Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Information privacy

HSPD - 24 Biometrics for Identification and Screening to Enhance National Security. Establishes a framework to ensure that federal executive departments use mutually compatible methods and procedures regarding biometric information of individuals, while respecting their information privacy and other legal rights. [Pg.55]

The US Constitution, federal statutes and regulations, and state law combine to govern the collection, use, and disclosure of information. The Constitution provides certain privacy protections, but does not explicitly protect information privacy. Generally, federal law addresses privacy issues and personal information by topic (e.g., education, telecommunications, privacy, health information, motor vehicle, communications and communications records, financial and credit information, children s online (Internet) privacy) The individual s interests are usually balanced with the government s need, with authorization for personal information normally being sought through warrants, subpoenas, and court orders [120]. [Pg.264]

Health Care Portability and Accountability Act prohibits use of geneuc information in certain health-insurance eligibility decisions, requires DHHS lo enforce health-information privacy provisions See http //w ww.ornI.gov/hgmh/publicat/hgn/... [Pg.719]

Privacy. Respect the privacy and confidentiality of personal data submitted to the site by the visitor. Confidentiality of data relating to individual patients and visitors to a medical/health Web site, including their identity, is respected by this Web site. The Web site owners undertake to honor or exceed the legal requirements of medical/health information privacy that apply in the country and state where the Web site and mirror sites are located. [Pg.91]

HIPAA is the acronym for the Health Insurance Portability and Accountability Act of 1996. HIPAA evolved as a result of the rapid evolution of health information systems technology as well as the challenges for maintaining the confidentiality of health information. HIPAA was introduced initially as the Kennedy-Kassebaum bill, an outgrowth of the Clinton administration s attempt to revamp the health care system. The result in HIPAA was an effort to streamline and standardize the health care system and to establish the privacy of subject information. The result of this effort was the issuance of the final HIPAA rules in August, 2002, which establish the requirements that prevent the disclosure of individually identifiable health information (Privacy Rule) (1) without authorization from the subject. An accidental posting of individuals health records and fraudulent use of medical records precipitated the passage of HIPAA. [Pg.478]

A. J. Rohm and G. R. Milne. 2002. Just what the doctor ordered The role of information sensitivity and trust in reducing medical information privacy concern. Journal of Business Research 5757 1-12. [Pg.548]

Ethical Issue The key ethical issue in this case is how Diane should respond to the client s choice of a DBMS design that offers weak security put differently, one that offers a low level of informational privacy protection for client s employees. [Pg.65]

Genetic information privacy is a subset of broader questions about the privacy of medical and other personal information. People value privacy for instru-... [Pg.75]

Son J, Kim SS (2008) Internet users information privacy-protective responses a taxonomy and a nomological model. MIS Q 32(3) 503-529... [Pg.218]

U.S. Department of Health and Human Services, n.d., Health Information Privacy. Available from http //www.hhs.gov/ocr/privacy/ [cited July 22,2014]. [Pg.381]

The seminal article on privacy remains S.Warren L.Brandeis, The rigfit to privacy %90) A Harv L Rev 193. See also, e.g. A.Westin, Privacy andfreedom (Bodley Head, 1967) R.Wacks, Personal information privacy and the Law (Clarendon, 1993). For an accessible article in the context of the present discussion, see F.G.B.Aldhouse, Data protection, privacy and the media... [Pg.279]

Data protection is only one aspect of privacy which may be compromised by the increasing nse of computers and computer netwoiks. As discussed above, whereas anonymity on the Internet may be a positive asset in the protection of informational privacy, it may also provide a perfect shield for more scurrilous activities. Even without the cover of anonymity, the various methods available for the dissemination of information on computer netwoiks provide fertile ground for the propagation of opprobrious material about others. The unicpie characteristics of computer netwoiks in being able to communicate information to large numbers of people in different geographical locations almost instantaneously may well lead to the Internet becoming, if not quite a safe haven, at least the preferred choice for such activity. [Pg.301]

Student information is protected by other agencies and groups in addition to FERPA. The Departments of Agriculture, Health and Human Services, and Justice defend information privacy and protect the information of students in schools. State and local entities may require safeguards for handling student information in a secure manner. Professional standards of ethical practice of school doctors and nurses, psychologists, and other professionals may also establish privacy restrictions (McCallister et al., 2010). [Pg.83]

Culnan, M.J., Armstrong, P.K. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust An Empirical Investigation. Organization Science 10, 104—115 (1999)... [Pg.168]

Cavoukian, A., Winn, C. (2012). Applying privacy by design best practices to SDG E s smart pricing program. Information Privacy Commission, Ontario. Retrieved from http //www.ipc. on.ca/images/Resources/pbd-sdge.pdf... [Pg.304]

Stewart, K. A., Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument Information Systems Research, 75(1), 36—49. [Pg.54]


See other pages where Information privacy is mentioned: [Pg.26]    [Pg.181]    [Pg.68]    [Pg.68]    [Pg.218]    [Pg.75]    [Pg.75]    [Pg.76]    [Pg.76]    [Pg.77]    [Pg.77]    [Pg.77]    [Pg.280]    [Pg.476]    [Pg.76]    [Pg.121]    [Pg.203]   
See also in sourсe #XX -- [ Pg.280 ]




SEARCH



Privacy

© 2024 chempedia.info