and sense of orientation.

  5. Support for Implications of Compressive Sensing Concepts to Imaging Systems

    DTIC Science & Technology

    2015-08-02

    34pretty picture" is not only not needed, but is not ALLOWED due to privacy concerns. Remember the huge controversy caused by mmW imagers seeing people...in 2003, for experimental studies of quantum degenerate atomic gases. From 2004-2006 he was a postdoctoral researcher in the Electrical and...Computer Engineering at the University of Arizona. He was recently also a program manager at DARPA/DSO where he started programs on quantum information

  6. Applying ethical and legal principles to new technology: the University of Auckland Faculty of Medical and Health Sciences' policy 'Taking and Sharing Images of Patients.'

    PubMed

    Jonas, Monique; Malpas, Phillipa; Kersey, Kate; Merry, Alan; Bagg, Warwick

    2017-01-27

    To develop a policy governing the taking and sharing of photographic and radiological images by medical students. The Rules of the Health Information Privacy Code 1994 and the Code of Health and Disability Services Consumers' Rights were applied to the taking, storing and sharing of photographic and radiological images by medical students. Stakeholders, including clinicians, medical students, lawyers at district health boards in the Auckland region, the Office of the Privacy Commissioner and the Health and Disability Commissioner were consulted and their recommendations incorporated. The policy 'Taking and Sharing Images of Patients' sets expectations of students in relation to: photographs taken for the purpose of providing care; photographs taken for educational or professional practice purposes and photographic or radiological images used for educational or professional practice purposes. In addition, it prohibits students from uploading images of patients onto image-sharing apps such as Figure 1. The policy has since been extended to apply to all students at the Faculty of Medical and Health Sciences at the University of Auckland. Technology-driven evolutions in practice necessitate regular review to ensure compliance with existing legal regulations and ethical frameworks. This policy offers a starting point for healthcare providers to review their own policies and practice, with a view to ensuring that patients' trust in the treatment that their health information receives is upheld.

  7. Facebook activity of residents and fellows and its impact on the doctor-patient relationship.

    PubMed

    Moubarak, Ghassan; Guiot, Aurélie; Benhamou, Ygal; Benhamou, Alexandra; Hariri, Sarah

    2011-02-01

    Facebook is an increasingly popular online social networking site. The purpose of this study was to describe the Facebook activity of residents and fellows and their opinions regarding the impact of Facebook on the doctor-patient relationship. An anonymous questionnaire was emailed to 405 residents and fellows at the Rouen University Hospital, France, in October 2009. Of the 202 participants who returned the questionnaire (50%), 147 (73%) had a Facebook profile. Among responders, 138 (99%) displayed their real name on their profile, 136 (97%) their birthdates, 128 (91%) a personal photograph, 83 (59%) their current university and 76 (55%) their current position. Default privacy settings were changed by 61% of users, more frequently if they were registered for >1 year (p=0.02). If a patient requested them as a 'friend', 152 (85%) participants would automatically decline the request, 26 (15%) would decide on an individual basis and none would automatically accept the request. Eighty-eight participants (48%) believed that the doctor-patient relationship would be altered if patients discovered that their doctor had a Facebook account, but 139 (76%) considered that it would change only if the patient had open access to their doctor's profile, independent of its content. Residents and fellows frequently use Facebook and display personal information on their profiles. Insufficient privacy protection might have an impact the doctor-patient relationship.

  8. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  9. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  10. 32 CFR 806b.11 - When to give Privacy Act Statements (PAS).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false When to give Privacy Act Statements (PAS). 806b... ADMINISTRATION PRIVACY ACT PROGRAM Collecting Personal Information § 806b.11 When to give Privacy Act Statements... information. Give a copy of the Privacy Act Statement if asked. Do not ask the person to sign the Privacy Act...

  11. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

    PubMed

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S Cenk; Shimizu, Chisato; Burns, Jane C; Wright, Victoria J; Png, Eileen; Hibberd, Martin L; Lloyd, David D; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-03-15

    We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. To demonstrate PRINCESS' performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). https://github.com/achenfengb/PRINCESS_opensource. shw070@ucsd.edu. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  12. Patients' rights in laboratory examinations: do they realize?

    PubMed

    Leino-Kilpi, H; Nyrhinen, T; Katajisto, J

    1997-11-01

    This article discusses the rights of patients who are attending hospital for the most common laboratory examinations and who may also be taking part in research studies. A distinction is made between five kinds of rights to: protection of privacy, physical integrity, mental integrity, information and self-determination. The data were collected (n = 204) by means of a structured questionnaire specifically developed for this study in the clinical chemistry, haematological, physiological and neurophysiological laboratories of one randomly selected university hospital in Finland. The analysis of the data was statistical. On the whole, patients' rights were realized reasonably well. This was most particularly the case with protection of privacy, as well as with the rights of physical and mental integrity. The rights to information and self-determination were less well realized. There are various steps that health care professionals and organizations can take to make sure that patients can enjoy their full rights, by counselling the patient, by giving opportunities to plan the examinations in advance, and by arranging a sufficient number of small examination rooms.

  13. Privacy information management for video surveillance

    NASA Astrophysics Data System (ADS)

    Luo, Ying; Cheung, Sen-ching S.

    2013-05-01

    The widespread deployment of surveillance cameras has raised serious privacy concerns. Many privacy-enhancing schemes have been proposed to automatically redact images of trusted individuals in the surveillance video. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris patterns as they are immutable and highly discriminative. In this paper, we propose a privacy data management system to be used in a privacy-aware video surveillance system. The privacy status of a subject is anonymously determined based on her iris pattern. For a trusted subject, the surveillance video is redacted and the original imagery is considered to be the privacy information. Our proposed system allows a subject to access her privacy information via the same biometric signal for privacy status determination. Two secure protocols, one for privacy information encryption and the other for privacy information retrieval are proposed. Error control coding is used to cope with the variability in iris patterns and efficient implementation is achieved using surrogate data records. Experimental results on a public iris biometric database demonstrate the validity of our framework.

  14. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-19

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be...

  15. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... party number (CPN) associated with an interstate call to interconnecting carriers. (b) Privacy. Except...

  16. 75 FR 20298 - Privacy Act Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ... Part 200 RIN 0430-AA03 Privacy Act Regulations AGENCY: Recovery Accountability and Transparency Board... amend the Board's regulations implementing the Privacy Act of 1974 (Privacy Act), as amended. This proposed rule would exempt certain systems of records from certain sections of the Privacy Act. These...

  17. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... party number (CPN) associated with an interstate call to interconnecting carriers. (b) Privacy. Except...

  18. Privacy Issues of a National Research and Education Network.

    ERIC Educational Resources Information Center

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  19. Digital Privacy: Toward a New Politics and Discursive Practice.

    ERIC Educational Resources Information Center

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  20. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments

    PubMed Central

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-01-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the “defense from social threats”, and the twofold function of privacy related to an “achieved state of privacy”, in the terms of both “system maintenance” and “system development”. The results also shed light on the role of the environment in shaping one’s experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being. PMID:27247696

  1. Quality assessment of dental health services provided at the Faculty of Dentistry, King Abdulaziz University.

    PubMed

    Hassan, Ali H; Amer, Hala A; Maghrabi, Abdulhamaid A

    2005-01-01

    The objectives of this research were to assess the quality of dental services delivered in King Abdulaziz University and highlight the necessary recommendations that would improve it. The methods used were live photographs illustrating the structure of dental services of the faculty presented in the clinic buildings, waiting places, equipments, instruments and supplies, as well as the comfort and privacy. Review of official records of the faculty for the number, qualifications and training of the dental staff and auxiliary personnel, as well as the process of care (starting from patient registration until completion of treatment). Records also demonstrated the access and utilization of services delivered in the various departments, the quality of these services and of infection control measures and procedures. The results revealed the high quality of services delivered through evaluating the structure and process of care in the university dental clinics. Dental services of King Abdulaziz University conform to high quality standards, with implementation of some changes for improvement and development.

  2. Reexamination of optimal quantum state estimation of pure states

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hayashi, A.; Hashimoto, T.; Horibe, M.

    2005-09-15

    A direct derivation is given for the optimal mean fidelity of quantum state estimation of a d-dimensional unknown pure state with its N copies given as input, which was first obtained by Hayashi in terms of an infinite set of covariant positive operator valued measures (POVM's) and by Bruss and Macchiavello establishing a connection to optimal quantum cloning. An explicit condition for POVM measurement operators for optimal estimators is obtained, by which we construct optimal estimators with finite POVMs using exact quadratures on a hypersphere. These finite optimal estimators are not generally universal, where universality means the fidelity is independentmore » of input states. However, any optimal estimator with finite POVM for M(>N) copies is universal if it is used for N copies as input.« less

  3. 32 CFR 318.5 - Designations and responsibilities

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... requirements developed to collect and/or maintain personal data conform to DoD Privacy Act Program standards...) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.5 Designations and responsibilities... effective Privacy Program. (2) Appoint a senior official to serve as the Agency Privacy Act Officer. (3...

  4. 32 CFR 318.5 - Designations and responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements developed to collect and/or maintain personal data conform to DoD Privacy Act Program standards...) PRIVACY PROGRAM DEFENSE THREAT REDUCTION AGENCY PRIVACY PROGRAM § 318.5 Designations and responsibilities... effective Privacy Program. (2) Appoint a senior official to serve as the Agency Privacy Act Officer. (3...

  5. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  6. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 3 2014-10-01 2014-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... and transmission technology used by the carrier or VoIP provider. (b) Privacy. Except as provided in...

  7. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  8. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  9. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 3 2012-10-01 2012-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... and transmission technology used by the carrier or VoIP provider. (b) Privacy. Except as provided in...

  10. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  11. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  12. 47 CFR 64.1601 - Delivery requirements and privacy restrictions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 3 2013-10-01 2013-10-01 false Delivery requirements and privacy restrictions... Number; Privacy § 64.1601 Delivery requirements and privacy restrictions. (a) Delivery. Except as... and transmission technology used by the carrier or VoIP provider. (b) Privacy. Except as provided in...

  13. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  14. 48 CFR 39.105 - Privacy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  15. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  16. 32 CFR 310.43 - Privacy Act inspections.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Privacy Act inspections. 310.43 Section 310.43 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Inspections § 310.43 Privacy Act inspections. During internal inspections...

  17. A Model Privacy Statement for Ohio Library Web Sites.

    ERIC Educational Resources Information Center

    Monaco, Michael J.

    The purpose of this research was to develop a model privacy policy statement for library World Wide Web sites. First, standards of privacy protection were identified. These standards were culled from the privacy and confidentiality policies of the American Library Association, the Federal Trade Commission's online privacy reports, the guidelines…

  18. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  19. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  20. 45 CFR 164.534 - Compliance dates for initial implementation of the privacy standards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... privacy standards. 164.534 Section 164.534 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.534 Compliance dates for initial implementation of the privacy standards. (a...

  1. 45 CFR 164.520 - Notice of privacy practices for protected health information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable Health Information § 164.520 Notice of privacy practices for protected health information. (a) Standard... 45 Public Welfare 1 2014-10-01 2014-10-01 false Notice of privacy practices for protected health...

  2. 32 CFR 310.2 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Program under 5 U.S.C. 552a and OMB Circular A-130. (b) Authorizes the Defense Privacy Board, the Defense Privacy Board Legal Committee, and the Defense Data Integrity Board. (c) Continues to authorize... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY...

  3. 32 CFR 310.2 - Purpose.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Privacy Program under 5 U.S.C. 552a and OMB Circular A-130. (b) Authorizes the Defense Privacy Board, the Defense Privacy Board Legal Committee, and the Defense Data Integrity Board. (c) Continues to authorize... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY...

  4. 32 CFR 310.2 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Privacy Program under 5 U.S.C. 552a and OMB Circular A-130. (b) Authorizes the Defense Privacy Board, the Defense Privacy Board Legal Committee, and the Defense Data Integrity Board. (c) Continues to authorize... Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY...

  5. 76 FR 63896 - Federal Acquisition Regulation; Privacy Training, 2010-013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-14

    ... Acquisition Regulation; Privacy Training, 2010-013 AGENCY: Department of Defense (DoD), General Services... contractors to complete training that addresses the protection of privacy, in accordance with the Privacy Act... Regulation (FAR) to add a new subpart 24.3, entitled ``Privacy Training,'' and related clause to ensure that...

  6. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  7. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  8. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  9. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  10. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  11. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  12. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  13. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  14. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  15. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  16. 48 CFR 52.224-2 - Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  17. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  18. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  19. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 2 2014-01-01 2014-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  20. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  1. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 4 Accounts 1 2014-01-01 2013-01-01 true Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  2. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  3. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  4. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  5. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 4 Accounts 1 2013-01-01 2013-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  6. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  7. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 16 Commercial Practices 1 2013-01-01 2013-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  8. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  9. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  10. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  11. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 16 Commercial Practices 1 2014-01-01 2014-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  12. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  13. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  14. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 7 2013-01-01 2013-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  15. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  16. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  17. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  18. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  19. 12 CFR 1016.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Revised privacy notices. 1016.8 Section 1016.8 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.8 Revised privacy notices. (a) General rule. Except as...

  20. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 4 Accounts 1 2012-01-01 2012-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  1. 32 CFR 505.12 - Privacy Act enforcement actions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act enforcement actions. 505.12 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.12 Privacy Act enforcement actions. (a.... (1) Civil remedies. The DA is subject to civil remedies for violations of the Privacy Act. In...

  2. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  3. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 2 2013-01-01 2013-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  4. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 4 Accounts 1 2011-01-01 2011-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  5. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 5 2012-10-01 2012-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  6. 12 CFR 716.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Revised privacy notices. 716.8 Section 716.8 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.8 Revised privacy notices. (a) General...

  7. 75 FR 81454 - Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    ... JOINT BOARD FOR ENROLLMENT OF ACTUARIES 20 CFR Part 903 Privacy Act of 1974; Implementation AGENCY... requirements of the Privacy Act of 1974, as amended, the Joint Board for the Enrollment of Actuaries (Joint... Privacy Act, from certain of the Privacy Act's provisions, to revise language that incorrectly implies...

  8. 45 CFR 503.1 - Definitions-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  9. 12 CFR 716.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Initial privacy notice to consumers required... CREDIT UNIONS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 716.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  10. 4 CFR 200.4 - Privacy Act inquiries.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act inquiries. 200.4 Section 200.4 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.4 Privacy Act inquiries. (a... Avenue, NW., Suite 700, Washington, DC 20006. Inquiries should be marked “Privacy Act Inquiry” on each...

  11. 48 CFR 1452.224-1 - Privacy Act Notification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Privacy Act Notification... Privacy Act Notification. (a) As prescribed in 1424.104, the clause at FAR 52.224-1, Privacy Act... the clause to read “Privacy Act Notification (JUL 1996) (Deviation)”; and (2) Adding the following...

  12. 10 CFR 1304.113 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Privacy Act training. 1304.113 Section 1304.113 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.113 Privacy Act training. (a) The Board... Board systems are informed of all requirements necessary to protect the privacy of individuals. The...

  13. 17 CFR 160.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Revised privacy notices. 160.8 Section 160.8 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 160.8 Revised privacy notices. (a) General rule. Except...

  14. 12 CFR 216.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Revised privacy notices. 216.8 Section 216.8 Banks and Banking FEDERAL RESERVE SYSTEM BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.8 Revised privacy notices...

  15. 16 CFR 313.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Revised privacy notices. 313.8 Section 313.8 Commercial Practices FEDERAL TRADE COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 313.8 Revised privacy notices. (a) General rule. Except...

  16. 4 CFR 200.13 - Privacy Act training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Privacy Act training. 200.13 Section 200.13 Accounts RECOVERY ACCOUNTABILITY AND TRANSPARENCY BOARD PRIVACY ACT OF 1974 § 200.13 Privacy Act training. (a) The... any Board systems of records are informed of all requirements necessary to protect the privacy of...

  17. 77 FR 57015 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DoD-2012-OS-0104] 32 CFR Part 319 Privacy... the records in another Privacy Act system of records. DIA is updating the DIA Privacy Act Program by... its Privacy Programs. DoD expects no opposition to the changes and no significant adverse comments...

  18. 77 FR 2721 - Privacy Act System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-19

    ... FEDERAL COMMUNICATIONS COMMISSION Privacy Act System of Records AGENCY: Federal Communications Commission (FCC, Commission, or Agency). ACTION: Notice; one new Privacy Act system of records. SUMMARY: Pursuant to subsection (e)(4) of the Privacy Act of 1974, as amended (``Privacy Act''), 5 U.S.C. 552a, the...

  19. Perspectives on Privacy and Terrorism: All Is not Lost--Yet.

    ERIC Educational Resources Information Center

    Gellman, Robert

    2002-01-01

    Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)

  20. 75 FR 11191 - Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-10

    ... 20472. For privacy issues please contact: Mary Ellen Callahan (703-235- 0780), Chief Privacy Officer... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Federal Emergency Management Agency System of Records AGENCY: Privacy Office...

  1. 75 FR 36535 - Freedom of Information Act, Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ... Freedom of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It..., Privacy Act of 1974; Implementation AGENCY: Department of the Treasury. ACTION: Final rule; correcting... the Privacy Act. In addition, that document revised the list of Treasury offices and bureaus found...

  2. Employee Privacy Rights: A Management Guide.

    ERIC Educational Resources Information Center

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  3. Privacy Awareness: A Means to Solve the Privacy Paradox?

    NASA Astrophysics Data System (ADS)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  4. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge.

    PubMed

    Yu, Fei; Ji, Zhanglong

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods.

  5. Scalable privacy-preserving data sharing methodology for genome-wide association studies: an application to iDASH healthcare privacy protection challenge

    PubMed Central

    2014-01-01

    In response to the growing interest in genome-wide association study (GWAS) data privacy, the Integrating Data for Analysis, Anonymization and SHaring (iDASH) center organized the iDASH Healthcare Privacy Protection Challenge, with the aim of investigating the effectiveness of applying privacy-preserving methodologies to human genetic data. This paper is based on a submission to the iDASH Healthcare Privacy Protection Challenge. We apply privacy-preserving methods that are adapted from Uhler et al. 2013 and Yu et al. 2014 to the challenge's data and analyze the data utility after the data are perturbed by the privacy-preserving methods. Major contributions of this paper include new interpretation of the χ2 statistic in a GWAS setting and new results about the Hamming distance score, a key component for one of the privacy-preserving methods. PMID:25521367

  6. mSieve: Differential Behavioral Privacy in Time Series of Mobile Sensor Data.

    PubMed

    Saleheen, Nazir; Chakraborty, Supriyo; Ali, Nasir; Mahbubur Rahman, Md; Hossain, Syed Monowar; Bari, Rummana; Buder, Eugene; Srivastava, Mani; Kumar, Santosh

    2016-09-01

    Differential privacy concepts have been successfully used to protect anonymity of individuals in population-scale analysis. Sharing of mobile sensor data, especially physiological data, raise different privacy challenges, that of protecting private behaviors that can be revealed from time series of sensor data. Existing privacy mechanisms rely on noise addition and data perturbation. But the accuracy requirement on inferences drawn from physiological data, together with well-established limits within which these data values occur, render traditional privacy mechanisms inapplicable. In this work, we define a new behavioral privacy metric based on differential privacy and propose a novel data substitution mechanism to protect behavioral privacy. We evaluate the efficacy of our scheme using 660 hours of ECG, respiration, and activity data collected from 43 participants and demonstrate that it is possible to retain meaningful utility, in terms of inference accuracy (90%), while simultaneously preserving the privacy of sensitive behaviors.

  7. mSieve: Differential Behavioral Privacy in Time Series of Mobile Sensor Data

    PubMed Central

    Saleheen, Nazir; Chakraborty, Supriyo; Ali, Nasir; Mahbubur Rahman, Md; Hossain, Syed Monowar; Bari, Rummana; Buder, Eugene; Srivastava, Mani; Kumar, Santosh

    2016-01-01

    Differential privacy concepts have been successfully used to protect anonymity of individuals in population-scale analysis. Sharing of mobile sensor data, especially physiological data, raise different privacy challenges, that of protecting private behaviors that can be revealed from time series of sensor data. Existing privacy mechanisms rely on noise addition and data perturbation. But the accuracy requirement on inferences drawn from physiological data, together with well-established limits within which these data values occur, render traditional privacy mechanisms inapplicable. In this work, we define a new behavioral privacy metric based on differential privacy and propose a novel data substitution mechanism to protect behavioral privacy. We evaluate the efficacy of our scheme using 660 hours of ECG, respiration, and activity data collected from 43 participants and demonstrate that it is possible to retain meaningful utility, in terms of inference accuracy (90%), while simultaneously preserving the privacy of sensitive behaviors. PMID:28058408

  8. Will the new Australian health privacy law provide adequate protection?

    PubMed

    Bomba, David; Hallit, George

    2002-01-01

    Amendments to the original Privacy Act (1988) come at a key point in time, as a national medical record system looms on the Australian horizon. Changes to The Privacy Act have the potential to define a level of information privacy prior to the implementation of such a system. We have therefore collected expert opinions on the ability of the Health Privacy Guidelines (enacted in December 2001 under The Privacy Act and hereafter more specifically known as Health Privacy Legislation) to ensure the privacy and security of patient information. We conclude that the legislation is flawed in its capacity to withstand an increasingly corporatised health sector. Deficiencies in consent requirements, together with feeble enforcement capabilities, mean The Legislation cannot effectively ensure that personally identifiable information will not end up in corporate third party hands. To significantly bolster the new legislation, we argue that it should be supplemented with explicit health data legislation and privacy auditing.

  9. Quantifying Differential Privacy under Temporal Correlations.

    PubMed

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-04-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time . We call it temporal privacy leakage . Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective.

  10. Deriving a Set of Privacy Specific Heuristics for the Assessment of PHRs (Personal Health Records).

    PubMed

    Furano, Riccardo F; Kushniruk, Andre; Barnett, Jeff

    2017-01-01

    With the emergence of personal health record (PHR) platforms becoming more widely available, this research focused on the development of privacy heuristics to assess PHRs regarding privacy. Existing sets of heuristics are typically not application specific and do not address patient-centric privacy as a main concern prior to undergoing PHR procurement. A set of privacy specific heuristics were developed based on a scoping review of the literature. An internet-based commercially available, vendor specific PHR application was evaluated using the derived set of privacy specific heuristics. The proposed set of privacy specific derived heuristics is explored in detail in relation to ISO 29100. The assessment of the internet-based commercially available, vendor specific PHR application indicated numerous violations. These violations were noted within the study. It is argued that the new derived privacy heuristics should be used in addition to Nielsen's well-established set of heuristics. Privacy specific heuristics could be used to assess PHR portal system-level privacy mechanisms in the procurement process of a PHR application and may prove to be a beneficial form of assessment to prevent the selection of a PHR platform with a poor privacy specific interface design.

  11. Disclosing Medical Mistakes: A Communication Management Plan for Physicians

    PubMed Central

    Petronio, Sandra; Torke, Alexia; Bosslet, Gabriel; Isenberg, Steven; Wocial, Lucia; Helft, Paul R

    2013-01-01

    Introduction: There is a growing consensus that disclosure of medical mistakes is ethically and legally appropriate, but such disclosures are made difficult by medical traditions of concern about medical malpractice suits and by physicians’ own emotional reactions. Because the physician may have compelling reasons both to keep the information private and to disclose it to the patient or family, these situations can be conceptualized as privacy dilemmas. These dilemmas may create barriers to effectively addressing the mistake and its consequences. Although a number of interventions exist to address privacy dilemmas that physicians face, current evidence suggests that physicians tend to be slow to adopt the practice of disclosing medical mistakes. Methods: This discussion proposes a theoretically based, streamlined, two-step plan that physicians can use as an initial guide for conversations with patients about medical mistakes. The mistake disclosure management plan uses the communication privacy management theory. Results: The steps are 1) physician preparation, such as talking about the physician’s emotions and seeking information about the mistake, and 2) use of mistake disclosure strategies that protect the physician-patient relationship. These include the optimal timing, context of disclosure delivery, content of mistake messages, sequencing, and apology. A case study highlighted the disclosure process. Conclusion: This Mistake Disclosure Management Plan may help physicians in the early stages after mistake discovery to prepare for the initial disclosure of a medical mistakes. The next step is testing implementation of the procedures suggested. PMID:23704848

  12. Comparing different scientific approaches to personalized medicine: research ethics and privacy protection.

    PubMed

    Langanke, Martin; Brothers, Kyle B; Erdmann, Pia; Weinert, Jakob; Krafczyk-Korth, Janina; Dörr, Marcus; Hoffmann, Wolfgang; Kroemer, Heyo K; Assel, Heinrich

    2011-07-01

    In this article, two different scientific approaches to personalized medicine are compared. Biorepository at Vanderbilt University (BioVU) is a genomic biorepository at Vanderbilt University Medical Center in Nashville, TN, USA. Genetic biosamples are collected from leftover clinical blood samples; medical information is derived from an electronic medical records. Greifswald Approach to Individualized Medicine is a research resource at the University of Greifswald, Germany, comprised of clinical records combined with biosamples collected for research. We demonstrate that although both approaches are based on the collection of clinical data and biosamples, different legal milieus present in the USA and Germany as well as slight differences in scientific goals have led to different 'ethical designs'. While BioVU can successfully operate with an 'opt-out' mechanism, an informed consent-based 'opt-in' model is indispensable to allow GANI_MED to reach its scientific goals.

  13. Comparing different scientific approaches to personalized medicine: research ethics and privacy protection

    PubMed Central

    Langanke, Martin; Brothers, Kyle B; Erdmann, Pia; Weinert, Jakob; Krafczyk-Korth, Janina; Dörr, Marcus; Hoffmann, Wolfgang; Kroemer, Heyo K; Assel, Heinrich

    2011-01-01

    In this article, two different scientific approaches to personalized medicine are compared. Biorepository at Vanderbilt University (BioVU) is a genomic biorepository at Vanderbilt University Medical Center in Nashville, TN, USA. Genetic biosamples are collected from leftover clinical blood samples; medical information is derived from an electronic medical records. Greifswald Approach to Individualized Medicine is a research resource at the University of Greifswald, Germany, comprised of clinical records combined with biosamples collected for research. We demonstrate that although both approaches are based on the collection of clinical data and biosamples, different legal milieus present in the USA and Germany as well as slight differences in scientific goals have led to different ‘ethical designs’. While BioVU can successfully operate with an ‘opt-out’ mechanism, an informed consent-based ‘opt-in’ model is indispensable to allow GANI_MED to reach its scientific goals. PMID:21892358

  14. A Distributed Ensemble Approach for Mining Healthcare Data under Privacy Constraints

    PubMed Central

    Li, Yan; Bai, Changxin; Reddy, Chandan K.

    2015-01-01

    In recent years, electronic health records (EHRs) have been widely adapted at many healthcare facilities in an attempt to improve the quality of patient care and increase the productivity and efficiency of healthcare delivery. These EHRs can accurately diagnose diseases if utilized appropriately. While the EHRs can potentially resolve many of the existing problems associated with disease diagnosis, one of the main obstacles in effectively using them is the patient privacy and sensitivity of the medical information available in the EHR. Due to these concerns, even if the EHRs are available for storage and retrieval purposes, sharing of the patient records between different healthcare facilities has become a major concern and has hampered some of the effective advantages of using EHRs. Due to this lack of data sharing, most of the facilities aim at building clinical decision support systems using limited amount of patient data from their own EHR systems to provide important diagnosis related decisions. It becomes quite infeasible for a newly established healthcare facility to build a robust decision making system due to the lack of sufficient patient records. However, to make effective decisions from clinical data, it is indispensable to have large amounts of data to train the decision models. In this regard, there are conflicting objectives of preserving patient privacy and having sufficient data for modeling and decision making. To handle such disparate goals, we develop two adaptive distributed privacy-preserving algorithms based on a distributed ensemble strategy. The basic idea of our approach is to build an elegant model for each participating facility to accurately learn the data distribution, and then can transfer the useful healthcare knowledge acquired on their data from these participators in the form of their own decision models without revealing and sharing the patient-level sensitive data, thus protecting patient privacy. We demonstrate that our approach can successfully build accurate and robust prediction models, under privacy constraints, using the healthcare data collected from different geographical locations. We demonstrate the performance of our method using the Type-2 diabetes EHRs accumulated from multiple sources from all fifty states in the U.S. Our method was evaluated on diagnosing diabetes in the presence of insufficient number of patient records from certain regions without revealing the actual patient data from other regions. Using the proposed approach, we also discovered the important biomarkers, both universal and region-specific, and validated the selected biomarkers using the biomedical literature. PMID:26681811

  15. A Distributed Ensemble Approach for Mining Healthcare Data under Privacy Constraints.

    PubMed

    Li, Yan; Bai, Changxin; Reddy, Chandan K

    2016-02-10

    In recent years, electronic health records (EHRs) have been widely adapted at many healthcare facilities in an attempt to improve the quality of patient care and increase the productivity and efficiency of healthcare delivery. These EHRs can accurately diagnose diseases if utilized appropriately. While the EHRs can potentially resolve many of the existing problems associated with disease diagnosis, one of the main obstacles in effectively using them is the patient privacy and sensitivity of the medical information available in the EHR. Due to these concerns, even if the EHRs are available for storage and retrieval purposes, sharing of the patient records between different healthcare facilities has become a major concern and has hampered some of the effective advantages of using EHRs. Due to this lack of data sharing, most of the facilities aim at building clinical decision support systems using limited amount of patient data from their own EHR systems to provide important diagnosis related decisions. It becomes quite infeasible for a newly established healthcare facility to build a robust decision making system due to the lack of sufficient patient records. However, to make effective decisions from clinical data, it is indispensable to have large amounts of data to train the decision models. In this regard, there are conflicting objectives of preserving patient privacy and having sufficient data for modeling and decision making. To handle such disparate goals, we develop two adaptive distributed privacy-preserving algorithms based on a distributed ensemble strategy. The basic idea of our approach is to build an elegant model for each participating facility to accurately learn the data distribution, and then can transfer the useful healthcare knowledge acquired on their data from these participators in the form of their own decision models without revealing and sharing the patient-level sensitive data, thus protecting patient privacy. We demonstrate that our approach can successfully build accurate and robust prediction models, under privacy constraints, using the healthcare data collected from different geographical locations. We demonstrate the performance of our method using the Type-2 diabetes EHRs accumulated from multiple sources from all fifty states in the U.S. Our method was evaluated on diagnosing diabetes in the presence of insufficient number of patient records from certain regions without revealing the actual patient data from other regions. Using the proposed approach, we also discovered the important biomarkers, both universal and region-specific, and validated the selected biomarkers using the biomedical literature.

  16. Analysis of the United States Computer Emergency Readiness Team’s (U.S. CERT) EINSTEIN III Intrusion Detection System, and Its Impact on Privacy

    DTIC Science & Technology

    2013-03-01

    Arlington, VA 22202–4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704–0188) Washington DC 20503. 1. AGENCY USE ONLY...University, 2004 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN INFORMATION TECHNOLOGY MANAGEMENT...Fulp Second Reader Dr. Dan Boger Chair, Department of Information Sciences iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT To secure

  17. One Size Doesn’t Fit All: Measuring Individual Privacy in Aggregate Genomic Data

    PubMed Central

    Simmons, Sean; Berger, Bonnie

    2017-01-01

    Even in the aggregate, genomic data can reveal sensitive information about individuals. We present a new model-based measure, PrivMAF, that provides provable privacy guarantees for aggregate data (namely minor allele frequencies) obtained from genomic studies. Unlike many previous measures that have been designed to measure the total privacy lost by all participants in a study, PrivMAF gives an individual privacy measure for each participant in the study, not just an average measure. These individual measures can then be combined to measure the worst case privacy loss in the study. Our measure also allows us to quantify the privacy gains achieved by perturbing the data, either by adding noise or binning. Our findings demonstrate that both perturbation approaches offer significant privacy gains. Moreover, we see that these privacy gains can be achieved while minimizing perturbation (and thus maximizing the utility) relative to stricter notions of privacy, such as differential privacy. We test PrivMAF using genotype data from the Wellcome Trust Case Control Consortium, providing a more nuanced understanding of the privacy risks involved in an actual genome-wide association studies. Interestingly, our analysis demonstrates that the privacy implications of releasing MAFs from a study can differ greatly from individual to individual. An implementation of our method is available at http://privmaf.csail.mit.edu. PMID:29202050

  18. Privacy in Social Networks: A Survey

    NASA Astrophysics Data System (ADS)

    Zheleva, Elena; Getoor, Lise

    In this chapter, we survey the literature on privacy in social networks. We focus both on online social networks and online affiliation networks. We formally define the possible privacy breaches and describe the privacy attacks that have been studied. We present definitions of privacy in the context of anonymization together with existing anonymization techniques.

  19. Fourteen Reasons Privacy Matters: A Multidisciplinary Review of Scholarly Literature

    ERIC Educational Resources Information Center

    Magi, Trina J.

    2011-01-01

    Librarians have long recognized the importance of privacy to intellectual freedom. As digital technology and its applications advance, however, efforts to protect privacy may become increasingly difficult. With some users behaving in ways that suggest they do not care about privacy and with powerful voices claiming that privacy is dead, librarians…

  20. 12 CFR 1204.2 - What do the terms in this part mean?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... who has primary responsibility for privacy and data protection policy and is authorized to process... Section 1204.2 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ORGANIZATION AND OPERATIONS PRIVACY ACT..., or control. Privacy Act means the Privacy Act of 1974, as amended (5 U.S.C. 552a). Privacy Act...

  1. 32 CFR 806b.51 - Privacy and the Web.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Privacy and the Web. 806b.51 Section 806b.51 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION PRIVACY ACT... security notices at major web site entry points and Privacy Act statements or Privacy Advisories when...

  2. 17 CFR 248.2 - Model privacy form: rule of construction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Model privacy form: rule of... Safeguarding Personal Information § 248.2 Model privacy form: rule of construction. (a) Model privacy form. Use of the model privacy form in Appendix A to Subpart A of this part, consistent with the instructions...

  3. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  4. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Annual privacy notice to... COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You...

  5. 12 CFR 1016.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Delivering privacy and opt out notices. 1016.9 Section 1016.9 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.9 Delivering privacy and opt out notices. (a...

  6. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  7. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial...

  8. 12 CFR 216.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Initial privacy notice to consumers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  9. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  10. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  11. 12 CFR 573.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Annual privacy notice to customers required. 573.5 Section 573.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.5 Annual privacy notice to...

  12. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You must...

  13. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  14. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  15. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  16. 12 CFR 216.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Initial privacy notice to consumers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  17. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  18. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  19. 12 CFR 573.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Delivering privacy and opt out notices. 573.9 Section 573.9 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.9 Delivering privacy and opt out notices...

  20. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  1. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  2. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Initial privacy notice to... COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice...

  3. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P, S-AM, AND S-ID Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except...

  4. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  5. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The...

  6. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  7. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  8. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  9. 12 CFR 332.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Annual privacy notice to customers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  10. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  11. 12 CFR 216.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Annual privacy notice to customers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  12. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  13. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  14. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  15. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  16. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 2 2013-04-01 2013-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  17. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice requirement...

  18. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 2 2012-04-01 2012-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  19. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  20. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  1. 12 CFR 40.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Initial privacy notice to consumers required. 40.4 Section 40.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.4 Initial privacy notice to...

  2. 12 CFR 1016.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Annual privacy notice to customers required. 1016.5 Section 1016.5 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.5 Annual privacy notice to customers...

  3. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  4. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  5. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  6. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  7. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  8. 12 CFR 573.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Initial privacy notice to consumers required. 573.4 Section 573.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.4 Initial privacy notice to...

  9. 12 CFR 40.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Initial privacy notice to consumers required. 40.4 Section 40.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.4 Initial privacy notice to...

  10. 12 CFR 332.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Initial privacy notice to consumers required... OF GENERAL POLICY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 332.4 Initial privacy notice to consumers required. (a) Initial notice requirement. You must provide a clear and...

  11. 12 CFR 40.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Annual privacy notice to customers required. 40.5 Section 40.5 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.5 Annual privacy notice to customers...

  12. 17 CFR 160.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... privacy notices. 160.6 Section 160.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.6 Information to be included in privacy notices. (a) General rule. The initial...

  13. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  14. 12 CFR 1016.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Initial privacy notice to consumers required. 1016.4 Section 1016.4 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 1016.4 Initial privacy notice to...

  15. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  16. 12 CFR 1016.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Model privacy form and examples. 1016.2 Section 1016.2 Banks and Banking BUREAU OF CONSUMER FINANCIAL PROTECTION PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) § 1016.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  17. 17 CFR 160.4 - Initial privacy notice to consumers required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Initial privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.4 Initial privacy notice to consumers required. (a) Initial notice requirement...

  18. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 2 2014-04-01 2014-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  19. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  20. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  1. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  2. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  3. 6 CFR 1002.3 - Privacy Act requests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Privacy Act requests. 1002.3 Section 1002.3 Domestic Security PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD IMPLEMENTATION OF THE PRIVACY ACT OF 1974 § 1002.3 Privacy Act requests. (a) Requests to determine if you are the subject of a record. You may...

  4. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  5. 12 CFR 40.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Annual privacy notice to customers required. 40.5 Section 40.5 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.5 Annual privacy notice to customers...

  6. 17 CFR 160.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Annual privacy notice to... COMMISSION PRIVACY OF CONSUMER FINANCIAL INFORMATION UNDER TITLE V OF THE GRAMM-LEACH-BLILEY ACT Privacy and Opt Out Notices § 160.5 Annual privacy notice to customers required. (a)(1) General rule. You must...

  7. 12 CFR 216.5 - Annual privacy notice to customers required.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 2 2012-01-01 2012-01-01 false Annual privacy notice to customers required... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.5 Annual privacy notice to customers required. (a)(1) General rule. You must provide a clear and...

  8. 32 CFR 701.118 - Privacy, IT, and PIAs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Privacy, IT, and PIAs. 701.118 Section 701.118... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.118 Privacy, IT, and PIAs. (a) Development. Privacy must be considered when requirements are being analyzed and decisions are being made...

  9. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 2 2011-04-01 2011-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  10. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  11. 10 CFR 1304.103 - Privacy Act inquiries.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Privacy Act inquiries. 1304.103 Section 1304.103 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.103 Privacy Act inquiries. (a) Requests... Clarendon Blvd., Suite 1300; Arlington, VA. Requests should be marked “Privacy Act Request” on each page of...

  12. 12 CFR 573.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Revised privacy notices. 573.8 Section 573.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 573.8 Revised privacy notices. (a) General rule. Except as otherwise...

  13. 17 CFR 248.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Revised privacy notices. 248.8...) REGULATIONS S-P AND S-AM Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Personal Information Privacy and Opt Out Notices § 248.8 Revised privacy notices. (a) General rule. Except as otherwise...

  14. 45 CFR 503.2 - General policies-Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  15. 25 CFR 700.259 - Records subject to Privacy Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as that...

  16. 12 CFR 40.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Model privacy form and examples. 40.2 Section 40.2 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 40.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  17. 28 CFR 513.50 - Privacy Act requests by inmates.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Privacy Act requests by inmates. 513.50... ADMINISTRATION ACCESS TO RECORDS Release of Information Privacy Act Requests for Information § 513.50 Privacy Act requests by inmates. Because inmate records are exempt from disclosure under the Privacy Act (see 28 CFR 16...

  18. 12 CFR 573.2 - Model privacy form and examples.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Model privacy form and examples. 573.2 Section 573.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION § 573.2 Model privacy form and examples. (a) Model privacy form. Use of the model...

  19. 12 CFR 40.8 - Revised privacy notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Revised privacy notices. 40.8 Section 40.8 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.8 Revised privacy notices. (a) General rule. Except as otherwise...

  20. 75 FR 50846 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-001...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... INFORMATION CONTACT: For general questions and privacy issues please contact: Mary Ellen Callahan (703-235...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--001 Freedom of Information Act and Privacy Act Records System of Records AGENCY: Privacy Office, DHS. ACTION: Final rule...

  1. 75 FR 743 - Freedom of Information Act, Privacy Act of 1974; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... of Information Act (FOIA) and its regulations concerning the Privacy Act of 1974 (Privacy Act). It..., Privacy Act of 1974; Implementation AGENCY: Department of the Treasury. ACTION: Final rule. SUMMARY: This... implement the Privacy Act. In addition, the document revises the list of Treasury offices and bureaus found...

  2. Personalized Privacy-Preserving Frequent Itemset Mining Using Randomized Response

    PubMed Central

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy. PMID:25143989

  3. Personalized privacy-preserving frequent itemset mining using randomized response.

    PubMed

    Sun, Chongjing; Fu, Yan; Zhou, Junlin; Gao, Hui

    2014-01-01

    Frequent itemset mining is the important first step of association rule mining, which discovers interesting patterns from the massive data. There are increasing concerns about the privacy problem in the frequent itemset mining. Some works have been proposed to handle this kind of problem. In this paper, we introduce a personalized privacy problem, in which different attributes may need different privacy levels protection. To solve this problem, we give a personalized privacy-preserving method by using the randomized response technique. By providing different privacy levels for different attributes, this method can get a higher accuracy on frequent itemset mining than the traditional method providing the same privacy level. Finally, our experimental results show that our method can have better results on the frequent itemset mining while preserving personalized privacy.

  4. Preserving Institutional Privacy in Distributed binary Logistic Regression.

    PubMed

    Wu, Yuan; Jiang, Xiaoqian; Ohno-Machado, Lucila

    2012-01-01

    Privacy is becoming a major concern when sharing biomedical data across institutions. Although methods for protecting privacy of individual patients have been proposed, it is not clear how to protect the institutional privacy, which is many times a critical concern of data custodians. Built upon our previous work, Grid Binary LOgistic REgression (GLORE)1, we developed an Institutional Privacy-preserving Distributed binary Logistic Regression model (IPDLR) that considers both individual and institutional privacy for building a logistic regression model in a distributed manner. We tested our method using both simulated and clinical data, showing how it is possible to protect the privacy of individuals and of institutions using a distributed strategy.

  5. Achieving Privacy in a Federated Identity Management System

    NASA Astrophysics Data System (ADS)

    Landau, Susan; Le van Gong, Hubert; Wilton, Robin

    Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We examine privacy risks and fundamental privacy protections of federated identity- management systems. The protections include minimal disclosure and providing PII only on a “need-to-know” basis. We then look at the Liberty Alliance system and analyze previous privacy critiques of that system. We show how law and policy provide privacy protections in federated identity-management systems, and that privacy threats are best handled using a combination of technology and law/policy tools.

  6. A globally optimal k-anonymity method for the de-identification of health data.

    PubMed

    El Emam, Khaled; Dankar, Fida Kamal; Issa, Romeo; Jonker, Elizabeth; Amyot, Daniel; Cogo, Elise; Corriveau, Jean-Pierre; Walker, Mark; Chowdhury, Sadrul; Vaillancourt, Regis; Roffey, Tyson; Bottomley, Jim

    2009-01-01

    Explicit patient consent requirements in privacy laws can have a negative impact on health research, leading to selection bias and reduced recruitment. Often legislative requirements to obtain consent are waived if the information collected or disclosed is de-identified. The authors developed and empirically evaluated a new globally optimal de-identification algorithm that satisfies the k-anonymity criterion and that is suitable for health datasets. Authors compared OLA (Optimal Lattice Anonymization) empirically to three existing k-anonymity algorithms, Datafly, Samarati, and Incognito, on six public, hospital, and registry datasets for different values of k and suppression limits. Measurement Three information loss metrics were used for the comparison: precision, discernability metric, and non-uniform entropy. Each algorithm's performance speed was also evaluated. The Datafly and Samarati algorithms had higher information loss than OLA and Incognito; OLA was consistently faster than Incognito in finding the globally optimal de-identification solution. For the de-identification of health datasets, OLA is an improvement on existing k-anonymity algorithms in terms of information loss and performance.

  7. Gender and online privacy among teens: risk perception, privacy concerns, and protection behaviors.

    PubMed

    Youn, Seounmi; Hall, Kimberly

    2008-12-01

    Survey data from 395 high school students revealed that girls perceive more privacy risks and have a higher level of privacy concerns than boys. Regarding privacy protection behaviors, boys tended to read unsolicited e-mail and register for Web sites while directly sending complaints in response to unsolicited e-mail. This study found girls to provide inaccurate information as their privacy concerns increased. Boys, however, refrained from registering to Web sites as their concerns increased.

  8. The study on privacy preserving data mining for information security

    NASA Astrophysics Data System (ADS)

    Li, Xiaohui

    2012-04-01

    Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.

  9. Privacy protection for HealthGrid applications.

    PubMed

    Claerhout, B; De Moor, G J E

    2005-01-01

    This contribution aims at introducing the problem of privacy protection in e-Health and at describing a number of existing privacy enhancing techniques (PETs). The recognition that privacy constitutes a fundamental right is gradually entering public awareness. Because healthcare-related data are susceptible to being abused for many obvious reasons, public apprehension about privacy has focused on medical data. Public authorities have become convinced of the need to enforce privacy protection and make considerable efforts for promoting through privacy protection legislation the deployment of PETs. Based on the study of the specific features of Grid technology, ways in which PET services could be integrated in the HealthGrid are being analyzed. Grid technology aims at removing barriers between local and remote resources. The privacy and legal issues raised by the HealthGrid are caused by the transparent interchange and processing of sensitive medical information. PET technology has already proven its usefulness for privacy protection in health-related marketing and research data collection. While this paper does not describe market-ready solutions for privacy protection in the HealthGrid, it puts forward several cases in which the Grid may benefit from PETs. Early integration of privacy protection services into the HealthGrid can lead to a synergy that is beneficial for the development of the HealthGrid itself.

  10. Quantifying Differential Privacy under Temporal Correlations

    PubMed Central

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  11. Protecting Children's Online Privacy.

    ERIC Educational Resources Information Center

    Kresses, Mamie

    2001-01-01

    Discuss provisions of new federal Children's Online Privacy Protection Act that principals should know to protect student privacy on the Internet. Also discusses relevant provisions of the Family Educational Rights and Privacy Act. (PKP)

  12. Evaluation of Patients’ Rights Observance According to Patients’ Rights Charter in Educational Hospitals Affiliated to Mashhad University of Medical Sciences: Medical Staffs’ Views

    PubMed Central

    Sabzevari, Alireza; Kiani, Mohammad Ali; Saeidi, Masumeh; Jafari, Seyed Ali; Kianifar, Hamidreza; Ahanchian, Hamid; Jarahi, Lida; Zakerian, Mohsen

    2016-01-01

    Introduction To supply quality services and healthcare, it is evident that medical ethics and patients’ rights, while providing medical and healthcare services need to be observed. This study was conducted to evaluate observance of the Patients’ Rights Charter among medical staff of educational hospitals affiliated to Mashhad University of Medical Sciences. Methods This cross-sectional study was conducted in four educational hospitals in Mashhad on eighty physicians, nurses, nurse aids and medical students. Data were collected using a two-part inventory of patients’ rights, including demographic data and inventory of patients’ rights observance. Data analysis was conducted using SPSS-16 as well as descriptive statistics, independent t-test, chi-square, Spearman correlation coefficient and Pearson correlation. Results Mean age of subjects was 36.3±8.3. Observance of human rights was perfect by 84.4 percent of subjects. The highest amount of observance of patients’ rights was related to the area of respecting patients’ privacy and observing the principle of confidentiality, which was evaluated to be perfect by all subjects (100%). The lowest value of patients’ rights observance was related to presenting appropriate and adequate information for patients, which was perfect among 48.1% of subjects. There was no significant relation between personal details (age, gender, education and career) and observance of patients’ rights (p>0.05). Conclusion Although in this study, the observance of patients’ rights by medical staff is optimal in most areas, the area of providing appropriate and adequate information needs to be promoted. Therefore, it is suggested that more stringent regulatory policies be compiled and implemented to the items of Patients’ Rights Charter along with training courses, to strengthen medical staff’s awareness in this regard. PMID:27957310

  13. Student Privacy versus Campus Safety: Has Recent Legislation Compromised Privacy Rights?

    ERIC Educational Resources Information Center

    van der Kaay, Christopher D.

    This study highlights major legislation addressing campus safety and crime reporting and discusses its impact on a student's right to privacy. The 1974 Family Educational Rights and Privacy Act, commonly referred to as the "Buckley Amendment," was among the first pieces of legislation to address the notion of student privacy and confidentiality.…

  14. 75 FR 55335 - Privacy Act of 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... in a system of records in the possession or under the control of DHS by complying with DHS Privacy... 1974; Privacy Act of 1974: Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity Reporting Initiative System of Records AGENCY: Privacy Office, DHS. ACTION: Notice of...

  15. Teaching Information Privacy in Marketing Courses: Key Educational Issues for Principles of Marketing and Elective Marketing Courses

    ERIC Educational Resources Information Center

    Peltier, James W.; Milne, George R.; Phelps, Joseph E.; Barrett, Jennifer T.

    2010-01-01

    An "information privacy gap" exists in marketing education, with little research addressing the state of information privacy and how appropriate privacy strategies and tactics should be communicated to students. The primary purpose of this article is to provide educators an understanding of information privacy and how they can incorporate this…

  16. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privacy Act systems of records. 505.3 Section 505... AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems of... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute or...

  17. 12 CFR 216.6 - Information to be included in privacy notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 2 2011-01-01 2011-01-01 false Information to be included in privacy notices... SYSTEM PRIVACY OF CONSUMER FINANCIAL INFORMATION (REGULATION P) Privacy and Opt Out Notices § 216.6 Information to be included in privacy notices. Link to an amendment published at 74 FR 62925, Dec. 1, 2009. (a...

  18. 32 CFR 505.3 - Privacy Act systems of records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privacy Act systems of records. 505.3 Section... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.3 Privacy Act systems of records. (a) Systems... assigned to an individual. (2) Privacy Act systems of records must be— (i) Authorized by Federal statute or...

  19. 38 CFR 20.1200 - Rule 1200. Privacy Act request-appeal pending.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2012-07-01 2012-07-01 false Rule 1200. Privacy Act... VETERANS AFFAIRS (CONTINUED) BOARD OF VETERANS' APPEALS: RULES OF PRACTICE Privacy Act § 20.1200 Rule 1200. Privacy Act request—appeal pending. When a Privacy Act request is filed under § 1.577 of this chapter by...

  20. 12 CFR 40.9 - Delivering privacy and opt out notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 1 2011-01-01 2011-01-01 false Delivering privacy and opt out notices. 40.9 Section 40.9 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY PRIVACY OF CONSUMER FINANCIAL INFORMATION Privacy and Opt Out Notices § 40.9 Delivering privacy and opt out notices. (a) How to...

Top