Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Privacy laws

Medicine is the only profession that labors incessantly to destroy the reason for its existence. [Pg.67]

Acquire an understanding of the sunshine and open meeting laws. [Pg.67]

Safety professionals should be aware that there is a proscribed procedure for the individual to appeal any refusal by the federal agency in correcting the record. Specific monetary penalties are provided in this law if the federal agency acts in an intentional or willful manner to fail to maintain accurate records, and individual employees of the federal agency can be penalized for willfully disclosing prohibited records. Safety professionals should be aware that federal agencies may disclose or release records of individuals, with or without the individual s consent, in specific circumstances, in order to fulfill the requirements of the Freedom of Information [Pg.67]

Safety professionals should be aware that any person who knowingly and willfully requests or obtains any record concerning an individual from the federal agency under false pretenses shall be guilty of a misdemeanor and subject to a fine of not more than 5,000.00.  [Pg.68]


The European Union s Directive on Data Protection bars the movement of personal data to countries that do not have sufficient data privacy laws in place. Additionally, the US Health Insurance Portability and Accountability Act (HIPAA) sets national standards for the protection of health information, as applied to the three types of covered entities health plans, healthcare clearinghouses and healthcare providers who conduct certain healthcare transactions electronically. HHS OCR HIPAA Privacy (2003). This law was enacted in recognition of the fact that advances in... [Pg.554]

COMPLEXITIES OF INFORMED CONSENT FOR COMPLIANCE TO PRIVACY LAWS... [Pg.240]

In general, personal data are prohibited from being shared without consent, and typically collection of personal data must be legitimately explained as to its scope and purposes. Here is an example list of well-known and oft-cited privacy laws around the world ... [Pg.248]

When first announced, the HIPAA regulations threw some medical researchers and a few designers of medical information systems into a panic mode because of the room for multiple interpretations due to the ambiguity and the absence of best practices. Canadian and European regulations are much more specific and rigid, and they tend to be clearer as to interpretation that suggests best practices. These privacy laws also cover all the industries, not just healthcare industry. [Pg.249]

The components can be extended for machine learning based on cybernetics by reflecting the output from the component on the control input so that the component can adjust the functional behavior based on the result of the previous processing. This facility enables the component to learn from experience and dynamically adjust its behavior and thus improve the intelligence and dynamic adaptability of the software component as shown in the Figure 8.10. For example, a software component for de-identification of protected personal information to comply with the privacy laws in one country or a specific industry may need to be re-developed, as shown in the Figure 8.11, to address the specific requirements in other countries, since de-identification rules are subject to the statutory requirements in each country and to the institutional privacy policies. [Pg.380]

When the new approach for dynamic component modeling is applied to the software component for de-identification of protected personal information to comply with the privacy laws, the same component can be used for other... [Pg.380]

The traditional computing model where data are exchanged across the network becomes inefficient and inadequate when vast amounts of data are involved or when the data need to be protected for compliance to privacy laws. The traditional computing model where software is kept stationary on a designated system becomes not only inefficient but inadequate for pervasive computing environment. [Pg.383]

In translational clinical research, in particular, researchers cannot access clinical information in health records that are protected by privacy laws and are required to be safeguarded within the institutional premises. Because of the limited accessibility to human data, clinical researchers instead heavily rely... [Pg.383]

R.Gellman, Does privacy law work , in P.E.Agre M.Rotenberg (eds) Technology and privacy the new landscape (Cambridge Mass. MIT Press, 1997). [Pg.280]

For this study, we analyzed all records of injirry acciderrts from the natiortal Austrian accident database, where cyclists were involved. The data covers the years 2002 until 2011 since data for 2012 was not available at the time of writing. While studies [ELV 99, LAN 03] recommend the use of hospital data for safety assessments, police data for accidents was used in this study since hospital data is not available for analysis in Austria. While accident insurance providers do collect data from hospitals, current data privacy laws do not allow for a consolidation of accident data from police and hospital sources. For the city of Vienna, the resulting dataset contains a total of 6,287 accidents. The database consists of several tables which describe the accidents. The accident table contains information about the location of the accident, the weather conditions, as well as the date and type of the accident. The participants table contains information about the participants such as age, degree of injury and type of vehicle. Table 10.4 shows the trends of the yearly nnmber of accidents. Fignre 10.1 presents a comparison of the trends of accident counts and bicycle counts based on the initial values for 2002. In the analysis time frame between 2002 and 2011, the data show no correlation between trends of accident counts and bicycle counts (R = 0.03). This suggests the validity of the concept of safety in numbers , which states, that an increase in the modal share of bicycles leads to a decrease in the number of accidents per cycled kilometer. [Pg.151]

Some carriers will utilize the services of their insurance providers to request their MVRs, and yet others may use a background investigation service to request the information on their behalf You will need to look at your state privacy laws to see if a third-party provider can assume this role on your behalf. [Pg.300]

Editor s Note It is important, as you develop any company policy, to be aware of state and local laws that may be more stringent than federal standards. This would include labor and privacy laws. If you have questions regarding what you can and cannot include in a policy, it may be to your advantage to have an attorney review its contents. [Pg.304]

Edmund Sanders, FTC to Drop Push for More Privacy Laws, LAT, October 2, 2001, at Ci John Schwartz, Government is Wary of Tackling Online Privacy, NYT, September 6, 2001, at Cl (AEI study) Stephen Labaton, White House and Agency Split on Internet Privacy, NYT, May 23, 2000, at Ci (Clinton position) Jeri Clausing, Fate Unclear for F.T.C. s Privacy Push, NYT, May 22,2000, at Ci (lobbying effort). [Pg.344]

Since the data contained in equipment such as body scanners may be subject to trans-border storage, there is a compelling need to consider the introduction of uniform privacy laws in order that the interests of the data subject and the data seeker are protected. Although complete uniformity in privacy legislation may be a difficult objective to attain (as has been the attempt to make other aspects of legislation uniform), it will be well worth the while of the international community to at least formulate international Standards and Recommend Practices (in the lines of the various ICAO Annexes) to serve as guidelines of State conduct. After all, as Collin MeUors pointed out ... [Pg.204]

In the body scanning process, there is an implicit link between ownership rights and privacy. Data protection legislation, including data privacy laws have been enacted by many countries throughout the world for two main reasons protection of privacy and ensuring of access by the owner to his information stored in a... [Pg.204]


See other pages where Privacy laws is mentioned: [Pg.649]    [Pg.561]    [Pg.738]    [Pg.1]    [Pg.145]    [Pg.189]    [Pg.190]    [Pg.244]    [Pg.248]    [Pg.249]    [Pg.250]    [Pg.253]    [Pg.336]    [Pg.33]    [Pg.77]    [Pg.67]    [Pg.69]    [Pg.71]    [Pg.358]    [Pg.279]    [Pg.280]    [Pg.281]    [Pg.295]    [Pg.305]   
See also in sourсe #XX -- [ Pg.240 ]




SEARCH



Privacy

© 2024 chempedia.info