Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Evaluation of Security

Security personnel must conduct ongoing assessments of security needs and issues. The safety and/ or the care environment committees should establish performance standards and review effectiveness annually. The review should address the following areas  [Pg.275]


Recommendation 15. The Chemical Materials Agency should conduct an overall evaluation of security requirements, maintenance implications, and impending evolutionary changes in the basic computer operating systems (Windows and Linux) used at chemical agent disposal facilities. A migration path that drives toward a minimally heterogeneous and maximally robust environment should be identified and considered for implementation. (Tier 3)... [Pg.55]

Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security... [Pg.89]

The sponsor and investigator, as appropriate, must retain all essential documents relating to the trial for at least 5 years after its completion. Documents should be securely archived, with restricted access to maintain subject confidentiality. Collectively, these constitute the Trial Master File, and facilitate any audit and evaluation of... [Pg.88]

Axisonitrile-1 (1) and axisothiocyanate-1 (2) were the first pair of NC/NCS compounds isolated from Axinella cannabina, see Introduction [1]. That both compounds possessed a new skeleton was evident, when 1 was reduced (Li/EtNH2) to axane (6). Other transformations involving the exocyclic methylene which survived selective reduction (Na/NH3) of 1, coupled with evaluation of the lHNMR data, supported its gross structure. Confirmation of 2 was secured when 1 was heated with sulfur and the resultant purified product found to be identical to the natural product. [Pg.50]

Das, T. K., Kim, H. J., Maitra, S. (2005). Security evaluation of generalized patchwork algorithm from cryptanalytic viewpoint. Lecture Notes in Artificial Intelligence, 3681, 1240-1247. [Pg.18]

Security Vulnerability Assessment A security vulnerability assessment is intended to identify security vulnerabilities from a wide range of threats ranging from vandalism to terrorism. With the recognition of threats, consequences, and vulnerabilities, the risk of security events can be evaluated, and a security management system can be organized that will effectively mitigate those risks. [Pg.106]

R.F. Eilbert, Development and evaluation of simulants for x-ray based explosive detection systems, in Proc. 2nd Explosives Detection Symposium Aviation Security Conference, W.H. Makky (ed.), 12-14 November 1996, Adantic City, NJ, FAA (1996) 49—54. [Pg.130]

Direction of imovation (from the standpoint of the SubChem research group - 6b ) The substitution of ceramic fibres in the constmction of catalytic converters would avoid exposure (manufacture and recycling) to potentially carcinogenic fibres. Inclusion of specialised official bodies in the evaluation of alternative materials is one step towards greater security of direction. [Pg.87]

Applicants are free to solicit advice from individual Member States and according to various surveys conducted by the European Federation of Pharmaceutical Industries and Associations, they often do. Apart from the FDA, these surveys reveal, the EU Member States most often consulted are Germany, France, Sweden and the United Kingdom. Flowever, it is often important to secure a pan-European advice. Article 51 of Council Regulation EEC/2309/93 requires the EMEA to provide the Member States and the institutions of the Commimity with the best possible scientific advice on any question relating to the evaluation of the quality, the safety and the efficacy of medicinal products for human... [Pg.509]

All aspects of the electronic records and electronic signature systems in place have been designed to provide a level of security and control equal to or exceeding the equivalent controls inherent to manual (paper) systems. This equivalency principle provides evaluative criteria for all electronic signatures. There is not a mandate to make a system perfect, error-free, or completely hacker-proof, although these are all appropriate ultimate goals rather, sufficient controls are required to assure that an electronic system is as secure or more secure than an equivalent manual system. [Pg.132]

In order to secure a continuous quantitative analysis of the outlet gas mixture, including all the species necessary for the evaluation of the nitrogen atomic balance, namely NH3, NO, N02 (reactants), N2 and N20 (products), the gases exiting the reactor were analyzed both by a Mass Spectrometer (MS) (Balzers QMS200) and by a UV analyzer (ABB Limas 11HW) in a parallel... [Pg.167]

Another important activity is the process to evaluate new security technologies and their integration with computer systems. The procedural controls implemented as a result of a risk analysis provide a starting point to look for technologies that can replace procedural controls. These procedural controls are the result of security-related implementation requirements identified during the risk analysis. [Pg.125]

The evaluation of computer systems performing regulated operations is the first phase to achieving an organized, prioritized, and balanced Part 11 Remediation Project approach. The objective of the evaluation is to identity the system s functional and/or procedural gaps results of the evaluation will determine whether the operational, maintenance, or security procedures specific to the system will provide a controlled environment, which ensures the integrity of the electronic records and/or signatures as stated in the Part 11 requirements. [Pg.132]

Similarly, WDYK Forensics made use of the popularity of the CSI television series to draw science students into interdisciplinary scientific learning. The application of a wide variety of research-grade instrumentation to problem solving, combined with a mock trial, gives students the opportunity both to generate relevant data and to critically evaluate the security of their conclusions. Inquiry-oriented science seminars such as this could focus on a wide variety of applications in... [Pg.190]

In children, the causes of this despair and loss of hope are almost always apparent in the first consultation session, providing it involves the family and includes an evaluation of the child s school life. In children, depression almost always revolves around problems at school and in the home, everything from bullying at school and abuse at home to academic school failure, painful peer relationships, and family conflicts over how to raise the child. The treatment of depression in children requires, first, finding out how and why the child became depressed and, second, helping the child, the family, the school, and all the other participants in the child s life restore hope in the child. Children have many needs, including a stable family, rational discipline, unconditional love, stimulating educational environments, physical security, and emotional safety. The object of therapy is to identify the unmet needs and to help adults meet them. [Pg.135]

Berkeley Scarifier as described by Haley et al. (1974). Materials are tested undiluted, and 0.5 ml liquid, or 0.5 g solid or semisolid material is applied. Each test site is covered with two layers of 1-in square surgical gauze secured in place with tape. The entire trunk of the animal is then wrapped with rubberized cloth or other occlusive impervious material to retard evaporation of the substances and hold the patches in one position. The wrappings are removed 24 h after application and the test sites are evaluated for erythema and edema using a prescribed scale. Evaluations of abraded and intact sites are recorded separately. Test sites are evaluated again 48 h later (72 h after application) using the same scale. [Pg.377]

All the above data may not be available from the literature. The data which are necessary but unobtainable need to be secured by calculation or experiment For the preliminary evaluation of hazardous reactive chemicals, data sheets indicating hazards are recommended. Although no complete set of data sheets is available at present, Material Safety Data Sheets (MSDS) 01 designated by OSHA, the Department of Labor of the U.S.A. and Chemical Data Handbooks 10 issued by the Tokyo Fire Agency contain some of this data. A hazard data base which can be used for the compilation of complete data sheets should be established in the near future. [Pg.21]


See other pages where Evaluation of Security is mentioned: [Pg.21]    [Pg.275]    [Pg.244]    [Pg.244]    [Pg.53]    [Pg.90]    [Pg.21]    [Pg.275]    [Pg.244]    [Pg.244]    [Pg.53]    [Pg.90]    [Pg.433]    [Pg.47]    [Pg.207]    [Pg.579]    [Pg.1057]    [Pg.13]    [Pg.19]    [Pg.4]    [Pg.24]    [Pg.178]    [Pg.70]    [Pg.220]    [Pg.106]    [Pg.14]    [Pg.84]    [Pg.155]    [Pg.105]    [Pg.161]    [Pg.491]    [Pg.28]    [Pg.164]    [Pg.293]    [Pg.76]    [Pg.134]    [Pg.67]   


SEARCH



© 2024 chempedia.info