Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Confidentiality requirement

This need for more science and engineering in catalyst shaping is unfortunately counterbalanced by the confidentiality requirements of a core aspect of the catalyst manufacturers business. If academia and industry find a suitable cooperation framework in this area, the common benefit will be an even more rational design of catalysts. [Pg.72]

As with most of a company s information where proprietary, trade secrets, or a facilities security may be involved, process hazard analysis reports may be considered confidential information. Release outside the company should be discussed with the legal staff or by the contractor agreements made with outside personnel participating in the study. A suitable distinction should be applied to the cover of any review produced documents whenever the confidentiality requirement is required. [Pg.62]

Specification of confidentiality requirements during the audit process. [Pg.927]

Privacy requirements. The only privacy requirement that has so far been considered is the invisibility of invisible signature schemes. (Recall that blind signature schemes and schemes without subliminal channels are not signature schemes in the sense of the minimal requirements.) One could also add normal confidentiality requirements with respect to outsiders. [Pg.61]

One could also consider normal confidentiality requirements in the interest of all participants in a transaction, e.g., that attackers do not learn anything about the messages that honest users authenticate for each other. In general, one woidd use combinations of normal signature schemes and secrecy schemes inside the system, but, as mentioned under Directedness of Authentication in Section 5.2.8, this will not always be trivial. [Pg.103]

The FDA will not publicly disclose the existence of a request for orphan designation, but there are certain conditions that apply, including whether the sponsor has made it publicly known he has orphan designation. The FDA will determine whether the disclosure can be made in accordance with confidentiality requirements of INDAs and NDAs. Once public availability eligibility has been determined, FDA will publish a list in accord with part 20 and section 314.430 of the CFR and other applicable statutes and regulations [10]. [Pg.219]

Confidentiality is an important part of any testing program. You don t want to let just anyone access sensitive testing information. This Subpart explains the confidentiality requirements of the DOT testing regulations. [Pg.179]

Role of Communications Specialists. The Office of Patient Safety notifies the communications specialists of events to facilitate external communications, including contact with the media and requests for public information. The communications staff also provides consultation regarding communication with the family and staff about the event and assists in internal communication of appropriate information in keeping with patient and peer review confidentiality requirements. [Pg.293]

Electronic data logging and monitoring equipment Electronic data transfer methods and data storage options Information security and confidentiality requirements Internet resources Project management software... [Pg.71]

Although both pilots and a small number of non-pilots may act as LOSA observers (ICAO, 2002), the decision was made to include only peer train drivers in the team of CORS observers. The rationale behind this decision was to promote trust in the program, to maintain role clarity of senior train crew, and to differentiate CORS observations from other compliance-based monitoring or assessment. Observers were selected via expressions of interest, and undertook an interview and written work sample activity, designed to assess their appreciation of confidentiality requirements, ethical behaviour, observation skills, written communication skills, accuracy of coding information, and willingness to follow rules and procedures. Observer selection results were endorsed by train crew union representatives via the CORS Steering Committee. [Pg.184]

You can also find wisdom relative to your work outside your organization. Potential advisors include professional colleagues, parents, religious leaders, and former professors and other teachers. However, in contemplating seeking external advice on internal matters, be careful to not violate ethical provisions or confidentiality requirements such as revealing confidential information about a client to a third party in such a way as to violate client confidentiality requirements. For example, the NSPE Code of Ethics in Section II-l-c states that Engineers shall not reveal facts, data, or information without the prior consent of the client or employer except as authorized or required by law or this Code. ... [Pg.371]

To apply the confidentiality requirement pattern, subclasses of StoredData or TransmittedData, Stakeholder, and Attacker must be derived and described in detail. For example, a special TransmittedData may be the PIN of a bank account, a special Stakeholder may be the bank account owner, and a special Attacker may be the class of all persons with no permission, who want to withdraw money and have access to all external interfaces of the machine. The instances of Stakeholder and Attacker must be disjoint. The Stakeholder is referred to, because we want to allow the access only to Stakeholders with legitimate interest [5]. The reference to an Attacker is necessary, because we can only ensure confidentiality with respect to an Attacker with given properties. [Pg.315]

Even if data is usually modeled using lexical domains, we derive StoredData or TransmittedData from CausalDomain, because in some cases the storage device and not the data is modeled. A LexicalDomain is a special CausalDomain. The following patterns can be used to define confidentiality requirements ... [Pg.315]

Gilrses, S., Jahnke, J.H., Obry, C., Onabajo, A., Santen, T., Price, M. Eliciting confidentiality requirements in practice. In GASCON 2005 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, pp. 101-116. IBM Press (2005)... [Pg.325]

Maintaining confidentiality during assistance is assured through compliance with WSRC-1-03. This procedure requires that confidentiality be maintained for all personnel referred to the medical department or requesting services offered by the Employee Assistance Program. RD-1 RRD specifically states the confidentiality requirements associated with the EAP. WSRC-1-03 also requires a mechanism be in place for keeping supervision informed if an employee is found to be unfit for duty during assistance. [Pg.500]


See other pages where Confidentiality requirement is mentioned: [Pg.608]    [Pg.370]    [Pg.518]    [Pg.314]    [Pg.374]    [Pg.103]    [Pg.66]    [Pg.562]    [Pg.10]    [Pg.288]    [Pg.262]    [Pg.195]    [Pg.520]    [Pg.176]    [Pg.315]    [Pg.76]    [Pg.273]    [Pg.114]    [Pg.203]   
See also in sourсe #XX -- [ Pg.61 , Pg.103 ]




SEARCH



© 2024 chempedia.info