Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Privacy issues

Ware WH. Contemporary privacy issues. In Bynum TW, Maner W, John L. Fisher JL, editors, Computing and privacy. New Haven Southern Connecticut State University Press, 1992 4-19. [Pg.727]

Figure 22 Artist s rendition of a person with concealed weapons seen using an ultra-low-dose backscatter system. Imaging is effective, but radiation safety and privacy issues may arise. Figure 22 Artist s rendition of a person with concealed weapons seen using an ultra-low-dose backscatter system. Imaging is effective, but radiation safety and privacy issues may arise.
The US Constitution, federal statutes and regulations, and state law combine to govern the collection, use, and disclosure of information. The Constitution provides certain privacy protections, but does not explicitly protect information privacy. Generally, federal law addresses privacy issues and personal information by topic (e.g., education, telecommunications, privacy, health information, motor vehicle, communications and communications records, financial and credit information, children s online (Internet) privacy) The individual s interests are usually balanced with the government s need, with authorization for personal information normally being sought through warrants, subpoenas, and court orders [120]. [Pg.264]

The lack of a capability to screen for explosives hidden on an individual is a major vulnerability in aviation and general security. Personal privacy issues and perceived health risks have deterred the use of bulk detectors, such as X ray, X-ray backscatter, and millimeter wave, for screening of individuals for concealed explosives. Consequently, the TSA is focused on trace detection as the best solution for passenger screening in airports. The TSA has determined that individuals carrying as little as 1 lb of concealed explosives get sufficiently contaminated to be detectable by portal devices that use trace detectors. The level of contamination on an individual s exterior clothing that can be routinely detected by the best portal devices is about 1 pg or about 1 part in 109 of the explosive mass. [Pg.240]

New kinds of viruses, security, safety, privacy issues New kinds of businesses... [Pg.230]

Depending on the needs of the individual pharmacy, several different types of insurance policies may be required to provide adequate risk protection for the business. The geographic location, type of practice, and services offered will influence the types of insurance needed. The risk management process is a continuous process, and periodic evaluations are necessary to address new or emerging risk threats to the pharmacy. Emerging threats discussed later in this chapter exemplify how recent changes in health care practices (privacy issues) and technology create new and different risk threats to the pharmacy. [Pg.493]

Even at the individual level, there are stakeholders. For some, it is as a customer for whom the standard may represent an unnecessary expense. For others, it may represent a peripheral or related change, such as environmental or privacy issues. [Pg.35]

The controversy over genetic testing is closely tied to costs (who will pay ) and related privacy issues (if the insurance company pays, will they have access ). As drug products become increasingly customized to genetic makeup, these issues will have to be resolved. In the next 10 years, a copy of your genetic profile is likely to be as common—an as accessible—as your cholesterol score. [Pg.365]

We discussed diversity quotients as a strategy, talking about the value and limitations of quantitative data, and about the transparency of data. That is a very important issue, as we all know today, because of the arguments about privacy versus transparency. In the best cases, private companies are required by law, by practice, and by stockholders to be much more transparent than academic institutions have to be at the present time. To what degree will social changes be forcing more transparency on academic institutions, and what are the implications of that Take MIT s secret data. What implications would such transparency have for faculty privacy There are many privacy issues. [Pg.127]

The challenge of a successful e-MPF implementation is to develop a transparent, seamless alliance-based value network (Bakos Brynjolfsson, 1998) that allows the customer to choose the best product combination for his or her personal needs without having to research the complex supplier market. Convenience and flexibility must be provided without compromising on security and privacy issues. Since e-MPF services have just been launched, it... [Pg.12]

Key to the development of a biomedical informatics architecture is the ethics and privacy issues inherent in any healthcare endeavor. Even though the IT industry sees this as an opportunity not a contraindication, the handling of genotypic and phenotypic data requires a high level of security to protect its highly sensitive and personal nature. Conformity to the statutory requirements for the protection of privacy will require the biomedical informatics field to be developed with the issues of privacy and security in mind. [Pg.145]

R. O Harrow Jr., Plans access to pharmacy data raises privacy issue, Washington Post (27 Sept. 1998) Al. [Pg.54]

Software for Manufacturing Group), 607 Prisons, personnel scheduling for, 1744, 1760 Privacy issues and anonymity, 267-268 current measures to protect, 269 with networks, 232 tools for, 268-269 visual/acoustical requirements, 1205 Private equity, 757, 759-761 Private networks, 237, 238, 243-244 Privatization, 38 Proactive pricing, 667... [Pg.2765]

Prudent safety professionals should exercise caution at any time individual privacy issues are involved in any situation. Safety professionals should review any privacy issues with their human resources department or legal counsel before taking any action that may violate any of the protections provided to applicants or employees and their personal or medical information. [Pg.70]

Engineers ability to address ethical issues related to technology advancement, e.g., privacy issues in computer software/conununication and... [Pg.104]

Main security solutions proposed to address security requirements of patient-monitoring systems reside in the areas of encryption and secure communication. Access-control techniques need to be developed to address the privacy issues in eHealth applications. In particular, procedures for authentication (user identification) and authorization (access right checking) are essential for acceptable and sustainable eHealth applications. The authentication function ensures that users are indeed who they claim to be. Therefore, an unauthorized party should not be able to receive or access a patient s medical data. Various techniques being considered include a combination of different authentication atomics. These atomics include biometric information (fingerprint, retina scan, typing pattern, etc.) and information the user knows (mother s maiden name), user possessions (e.g., smart card identification systems), and may also include current location and/or the end-user terminal identity (media access control [MAC] hardware address) and time of access. [Pg.360]

The cameras used for VSAR were in the lobby, the living room, and the kitchen. Due to privacy issues, they were not used in the bedroom. For WSAR, we developed the MASoL, which is a low-cost, low-energy consumption sensor device. MASoL contains 13-axis sensors, gathering many kinds of behaviors and storing them. In addition, we also used the OUAR approach with an RFID-based sensor, with RFID tags attached to the book and cup. [Pg.617]

With any increase in the involvement of DNA sequencing in forensics comes the likelihood that debate will intensify concerning privacy issues regarding the use of sequence information. Unlike commonly used methods of PGR analysis, SNP determination will reveal certain details about suspects that could he open to abuse. Ethical issues involving the use and dissemination of DNA data will have to be resolved as the methods of DNA analysis continue to evolve. [Pg.520]

Social acceptability refers to the context in which the system will be used that is to say, how well the system suits the social habits of the user (e.g., in terms of ethics, privacy issues). [Pg.290]

Abstract. Since automotive IT is becoming more and more powerful, the IT-security in this domain is an evolving area of research. In this paper we focus on the relevance of the black box perspective in the context of threat analyses for automotive IT systems and discuss typical starting points and implications of respective attacks. We put a special focus on potential privacy issues, which we expect to be of increasing relevance in future automotive systems. To motivate appropriate provision for privacy protection in future cars we discuss potential scenarios of privacy violations. To underline the relevance even today, we further present a novel attack on a recent gateway ECU enabling an attacker to sniff arbitrary internal communication even beyond subnetwork borders. [Pg.145]

Increasing Attacks on Privacy Issues in the Automotive Domain... [Pg.146]

Even current automotive systems store and process a lot of information which allow significant statements about the users, their habits and behaviour. We do not neglect the comfort offered this way to the users, but also potential threats of this trend have to be discussed increasingly, e.g. to also address privacy issues. Exemplary references to person related or person relatable data are listed in the following ... [Pg.146]


See other pages where Privacy issues is mentioned: [Pg.716]    [Pg.135]    [Pg.69]    [Pg.122]    [Pg.83]    [Pg.105]    [Pg.277]    [Pg.683]    [Pg.206]    [Pg.333]    [Pg.342]    [Pg.38]    [Pg.67]    [Pg.119]    [Pg.136]    [Pg.108]    [Pg.404]    [Pg.423]    [Pg.1664]    [Pg.468]    [Pg.146]    [Pg.147]    [Pg.269]    [Pg.98]   
See also in sourсe #XX -- [ Pg.105 , Pg.106 , Pg.107 , Pg.108 ]




SEARCH



Ethical issues privacy, confidentiality

Privacy

Privacy ethical issues

© 2024 chempedia.info