Powered by Deep Web Technologies
Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Freedom of Information Act (FOIA) and Privacy Act Requests |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests Calibration Facilities Ecosystem Management Team Environmental...

2

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information ActPrivacy Act Requests Home > About Us > Our Operations > NNSA Office of General...

3

U.S. DEPARTMENT OF ENERGY PRIVACY ACT INFORMATION REQUEST  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PRIVACY ACT INFORMATION REQUEST PRIVACY ACT INFORMATION REQUEST (NOTE: Use of this form is recommended, but is not mandatory) To request Information or Action under the Act, complete appropriate Items in Part I. and establish identity in accordance with instructions on Reverse Side. Retain copy; submit original to the appropriate Privacy Act Officer at the U.S. Department of Energy Headquarters or Field location. . Fax PA Form to 202-586-8151 Attention: Privacy Act Office. NOTE: Records will be provided in CD format unless otherwise stated. Part II is For Agency Use Only. FALSE STATEMENTS SUBJECT TO CRIMINAL PENALTIES. PLEASE SEE REVERSE SIDE. (Please Print) PART I - REQUESTER (Please Print)

4

Freedom of Information Act (FOIA) and Privacy Act Requests | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information can be found at http://energy.gov/management/office-management/operational-management/freedom-information-act. Privacy Act Requests Privacy Act requests can not be submitted electronically. They must be submitted in writing or in person to: Cathy Harrell U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 Be sure to include as much information as you can about when and where you worked, what records you are requesting, sign the request, and include copies of 2 forms of ID or a photo ID. You must either have your request notarized or 1) acknowledge that you understand the criminal penalty in the Privacy Act for requesting or

5

Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Privacy Act Code of Federal Regulations (CFR) for the Privacy Act is 10CFR 1008 Privacy Act of 1974 and Amendments (as of Jan 2, 1991) From GPO US Code on CD-ROM (GPO S/N 052-001-004-00439-6) $30.00 -CITE- 5 USC Sec. 552a -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -EXPCITE- TITLE 5 PART I CHAPTER 5 SUBCHAPTER II -HEAD- Sec. 552a. Records maintained on individuals -STATUTE- (a) Definitions. - For purposes of this section - (1) the term 'agency' means agency as defined in section 552(e) (FOOTNOTE 1) of this title; (FOOTNOTE 1) See References in Text note below. (2) the term 'individual' means a citizen of the United States or an alien lawfully admitted for permanent residence (3) the term 'maintain' includes maintain, collect, use, or disseminate;

6

FOIA/Privacy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act/Privacy Act Freedom of Information Act/Privacy Act The Oak Ridge Office of Chief Counsel is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. DOE continuously gathers site specific information about its facilities and record repositories. Links to DOE sites and major contractors are found at Energy.gov. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here or on another Department website, submit a Freedom of Information Act request electronically.

7

The Privacy Act of 1974  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Act of 1974 Privacy Act of 1974 The Privacy Act of 1974, 5 U.S.C. §552a, governs an agency's collection, storage, and use of information about an individual. The Privacy Act protects the privacy of individuals by establishing fair information practices for the collection, maintenance, use, and dissemination of information by federal agencies. Frequently Asked Questions Who is an individual for the purposes of the Privacy Act? A (living) citizen of the United States or an alien lawfully admitted for permanent legal residence.  Deceased individuals are not covered by the Privacy Act, and their executors or next-of- kin can not pursue a Privacy Act claim on their behalf.

8

Privacy Act Statement | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Statement | National Nuclear Security Administration Statement | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Statement Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Statement Privacy Act Statement Agency forms used to collect personal information protected by the Act must

9

NETL: Your Rights under the FOIA, the Privacy Act, and other Privacy Laws  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA/Privacy Act FOIA/Privacy Act Your Rights under the FOIA, the Privacy Act, and other Privacy Laws The Freedom of Information Act and Privacy Act Division/Office is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOIA) and the Privacy Act (PA), 5 U.S.C. 552 and 5 U.S.C. 552a, respectively. The resources on these pages are provided to aid in finding answers to your questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOIA request. If the information is not available here, submit a Freedom of Information Act request electronically. To assist obtaining publicly available information, we suggest you first conduct a search on the specific topic or information you are seeking using

10

NETL: Contact Info and Privacy Act Advisory  

NLE Websites -- All DOE Office Websites (Extended Search)

Contact Info and Privacy Act Advisory To contact us: National Energy Technology Laboratory 626 Cochrans Mill Road P.O. Box 10940 Pittsburgh, PA 15236-0940 Phone: 412-386-6167 PRIVACY ACT ADVISORY: Authority: 5 U.S.C. 301, 5 U.S.C. 552, Freedom of Information Act (FOIA); and Title 10, Code of Federal Regulations, Part 1004. Purpose: To allow individuals to file electronic FOIA requests; to track all FOIA requests from receipt to response to compile statistics for the Annual FOIA Report; to research and respond to FOIA requests; to maintain case files to comply with records disposal requirements; and to maintain an administrative record to support any litigation. Routine Use: Records related to the FOIA request will be maintained in DOE-55 "Freedom of Information and Privacy Act (FOIA/PA) Requests for Records." A record

11

Privacy Act | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Privacy Act Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act Print Text Size: A A A RSS Feeds FeedbackShare Page General Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

12

How to Submit a Privacy Act Request | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Submit a Privacy Act Request How to Submit a Privacy Act Request Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Compilation of Systems of Records Energy Employees Occupational Illness Compensation Program Act (EEOICPA) How to Submit a Privacy Act Request Privacy Act Request Form .pdf file (99KB) Reference Links Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Privacy Act How to Submit a Privacy Act Request Print Text Size: A A A RSS Feeds FeedbackShare Page Related Links Privacy Act Request Form .pdf file (99KB) You may request your own Privacy Act records by submitting a request in

13

FOIA Reading Room - privacy act  

NLE Websites -- All DOE Office Websites (Extended Search)

Reading Room - pricacy act Reading Room - pricacy act CH Frequently Requested Documents Under FOIA Administrative Electronic FOIA Form Privacy Act Advisory (Microsoft Word(tm) document) DOE-CH Government Purchase Card Cardholders: December 2012 CH Organizational Chart: Current Version Policies and Procedures - Office of Science (including Chicago Office) Office of Hearings and Appeals Decisions Department of Justice Cases and Legal Documents Department of Energy Directives DOE Office of Inspector General Reports Responses Under FOIA FY10 Management and Operating Contracts "FY2012 Laboratory Performance Report Cards" The following management and operating prime contracts under the jurisdiction of DOE-CH have been renewed and posted for your convenience. Modifications that change, delete, or add language to any portion of these contracts (referred to as "M" Mods) will be posted as expeditiously as possible after execution. It is at the discretion of the Contractors whether or not they include modifications that change the amount obligated by the Government. Ames Laboratory - Contract No. No.DE-AC02-07CH11358

14

Privacy Act Advisory | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Act Advisory Privacy Act Advisory Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Advisory Exemptions How to Submit a FOIA Request Fee Waiver and Reduction Criteria Electronic Reading Room ISC Conventional Reading Rooms Reference Links Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Freedom of Information Act (FOIA) Privacy Act Advisory Print Text Size: A A A RSS Feeds FeedbackShare Page To Contact Us Freedom of Information Act/Privacy Act Officer U.S. Department of Energy SC Integrated Support Center - Chicago

15

Information fusion in data privacy: A survey  

Science Conference Proceedings (OSTI)

In this paper, we review the role of information fusion in data privacy. To that end, we introduce data privacy, and describe how information and data fusion are used in some fields of data privacy. Our study is focused on the use of aggregation for ... Keywords: Data privacy, Information fusion, Microaggregation, Record linkage

Guillermo Navarro-Arribas; Vicen Torra

2012-10-01T23:59:59.000Z

16

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Proposed Rules, and Notices of Federal agencies and organizations, as well as Executive Orders and other Presidential Documents. The Privacy Act Issuances Compilation contains...

17

Privacy Act Fees and Time Limits | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual...

18

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

unwarranted invasions of their privacy stemming from federal agencies' collection, maintenance, use, and disclosure of personal information about them. Therefore, unlike the...

19

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

20

Privacy Act (PA) of 1974 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

(PA) of 1974 | National Nuclear Security Administration (PA) of 1974 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act (PA) of 1974 Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 Privacy Act (PA) of 1974 The purpose of the Privacy Act of 1974 (Act), Title 5, United States Code,

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer....................................................................................................................5 13. Texas Public Information Act ..........................................................................................................................................6 1. Purpose The University of Texas at Austin (U. T. Austin) is committed to ensuring the privacy

Texas at Austin, University of

22

PRIVACY IMPACT ASSESSMENT: Human Resources Personal Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Human Human Resources - Personal Information Change Request PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site Idaho National Engineering Laboratory Engineering Research Office Building (EROB) Name of Information Human Resources - Personal Information Change Request System or IT Project Business Enclave Exhibit Project UID 106800 NewPIA ~ Update D N T 'tl I Contact Information arne,

23

A Citizen's Guide on Using the Freedom of Information Act  

NLE Websites -- All DOE Office Websites (Extended Search)

REPORT 2005 109-226 Union Calendar No. 127 A CITIZEN'S GUIDE ON USING THE FREEDOM OF INFORMATION ACT AND THE PRIVACY ACT OF 1974 TO REQUEST GOVERNMENT RECORDS SECOND REPORT BY THE...

24

Discriminatory Lossy Source Coding: Side Information Privacy  

E-Print Network (OSTI)

A lossy source coding problem is studied in which a source encoder communicates with two decoders, one with and one without correlated side information with an additional constraint on the privacy of the side information at the uninformed decoder. Two cases of this problem arise depending on the availability of the side information at the encoder. The set of all feasible rate-distortion-equivocation tuples are characterized for both cases. The difference between the informed and uninformed cases and the advantages of encoder side information for enhancing privacy are highlighted for a binary symmetric source with erasure side information and Hamming distortion.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

25

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

to make a request Requests for records pursuant to the Act can be submitted to the NNSA Albuquerque Complex in writing at the following address: NNSA Albuquerque Complex Office...

26

Privacy Act Exemptions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Special exemption, Section 552a(d)(5), which prohibits an individual access to any information compiled in reasonable anticipation of a civil action or proceeding. General...

27

Privacy Act Violations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

or employee of an agency knowingly and willfully discloses individually identifiable information to any person or agency without written consent of the individual to whom the...

28

Keeping up appearances: understanding the dimensions of incidental information privacy  

Science Conference Proceedings (OSTI)

We conducted a survey of 155 participants to examine privacy concerns relating to the viewing of incidental information (i.e. traces of previous activity unrelated to the task at hand) in web browsers. We have identified several dimensions of privacy ... Keywords: collaboration, incidental information, privacy, survey, web browsing

Kirstie Hawkey; Kori M. Inkpen

2006-04-01T23:59:59.000Z

29

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems and Organizations Appendix F ...

2013-05-09T23:59:59.000Z

30

Security and Privacy Controls for Federal Information Systems  

Science Conference Proceedings (OSTI)

NIST Special Publication 800-53. Revision 4. Security and Privacy Controls for Federal Information Systems. and Organizations. JOINT TASK FORCE ...

2013-06-18T23:59:59.000Z

31

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer Written By: Chief Information Security Officer/  

E-Print Network (OSTI)

The University of Texas at Austin Web Privacy Policy Office of the Chief Information Officer.......................................................................................................................5 13. Texas Public Information Act.............................................................................................. Error! Bookmark not defined. 1. Purpose The University of Texas at Austin (U. T. Austin) is committed

Texas at Austin, University of

32

Electronic access to information and the privacy paradox: rethinking practical obscurity and its impact on electronic freedom of information  

Science Conference Proceedings (OSTI)

This article addresses the U.S. Supreme Court's formulation of "practical obscurity" in Reporters Committee v. Department of Justice, a seminal case interpreting the U.S. Freedom of Information Act (FOIA). By examining lower federal court opinions ... Keywords: department of Justice, electronic information, freedom of information, privacy, reporters Committee for Freedom of the Press

Charles N. Davis

2003-01-01T23:59:59.000Z

33

Freedom of Information Act  

NLE Websites -- All DOE Office Websites (Extended Search)

FOIA FOIA Freedom of Information Act (FOIA) If you would like additional information related to your request you should contact the FOIA Requester Service Center at this location. If you submitted your request to another component of the DOE, or if you submitted a request to this office and it has been transferred to a component of the Department to be processed, please contact the FOIA Requester Service Center at that location. You may access the telephone number to the appropriate FOIA Requester Service Center at http://energy.gov/management/office-management/operational-management/freedom-information-act/foia-contacts. Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004 Freedom of Information Act of 1966 and Amendments (as of Jan. 2, 1991)

34

Energy Employees Occupational Illness Compensation Program Act...  

Office of Science (SC) Website

Energy Employees Occupational Illness Compensation Program Act (EEOICPA) Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act...

35

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule  

Science Conference Proceedings (OSTI)

Organizations collect personal information from individuals to carry out their business functions. Federal privacy regulations, such as the Health Insurance Portability and Accountability Act (HIPAA), mandate how this collected information can be shared ... Keywords: HIPAA, obligations, policy analysis, privacy policy

Omar Chowdhury; Andreas Gampe; Jianwei Niu; Jeffery von Ronne; Jared Bennatt; Anupam Datta; Limin Jia; William H. Winsborough

2013-06-01T23:59:59.000Z

36

Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Privacy Privacy/Security This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

37

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval  

E-Print Network (OSTI)

In previous work, we presented a novel information-theoretic privacy criterion for query forgery in the domain of information retrieval. Our criterion measured privacy risk as a divergence between the user's and the population's query distribution, and contemplated the entropy of the user's distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our previous work, elaborating on the intimate connection between the celebrated method of entropy maximization and the use of entropies and divergences as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.

Rebollo-Monedero, David; Forn, Jordi

2011-01-01T23:59:59.000Z

38

American Recovery and Reinvestment Act Information Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery and Reinvestment Act Recovery and Reinvestment Act Information Services American Recovery and Reinvestment Act American Recovery and Reinvestment Act Information Services American Recovery and Reinvestment Act American Recovery and Reinvestment Act Information Services American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act American Recovery and Reinvestment Act

39

Privacy Act System Notices | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

on himher; how an individual can access or amend the record; and the categories of sources of records in the system. The Act requires an agency to publish notice of a proposed...

40

Freedom of Information Act/Privacy Act Requests | National Nuclear...  

National Nuclear Security Administration (NNSA)

Control Number Receipt Date Status FOIA 09-00008-C 01072009 Request out for search FOIA 09-00025-C 01272009 Request out for search FOIA 09-00057-P 2182009 Request...

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Privacy Act Links to Relates Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

on individuals and rules agencies follow to assist individuals who request information about their records. DOE Office of Hearings and Appeals. The Department of Justice...

42

Freedom of Information Act  

Science Conference Proceedings (OSTI)

... but "only to the extent that the production of such ... of the FOIA provides blanket protection for oil well information ... to publish as part of its annual report. ...

43

Design and application of a Health Insurance Portability and Accountability Act-compliant privacy framework for pervasive healthcare  

Science Conference Proceedings (OSTI)

With an increasing emphasis on pervasive healthcare services, providing a high degree of privacy to patients is becoming a major challenge due to: (a) an increased number of avenues, such as device, access points, switches and database; (b) ... Keywords: EHR, HIPAA, Health Insurance Portability and Accountability Act, e-health, electronic health records, electronic healthcare, electronic medical records, mobile communications, pervasive healthcare, privacy, security, wireless health

Srilaxmi Malladi; Upkar Varshney

2008-04-01T23:59:59.000Z

44

Privacy - Information Protection Task Force - Charter | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Framework for a 21st Century Grid: Enabling our Secure Energy Future (July 12, 2011) Information Security: Coordination of Federal Cyber Security Research and Development...

45

Information Security and Privacy Advisory Board (ISPAB)  

Science Conference Proceedings (OSTI)

... Institute of Standards and Technology (NIST), the Secretary of Commerce and the Director of the Office of Management and Budget on information ...

2013-01-15T23:59:59.000Z

46

Genomic Research and Data-Mining Technology: Implications for Personal Privacy and Informed Consent  

Science Conference Proceedings (OSTI)

This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology (ICT) and population genomics research. I begin by briefly examining the ethical, legal, and social ... Keywords: data mining, deCODE Genetics, distributional group profiles, epidemiology, genetic exceptionalism, genomic research, informed consent, non-distributional group profiles, personal privacy, population genomics

Herman T. Tavani

2004-03-01T23:59:59.000Z

47

NASA Web Site Privacy and Important Notices  

NLE Websites -- All DOE Office Websites (Extended Search)

NASA Web Privacy Policy NASA Web Privacy Policy Thank you for visiting NASA and reviewing our policy notices. We have integrated these statements into a single posting for ease of use. The following links will help you navigate to a specific section: Privacy Policy Security Notice Accessibility Statement Linking Policy and Disclaimer of Endorsement Privacy Policy This notice provides NASA's policy regarding the nature, purpose, use and sharing of any information collected via this Web site. The information you provide on a NASA Web site will be used only for its intended purpose. We will protect your information consistent with the principles of the Privacy Act, the e-Government act of 2002, the Federal Records Act, and as applicable, the Freedom of Information Act. Submitting information is strictly voluntary. By doing so, you are giving

48

Radio Frequency Identification : regulating information privacy protection  

E-Print Network (OSTI)

As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and ...

Laufer, Deanna (Deanna Raquel)

2007-01-01T23:59:59.000Z

49

Freedom of Information Act (FOIA) | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Freedom of Information Act (FOIA) Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Advisory Exemptions How to Submit a FOIA Request Fee Waiver and Reduction Criteria Electronic Reading Room ISC Conventional Reading Rooms Reference Links Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Freedom of Information Act (FOIA) Print Text Size: A A A RSS Feeds FeedbackShare Page On September 4, 1966, Public Law 89-554, enacted into law Title 5 of the U.S. Code entitled , "Government Organization and Employees", and

50

Federal Information Security Management Act (FISMA) ...  

Science Conference Proceedings (OSTI)

Federal Information Security Management Act (FISMA) Implementation Project. Summary: The FISMA Implementation Project ...

2013-01-15T23:59:59.000Z

51

SEPA Freedom of Information Act (FOIA) program  

Energy.gov (U.S. Department of Energy (DOE))

Southeastern Participates in the United States Governments Freedom of Information Act (FOIA) program.

52

Managing the Costs of Informational Privacy: Pure Bundling as a Strategy in the Individual Health Insurance Market  

Science Conference Proceedings (OSTI)

Advances in genetic testing and data mining technologies have increased the availability of genetic information to insurance companies and insureds (applicants and policy holders) in the individual health insurance market (IHIM). Regulators, concerned ... Keywords: Bundling Information Privacy Insurance Markets Insurey Words And Phrases Ance Policy Privacy Privacy Cost

Matt E. Thatcher; Eric K. Clemons

2000-08-01T23:59:59.000Z

53

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

'" '" " * .1 * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FREEDOM OF INFORMAnON ACT/ PRIVACY ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Oeparbn~ntal Element" Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Freedom of Information Act/Privacy

54

Department of Energy Idaho - Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Policies No Fear Act Site Map Privacy Phone Book You are here: DOE-ID Home > Privacy Privacy General Disclaimer This system is made available by an agency of the United States...

55

A Citizen's Guide on Using the Freedom of Information Act  

NLE Websites -- All DOE Office Websites (Extended Search)

GOVERNMENT PRINTING OFFICE GOVERNMENT PRINTING OFFICE WASHINGTON : 1 21-892 PDF HOUSE OF REPRESENTATIVES " ! 109TH CONGRESS 1st Session REPORT 2005 109-226 Union Calendar No. 127 A CITIZEN'S GUIDE ON USING THE FREEDOM OF INFORMATION ACT AND THE PRIVACY ACT OF 1974 TO REQUEST GOVERNMENT RECORDS SECOND REPORT BY THE COMMITTEE ON GOVERNMENT REFORM Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html http://www.house.gov/reform SEPTEMBER 20, 2005.-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed VerDate 11-MAY-2000 14:44 Sep 20, 2005 Jkt 000000 PO 00000 Frm 00001 Fmt 4012 Sfmt 4012 D:\DOCS\21892.TXT HGOVREF1 PsN: HGOVREF1 (II) COMMITTEE ON GOVERNMENT REFORM TOM DAVIS, Virginia, Chairman CHRISTOPHER SHAYS, Connecticut DAN BURTON, Indiana

56

Imagined communities: awareness, information sharing, and privacy on the facebook  

Science Conference Proceedings (OSTI)

Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. ...

Alessandro Acquisti; Ralph Gross

2006-06-01T23:59:59.000Z

57

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

58

Sikes Act | Open Energy Information  

Open Energy Info (EERE)

Sikes Act Sikes Act Jump to: navigation, search Statute Name Sikes Act Year 1960 Url [[File:|160px|link=http://en.wikipedia.org/wiki/Sikes_Act]] Description The Sikes Act (16 USC 670a-670o, 74 Stat. 1052), was enacted into United States law on September 15, 1960. It provides for cooperation by the Department of the Interior and Department of Defense with State agencies in planning, development and maintenance of fish and wildlife resources on military reservations throughout the United States. References Sikes Act[1] The Sikes Act recognizes the importance and value of military lands to natural resources. It seeks to ensure that these ecosystems are protected and enhanced while allowing the military lands to continue to meet the needs of military operations.

59

Privacy is a process, not a PET: a theory for effective privacy practice  

Science Conference Proceedings (OSTI)

Privacy research has not helped practitioners -- who struggle to reconcile users' demands for information privacy with information security, legislation, information management and use -- to improve privacy practice. Beginning with the principle that ... Keywords: framework, privacy, security, trust

Anthony Morton; M. Angela Sasse

2012-09-01T23:59:59.000Z

60

DOE O 206.1, Department of Energy Privacy Program  

Directives, Delegations, and Requirements

The order establishes Departmental implementation of agency statutory and regulatory requirements for privacy, specifically those provided in the Privacy Act ...

2009-01-16T23:59:59.000Z

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Adaptive information-sharing for privacy-aware mobile social networks  

Science Conference Proceedings (OSTI)

Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co-presence can be shared easily with online "friends", as their smartphones already access such information from embedded ... Keywords: decision-making, information-sharing, machine learning, privacy, user study

Igor Bilogrevic, Kvin Huguenin, Berker Agir, Murtuza Jadliwala, Jean-Pierre Hubaux

2013-09-01T23:59:59.000Z

62

Freedom of Information Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operational Management » Freedom of Information Act Operational Management » Freedom of Information Act Freedom of Information Act The Office of Information Resources is responsible for administering policies, programs, and procedures to ensure DOE compliance with the Freedom of Information Act (FOlA), 5 U.S.C. 552. The resources on these pages are provided to aid in finding answers to questions about programs of the Department of Energy and to obtain information that is publicly available without submitting a FOlA request. You may also search on the FOIA Portal that consists of documents previously released under the FOIA. If the information is not available here, submit a Freedom of Information Act request electronically. You may also mail in your FOIA request to the following address: FOIA Requester Service Center

63

Freedom of Information and Privacy Act Database PIA, Idaho Operations...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications PIA - Security Clearance Work Tracking and Budget System Occupational Injury & Illness System (01&15) PIA, Idaho National Laboratory TRAIN-PIA.pdf...

64

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems  

Science Conference Proceedings (OSTI)

In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, ... Keywords: Information confinement, Privacy, Probabilistic algorithm, RFID systems, Security

Roberto Di Pietro; Refik Molva

2011-05-01T23:59:59.000Z

65

PRIVACY IMPACT ASSESSMENT: INL E-IDR  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL E-IDR (Invention Disclosure Record) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. I MODULE 1- PRIVACY NEEDS ASSESSMENT Date O..parlmental Element & Site 6/10/09 Idaho National Laboratory Building: 654 BUilding Name: EROS Name of Information System or IT Project E-IDR (Invention Disclosure Record) Exhibit Project UID 61104 NewPIA GJ Update D N T 'tl I Contact Information arne, I e Ph E ' I one, mal System Owner Wendy Skinner Local Privacy Act

66

PRIVACY IMPACT ASSESSMENT: Occupational Medicine Assistant PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medicine Medicine - Assistant PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Deparlment of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT iDafe 'Depauwerltal El.ment& iSlte June 10, 2009 Idaho National Laboratory Name :of,lnfonnation Systetnol"'ITiPtoJect Occupational Medicine - Assistant Exhlblt;ProJect UID Indirect funded Occupational Safety and Health NewPIA 0 Update D N T 'tl I Contact Information arne I e . , Phone, Email System Owner Local Privacy Act Offtcer

67

Information Collection Requests/Paper Reduction Act | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Collection RequestsPaper Reduction Act Information Collection RequestsPaper Reduction Act Training Presentation on the on Information Collection and the Paper...

68

Archaeological Resource Protection Act | Open Energy Information  

Open Energy Info (EERE)

Resource Protection Act Resource Protection Act Year 1979 Url [[File:|160px|link=]] Description Pub.L. 96-95 as amended, 93 Stat. 721, codified at 16 U.S.C. §§ 470aa-470mm References National Park Service ARPA Information[1] The Archaeological Resources Protection Act of 1979, also referred to as ARPA, is a federal law of the United States passed in 1979 and amended in 1988. It governs the excavation of archaeological sites on federal and Indian lands in the United States, and the removal and disposition of archaeological collections from those sites and is administered by the National Park Service. References ↑ "National Park Service ARPA Information" Retrieved from "http://en.openei.org/w/index.php?title=Archaeological_Resource_Protection_Act&oldid=44856

69

Archaeological Resources Protection Act | Open Energy Information  

Open Energy Info (EERE)

Resources Protection Act Resources Protection Act Year 1979 Url [[File:|160px|link=http://www.nps.gov/archeology/tools/Laws/arpa.htm]] Description 16 U.S.C. 470aa-470mm; Public Law 96-95 and amendments References National Park Service ARPA Information[1] The Archaeological Resources Protection Act of 1979, also referred to as ARPA, is a federal law of the United States passed in 1979 and amended in 1988. It governs the excavation of archaeological sites on federal and Indian lands in the United States, and the removal and disposition of archaeological collections from those sites and is administered by the National Park Service. 16 USC 470aa-470mm - Statute Text 43 CFR 7 - Regulation Text References ↑ "National Park Service ARPA Information" Retrieved from "http://en.openei.org/w/index.php?title=Archaeological_Resources_Protection_Act&oldid=44853

70

PRIVACY IMPACT ASSESSMENT: INL Energy Employees' Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INL INL Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided In the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Building 616 Willow Creek Building Name of Information Energy Employees' Occupational Illness Compensation Program Act (EEOICPA) System or IT ProJect Tracking Database Exhibit Project

71

WIPP - Freedom of Information Act (FOIA) definition  

NLE Websites -- All DOE Office Websites (Extended Search)

What is the Freedom of Information Act (FOIA)? What is the Freedom of Information Act (FOIA)? The FOIA, Title 5, United States Code, Section 552, was signed into law on July 4, 1966, by President Lyndon B. Johnson. Since then, the FOIA has been amended in 1974, 1986, and most recently, with the enactment of the Electronic Freedom of Information Act Amendments of 1996 (E-FOIA). The E-FOIA and requires federal agencies to make records available both electronically and through public reading rooms. The U.S. Department of Energy (DOE) implements the FOIA regulation in 10 Code of Federal Regulations Part 1004 (10 CFR 1004). The FOIA establishes the premise that any person has a right of access to federal agency records, and that federal agency records must be made available to the public unless they are specifically exempt from public release.

72

Privacy | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

issues. The Program is based on the Privacy Act of 1974, as implemented by Office of Management and Budget Circular A-130, the E-Government Act of 2002, and Departmental policies....

73

Department of Energy Adopts Rules to Protect Consumer Privacy | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy Department of Energy Adopts Rules to Protect Consumer Privacy March 15, 2010 - 4:17pm Addthis The Weatherization Assistance Program (WAP) enables states to provide financial assistance to qualifying consumers who want to improve the energy-efficiency of their homes. In response to concerns about the potential disclosure by the States of personal information they collect from WAP applicants, the Department has issued an interim final rule that requires states to apply the standards of the Freedom of Information Act that protect the privacy of potentially sensitive personal information. These protections will ensure a consistent and balanced approach towards the twin goals of consumer privacy and government transparency. The entire

74

Multi-User Privacy: The Gray-Wyner System and Generalized Common Information  

E-Print Network (OSTI)

The problem of preserving privacy when a multivariate source is required to be revealed partially to multiple users is modeled as a Gray-Wyner source coding problem with K correlated sources at the encoder and K decoders in which the kth decoder, k = 1, 2, ...,K, losslessly reconstructs the kth source via a common link and a private link. The privacy requirement of keeping each decoder oblivious of all sources other than the one intended for it is introduced via an equivocation constraint at each decoder such that the total equivocation summed over all decoders is E. The set of achievable rates-equivocation tuples is completely characterized. Using this characterization, two different definitions of common information are presented and are shown to be equivalent.

Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

75

NIH 2674-12 (PAGE 1) Privacy Act 09-25-0165 Revised 11-2010  

E-Print Network (OSTI)

through 06/30/2014 U.S. Department of Health and Human Services National Institutes of Health NIH Loan Repayment Program Contract Sections 487A, 487B, 487C, 487E, and 487F of the Public Health Service Act ("Act") authorize the Secretary of the Department of Health and Human Services ("Secretary"), and Section 485G

Bandettini, Peter A.

76

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... JOINT TASK FORCE TRANSFORMATION INITIATIVE ... aspects of information security (ie, technical ... physical, personnel, cyber-physical); and 4. Is ...

2013-05-09T23:59:59.000Z

77

Privacy Policy | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Data.gov is committed to protecting the privacy and security of visitors to this website. Data.gov does not collect personal information when you visit our website...

78

Understanding privacy policies  

Science Conference Proceedings (OSTI)

Their is growing recognition that users of web-based systems want to understand, if not control, what customer's data is stored by whom, for what purpose, for what duration, and with whom it is shared. We inform current language-based privacy efforts ... Keywords: Clone detection, Domain-specific languages, Empirical study, Language understanding, Language usage, P3P, Policy compliance, Policy enforcement, Privacy, Privacy policies, Software language engineering, Software linguistics, Software metrics, Web-based systems

Ralf Lmmel; Ekaterina Pek

2013-04-01T23:59:59.000Z

79

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ENERGY EMPLOYEES OCCUPATIONAL ILLNESS COMPENSATION PROGRAM ACT PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance Is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Energy Employees Occupational Illness System or IT Project Compensation Program Act exhibit

80

Weatherization Assistance for Low-Income Persons: Maintaining the Privacy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weatherization Assistance for Low-Income Persons: Maintaining the Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Weatherization Assistance for Low-Income Persons: Maintaining the Privacy of Applicants for and Recipients of Services Amending regulations to require all States and other service providers that participate in the Weatherization Assistance Program (WAP) to treat all requests for information concerning applicants and recipients of WAP funds in a manner consistent with the Federal government's treatment of information requested under the Freedom of Information Act (FOIA), 5 U.S.C. 552, including the privacy protections contained in Exemption (b)(6) of the FOIA, 5 U.S.C. 552(b)(6). Weatherization Assistance for Low-Income Persons: Maintaining the Privacy

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

National Flood Insurance Act | Open Energy Information  

Open Energy Info (EERE)

Flood Insurance Act Flood Insurance Act Jump to: navigation, search Statute Name National Flood Insurance Act Year 1968 Url [[File:|160px|link=]] Description References FEMA Library[1] Wikipedia[2] The National Flood Insurance Act of 1968 is a piece of legislation passed in the United States that led to the creation of the National Flood Insurance Program (NFIP). The National Flood Insurance Act of 1968 created the Federal Insurance Administration and made flood insurance available for the first time. The Flood Disaster Protection Act of 1973 made the purchase of flood insurance mandatory for the protection of property located in Special Flood Hazard Areas. The National Flood Insurance Act is administered by the Federal Emergency Management Agency. The NFIP goals are two-fold:

82

Tennessee Water Resources Information Act (Tennessee) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tennessee Water Resources Information Act (Tennessee) Tennessee Water Resources Information Act (Tennessee) Tennessee Water Resources Information Act (Tennessee) < Back Eligibility Agricultural Commercial Construction Developer Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Municipal/Public Utility Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Buying & Making Electricity Water Home Weatherization Program Info State Tennessee Program Type Environmental Regulations Provider Tennessee Department Of Environment and Conservation The Tennessee Water Resources Information Act is designed to prevent the lowering of the ground water table by requiring that adequate information

83

NETL: Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy Policy Privacy Policy Privacy Policy National Energy Technology Laboratory strives to protect the privacy of website visitors. Information collected is strictly limited to the following: Information Collected and Stored Automatically The IP address, a number that is automatically assigned to each computer that connects to the World Wide Web; Date and time of website access; Pages browsed. NETL reviews this information in an effort to make the website more useful and informative. This information is used solely as a source of anonymous statistical information; NETL does not track or record information about individuals or their visits. This information is NOT shared with anyone beyond NETL website home page staff, except when required by law enforcement investigation.

84

California Environmental Quality Act | Open Energy Information  

Open Energy Info (EERE)

Act Act Jump to: navigation, search Statute Name California Environmental Quality Act Year 1970 Url [[File:|160px|link=http://en.wikipedia.org/wiki/California_Environmental_Quality_Act]] Description References Wikipedia[1] CERES Webpage[2] CDOFG Webpage[3] The California Environmental Quality Act (CEQA) is a California statute passed in 1970, shortly after the United States federal government passed the National Environmental Policy Act (NEPA), to institute a statewide policy of environmental protection. CEQA does not directly regulate land uses, but instead requires state and local agencies within California to follow a protocol of analysis and public disclosure of environmental impacts of proposed projects and adopt all feasible measures to mitigate those impacts.[1] CEQA makes environmental protection a mandatory part of

85

Safe Drinking Water Act | Open Energy Information  

Open Energy Info (EERE)

Act Act Jump to: navigation, search Statute Name Safe Drinking Water Act Year 1974 Url SDWA.jpg Description The Safe Drinking Water Act was established to protect the quality of drinking water in the U.S. References SDWA of 1974[1] Federal Oil and Gas[2] The Safe Drinking Water Act was established to protect the quality of drinking water in the U.S. This law focuses on all waters actually or potentially designated for drinking use, whether from above ground or underground sources. The Act authorized EPA to establish safe standards of purity and required all owners or operators of public water systems to comply with primary (health-related) standards. State governments, which assume this power from EPA, also encourage attainment of secondary standards (nuisance-related).

86

National Historic Preservation Act | Open Energy Information  

Open Energy Info (EERE)

Act Act Jump to: navigation, search Statute Name National Historic Preservation Act Year 1966 Url [[File:|160px|link=http://www.achp.gov/docs/nhpa%202008-final.pdf]] Description 16 USC 470a et seq (2006) and implementing regulations at 36 CFR 800 (2008) References Advisory Council on Historic Preservation[1] (pdf) National Historic Preservation Act[2] 16 USC 470a et seq (2006) and implementing regulations at 36 CFR 800 (2008) The goal of the National Historic Preservation Act (NHPA), which established the Advisory Council on Historic Preservation (ACHP) in 1966, is to have federal agencies act as responsible stewards of our nation's resources when their actions affect historic properties. The ACHP is the only entity with the legal responsibility to encourage federal agencies to

87

Coastal Zone Management Act | Open Energy Information  

Open Energy Info (EERE)

Zone Management Act Zone Management Act Jump to: navigation, search Statute Name Coastal Zone Management Act Year 1972 Url [[File:|160px|link=]] Description The Coastal Zone Management Act of 1972 (CZMA; Pub.L. 92-583, 86 Stat. 1280, enacted October 27, 1972, 16 U.S.C. §§ 1451-1464, Chapter 33) is an Act of Congress passed in 1972 to encourage coastal states to develop and implement coastal zone management plans (CZMPs). This act was established as a United States National policy to preserve, protect, develop, and where possible, restore or enhance, the resources of the Nation's coastal zone for this and succeeding generations. References Wikipedia[1] National Oceanic and Atmospheric Administration[2] The U.S. Congress recognized the importance of meeting the challenge of

88

Coastal Barrier Resources Act | Open Energy Information  

Open Energy Info (EERE)

Barrier Resources Act Barrier Resources Act Jump to: navigation, search Statute Name Coastal Barrier Resources Act Year 1982 Url [[File:|160px|link=]] Description References Wikipedia[1] FWS Coastal Barrier Resources Act Webpage[2] The Coastal Barrier Resources Act of the United States was enacted October 18, 1982. The United States Congress passed this Act in order to address the many problems associated with coastal barrier development. CBRA designated various undeveloped coastal barriers, which were illustrated by a set of maps adopted by law, to be included in the John H. Chafee Coastal Barrier Resources System (CBRS). These designated areas were made ineligible for both direct and indirect Federal expenditures and financial assistance, which are believed to encourage development of fragile,

89

DOE Privacy Steering Committee Charter  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Steering Committee Charter Privacy Steering Committee Charter A. OBJECTIVE The purpose of the Department of Energy (DOE) Privacy Steering Committee (EPSC) is to advise the Senior Agency Official for Privacy (SAOP) and the Department's Privacy Program, providing recommendations to improve policies and program initiatives including breach response and notification, Privacy Impact Assessments, and other privacy matters. The EPSC is an essential component of DOE's ongoing efforts to identify processes to eliminate the unnecessary use of SSNs, and to safeguard Personally Identifiable Information (PII) while mitigating risks where the use of SSNs is authorized by a law, regulation or DOE Directive to fulfill a mission of the Department. B. AUTHORITY The EPSC is established at the direction of the Senior Agency Official for Privacy (SAOP).

90

Clean Air Act | Open Energy Information  

Open Energy Info (EERE)

Clean Air Act Clean Air Act Jump to: navigation, search Statute Name Clean Air Act Year 1970 Url CAA.jpg Description Congress passed the CAA in 1970 in order to combat air pollution in the United States and protect the health and general welfare of United States citizens against air pollutants. References CAA[1] Federal Oil and Gas[2] Contents 1 Introduction 2 Title I Air Pollution Prevention 3 Title II Emission Standards for Moving Sources 4 Title III General Provisions 5 Title IV Acid Deposition Control 6 Title V Permits 7 Title VI Stratospheric Ozone Protection 8 References Introduction The Clean Air Act was enacted by congress in 1990. Since then only minor changes have been made. The act is just a law ensuring that the EPA will follow certain guidelines and definitions for protecting and improving the

91

Clean Water Act | Open Energy Information  

Open Energy Info (EERE)

Clean Water Act Clean Water Act Year 1972 Url CWA.jpg Description The Clean Water Act was established to restore and maintain the chemical, physical, and biological integrity of the nation's waters. References CWA[1] Federal Oil and Gas[2] The Clean Water Act (CWA) (33 U.S.C. § 1251 et seq.) - The Clean Water Act was established to restore and maintain the chemical, physical, and biological integrity of the nation's waters. The CWA aims to protect water quality through development of water quality standards, anti-degradation policies, water quality permitting procedures, water body monitoring and assessment programs, and elimination or point and nonpoint pollution sources. The CWA regulates the National Pollutant Discharge Elimination System (NPDES) permitting process, which establishes, through a permit,

92

Oil Pollution Act | Open Energy Information  

Open Energy Info (EERE)

Pollution Act Pollution Act Jump to: navigation, search Statute Name Oil Pollution Act Year 1990 Url OPA.jpg Description The Oil Pollution Act (OPA) of 1990 streamlined and strengthened EPA's ability to prevent and respond to catastrophic oil spills. References OPA[1] Federal Oil and Gas[2] The Oil Pollution Act (OPA) of 1990 streamlined and strengthened EPA's ability to prevent and respond to catastrophic oil spills. A trust fund financed by a tax on oil is available to clean up spills when the responsible party is incapable or unwilling to do so. The OPA requires oil storage facilities and vessels to submit to the federal government response plans detailing how they will respond to large discharges. EPA has published regulations for aboveground storage facilities; the Coast Guard

93

Act Solar Inc | Open Energy Information  

Open Energy Info (EERE)

Solar Inc Solar Inc Jump to: navigation, search Name Act Solar Inc. Place Santa Clara, California Sector Solar Product California-based solar micro-inverter manufacturer and power management technology company. References Act Solar Inc.[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Act Solar Inc. is a company located in Santa Clara, California . References ↑ "Act Solar Inc." Retrieved from "http://en.openei.org/w/index.php?title=Act_Solar_Inc&oldid=341733" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version Permanent link Browse properties 429 Throttled (bot load) Error 429 Throttled (bot load)

94

Marine Mammal Protection Act | Open Energy Information  

Open Energy Info (EERE)

Mammal Protection Act Mammal Protection Act Jump to: navigation, search Statute Name Marine Mammal Protection Act Year 1972 Url [[File:|160px|link=]] Description References NOAA Overview[1] The Marine Mammal Protection Act (MMPA) was enacted on October 21, 1972. All marine mammals are protected under the MMPA. The MMPA prohibits, with certain exceptions, the "take" of marine mammals in U.S. waters and by U.S. citizens on the high seas, and the importation of marine mammals and marine mammal products into the U.S. Congress passed the Marine Mammal Protection Act of 1972 based on the following findings and policies: Some marine mammal species or stocks may be in danger of extinction or depletion as a result of human activities; These species or stocks must not be permitted to fall below their

95

Endangered Species Act | Open Energy Information  

Open Energy Info (EERE)

Endangered Species Act Endangered Species Act Jump to: navigation, search Statute Name Endangered Species Act Year 1973 Url Puerto-rican-parrott-TomMacKenzieUSFWS.jpg Description References The Endangered Species Act[1] Fish and Wildlife Service - ESA Overview[2] ESA Fact Sheet[3] When Congress passed the Endangered Species Act (ESA) in 1973, it recognized that our rich natural heritage is of "esthetic, ecological, educational, recreational, and scientific value to our Nation and its people." It further expressed concern that many of our nation's native plants and animals were in danger of becoming extinct. The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. It is administered by the U.S. Fish and Wildlife Service and the Commerce Department's National Marine Fisheries

96

Freedom of Information Act (FOIA) | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Freedom of Information Act (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

97

Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE  

E-Print Network (OSTI)

extent of the law. In addition to various laws governing your privacy, we have our own privacy policies medical treatment you have received and about payment for health care you have received. It is our policy, counterintelligence, and other national security activities. 5. Individual Rights Access. You have the right

Salama, Khaled

98

Privacy-awareness information for web forums: results from an empirical study  

Science Conference Proceedings (OSTI)

While interacting with others on the internet, users share a lot of personal data with a potentially large but "invisible" audience. An important issue is maintaining control over personal data and therefore, in the first place, users need to be aware ... Keywords: empirical study, forum, privacy, privacy awareness, social software, social web, user-centered design

Stefanie Ptzsch; Peter Wolkerstorfer; Cornelia Graf

2010-10-01T23:59:59.000Z

99

Federal Power Act | Open Energy Information  

Open Energy Info (EERE)

Federal Power Act Federal Power Act Year 1920 Url [[File:|160px|link=http://www.fws.gov/laws/lawsdigest/FEDPOWR.HTML]] Description References Federal Power Act[1] The original Federal Power Act provides for cooperation between the Federal Energy Regulatory Commission (Commission) and other Federal agencies, including resource agencies, in licensing and relicensing power projects. The President is required to appoint the five commissioners with the advice and consent of the Senate (16 U.S.C. 792). The President is also authorized, at the request of the Commission, to detail engineers from the Departments of Agriculture or Interior for field work (16 U.S.C. 793). "Navigable waters" (for which the Commission has jurisdiction under the Commerce Clause) are defined to include "streams or other bodies of water

100

National Environmental Policy Act | Open Energy Information  

Open Energy Info (EERE)

Policy Act Policy Act Jump to: navigation, search Statute Name National Environmental Policy Act Year 1969 Url NEPA.jpg Description Enacted in 1970, NEPA established a national policy to encourage productive and enjoyable harmony between man and his environment and to promote the prevention and elimination of damage to the environment and biosphere. References NEPA (statute)[1] NEPA.gov[2] NEPA documents related to geothermal energy[3] The National Environmental Policy Act (NEPA) (42 U.S.C. § 4321 et seq.) - Enacted in 1970, NEPA established a national policy to encourage productive and enjoyable harmony between man and his environment and to promote the prevention and elimination of damage to the environment and biosphere. NEPA requires that all federal agencies consider the potential environmental

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Best Practices: Best Practices: Elements of a Federal Privacy Program Version 1.0 Sponsored By: Federal CIO Council Privacy Committee June 2010 Best Practices: Elements of a Federal Privacy Program June 2010 Page i Contents Acknowledgements __________________________________________________________________ ii Purpose ____________________________________________________________________________ 1 Introduction: Privacy Stewardship and Governance _________________________________________ 3 Element 1 -Leadership ________________________________________________________________ 6 Element 2 - Privacy Risk Management and Compliance Documentation _________________________ 9 Element 3 - Information Security _______________________________________________________ 14

102

An online experiment of privacy authorization dialogues for social applications  

Science Conference Proceedings (OSTI)

Several studies have documented the constantly evolving privacy practices of social networking sites and users' misunderstandings about them. Researchers have criticized the interfaces to "configure" privacy preferences as opaque, uninformative, and ... Keywords: information privacy, online social networks (osns), privacy awareness and control, privacy notice and consent, third-party applications (apps)

Na Wang; Jens Grossklags; Heng Xu

2013-02-01T23:59:59.000Z

103

Farmland Protection Policy Act | Open Energy Information  

Open Energy Info (EERE)

Farmland Protection Policy Act Farmland Protection Policy Act Jump to: navigation, search Statute Name Farmland Protection Policy Act Year 1981 Url [[File:|160px|link=http://www.nrcs.usda.gov/wps/portal/nrcs/detail/?ss=16&navtype=SUBNAVIGATION&cid=nrcs143_008275&navid=100170180000000&pnavid=100000000000000&position=Welcome.Html&ttype=detail&pname=Farmland%20Protection%20Policy%20Act%20%7C%20NRCS]] Description Congress enacted the Farmland Protection Policy Act (FPPA) as a subtitle of the 1981 Farm Bill. The purpose of the law is to "...minimize the extent to which Federal programs contribute to the unnecessary conversion of farmland to nonagricultural uses..." (P.L. 97-98, Sec. 1539-1549; 7 U.S.C. 4201, et seq.). The FPPA also stipulates that federal programs be compatible with state, local and private efforts to protect farmland. For the purposes of the law, federal programs include construction projects-such as highways, airports, dams and federal buildings-sponsored or financed in whole or part by the federal government, and the management of federal lands. The U.S. Department of Agriculture's Natural Resources Conservation Service (NRCS) is charged with oversight of the FPPA.

107

Migratory Bird Treaty Act | Open Energy Information  

Open Energy Info (EERE)

Migratory Bird Treaty Act Migratory Bird Treaty Act Jump to: navigation, search Statute Name Migratory Bird Treaty Act Year 1918 Url [[File:|160px|link=http://law2.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t13t16+6189+0++%28%29%20%20AND%20%28%2816%29%20ADJ%20USC%29%3ACITE%20AND%20%28USC%20w%2F10%20%28703%29%29%3ACITE%20%20%20%20%20%20%20%20%20]] Description References FWS Overview[1] The original 1918 statute implemented the 1916 Convention between the U.S. and Great Britain (for Canada) for the protection of migratory birds. Later amendments implemented treaties between the U.S. and Mexico, the U.S. and Japan, and the U.S. and the Soviet Union (now Russia). Specific provisions in the statute include: Establishment of a Federal prohibition, unless permitted by regulations, to

108

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Information Resources - FOIAXpress Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Depamnf!l1tal Elel1l~nt&$ite july 23, 2009 Office of Information Resources Office of Management DOE Headquarters, Germantown, Germantown Computer Center Server Room Nameonl1fol'l11i1tion Sysleijlprl'f 'Project FOIAXpress ExhibitProj~tUID TBD NeWPIA ~ Update D Please indicate whether this is a new

109

A privacy expectations and security assurance offer system  

Science Conference Proceedings (OSTI)

Consumers accessing web sites for information or to purchase products face limited opportunity to express their privacy preferences, and even less recourse if security violations lead to inadvertent disclosure of privacy sensitive information. A privacy ... Keywords: e-commerce, incentives, insurance, privacy

Jeffrey Hunker

2008-07-01T23:59:59.000Z

110

Data Protection The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998,  

E-Print Network (OSTI)

Data Protection The Data Protection Act 1984 has now been replaced by the Data Protection Act 1998, which is based on the European Data Protection Directive. The 1998 Act applies to both manual for privacy and access by individuals. Information on how to make a request for access to personal data under

Priestley, Hilary

111

Smart Meter Privacy: A Utility-Privacy Framework  

E-Print Network (OSTI)

End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem with minimal assumptions that is tractable. Specifically for a stationary Gaussian Markov model of the electricity load, it is shown that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power, and this approach appears to encompass most of the proposed privacy approaches.

Rajagopalan, S Raj; Mohajer, Soheil; Poor, H Vincent

2011-01-01T23:59:59.000Z

112

PRIVACY IMPACT ASSESSMENT: Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office Office of Workforce Development for Teachers and Scientists Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextineword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 1, 2009 U.S. Department of Energy; Office of Science; Office of Workforce Development for Teachers and Scientists (WDTS) System location - Pacific Northwest National Laboratory, Richland, WA Name of Information iPASS System for DOE Office of Science laboratory fellowship programs, including

113

Competitive Privacy in the Smart Grid: An Information-theoretic Approach  

E-Print Network (OSTI)

Advances in sensing and communication capabilities as well as power industry deregulation are driving the need for distributed state estimation in the smart grid at the level of the regional transmission organizations (RTOs). This leads to a new competitive privacy problem amongst the RTOs since there is a tension between sharing data to ensure network reliability (utility/benefit to all RTOs) and withholding data for profitability and privacy reasons. The resulting tradeoff between utility, quantified via fidelity of its state estimate at each RTO, and privacy, quantified via the leakage of the state of one RTO at other RTOs, is captured precisely using a lossy source coding problem formulation for a two RTO network. For a two-RTO model, it is shown that the set of all feasible utility-privacy pairs can be achieved via a single round of communication when each RTO communicates taking into account the correlation between the measured data at both RTOs. The lossy source coding problem and solution developed he...

Sankar, Lalitha; Tandon, Ravi; Poor, H Vincent

2011-01-01T23:59:59.000Z

114

Privacy & Security Notice | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

115

Freedom of Information Act (FOIA) | National Nuclear Security  

National Nuclear Security Administration (NNSA)

(FOIA) | National Nuclear Security (FOIA) | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Freedom of Information Act (FOIA) Home > About Us > Our Operations > NNSA Office of General Counsel > Freedom of Information Act (FOIA) Freedom of Information Act (FOIA) The FOIA establishes the premise that people should have access to

116

Facebook: Threats to Privacy  

E-Print Network (OSTI)

End-users share a wide variety of information on Facebook, but a discussion of the privacy implications of doing so has yet to emerge. We examined how Facebook affects privacy, and found serious flaws in the system. Privacy on Facebook is undermined by three principal factors: users disclose too much, Facebook does not take adequate steps to protect user privacy, and third parties are actively seeking out end-user information using Facebook. We based our end-user findings on a survey of MIT students and statistical analysis of Facebook data from MIT, Harvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms of Fair Information Practices as recommended by the Federal Trade Commission. In light of the information available and the system that protects it, we used a threat model to analyze specific privacy risks. Specifically, university administrators are using Facebook for disciplinary purposes, firms are using it for marketing purposes, and intruders are exploiting security holes. For each threat, we analyze the efficacy of the current protection, and where solutions are inadequate, we make recommendations on how to address the issue.

Harvey Jones; Jos Hiram Soltren

2005-01-01T23:59:59.000Z

117

Towards the development of privacy-aware systems  

Science Conference Proceedings (OSTI)

Privacy and data protection are pivotal issues in nowadays society. They concern the right to prevent the dissemination of sensitive or confidential information of individuals. Many studies have been proposed on this topic from various perspectives, ... Keywords: Privacy policy, Privacy-Aware Access Control, Privacy-related legal requirements, Requirements Engineering

Paolo Guarda; Nicola Zannone

2009-02-01T23:59:59.000Z

118

Localization privacy  

Science Conference Proceedings (OSTI)

Location-aware technology and its applications are fundamental to ubiquitous computing. Essential to this technology is object localization and identification. RFID (radio frequency identification) technology has been shown to be very effective for identification ... Keywords: RFID, localization privacy, location privacy, location-aware applications, object localization

Mike Burmester

2012-01-01T23:59:59.000Z

119

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

120

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

The Premier Information Source for Professionals Who Track Environmental and Energy Policy. 1996-2011 E&E Publishing, LLC Privacy Policy Site Map  

E-Print Network (OSTI)

The Premier Information Source for Professionals Who Track Environmental and Energy Policy. © 1996 testified before Congress in recent years on the economics of climate change and energy policy. He has also-2011 E&E Publishing, LLC Privacy Policy Site Map 11. TREASURY: Tufts economics professor picked to lead

Tufts University

122

Privacy Rights and Protection: Foreign Values in Modern Thai Context  

Science Conference Proceedings (OSTI)

The concept of privacy as a basic human right which has to be protected by law is a recently adopted concept in Thailand, as the protection of human rights was only legally recognized by the National Human Rights Act in 1999. Moreover, along with other ... Keywords: Buddhism, Thai culture, data protection, human rights, privacy protection, privacy rights, smart ID cards

Krisana Kitiyadisai

2005-03-01T23:59:59.000Z

123

File:Ferc wsr-act.pdf | Open Energy Information  

Open Energy Info (EERE)

Ferc wsr-act.pdf Ferc wsr-act.pdf Jump to: navigation, search File File history File usage File:Ferc wsr-act.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 105 KB, MIME type: application/pdf, 17 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 19:02, 20 October 2012 Thumbnail for version as of 19:02, 20 October 2012 1,275 × 1,650, 17 pages (105 KB) Klein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

124

WIPP - Privacy Act of 1974  

NLE Websites -- All DOE Office Websites (Extended Search)

are enforceable though legal action. Criminal and civil penalties may apply. It is a crime to knowingly and willfully request or obtain records concerning an individual from an...

125

Employing PRBAC for privacy preserving data publishing  

Science Conference Proceedings (OSTI)

Issues about privacy-preserving data mining have emerged globally, but still the main problem is that non-sensitive information or unclassified data, one is able to infer sensitive information that is not supposed to be disclosed. Based on our previous ... Keywords: access control, data mining, data publishing, privacy

Anour F. A. Dafa-Alla; Gyoyong Sohn; Keun Ho Ryu

2009-11-01T23:59:59.000Z

126

Colorado Water Quality Control Act | Open Energy Information  

Open Energy Info (EERE)

Water Quality Control Act Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Colorado Water Quality Control Act edit Details Activities (0) Areas...

127

A theory and toolkit for the mathematics of privacy : methods for anonymizing data while minimizing information loss  

E-Print Network (OSTI)

Privacy laws are an important facet of our society. But they can also serve as formidable barriers to medical research. The same laws that prevent casual disclosure of medical data have also made it difficult for researchers ...

Katirai, Hooman

2006-01-01T23:59:59.000Z

128

Energy Privacy Steering Committee  

Energy.gov (U.S. Department of Energy (DOE))

TheDepartment of Energy (DOE) Privacy Steering Committee (EPSC) advises the Senior Agency Official for Privacy (SAOP) and the Departments Privacy Program regardingpolicies and program...

129

Differential privacy under fire  

Science Conference Proceedings (OSTI)

Anonymizing private data before release is not enough to reliably protect privacy, as Netflix and AOL have learned to their cost. Recent research on differential privacy opens a way to obtain robust, provable privacy guarantees, and systems like PINQ ...

Andreas Haeberlen; Benjamin C. Pierce; Arjun Narayan

2011-08-01T23:59:59.000Z

130

Mining and Minerals Policy Act of 1970 | Open Energy Information  

Open Energy Info (EERE)

and Minerals Policy Act of 1970 and Minerals Policy Act of 1970 Jump to: navigation, search Statute Name Mining and Minerals Policy Act of 1970 Year 1970 Url Actof1970.jpg Description An amendment to the Mineral Leasing Act References Mining and Minerals Policy Act of 1970[1] The Mining and Minerals Policy Act of 1970 (30 U.S.C. § 21 et seq.) - An amendment to the Mineral Leasing Act, this statute encompasses both hard rock mining and oil and gas and established modern federal policy regarding mineral resources in the United States. The Act articulates a national interest to foster and encourage private enterprise while mitigating adverse environmental impacts. References ↑ "Mining and Minerals Policy Act of 1970" Retrieved from "http://en.openei.org/w/index.php?title=Mining_and_Minerals_Policy_Act_of_1970&oldid=334610"

131

Protecting location privacy: optimal strategy against localization attacks  

Science Conference Proceedings (OSTI)

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation ... Keywords: location inference attacks, location privacy, location-based services, optimal defense strategy, privacy protection, service quality, stackelberg bayesian games

Reza Shokri; George Theodorakopoulos; Carmela Troncoso; Jean-Pierre Hubaux; Jean-Yves Le Boudec

2012-10-01T23:59:59.000Z

132

Efficient zero-knowledge identification schemes which respect privacy  

Science Conference Proceedings (OSTI)

At first glance, privacy and zero-knowledgeness seem to be similar properties. A scheme is private when no information is revealed on the prover and in a zero-knowledge scheme, communications should not leak provers' secrets. Until recently, privacy ... Keywords: identification, privacy, zero-knowledge

Julien Bringer; Herv Chabanne; Thomas Icart

2009-03-01T23:59:59.000Z

133

Verification of data pattern for interactive privacy preservation model  

Science Conference Proceedings (OSTI)

The research problem of privacy-preserving data publishing is to release microdata in an aggregated form using distinguished techniques that will effectively conceal sensitive and private information but can be used by external users to exercise data ... Keywords: data mining, differential privacy, privacy preservation

Sujoy Ray; Mohammad Fahim Nizam; Swagata Das; Benjamin C. M. Fung

2011-03-01T23:59:59.000Z

134

Mineral Leasing Act of 1920 | Open Energy Information  

Open Energy Info (EERE)

Leasing Act of 1920 Leasing Act of 1920 Jump to: navigation, search Statute Name Mineral Leasing Act of 1920 Year 1920 Url MineralLeasingAct.jpg Description The Mineral Leasing Act established the authority of the Secretary of the Interior to oversee oil and gas operations on federal land. References Federal Oil and Gas Statutes[1] Mineral Leasing Act of 1920 (30 U.S.C. § 181 et seq.) - The Mineral Leasing Act established the authority of the Secretary of the Interior to oversee oil and gas operations on federal land. "The Secretary of the Interior is authorized to prescribe necessary and proper rules and regulations and to do any and all things necessary to carry out and accomplish the purposes of this Act." 30 U.S.C. § 189 References ↑ "Federal Oil and Gas Statutes"

135

Privacy in mobile technology for personal healthcare  

Science Conference Proceedings (OSTI)

Information technology can improve the quality, efficiency, and cost of healthcare. In this survey, we examine the privacy requirements of mobile computing technologies that have the potential to transform healthcare. Such mHealth technology enables ... Keywords: HIPAA, Privacy framework, e-health, electronic health record, home healthcare, mHealth, medicine, mobile healthcare, personal health record

Sasikanth Avancha; Amit Baxi; David Kotz

2012-11-01T23:59:59.000Z

136

National Forest Management Act of 1976 | Open Energy Information  

Open Energy Info (EERE)

Forest Management Act of 1976 Forest Management Act of 1976 Jump to: navigation, search Statute Name National Forest Management Act of 1976 Year 1976 Url [[File:|160px|link=]] Description References Wikipedia[1] USFS Forest Management[2] The National Forest Management Act of 1976 is a federal law that governs the administration of national forests. This act requires the United States Forest Service to use a systematic and interdisciplinary approach to resource management in national forests. The USFS provides a full text of the Act here: Pub. L. 94-588 References ↑ "Wikipedia" ↑ "USFS Forest Management" Retrieved from "http://en.openei.org/w/index.php?title=National_Forest_Management_Act_of_1976&oldid=455235" Categories: Federal Environmental Statutes

137

Federal Advisory Committee Act of 1972 | Open Energy Information  

Open Energy Info (EERE)

Act of 1972 Act of 1972 Jump to: navigation, search Statute Name Federal Advisory Committee Act of 1972 Year 1972 Url [[File:|160px|link=http://www.gsa.gov/portal/content/100916]] Description The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References Federal Advisory Committee Act of 1972 (annotated and un-annotated)[1] The Federal Advisory Committee Act became law in 1972 and is the legal foundation defining how federal advisory committees operate. The law has special emphasis on open meetings, chartering, public involvement, and reporting. References ↑ "Federal Advisory Committee Act of 1972 (annotated and

138

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

139

Outer Continental Shelf Lands Act | Open Energy Information  

Open Energy Info (EERE)

Outer Continental Shelf Lands Act Outer Continental Shelf Lands Act Jump to: navigation, search Statute Name Outer Continental Shelf Lands Act Year 1953 Url [[File:|160px|link=]] Description References Outer Continental Shelf Lands Act pdf[1] This article is a stub. You can help OpenEI by expanding it. Enacted in 1953, the Outer Continental Lands Act provides for the jurisdiction of the United States over the submerged lands of the outer Continental Shelf, and authorizes the Secretary of the Interior to lease such lands for certain purposes. "It is hereby declared to be the policy of the United States that- (1) the subsoil and seabed of the outer Continental Shelf appertain to the United States and are subject to its jurisdiction, control, and power of disposition as provided in this Act..."

140

What is the Freedom of Information Act (FOIA)? | National Nuclear...  

National Nuclear Security Administration (NNSA)

how to obtain recordsinformation. The Act applies to records created and maintained by agencies in the executive branch of the federal government including the Executive Office...

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Energy Independence and Security Act of 2007 | Open Energy Information  

Open Energy Info (EERE)

Links Energy Independence and Security Act of 2007 Retrieved from "http:en.openei.orgwindex.php?titleEnergyIndependenceandSecurityActof2007&oldid255460" Category: Stubs...

142

Animal Agriculture Compliance Act (Iowa) | Open Energy Information  

Open Energy Info (EERE)

Compliance Act (Iowa) Policy Type Environmental Regulations Affected Technologies BiomassBiogas Active Policy Yes Implementing Sector StateProvince Program Administrator...

143

Indian Mineral Development Act of 1982 | Open Energy Information  

Open Energy Info (EERE)

Mineral Development Act of 1982 Mineral Development Act of 1982 Jump to: navigation, search Statute Name Indian Mineral Development Act Year 1982 Url IndianDevelopment1982.jpg Description Provides for tribes to enter into energy development agreements with DOI approval References Indian Mineral Development Act of 1982[1] Bureau of Indian Affairs[2] The Indian Mineral Development Act of 1982 (IMDA) 25 U.S.C. Secs. 2101-2108 was enacted to provide Indian tribes with flexibilty in the development and sale of mineral resources. S.Rep. No. 97-472, 97th Cong.2d Sess. 2 (1982). Foremost among the beneficial effects of IMDA was the opportunity for Indian tribes to enter into joint venture agreements with mineral developers. The contractual relationships permitted by IMDA were designed to meet two objectives: First, to further the policy of self-determination

144

General Mining Act of 1872 | Open Energy Information  

Open Energy Info (EERE)

Mining Act of 1872 Mining Act of 1872 Jump to: navigation, search Statute Name General Mining Act of 1872 Year 1890 Url Generalmininglaw1872.jpg Description The seminal law regarding mineral management on federal lands in the United States. References General Mining Act of 1872[1] FORTY-SECOND CONGRESS. Sess. II Ch. 149, 152. 1872 91 fied person: Provided, That all the persons availing themselves of the provisions of this section shall be required to pay, and there shall be collected from them, at the time of making payment for their land, interest on the total amounts paid by them, respectively, at the rate of five per centum per annum, from the date at which they would have been required to make payment under the act of July fifteenth, eighteen hundred and seventy. until the

145

Flood Disaster Protection Act of 1973 | Open Energy Information  

Open Energy Info (EERE)

Disaster Protection Act of 1973 Disaster Protection Act of 1973 Jump to: navigation, search Statute Name Flood Disaster Protection Act of 1973 Year 1973 Url [[File:|160px|link=]] Description References FDPA Text[1] The National Flood Insurance Program (NFIP) is administered primarily under two statutes: the National Flood Insurance Act of 1968 and the Flood Disaster Protection Act of 1973 (FDPA). The NFIP is administered by a department of the Federal Emergency Management Agency (FEMA), the Federal Insurance Administration (FIA). The FDPA requires federal financial regulatory agencies to adopt regulations prohibiting their regulated lending institutions from making, increasing, extending or renewing a loan secured by improved real estate or a mobile home located or to be located in a SFHA in a community participating in the NFIP unless the property

146

Bald and Golden Eagle Protection Act | Open Energy Information  

Open Energy Info (EERE)

Golden Eagle Protection Act Golden Eagle Protection Act Jump to: navigation, search Statute Name Bald and Golden Eagle Protection Act Year 1940 Url [[File:|160px|link=http://permits.fws.gov/ltr/ltr.shtml]] Description References FWS Overview[1] This article is a stub. You can help OpenEI by expanding it. The Bald and Golden Eagle Protection Act (16 U.S.C. 668-668c), enacted in 1940, and amended several times since then, prohibits anyone, without a permit issued by the Secretary of the Interior, from "taking" bald eagles, including their parts, nests, or eggs. The Act provides criminal penalties for persons who "take, possess, sell, purchase, barter, offer to sell, purchase or barter, transport, export or import, at any time or any manner, any bald eagle ... [or any golden eagle], alive or dead, or any part, nest,

147

Indian Mineral Leasing Act of 1938 | Open Energy Information  

Open Energy Info (EERE)

Act of 1938 Act of 1938 Jump to: navigation, search Statute Name Indian Mineral Leasing Act Year 1938 Url IndianMineralLeasing1938.jpg Description Provides for leasing of minerals on tribal lands References IMLA[1] United States v. Navajo Nation[2] The Indian Mineral Leasing Act of 1938 (IMLA) provides that "[u]nallotted lands within any Indian reservation," or otherwise under federal jurisdiction, "may, with the approval of the Secretary [of the Interior (Secretary)] ... , be leased for mining purposes, by authority of the tribal council or other authorized spokesmen for such Indians." 25 U.S.C. § 396a. The Act aims to provide Indian tribes with a profitable source of revenue and to foster tribal self-determination by giving Indians a greater

148

Healthy Forests Restoration Act of 2003 | Open Energy Information  

Open Energy Info (EERE)

Healthy Forests Restoration Act of 2003 Healthy Forests Restoration Act of 2003 Jump to: navigation, search Statute Name Healthy Forests Restoration Act of 2003 Year 2003 Url [[File:|160px|link=]] Description References Healthy Forests Restoration Act of 2003 PDF[1] This article is a stub. You can help OpenEI by expanding it. The Healthy Forests Initiative (or HFI), officially the Healthy Forests Restoration Act of 2003 (P.L. 108-148), is a law originally proposed by President George W. Bush in response to the widespread forest fires during the summer of 2002.[1] The main thrusts of the law are to thin overstocked stands, clear away vegetation and trees to create shaded fuel breaks, provide funding and guidance to reduce or eliminate hazardous fuels in National Forests, improve forest fire fighting, and research new methods to

149

Geothermal Steam Act of 1970 | Open Energy Information  

Open Energy Info (EERE)

Steam Act of 1970 Steam Act of 1970 Jump to: navigation, search To encourage the development of geothermal energy, the United States government passed the Geothermal Steam Act in 1970 allowing the leasing of land containing geothermal resources; however, Congress excluded any lands within the National Park System, U.S. Fish and Wildlife Service lands, and any other lands prohibited from leasing by the Mineral Leasing Act of 1920. The Bureau of Land Management (BLM) administrates the Act, issuing distinct authorizations for the exploration, development, production, and closeout of a geothermal resource. When a lessee first receives a lease, they have ten years to reach a certain level of development with the land; upon demonstrating such development, BLM extends their lease to 40 years, after

150

Privacy Impact Assessment | OSTI, US Dept of Energy, Office of Scientific  

Office of Scientific and Technical Information (OSTI)

Privacy Impact Assessment Privacy Impact Assessment Name of Project: Web Domains Maintained by the Office of Scientific and Technical Information (OSTI) Bureau: U.S. Department of Energy, Office of Science Project's Unique ID: N/A Contact Information: [Mailing address for 1 through 5 below is: DOE Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831.] Who is the person completing this document? (Name, title, organization, and contact information.) Valerie S. Allen, Technical Information Specialist allenv@osti.gov, Telephone 865-576-3469 Who is the system owner? (Name, organization, and contact information.) Judy C. Gilmore, OSTI Acting Assistant Director for Program Integration gilmorej@osti.gov, Telephone 865-576-5600 Who is the system manager for this system or application? (Name,

151

Property:Incentive/InActDt | Open Energy Information  

Open Energy Info (EERE)

InActDt InActDt Jump to: navigation, search Property Name Incentive/InActDt Property Type Date Description Incentive Inactive Date. Pages using the property "Incentive/InActDt" Showing 25 pages using this property. (previous 25) (next 25) 3 30% Business Tax Credit for Solar (Vermont) + 26 August 2011 + A AEP Ohio - Renewable Energy Technology Program (Ohio) + 30 June 2013 + AEP Texas Central Company - ENERGY STAR New Home Program (Texas) + 19 August 2011 + Agricultural Biomass Income Tax Credit (Corporate) (New Mexico) + 31 December 2019 + Agricultural Biomass and Landfill Diversion Incentive (Texas) + 31 August 19 + Appliance Efficiency Standards (Massachusetts) + 25 March 2012 + Arkansas - Residential Energy-Efficient Appliance Rebate Program (Arkansas) + 16 April 2012 +

152

Coal Mine Safety Act (Virginia) | Open Energy Information  

Open Energy Info (EERE)

Data Page Edit with form History Share this page on Facebook icon Twitter icon Coal Mine Safety Act (Virginia) This is the approved revision of this page, as well as being...

153

Coal Bed Methane Protection Act (Montana) | Open Energy Information  

Open Energy Info (EERE)

Data Page Edit with form History Share this page on Facebook icon Twitter icon Coal Bed Methane Protection Act (Montana) This is the approved revision of this page, as...

154

Privacy issues with DNA databases and retention of individuals' DNA information by law enforcement agencies: the holding of the European Court of Human Rights case S and Marper v. United Kingdom should be adapted to American Fourth Amendment jurisprudence  

Science Conference Proceedings (OSTI)

When law enforcement agencies collect, retain, and use individuals' DNA information in DNA databases for crime prevention purposes the presumption of innocence is reduced for those individuals. Collection and use of DNA information has benefits, greatly ... Keywords: DNA, DNA databases, European Court of Human Rights, comparative law, constitutional law, criminal procedure, fourth amendment, privacy

Michael Lwin

2010-06-01T23:59:59.000Z

155

Best Practices: Elements of a Federal Privacy Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and information systems. 42 The SAOPCPO plays a key role, in conjunction with the CIO, CISO, the Chief Security Officer, and other officials having privacy related...

156

A technology perspective on worldwide privacy regulations  

Science Conference Proceedings (OSTI)

In this paper we provide an overview of the worldwide privacy regulatory landscape from a technology perspective. We focus on data-centric definitions of personal information and then examine how these differ across different regulatory frameworks, such ...

D. A. Chapin; A. C. Nelson; B. S. Gerber

2009-03-01T23:59:59.000Z

157

Energy Policy Act of 2005 | Open Energy Information  

Open Energy Info (EERE)

Policy Act of 2005 Policy Act of 2005 Jump to: navigation, search EPAct was the first major energy legislation passed by Congress in 13 years. The Energy Policy Act of 2005 was signed into law by President Bush on August 8, 2005. Contents 1 Major Points 2 Energy Goal 3 Renewable Energy Goals 4 ENERGY STAR® Requirements 5 Metering Requirements 6 Solar Requirements 7 Motor Requirements 8 Green Building Requirements 9 Hydrogen Fleet & Energy Systems 10 Fuel Cells 11 Incentives 12 Exclusions 13 References Major Points Provides revised ANNUAL energy reduction goals (2% per year beginning in FY 2006). Provides revised renewable energy purchase goals. Reauthorizes Energy Savings Performance Contracts (ESPCs) until October 1, 2016. Requires federal procurement of ENERGY STAR® or FEMP-designated

158

TITLE: Disclosures of Protected Health Information Required by Law Columbia University Medical Center will use, disclose, or release a patient's protected health  

E-Print Network (OSTI)

and Assignments Team of the Office of Counterintelligence at 505-665-1572. I certify that the above information of Energy plans, policies, reports, studies, financial plans, internal data protected by the Privacy Act

Champagne, Frances A.

159

Friends Only: Examining a Privacy-Enhancing Behavior in Facebook  

E-Print Network (OSTI)

Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study we explore privacy in social network sites as a contextual information practice, managed by a process of boundary regulation. Drawing on a sample survey of undergraduate Facebook users, we examine a particular privacy-enhancing practice: having a friends-only Facebook profile. Particularly, we look at the association between network composition, expectancy violations, interpersonal privacy practices and having a friends-only profile. We find that expectancy violations by weak ties and increased levels of interpersonal privacy management are positively associated with having a friends-only profile. We conclude with a discussion of how these findings may be integrated into the design of systems to facilitate interaction while enhancing individual privacy. Author Keywords Social network sites, social networking, Facebook, privacy,

Fred Stutzman; Jacob Kramer-duffield

2010-01-01T23:59:59.000Z

160

2013 Privacy Awareness Training | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » 2013 Privacy Awareness Training 2013 Privacy Awareness Training October 11, 2013 5:00PM EDT Registration link: OLC Course type: Online Course Location: Online Course Description: This course is designed to address the importance of privacy, and to ensure that DOE employees are aware of the vital role they play in safeguarding privacy and protecting Personally Identifiable Information (PII). Audience: All Headquarters Federal and contractor employees and detailees with access to Federal information resources and all remote Federal and support services contractor employees provided access to the Federal Information Resources. This DOECAST does not apply to M&O contractors. M&O contractors should follow their respective guidelines for training.

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Emergency Planning and Community Right-to-Know Act (EPCRA) requirements. CERCLA Information Brief  

SciTech Connect

The Emergency Planning and Community Right-to-Know Act (EPCRA), also known as Title III of the Superfund Amendments and Reauthorization Act of 1986 (SARA), requires regulated facilities to publicly disclose information about the chemicals they store, use, dispose of, or release. The information is used to encourage and support emergency planning for responding to chemical accidents and to provide local governments and the public with information about possible chemical hazards in their communities.

Dailey, R.

1993-10-01T23:59:59.000Z

162

Analyzing Facebook privacy settings: User expectations vs. reality  

E-Print Network (OSTI)

The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our overarching goal is to improve defaults and provide better tools for managing privacy, but we are limited by the fact that the full extent of the privacy problem remains unknown; there is little quantification of the incidence of incorrect privacy settings or the difficulty users face when managing their privacy. In this paper, we focus on measuring the disparity between the desired and actual privacy settings, quantifying the magnitude of the problem of managing privacy. We deploy a survey, implemented as a Facebook application, to 200 Facebook users recruited via Amazon Mechanical Turk. We find that 36 % of content remains shared with the default privacy settings. We also find that, overall, privacy settings match users expectations only 37 % of the time, and when incorrect, almost always expose content to more users than expected. Finally, we explore how our results have potential to assist users in selecting appropriate privacy settings by examining the user-created friend lists. We find that these have significant correlation with the social network, suggesting that information from the social network may be helpful in implementing new tools for managing privacy.

Yabing Liu; Balachander Krishnamurthy; Krishna P. Gummadi

2011-01-01T23:59:59.000Z

163

Freedom of Information Act Related Sites | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

agency established by Congress in 1988 to provide safety oversight of the nuclear weapons complex operated by the DOE. National Technical Information Service A centralized...

164

PRIVACY IMPACT ASSESSMENT: OCIO HSPD-12 Physical  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCIO OCIO - HSPD-12 Physical and Logical System PIA Template Version 4- June, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site August 27,2009 Office of the Chief Information Officer DOE Headquarters, Forrestal, 8H-065 Name of Information System or IT Project HSPD-12 Physical and Logical Access System Exhibit Project UID Project's Unique 10: 019-60-01-17-01-8062-04-404-140 (2010 UID) NewPIA D Update ~ HSPD-12

165

PRIVACY IMPACT ASSESSMENT: Visitor Dosimeter Badge Tracking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Visitor Visitor Dosimeter Badge Tracking PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetexUneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 11, 2009 Deparbnental Idaho National Laboratory Element & Site Building 616 Willow Creek Building Name of Information Visitor Dosimeter Badge Tracking System or IT Project Exhibit Project UID 217975 New PIA ~ Update D Name, Title I Contact Information Phone, Email Lynn Rockhold System Owner I' 1\ I \ \ ( y P II 114 I' "I

166

Class-Restricted Clustering and Microperturbation for Data Privacy  

Science Conference Proceedings (OSTI)

The extensive use of information technologies by organizations to collect and share personal data has raised strong privacy concerns. To respond to the public's demand for data privacy, a class of clustering-based data masking techniques is increasingly ... Keywords: confidentiality, data perturbation, information theory, microaggregation, minimum spanning tree

Xiao-Bai Li, Sumit Sarkar

2013-04-01T23:59:59.000Z

167

PRIVACY IMPACT ASSESSMENT: Integrated Safety Management Workshop  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Integrated Safety Management Workshop Registration PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element&·Slte 16/Jun/09 Idaho National Laboratory Engineering Research Office Building (EROB) Name of-Information System or IT Project Integrated Safety Management Workshop Registration Exhibit Project UID 207765 NewPIA D Update 0 DOE PIA - ISMS Workshop Finallxw.doc N T "tl I

168

PRIVACY IMPACT ASSESSMENT: INL Manchester Software  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manchester Manchester Software 1099 Reporting PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program. Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date 06/09/09 Departmental Idaho National Laboratory Element &Site Building Name: lAB Name of Infonnatlon Manchester Software 1099 Reporting System or IT Project Exhibit Project UID 202021 New PIA GJ Update D Name, Title I Contact Information Phone, Email Bryan Larson, System Owner 208-526-8685 Technical Lead, Manchester

169

PRIVACY IMPACT ASSESSMENT: OCCUPATIONAL MEDICINE- INL OCCUPATIONAL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OCCUPATIONAL OCCUPATIONAL MEDICINE- INL OCCUPATIONAL MEDICAL SUVEILLANCE SYSTEM (OMSS) PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Dllte DepartmentAll Element~&Slte 06-16-2009 Idaho National Laboratory Building Number: WCB Building Name: WCB Name of Information System!«)r IT Project Occupational Medical Surveillance System (OMSS) ExhlbllProJect UIO 72 NewPIA D Update 0 DOE PIA - OMSS Finallxw.doc

170

PRIVACY IMPACT ASSESSMENT: Occupational Safety Health Occupational  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Occupational Occupational Safety & Health - Occupational Injury & Illness System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1 J Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date June 12, 2009 Departmental Idaho National Laboratory Element & Site Name of Infonnatlon Occupational Injury & Illness System (01&15) System or IT Project Exhibit Project UID 136 New PIA ~ Update D Name, Title Contact Information Phone, Email Anthony J. Kavran (208) 526-5826

171

WIPP Privacy Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

WIPP Privacy Policy and Disclaimers NOTICE: The Waste Isolation Pilot Plant (WIPP) Internet Server is provided as a service of the Department of Energy (DOE) for distribution of...

172

Do online social network friends still threaten my privacy?  

Science Conference Proceedings (OSTI)

A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that third ... Keywords: attribute prediction, facebook, homophily, online social networks, privacy

Sebastian Labitzke; Florian Werling; Jens Mittag; Hannes Hartenstein

2013-02-01T23:59:59.000Z

173

Secure and privacy-preserving execution model for data services  

Science Conference Proceedings (OSTI)

Data services have almost become a standard way for data publishing and sharing on top of the Web. In this paper, we present a secure and privacy-preserving execution model for data services. Our model controls the information returned during service ... Keywords: RDF views, data services, privacy preservation

Mahmoud Barhamgi, Djamal Benslimane, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frederic Cuppens, Michael Mrissa, Hajer Taktak

2013-06-01T23:59:59.000Z

174

Relations among privacy notions  

Science Conference Proceedings (OSTI)

This article presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds, provide new insights into the relation ... Keywords: Adversarial model, anonymity, privacy notions, unlinkability

Jens-Matthias Bohli; Andreas Pashalidis

2011-05-01T23:59:59.000Z

175

Privacy in (mobile) Telecommunications Services  

Science Conference Proceedings (OSTI)

Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded. Traffic data subsume under the notion ... Keywords: data protection, ethics, location data, privacy, telecommunications, traffic data

Jacques Penders

2004-12-01T23:59:59.000Z

176

Office of Information Resources  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Freedom of Information and Privacy Act Database Freedom of Information and Privacy Act Database Bureau: DOE-ID Project Unique ID: Date: May 8,2008 A. CONTACT INFORMATION 1. Who is the person completing this document? Nicole Brooks Title: FOIA/PA Officer Organization: DOE-ID Public Affairs Office Address: 1955 N. Fremont Ave, MS 1203 Idaho Falls, Idaho 83415 2. Who is the system owner? Nicole Brooks, FOIA/PA Officer U.S. DOE, Idaho Operations Office DOE-ID Public Affairs Office Address: 1955 N. Fremont Ave, MS 1203 Idaho Falls, Idaho 834 15 3. Who is the system manager for this system o r application? Nicole Brooks, FOIA/PA Officer U.S. DOE, Idaho Operations Office DOE-ID Public Affairs Office Address: 1955 N. Fremont Ave, MS 1203 Idaho Falls, Idaho 83415 4. Who is the IT Security Manager who reviewed this document?

177

Legal concepts meet technology: a 50-state survey of privacy laws  

Science Conference Proceedings (OSTI)

Informational privacy consists of the ability to control how others use our personal information. Over the past several decades, we have lost a significant degree of control as a result of advances in information processing technology and the rise of ... Keywords: data disposal, data security, personally identifying information, privacy, state law

Miriam B. Russom; Robert H. Sloan; Richard Warner

2011-12-01T23:59:59.000Z

178

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

,. - -i * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: FERNALD HISTORICAL RECORDS SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/02061.pdf Please complete electronically: no hand-written slibmisslons will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & SIte· June 4, 2009 Office of Legacy Management, Morgantown, WV Name of Information System or IT Project LM Records Handling System (LMRHS01) - Fernald Historical Records System exhIbit Project UIO 019-10-01-31-02-1014-00

179

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM ROCKY FLATS ENVIRONMENTAL RECORDS DATABASE PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element & Site June 4,2009 Office of Legacy Management, Morgantown, WV Name of Information LM Records Handling System (LMRHS01) - Rocky Flats Environmental Records System or IT Project Database exhibit Project UID 019-10-01-31-02-1014-00

180

Power is information: South Africa's promotion of access to information act in context  

Science Conference Proceedings (OSTI)

Information professionals in some developing countries are likely to view context' differently from those in developed countries. Context' becomes even more problematic when the searchers for information are ordinary citizens and ...

Archie L. Dick

2005-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Privacy and identifiability in clinical research, personalized medicine, and public health surveillance  

E-Print Network (OSTI)

Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication ...

Cassa, Christopher A

2008-01-01T23:59:59.000Z

182

Bunker: a privacy-oriented platform for network tracing  

Science Conference Proceedings (OSTI)

ISPs are increasingly reluctant to collect and store raw network traces because they can be used to compromise their customers' privacy. Anonymization techniques mitigate this concern by protecting sensitive information. Trace anonymization can be performed ...

Andrew G. Miklas; Stefan Saroiu; Alec Wolman; Angela Demke Brown

2009-04-01T23:59:59.000Z

183

Privacy-preserving anonymization of set-valued data  

Science Conference Proceedings (OSTI)

In this paper we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of transactional data that contains detailed information about items bought together by individuals. Even after removing all personal ...

Manolis Terrovitis; Nikos Mamoulis; Panos Kalnis

2008-08-01T23:59:59.000Z

184

A privacy-aware architecture for a web rating system  

Science Conference Proceedings (OSTI)

Net Trust is a fraud-detection application that enhances security while protecting privacy. Net Trust identifies fraudulent Web sites by aggregating individual opinions, user-selected browsing histories, and third-party information. In this paper, we ...

C. Viecco; A. Tsow; L. J. Camp

2009-03-01T23:59:59.000Z

185

Intelligent content-based privacy assistant for facebook  

E-Print Network (OSTI)

AbstractAlthough most online social networks now offer fine-grained controls of information sharing, these are rarely used, both because their use imposes additional burden on the user and because there are too many control settings for an average user to handle. To mitigate this problem, we have developed an Intelligent Privacy Assistant for Facebook that partially automates the assignment of sharing permissions, taking into account the content of the information published and users high-level sharing policies. The Assistant uses a novel social web privacy language, employs named entity recognition algorithms to annotate sensitive parts of published information and an answer set programming system to evaluate users privacy policies and determine the list of safe recipients. On a test scenario, the Assistant reached 73.8 % and 95.2 % performance in correctly determining safe and unsafe recipients, respectively. Keywords-privacy protection, social web, information extraction, policies, Facebook I.

Michal Jakob; Zbyn?k Moler; Michal P?chou?ek; Roman Vaculn

2011-01-01T23:59:59.000Z

186

Points of Contact and Privacy Act Advisory  

NLE Websites -- All DOE Office Websites (Extended Search)

1955 Fremont Avenue, MS 1203, Idaho Falls, ID 83415 (208) 526-5190 Mr. Abel Lopez, DOE-HQ FOIA Officer 1000 Independence Avenue, SW, Washington, D.C. 20585 (202) 586-8618...

187

Privacy Act Disclosures | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

of compelling circumstances affecting the health or safety of an individual; to either House of Congress, or any committee or subcommittee thereof; to the Comptroller General in...

188

Privacy Act Violations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

are enforceable through legal action. Criminal and civil penalties may apply. It is a crime if any officer or employee of an agency knowingly and willfully discloses individually...

189

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

be your full name, any other names you might have used, your birth date, your social security number, and home address. Please provide a phone number where you can be reached...

190

Privacy Act Exemptions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

exemptions: Section 552a(j)(1) which covers records maintained by the Central Intelligence Agency, Section 552a(j)(2) which covers records relating to law enforcement...

191

PHEmail: designing a privacy honoring email system  

Science Conference Proceedings (OSTI)

Controlling one's personal and private information could help alleviate one of the greatest harms facing the Internet today - the loss of attention due to the over abundance of unsolicited email (spam). If one could control the dissemination and usage ... Keywords: design, email application, privacy, social network, spam

David Nguyen; Khai Truong

2003-04-01T23:59:59.000Z

192

Privacy, Technology, and Aging: A Proposed Framework  

E-Print Network (OSTI)

the development, adoption, and use of home-based ubiquitous technologies for older adults. We began with a five, adoption, and use of home-based ubiquitous technologies are highly contextual, individualized and aging can inform the development of a privacy framework for home-based technologies that can contribute

Camp, L. Jean

193

Office of Information Resources  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Subpart D--Maintenance and Subpart D--Maintenance and Establishment of Systems of Records 1008.20 Content of systems of records. 1008.21 Collection of information by DOE about an individual for a system of records. 1008.22 Use and collection of social security numbers. 1008.23 Public notice of systems of records. 1008.24 Criminal penalties-failure t o pub- lish a system notice. AUTHORITY: Dept. of Energy Organization Act, Pub. L. 95-91, Executive Order 12091, 42 FR 46267, Privacy Act of 1974, Pub. L. 9>579 (5 U.S.C. 552a). SOURCE: 45 FR 61577. Sept. 16. 1980. unless otherwise noted. Subpart A-General Provisions 8 1008.1 Purpose and scope. (a) This part establishes the proce- dures t o implement the Privacy Act of 1974 (Pub. L. 93-579, 5 U.S.C. 552a) with- in the Department of Energy.

194

STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you be informed of the following: (1) you are entitled to request to be informed about the information about  

E-Print Network (OSTI)

Part: 68 Mail Stop: STEP 2: To Be Completed by SOFC Privacy Policy "State law requires that you: STEP 4: Vendor, email invoice to ldarling@stuact.tamu.edu or mail invoice to SOFC Mail Stop 1236. STEP contact person: (Please notify SOFC @ 845-1114 if event is cancelled) Vendor phone number: Faculty

Behmer, Spencer T.

195

PRIVACY IMPACT ASSESSMENT: INL PERSONNEL SECURITY SECIMS PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PERSONNEL PERSONNEL SECURITY - SECIMS PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element;& Site Name of Infonnatlon Syetemor Ilf Project Exhibit ProJect UIO NewPIA D Update ~ June 11, 2009 Idaho National Laboratory Willow Creek Building RIOT-Center INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE 311 DOE PIA - SECIMS Finallxw.doc N T 'tl I Contact Information arne I e . , Phone, Email

196

PRIVACY IMPACT ASSESSMENT: IDAHO NATIONAL LABORATORY-TRAIN PIA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IDAHO IDAHO NATIONAL LABORATORY-TRAIN PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-wrltten submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Departmental Element &Site June 11, 2009 Idaho National Laboratory Name of Infonnatlon SY8tem or IT Project Training Records and Information Network (TRAIN) Exhibit Project UID 70 NewPIA [!J Update D N T Otl I Contact Information ame, I e Ph E " I one, mal SY8tem Owner Carla J. Drake, Manager (208) 526-0841 Systems Approach

197

Flybynight: mitigating the privacy risks of social networking  

E-Print Network (OSTI)

Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service providers are able to observe and accumulate the information that users transmit through the network. We aim to mitigate this risk by presenting a new architecture for protecting information published through the social networking website, Facebook, through encryption. Our architecture makes a trade-off between security and usability in the interests of minimally affecting users ' workflow and maintaining universal accessibility. While active attacks by Facebook could compromise users ' privacy, our architecture dramatically raises the cost of such potential compromises and, importantly, places them within a framework for legal privacy protection because they would violate a user?s reasonable expectation of privacy. We have built a prototype Facebook application implementing our architecture, addressing some of the limitations of the Facebook platform through proxy cryptography.

Matthew M. Lucas; Nikita Borisov

2008-01-01T23:59:59.000Z

198

PRIVACY IMPACT ASSESSMENT: INL Education Programs PIA Template  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Education Education Programs PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE I - PRIVACY NEEDS ASSESSMENT Date Departmental Elernent'& (Site 24/Jun/09 Idaho National Laboratory Information Operations and Research Center (IORC) Nameofll,f..,rrnatlon INL Education Programs System or IfPi'()ject Business Enclave Exhibit Proj.ctlUO NA NewPIA D Update [~] DOE PIA - INL Education Program Finallxw.doc N T "tl I Contact Information arne,

199

PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

. . ,-) ')7 73?¥i5": )~"'f"YC-:;'~dt?f(~"'f9'FrrZ , . PRIVACY IMPACT ASSESSMENT: Shaw Areva MOX Services, LLC MOX Services Unclassified Information System Template - January 30, 2009, Version 2 Department of Energy Privacy Impact Assessment (pIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: hltp:llwww.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. (803) 819-22700 Dstlnson@moxprolect.com Dave Stinson, President and Chief Executive Officer, Shaw AREVA MOX Services, LLC NNSA Shaw AREVA MOX Services Savannah River Site, Aiken SC .. .. . ": .' . ' .... .- ...: ......

200

Intergovernmental relations inherent in the Energy Management Partnership Act: a workshop on information requirements  

SciTech Connect

This paper summarizes the results of the first of three workshops that were planned to assess the information needed by the Office of Conservation and Solar Energy (CS) to effectively evaluate the pending Energy Management Partnership Act (EMPA); the workshop concentrated on issues of the EMPA hierarchical partnership. The approach utilized offers two major benefits to CS. First, by considering the problem of program evaluation while EMPA is still in the planning stage, this study identifies any baseline information that should be collected prior to implementation of EMPA, and also provides CS with the opportunity to include evaluation considerations in the operating guidelines for the program. Second, by identifying the potential problems and benefits inherent in EMPA and then identifying the information necessary to evaluate these problems and benefits, information requirements tied to the reasons for needing that information are generated, rather than a long unrelated laundry list of information requirements. Drafting of EMPA is not yet complete. When the term EMPA is used here, it refers to a set of bills that are presently being melded together. The original EMPA bill, which originated in DOE, was designed to expand the role of state and local governments in achieving national energy goals. Specifically, EMPA would provide a total of $110 million annually to state and local governments over a five year period to (1) develop an overall state energy plan, (2) consolidate three existing federal energy grant programs, (3) allow the secretary to fund directly innovative projects at the local level, and (4) provide additional assistance to states to cover the administrative costs of existing energy programs. Other bills, which may be passed in conjuncttion with EMPA or incorporated into EMPA, place additional emphasis on the local level by allocating as much as $400 million annually to local governments.

Hoop, W.J.; Edelson, E.

1980-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

DOE Privacy Best Practices/ Enabling Technologies Subcommittee...  

NLE Websites -- All DOE Office Websites (Extended Search)

More Documents & Publications Energy Privacy Steering Committee 90-day Interim Report on Shale Gas Production - Secretary of Energy Advisory Board Elements of a Federal Privacy...

202

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

203

Microsoft Word - Privacy 0818.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Empowering Consumers ) DOE-HQ-2009-0003-0818 Empowering Consumers ) DOE-HQ-2009-0003-0818 And the Smart Grid: Data Access, Third Party ) (Noticed May 11, 2010) Use, and Privacy ) ) Comments of San Diego Gas & Electric Company San Diego Gas & Electric Company ("SDG&E") submits these comments in response to the above-enumerated Request for Information noticed by the Department on May 11, 2010. SDG&E is a regulated electric and gas utility operating pursuant to authorities granted to it by the Federal Energy Regulatory Commission and the State of California. SDG&E serves 3.4 million consumers in the San Diego and southern Orange County areas of California via 1.4 million electric meters and 830,000 gas meters. SDG&E's sister company, the Southern California Gas

204

Protecting FWP Participant Personally Identifiable Information/Protected  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting FWP Participant Personally Identifiable Protecting FWP Participant Personally Identifiable Information/Protected Health Information Protecting FWP Participant Personally Identifiable Information/Protected Health Information The confidentiality and privacy rights of former workers are not only a legal requirement, they are crucial to establishing and maintaining credibility with the former worker community. All medical information that is collected as part of this program is treated as confidential and is used only as allowed by the Privacy Act of 1974. All FWP activities are conducted with the approval of the Institutional Review Boards, or Human Subjects Committees, of DOE and involved universities. All individuals sign an informed consent and Health Insurance Portability and Accountability Act

205

Microsoft Word - Privacy_Contact_Listing_September_21_2010  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Department of Energy US Department of Energy Privacy Act Officers Contact Listing As of September 21, 2010 Chief Privacy Officer Jerry Hanley U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 jerry.hanley@hq.doe.gov Phone: (202) 586-0483 Fax: (202) 586-0575 Operations Offices Chicago Office Miriam Legan U.S. Department of Energy Chicago Office 9800 S. Cass Avenue Argonne, IL 60439 miriam.legan@ch.doe.gov Phone: 630-252-2041 Fax: 630-252-2183 Idaho Operations Office Clayton Ogilvie U.S. Department of Energy 1955 Fremont Ave. MS 1203 Idaho Falls, Idaho 83415

206

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

SciTech Connect

Participatory sensing applications rely on individuals to share local and personal data with others to produce aggregated models and knowledge. In this setting, privacy is an important consideration, and lack of privacy could discourage widespread adoption of many exciting applications. We present a privacy-preserving participatory sensing scheme for multidimensional data which uses negative surveys. Multidimensional data, such as vectors of attributes that include location and environment fields, pose a particular challenge for privacy protection and are common in participatory sensing applications. When reporting data in a negative survey, an individual participant randomly selects a value from the set complement of the sensed data value, once for each dimension, and returns the negative values to a central collection server. Using algorithms described in this paper, the server can reconstruct the probability density functions of the original distributions of sensed values, without knowing the participants actual data. As a consequence, complicated encryption and key management schemes are avoided, conserving energy. We study trade-offs between accuracy and privacy, and their relationships to the number of dimensions, categories, and participants. We introduce dimensional adjustment, a method that reduces the magnification of error associated with earlier work. Two simulation scenarios illustrate how the approach can protect the privacy of a participant's multidimensional data while allowing useful population information to be aggregated.

Groat, Michael [University of New Mexico, Albuquerque; Forrest, Stephanie [University of New Mexico, Albuquerque; Horey, James L [ORNL; Edwards, Benjamin [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln

2012-01-01T23:59:59.000Z

207

The Failure of Online Social Network Privacy Settings  

E-Print Network (OSTI)

Increasingly, people are sharing sensitive personal information via online social networks (OSN). While such networks do permit users to control what they share with whom, access control policies are notoriously difficult to configure correctly; this raises the question of whether OSN users privacy settings match their sharing intentions. We present the results of an empirical evaluation that measures privacy attitudes and intentions and compares these against the privacy settings on Facebook. Our results indicate a serious mismatch: every one of the 65 participants in our study confirmed that at least one of the identified violations was in fact a sharing violation. In other words, OSN users privacy settings are incorrect. Furthermore, a majority of users cannot or will not fix such errors. We conclude that the current approach to privacy settings is fundamentally flawed and cannot be fixed; a fundamentally different approach is needed. We present recommendations to ameliorate the current problems, as well as provide suggestions for future research. 1 Related Work To the best of our knowledge this is the first attempt to measure the correctness of privacy settings by first surveying users sharing intentions, to aid the process of identifying potential violations, then confirming the potential violations with the user. We argue that this method produces a more accurate evaluation compared

Michelle Madejski; Maritza Johnson; Steven M. Bellovin

2011-01-01T23:59:59.000Z

208

Privacy and security issues in cloud computing: The role of institutions and institutional evolution  

Science Conference Proceedings (OSTI)

Cloud computing is likened and equated to the Industrial Revolution. Its transformational nature is, however, associated with significant security and privacy risks. This paper investigates how the contexts provided by formal and informal institutions ... Keywords: Cloud computing, Contradictions, Institutional changes, Institutions, Privacy and security, Trust production process

Nir Kshetri

2013-05-01T23:59:59.000Z

209

Security and privacy implications of cloud computing: lost in the cloud  

Science Conference Proceedings (OSTI)

Cloud computing - the new paradigm, the future for IT consumer utility, the economy of scale approach, the illusion of un infinite resources availability, yet the debate over security and privacy issues is still undergoing and a common policy framework ... Keywords: cloud computing, data, information, network, privacy, security

Vassilka Tchifilionova

2010-03-01T23:59:59.000Z

210

A comparative study of online privacy regulations in the U.S. and China  

Science Conference Proceedings (OSTI)

Online privacy seeks to protect the identity of individuals who use the internet to collect information or express opinions. However, given the proliferating vehicles through which one's identity can be ascertained, the question remains as to what policies ... Keywords: China, Internet, Privacy, United States

Yanfang Wu; Tuenyu Lau; David J. Atkin; Carolyn A. Lin

2011-08-01T23:59:59.000Z

211

U.S. Department of Energy 2009 Annual FOIA Report I. Basic Information Regarding Report.  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9 Annual FOIA Report 9 Annual FOIA Report I. Basic Information Regarding Report. A. Kevin T. Hagerty, Director Office of Information Resources, MA-90 U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 202-586-5955 Sheila Jeter, FOIA/Privacy Act Specialist Alexander Morris, FOIA Officer FOIA/Privacy Act Office, MA-90 Office of Information Resources U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 202-586-5955 B. An electronic copy of the Freedom of Information Act (FOIA) report can be obtained at http://management.energy.gov/documents/annual_reports.htm. The report can then be accessed by clicking FOIA Annual Reports. C. A paper copy of the report can be obtained at the Headquarters Freedom of Information

212

Integrating Security and Privacy Requirements into ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2011-11-15T23:59:59.000Z

213

Managing Security and Privacy Risk in Healthcare ...  

Science Conference Proceedings (OSTI)

... Page 4. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4 Unconventional Threats Affecting Security and Privacy Connectivity ...

2012-06-05T23:59:59.000Z

214

Request for Information (RFI) from the Department of Energy for Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy 1. Who owns energy consumption data? The utility needs access to "raw" billing data, i.e., meter readings that take place every time the price changes and allow the utility to calculate the consumption during a particular time period and rate the consumption according to the price in effect during that period. Based on the FIPP principle of data minimization, it is expected that these meter readings would occur just a few times per day (e.g., every time a new price period begins

215

Federal Land Policy and Management Act of 1976 | Open Energy Information  

Open Energy Info (EERE)

Land Policy and Management Act of 1976 Land Policy and Management Act of 1976 Jump to: navigation, search Statute Name Federal Land Policy and Management Act of 1976 Year 1976 Url Landpolicy1976.jpg Description FLPMA, also called the BLM Organic Act, consolidated and articulated BLM management responsibilities and delegated many management responsibilities pertaining to federal land from the Secretary of the Interior to the Director of the BLM, including oversight of oil and gas leases. References Federal Land Policy and Management Act of 1976[1] The Federal Land Policy and Management Act of 1976 (43 U.S.C. §1701 et seq.) - FLPMA, also called the BLM Organic Act, consolidated and articulated BLM management responsibilities and delegated many management responsibilities pertaining to federal land from the Secretary of the

216

Stalking online: on user privacy in social networks  

Science Conference Proceedings (OSTI)

With the extreme popularity of Web and online social networks, a large amount of personal information has been made available over the Internet. On the other hand, advances in information retrieval, data mining and knowledge discovery technologies have ... Keywords: attacks, privacy, social networks, web

Yuhao Yang; Jonathan Lutes; Fengjun Li; Bo Luo; Peng Liu

2012-02-01T23:59:59.000Z

217

Measuring long-term location privacy in vehicular communication systems  

Science Conference Proceedings (OSTI)

Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many vehicular applications rely on continuous and detailed location information ... Keywords: Accumulated information, Entropy, Location privacy, Metric, Vehicular communication systems

Zhendong Ma; Frank Kargl; Michael Weber

2010-07-01T23:59:59.000Z

218

Office of Information Resources  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY INFORMATION PROTECTION TASK FORCE CHARTER A. OBJECTIVE The objective of the Department of Energy (DOE) Information Protection Task Force (IPTF) is to serve as the focal point for the DOE Privacy Program. The IPTF is an advisory entity, providing recommendations to the Senior Agency Official for Privacy (SAOP) to improve policies associated with the DOE Privacy Program, Breach Response and Notification, Privacy Impact Statements, and other privacy matters. The IPTF is an essential component of DOE's ongoing efforts to identify processes to reduce the collection and use of SSNs and to mitigate risks associated with paper-based

219

Safeguarding Health Information: Building Assurance through ...  

Science Conference Proceedings (OSTI)

... Privacy Workgroup Panelists: Balavignesh Thirumalainambi (NJ-HITEC) Joseph McClure, JD (Siemens) Doreen Espinosa (Utah Health Information ...

2013-05-09T23:59:59.000Z

220

Kyoto: Think Global, Act Local (K:TGAL) | Open Energy Information  

Open Energy Info (EERE)

Kyoto: Think Global, Act Local (K:TGAL) Kyoto: Think Global, Act Local (K:TGAL) Jump to: navigation, search Name Kyoto: Think Global, Act Local (K:TGAL) Agency/Company /Organization Netherlands Development Cooperation Sector Land, Climate Topics GHG inventory Website http://www.communitycarbonfore Program Start 2003 Program End 2009 References K:TGAL[1] Kyoto: Think Global, Act Local (K:TGAL) Screenshot "Kyoto: Think Global, Act Local (K:TGAL) is a research and capacity building program, financed by the Netherlands Development Cooperation, it is investigating the possibilities and potential for Community Based Forest Management of existing natural forest to be included as an eligible carbon mitigation activity under international climate change agreements in the future, particularly under REDD policy. The program involves research teams

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Mineral Leasing Act for Acquired Lands of 1947 | Open Energy Information  

Open Energy Info (EERE)

Acquired Lands of 1947 Acquired Lands of 1947 Jump to: navigation, search Statute Name Mineral Leasing Act for Acquired Lands of 1947 Year 1947 Url Acquiredlands.jpg Description (30 U.S.C. § 351 et seq.) - Extends the provisions of the Mineral Leasing Act and the authority of the Secretary of the Interior over oil and gas operations to federal "acquired lands." References Mineral Leasing Act for Acquired Lands of 1947 [1] The Mineral Leasing Act for Acquired Lands of 1947 (30 U.S.C. § 351 et seq.) - Extends the provisions of the Mineral Leasing Act and the authority of the Secretary of the Interior over oil and gas operations to federal "acquired lands." "To promote the mining of coal, phosphate, sodium, potassium, oil, oil shale, gas, and sulfur on lands acquired by the United States."

222

OSTIblog Online Privacy Policy | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Online Privacy Policy Online Privacy Policy We at OSTI.gov are committed to protecting the privacy and security of your visits to this Website. Outlined below is our online privacy policy. If you have questions about this policy, please let us know. Collection and disclosure of information: To ensure we are able to communicate effectively with visitors to our web site, we collect some information that can be directly associated with a specific person. We call this "Personal Information," and it includes, by way of illustration, names, addresses, telephone numbers and e-mail addresses. We collect Personal Information from eligible individuals who affirmatively request to receive e-mail or other services from us. We collect this Personal Information in order to provide these eligible individuals with

223

DOE Office of Science - Chicago Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Records Privacy Act Notices DOE Freedom of InformationPrivacy Act Division DOE Office of Hearings & Appeals DOJ Freedom of Information Act DOJ Office of Information and...

224

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

225

"A Regulator's Privacy Guide to Third-Party Data Access for Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

"A Regulator's Privacy Guide to Third-Party Data Access for Energy "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency" Now Available January 4, 2013 - 9:32am Addthis The State and Local Energy Efficiency Action Network's (SEE Action) Customer Information and Behavior Working Group has released "A Regulator's Privacy Guide to Third-Party Data Access for Energy Efficiency." Funded by the Office of Electricity Delivery and Energy Reliability, the guide summarizes the range of approaches taken by states on privacy and security issues related to third-party access to customer data gathered under electric and gas ratepayer-funded energy efficiency programs and through mechanisms such as advanced metering infrastructure.

226

Privacy-enhanced web personalization  

Science Conference Proceedings (OSTI)

Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing ...

Alfred Kobsa

2007-01-01T23:59:59.000Z

227

Searching oURspace for Information on the Indian Act 2010, March 18 The oURspace digital repository contains both primary and secondary resources on the Indian  

E-Print Network (OSTI)

that link to read the full text of the item. Enter Indian Act in the Search oURSpace text box. This search the search further, the term "Canada" was used in addition to "Indian Act." Search other repositoriesSearching oURspace for Information on the Indian Act ­ 2010, March 18 The oURspace digital

Argerami, Martin

228

Model-based context privacy for personal data streams  

Science Conference Proceedings (OSTI)

Smart phones with increased computation and sensing capabilities have enabled the growth of a new generation of applications which are organic and designed to react depending on the user contexts. These contexts typically define the personal, social, ... Keywords: context streams, context-awareness, dynamic bayesian networks, information leakage, privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Mani Srivastava; Harris Teague

2012-10-01T23:59:59.000Z

229

Analysis of privacy in online social networks of runet  

Science Conference Proceedings (OSTI)

In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situations and staying in touch with people already known. An important aspect of ... Keywords: information revelation, privacy, security, social networking sites, trust

Slava Kisilevich; Florian Mansmann

2010-09-01T23:59:59.000Z

230

Privacy in the Smart Grid Smart Grid 101  

E-Print Network (OSTI)

Privacy in the Smart Grid #12;Smart Grid 101 Energy and information flows in many directions, from Distributed Generation & StorageThird party services #12;#12;Smart Grid Hopes/Promises #1 ­Better Utilization Grid Hopes/ Promisses (II) "The Smart Grid will:" · Reduce CO2 emissions by up to 480 MMT by 2020

Hoepman, Jaap-Henk

231

OpenTag: Privacy protection for RFID  

E-Print Network (OSTI)

Radio frequency identification's use in retail is good for pervasive computing, but raises considerable privacy issues. OpenTag programmable tags address privacy issues while remaining fully compatible with the supply-chain ...

Holtzman, Henry N.

232

Selected antecedents of customer loyalty within a restaurant loyalty program: Perceived control, privacy concern, perceived value of a loyalty program, and willingness to disclose information.  

E-Print Network (OSTI)

??The objectives of this study were to examine a conceptual model of information disclose and customer loyalty with respect to the sensitive level of information, (more)

Lee, Hee Seok

2008-01-01T23:59:59.000Z

233

Privacy: is there an app for that?  

Science Conference Proceedings (OSTI)

Users of social networking sites (SNSs) increasingly must learn to negotiate privacy online with multiple service providers. Facebook's third-party applications (apps) add an additional layer of complexity and confusion for users seeking to understand ... Keywords: Facebook, adverse privacy events, privacy, social networking applications

Jennifer King; Airi Lampinen; Alex Smolen

2011-07-01T23:59:59.000Z

234

Ex Ante Appraisal Carbon-Balance Tool (EX-ACT) | Open Energy Information  

Open Energy Info (EERE)

Ex Ante Appraisal Carbon-Balance Tool (EX-ACT) Ex Ante Appraisal Carbon-Balance Tool (EX-ACT) Jump to: navigation, search LEDSGP green logo.png FIND MORE DIA TOOLS This tool is part of the Development Impacts Assessment (DIA) Toolkit from the LEDS Global Partnership. Tool Summary LAUNCH TOOL Name: The Ex Ante Carbon-balance Tool Agency/Company /Organization: Food and Agriculture Organization of the United Nations Partner: Policy and Programme Development Support Division (TCS), Investment Centre Division (TCI), and Agricultural Development Economics Division (ESA) Sector: Climate, Land Focus Area: Agriculture, Forestry Topics: Co-benefits assessment, Finance, GHG inventory, Resource assessment Resource Type: Software/modeling tools User Interface: Spreadsheet Complexity/Ease of Use: Moderate Website: www.fao.org/tc/tcs/exact/en/

235

File:Colorado Water Quality Control Act.pdf | Open Energy Information  

Open Energy Info (EERE)

Water Quality Control Act.pdf Water Quality Control Act.pdf Jump to: navigation, search File File history File usage Metadata File:Colorado Water Quality Control Act.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 413 KB, MIME type: application/pdf, 69 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:23, 14 March 2013 Thumbnail for version as of 14:23, 14 March 2013 1,275 × 1,650, 69 pages (413 KB) Alevine (Talk | contribs)

236

File:09MTAMontanaEnvironmentalPolicyAct.pdf | Open Energy Information  

Open Energy Info (EERE)

MTAMontanaEnvironmentalPolicyAct.pdf MTAMontanaEnvironmentalPolicyAct.pdf Jump to: navigation, search File File history File usage File:09MTAMontanaEnvironmentalPolicyAct.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 59 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:47, 9 October 2012 Thumbnail for version as of 14:47, 9 October 2012 1,275 × 1,650 (59 KB) Dklein2012 (Talk | contribs) 12:16, 1 October 2012 Thumbnail for version as of 12:16, 1 October 2012 1,275 × 1,650 (45 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup

237

All Previous Editions are Obsolete A Summary of Your Rights Under the Fair Credit Reporting Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Administrative Update 03/2013) Administrative Update 03/2013) All Previous Editions are Obsolete A Summary of Your Rights Under the Fair Credit Reporting Act (As Published by Federal Trade Commission) The federal Fair Credit Reporting Act (FCRA) promotes the accuracy, fairness, and privacy of information in the files of consumer reporting agencies. There are many types of consumer reporting agencies, including credit bureaus and specialty agencies (such as agencies that sell information about check writing histories, medical records, and rental history records). Here is a summary of your major rights under the FCRA. For more information, including information about additional rights, go to http://www.consumer.ftc.gov/ or write to: Consumer Response Center, Room 130-A, Federal Trade Commission, 600 Pennsylvania Ave. N.W.,

238

A Summary of Your Rights Under the Fair Credit Reporting Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6/00/Administrative Update 11/2012) 6/00/Administrative Update 11/2012) All Editions Prior to 6/00 are Obsolete 1 A Summary of Your Rights Under the Fair Credit Reporting Act (As Published by Federal Trade Commission) The federal Fair Credit Reporting Act (FCRA) promotes the accuracy, fairness, and privacy of information in the files of consumer reporting agencies. There are many types of consumer reporting agencies, including credit bureaus and specialty agencies (such as agencies that sell information about check writing histories, medical records, and rental history records). Here is a summary of your major rights under the FCRA. For more information, including information about additional rights, go to http://www.ftc.gov/credit or write to: Consumer Response Center, Room 130-A, Federal Trade

239

NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Use and Privacy- Comments of Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities Telecom Council hereby comments in response to the Department of Energy (DOE) request for information on data access, third party use, and privacy. In summary, UTC submits that the innovative deployment by energy utilities of smart meters and smart control systems will create a smart energy grid that will unlock the value of what has been called the Energy Information Economy2. Smart energy grids will create an environment in which consumers will have greater abilities to manage their own energy usage and utilities will have new tools to affect grid-wide energy efficiencies never before possible. The key to all this is data. How to provide secure access to it

240

DOE Privacy Steering Committee Meeting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees EPSC Subcommittees April 23, 2009 April 23, 2009 Subcommittee Charge/Outcomes Members Chairs* Best Practices/ Enabling Technologies Subcommittee Charge of the Subcommittee The Best Practices/ Enabling Technologies Subcommittee will serve as a forum for the development and promotion of Privacy best practices, as well as for the review of available technologies that support and enable the mission of Privacy. Best practices may be drawn from the public and private sectors. Technology solutions may include consideration of enterprise licensing agreements, and experience of other Federal agencies. Best Practices and Technology will assess agency and industry solutions to develop implementation and performance measurement benchmarks.

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

File:Public Utility Regulatory Act - Texas.pdf | Open Energy Information  

Open Energy Info (EERE)

Public Utility Regulatory Act - Texas.pdf Public Utility Regulatory Act - Texas.pdf Jump to: navigation, search File File history File usage Metadata File:Public Utility Regulatory Act - Texas.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 Go!

242

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

243

PRIVACY IMPACT ASSESSMENT (PIA)  

Science Conference Proceedings (OSTI)

... and maintenance of Continuity of Operations ... of Success Stories, specific business identifiable information is ... do individuals or businesses have to ...

2012-09-13T23:59:59.000Z

244

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

245

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

246

NOTICE OF PRIVACY PRACTICES THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET  

E-Print Network (OSTI)

: · Treating all of your health information that we collect as confidential. · Stating confidentiality policies provides the insurer the right to contest the claim under the policy Uses and Disclosures with Neither for lawful intelligence, counterintelligence, and other national security activities. We may be required

Bordenstein, Seth

247

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

248

Recovery Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 Recovery Act Buy American Requirements for Information Needed from Financial Assistance Applicants/Recipients for Waiver Requests Based on Unreasonable Cost or Nonavailability Applicants for and recipients of financial assistance funded by the Recovery Act must comply with the requirement that all of the iron, steel, and manufactured goods used for a project for the construction, alteration, maintenance, or repair of a public building or public work be produced in the United States, unless the head of the agency makes a waiver, or determination of inapplicability of the Buy American Recovery Act provisions, based on one of the authorized exceptions. The authorized exceptions are unreasonable cost, nonavailability, and in furtherance of the public interest. This

249

Information Management | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Information Management Information Management Integrated Support Center (ISC) ISC Home About Services Freedom of Information Act (FOIA) Privacy Act Categorical Exclusion Determinations Contact Information Integrated Support Center Roxanne Purucker U.S. Department of Energy 9800 S. Cass Avenue Argonne, IL 60439 P: (630) 252-2110 Larry Kelly U.S. Department of Energy 200 Administration Road Oak Ridge, TN 37830 P: (865) 576-0885 Services Information Management Print Text Size: A A A RSS Feeds FeedbackShare Page Integrated Support Center information management professionals are an integral part of the Science Information Technology Modernized Organization. Staff in the ISC collaborate closely with the Site Offices and the SC Chief Information Officer to ensure federal staff in the field have the right products and services to efficiently fulfill the mission.

250

Privacy | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

completed any pre-determined tasks while on the site. This technology is provided by Google Analytics and the information collected is used to optimize our website; helping us...

251

Understanding Motivations for Facebook Use: Usage Metrics, Network Structure, and Privacy  

E-Print Network (OSTI)

This study explores the links between motives for using a social network service and numerical measures of that activity. Specifically, it identified motives for Facebook use by employing a Uses and Gratifications (U&G) approach and then investigated the extent to which these motives can be predicted through usage and network metrics collected automatically via the Facebook API. In total, 11 Facebook usage metrics and eight personal network metrics served as predictors. Results showed that all three variable types in this expanded U&G frame of analysis (covering social antecedents, usage metrics, and personal network metrics) effectively predicted motives and highlighted interesting behaviors. To further illustrate the power of this framework, the intricate nature of privacy in social media was explored and relationships drawn between privacy attitudes (and acts) and measures of use and network structure. Author Keywords Uses and gratifications; social network sites; social networks; Facebook; privacy; computer-mediated communication.

Tasos Spiliotopoulos; Ian Oakley

2013-01-01T23:59:59.000Z

252

Protecting consumer privacy from electric load monitoring  

Science Conference Proceedings (OSTI)

The smart grid introduces concerns for the loss of consumer privacy; recently deployed smart meters retain and distribute highly accurate profiles of home energy use. These profiles can be mined by Non Intrusive Load Monitors (NILMs) to expose much of ... Keywords: load monitor, privacy, smart meter

Stephen McLaughlin; Patrick McDaniel; William Aiello

2011-10-01T23:59:59.000Z

253

POPCORN: privacy-preserving charging for emobility  

Science Conference Proceedings (OSTI)

Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will require protocols and standards that will control authentication, authorization, and billing of electric-vehicle charging. ... Keywords: electric vehicle charging, iso/iec 15118, privacy, privacy enhancing technologies, security

Christina Hfer, Jonathan Petit, Robert Schmidt, Frank Kargl

2013-11-01T23:59:59.000Z

254

10 CFR 1008, Records Maintained On Individuals (Privacy Act)...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Government Through Leadership in Environmental Management Office of Personnel Management, 5 CFR 731 Code of Federal Regulations PROCEDURAL RULES FOR DOE NUCLEAR ACTIVITIES...

255

NIST Awards Grants to Improve Online Security and Privacy  

Science Conference Proceedings (OSTI)

NIST Awards Grants to Improve Online Security and Privacy. For Immediate Release: September 17, 2013. ...

2013-09-17T23:59:59.000Z

256

IBM Software Information Management  

E-Print Network (OSTI)

instances of private data so that they can be fully protected · Support compliance with privacy regulations protecting that data--and the applications that hold that data--makes good business sense. However, different types of information have different protection and privacy requirements. Therefore, organizations must

257

PAPERWORK REDUCTION ACT SUBMISSION  

U.S. Energy Information Administration (EIA)

19. Certification for Paperwork Reduction Act Submissions On behalf of this Federal agency, I certify that the collection of information encompassed ...

258

DOE Request for Information - Implementing the National Broadband...  

NLE Websites -- All DOE Office Websites (Extended Search)

Information - Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy DOE Request for Information -...

259

Recovery Act Information, Legislation  

Science Conference Proceedings (OSTI)

... 110140: Provided further, That the Secretary of Energy may use ... Such protocols and standards shall further align policy, business, and technology ...

2013-11-12T23:59:59.000Z

260

Freedom of Information Act  

NLE Websites -- All DOE Office Websites (Extended Search)

by the Federal Bureau of Investigation pertaining to foreign intelligence or counterintelligence, or international terrorism, and the existence of the records is classified...

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Freedom of Information Act  

Science Conference Proceedings (OSTI)

... Program staff in those areas search their files for the records. ... [Optional] I appeal the decision to require me to pay search charges for this request. ...

2012-07-17T23:59:59.000Z

262

Citizen's Attitudes about Privacy While Accessing Government and Private  

E-Print Network (OSTI)

This paper reports the results of an investigation on citizens' attitudes and concerns regarding privacy and security on the Web, in general, and on the government websites they may visit, in particular. We examine to what extent those concerns can be alleviated by using a Secure Private Portal that protects citizen's personally identifying information when accessing government websites. The research project had two main goals: (a) to develop a comprehensive psychological instrument to assess citizens' attitudes and concerns regarding privacy and security on the Web; (b) to test the impact a Secure Private Portal may have on those concerns and on the way citizens use Government Websites. In order to accomplish these goals researchers from Columbia Business School and from Columbia departments of Computer Science and Psychology, developed and ran a web-based survey. Participants were recruited using online advertising through Google.com and provided their responses on the web. Early analyses of the results indicate a very high level of citizens' concerns regarding privacy and security of their personal data. Some of the concerns can appropriately be addressed only by fundamental policy changes. Furthermore, the results suggest that citizens perceive those sites which use secure portals as much safer and are more likely to visit them again. The results may indicate a new strategy for the presentation and design of government websites.

Websites Results Of; Salvatore J. Stolfo; Eric Johnson; Tomislav Pavlicic; Stephen Jan

2003-01-01T23:59:59.000Z

263

Hearing on Online Privacy, Social Networking, and Crime Victimization Before the Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security U.S. House of Representatives  

E-Print Network (OSTI)

Washington, DCMr. Chairman and Members of the Committee, thank you for the opportunity to testify today. My name is Marc Rotenberg, and I am the President of the Electronic Privacy Information Center. EPIC was established to focus public attention on emerging privacy and civil liberties issue. I also teach Information Privacy Law at Georgetown University Law Center. I want to thank you for holding this hearing today and also thank Chairman Conyers for his May letter to Facebook. EPIC has a particular interest in privacy and social networking services. We filed two complaints at the Federal Trade Commission in the last year following decisions by Facebook to change its privacy policies and the privacy settings of its users. We also filed a complaint when Google introduced Buzz, its social network service, because the company essentially opted in all of its Gmail users. We believe it is vitally important to protect the privacy of users of these services, and many users agree. To be clear, we do not object to social network servicesthey are enormously valuablebut we do believe that there are serious privacy risks to

Marc Rotenberg

2010-01-01T23:59:59.000Z

264

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of future of gov Network 2020/MTIPS/TIC Earl Crane, Director for Federal Cybersecurity, National Security Staff, The White House Tim Polk ...

2013-06-17T23:59:59.000Z

265

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Michigan Gregorg Garcia, Garcia Cyber Partners Brian ... explained how the transformation is executed - DoD is transforming IA policies ...

2013-03-08T23:59:59.000Z

266

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... Enhance user interface with REST design, Migrate database and web ... E-Gov Update Lisa Schlosser, Deputy CIO, Federal Government, OMB ...

2013-03-11T23:59:59.000Z

267

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... simulated testing set up in fifteen government facilities. ... It is essential to understand the relationship ... to present his paper on Cyber Security Doctrine. ...

2011-07-20T23:59:59.000Z

268

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... of Intellectual Property's negative impact on jobs Economic losses ... of framework (heavy lift), creation of overlays ... Wisham Lorna First Energy visitor ...

2013-06-19T23:59:59.000Z

269

Information Security and Privacy Advisory Board (ISPAB) ...  

Science Conference Proceedings (OSTI)

... does not become unclassified and does not leave CSP. ... can change and have a big impact, specifically on ... but is there one large weather map or ...

2013-12-24T23:59:59.000Z

270

location privacy based on trusted computing and secure logging  

E-Print Network (OSTI)

Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a persons location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operators customers in a privacy-preserving way. So far, this assurance has been based on a legal contract between the operator and the provider. However, there has been no technical mechanism that lets the operator verify whether the provider adheres to the privacy policy outlined in the contract. We propose an architecture for location-based services based on Trusted Computing and Secure Logging that provides such a technical mechanism. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks.

Urs Hengartner

2008-01-01T23:59:59.000Z

271

Privacy Protection for Social Networking APIs  

E-Print Network (OSTI)

Social networking APIs integrate third-party content into the site and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacypreserving API that is motivated by an analysis of the data needs and uses of Facebook applications. Our study of 150 popular Facebook applications reveals that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications output, privacy-by-proxy can be accomplished without major changes to the platform architecture or applications by using new tags and data transformations.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

272

Notice of Privacy Practices University of Connecticut Effective Date: April 14, 2003  

E-Print Network (OSTI)

providers of service may have different policies or notices regarding the information they maintain about this notice of our legal duties and privacy policy practices with respect to your PHI; and Follow the terms, counterintelligence, and other national security activities authorized by law. Protective Services for the President

Holsinger, Kent

273

Privacy-preserving screen capture: Towards closing the loop for health IT usability  

Science Conference Proceedings (OSTI)

As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world health IT systems are typically ... Keywords: Health IT, Privacy, Redaction, Security, Usability

Joseph Cooley, Sean Smith

2013-08-01T23:59:59.000Z

274

A semantic framework to protect the privacy of electronic health records with non-numerical attributes  

Science Conference Proceedings (OSTI)

Structured patient data like Electronic Health Records (EHRs) are a valuable source for clinical research. However, the sensitive nature of such information requires some anonymisation procedure to be applied before releasing the data to third parties. ... Keywords: Electronic health records, Privacy, SNOMED CT, Semantic similarity, Statistical disclosure control

Sergio MartNez; David SNchez; Aida Valls

2013-04-01T23:59:59.000Z

275

Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining  

Science Conference Proceedings (OSTI)

Data-mining techniques can be used not only to study collective behavior about customers, but also to discover private information about individuals. In this study, we demonstrate that decision trees, a popular classification technique for data mining, ... Keywords: computers, data mining, databases/artificial intelligence, decision trees, entropy, privacy, probability, pruning, public sector, relative entropy, society

Xiao-Bai Li; Sumit Sarkar

2009-11-01T23:59:59.000Z

276

Privacy-friendly Aggregation for the Smart-grid Klaus Kursawe1  

E-Print Network (OSTI)

Privacy-friendly Aggregation for the Smart-grid Klaus Kursawe1 , George Danezis2 , and Markulf additional information about the individual meter readings. 1 Introduction. Smart-grid deployments issue for electricity metering, and will be one significant use-case in the upcoming smart grid

Danezis, George

277

Privacy Protection for Social Networking Platforms, Web 2.0 Security and Privacy  

E-Print Network (OSTI)

Social networking platforms integrate third-party content into social networking sites and give third-party developers access to user data. These open interfaces enable popular site enhancements but pose serious privacy risks by exposing user data to third-party developers. We address the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacy-preserving API. Our design is motivated by an analysis of the data needs and uses of Facebook applications. We studied 150 popular Facebook applications and found that nearly all applications could maintain their functionality using a limited interface that only provides access to an anonymized social graph and placeholders for user data. Since the platform host can control the third party applications output, privacy-by-proxy can be accomplished by using new tags and data transformations without major changes to either the platform architecture or applications.

Adrienne Felt; David Evans

2008-01-01T23:59:59.000Z

278

SmokeScreen: flexible privacy controls for presence-sharing  

Science Conference Proceedings (OSTI)

Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both trusted social relations and untrusted strangers. In this paper, we present ... Keywords: location privacy, mobile computing, pervasive computing, presence-sharing, social networks

Landon P. Cox; Angela Dalton; Varun Marupadi

2007-06-01T23:59:59.000Z

279

Comments of Avista Corporation on DOE Request forInformation...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Avista Corporation on...

280

Re: DOE Request for Information - Implementing the National Broadband...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy ("DOE" or "Department") for information on state efforts to enact Smart Grid privacy and data collection policies; utility practices and policies regarding...

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Regarding Request for Information Published at 75 Fed. Reg. 26...  

NLE Websites -- All DOE Office Websites (Extended Search)

(May 11, 2010) "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy" Regarding Request for Information...

282

Reply comments to DOE Request for Information-Implementing the...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Reply comments to DOE Request for...

283

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer, H. Vincent Poor  

E-Print Network (OSTI)

Smart Meter Privacy: A Utility-Privacy Framework S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far and the utility requirements of smart meter data. This leads to a novel privacy-utility tradeoff problem

Sankar, Lalitha

284

C4PS: colors for privacy settings  

Science Conference Proceedings (OSTI)

The ever increasing popularity of Facebook and other Online Social Networks has left a wealth of personal and private data on the web, aggregated and readily accessible for broad and automatic retrieval. Protection from both undesired recipients and ... Keywords: access control, online social networks, privacy

Thomas Paul; Martin Stopczynski; Daniel Puscher; Melanie Volkamer; Thorsten Strufe

2012-04-01T23:59:59.000Z

285

Summary of Decisions- October 29, 2012 November 2, 2012  

Energy.gov (U.S. Department of Energy (DOE))

Decisions were issued on: - Freedom of Information Act Appeal - Personnel Security (10 CFR Part 710) - Privacy Act Appeal

286

Coal Mine Safety Act (Virginia)  

Energy.gov (U.S. Department of Energy (DOE))

This Act is the primary legislation pertaining to coal mine safety in Virginia. It contains information on safety rules, safety standards and required certifications for mine workers, prohibited...

287

Targeted Advertising ... And Privacy Too  

Science Conference Proceedings (OSTI)

The Web presents a rich and powerful tool for aggregation of consumer information. A flurry of recent articles in the popular press has documented aggressive manipulation of such information by some companies for the purposes of targeted advertising. ...

Ari Juels

2001-04-01T23:59:59.000Z

288

USDOE, Office of Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any

289

The Future of Tax Privacy  

E-Print Network (OSTI)

Inspector General noted in a 2007 report, IRS employees "are required to take sensitive taxpayer information out of the office

Schwartz, Paul M.

2009-01-01T23:59:59.000Z

290

No Fear Act Data | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No Fear Act Data No Fear Act Data No Fear Act Data This document contains data related to the No FEAR Act including complaint basis, processing time, complaints dismissed, and historical information. For more information about the No FEAR Act, visit http://energy.gov/diversity/services/protecting-civil-rights/no-fear-act FY 2013 First Quarter No FEAR Act FY 2012 No FEAR Act Data 2006 through 2011 No Fear Act Data Summary.pdf October 1, 2005 through September 30, 2006 No Fear Act.pdf October 1, 2003 through September 30, 2004 No Fear Act.pdf October 1, 2002 through September 30, 2003 No Fear Act.pdf October 1, 2001 through September 30, 2002 No Fear Act.pdf More Documents & Publications DOE F 1600.1 NOTIFICATION AND FEDERAL EMPLOYEE ANTIDISCRIMINATION AND RETALIATION ACT OF

291

PAPERWORK REDUCTION ACT OF 1995  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PAPERWORK REDUCTION ACT PAPERWORK REDUCTION ACT OF 1995 U. S. DEPARTMENT OF ENERGY INFORMATION COLLECTION MANAGEMENT PROGRAM Chris Rouleau, PRA Officer Records Management Division Office of the Associate Chief Information Officer for IT Planning, Architecture and E-Government Office of the Chief Information Officer Office of the Chief Information Officer 2/16/2010 2 TOPICS  Paperwork Reduction Act (PRA) of 1995 - Law  Paperwork Reduction Act - Overview  Information Collection Requests (ICRs)  Information Collection Request Associated with A Notice of Proposed Rule Making  Program Points of Contacts  Information Collection Clearance Managers  Information Collection Requests Checklist  Drivers  Annual Information Collection Budget  Summary of What To Do  Summary of What NOT

292

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access, Third Party Use and Privacy- Comments of Utilities Telecom Council NBP RFI: Data Access, Third Party Use and Privacy- Comments of Utilities Telecom Council The Utilities...

293

NBP RFI: Data Access, Third Party Use and Privacy- Comments of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company NBP RFI: Data Access, Third Party Use and Privacy- Comments of Baltimore Gas & Electric Company...

294

Privacy-friendly Energy-metering via Homomorphic Encryption  

E-Print Network (OSTI)

revealed is minimal. There is one issue though, for leakage or fraud detection and smart-grid optimizationPrivacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation, 17 Nov 2009. www.ipc.on.ca/images/Resources/pbd-smartpriv-smartgrid Standards, 1 Dec 2009. http://epic.org/privacy/ smartgrid/EPIC_Smart_Grid-Cybersecurity_12-01-09.2.pdf. [Har

Jacobs, Bart

295

EIA - Privacy Statement & Security Policy  

U.S. Energy Information Administration (EIA)

... you should know that EIA collects and stores a standard set of Internet-related information, such as an Internet Protocol (IP) address, the date and time, the ...

296

PRIVACY IMPACT ASSESSMENT: SPRO Physical Security Major Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessments, for requirements and additional gUidance for conducting a PIA: http:www.directives.doe.govpdfsdoedoetexUneword206o2061.pdf MODULE I - PRIVACY NEEDS...

297

Enhancing Privacy in Participatory Sensing Applications with Multidimensional Data  

Science Conference Proceedings (OSTI)

Participatory sensing applications rely on individuals to share personal data to produce aggregated models and knowledge. In this setting, privacy concerns can discourage widespread adoption of new applications. We present a privacy-preserving participatory sensing scheme based on negative surveys for both continuous and multivariate categorical data. Without relying on encryption, our algorithms enhance the privacy of sensed data in an energy and computation efficient manner. Simulations and implementation on Android smart phones illustrate how multidimensional data can be aggregated in a useful and privacy-enhancing manner.

Forrest, Stephanie [University of New Mexico, Albuquerque; He, Wenbo [University of Nebraska, Lincoln; Groat, Michael [University of New Mexico, Albuquerque; Edwards, Benjamin [University of New Mexico, Albuquerque; Horey, James L [ORNL

2013-01-01T23:59:59.000Z

298

Re: U.S. Department of Energy Request for Information Implementing...  

NLE Websites -- All DOE Office Websites (Extended Search)

for Information Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Re: U.S. Department of Energy...

299

Privacy-Preserving Friends Troubleshooting Network  

E-Print Network (OSTI)

Abstract Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topeer systems to tackle a new problem: automatic misconfiguration troubleshooting. In this setting, machine configurations from peers are shared to diagnose misconfigurations on a sick machine. The key challenges are preserving privacy of individual configuration data and ensuring the integrity of peer contributions. To this end, we construct the Friends Troubleshooting Network (FTN), a peer-to-peer overlay network, where the links between peer machines reflect the friendship of their owners. Our FTN manifests recursive trust rather than transitive trust. To achieve privacy, we use the general scheme of a historyless and futureless random-walk for routing, during which search is carried out simultaneously with secure parameter aggregation for the purpose of troubleshooting. Our design has been guided by the characteristics of a real-world friends network, the MSN Instant Messenger (IM) network. We have prototyped our FTN system and analyzed the tradeoff between privacy and protocol efficiency. I.

Qiang Huang; Helen J. Wang; Nikita Borisov

2005-01-01T23:59:59.000Z

300

Design and Evaluation of an Architecture for Location Privacy  

E-Print Network (OSTI)

Many operators of cellphone networks now offer location-based services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a persons location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operators customers in a privacy-preserving way. We propose an architecture for location-based services based on Trusted Computing and Secure Logging. Trusted Computing lets an operator query the configuration of a location-based service. The operator will hand over location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors the composition or the timing of information flowing into and out of its service, and active attacks, where the provider modifies or injects customer queries to the service. We introduce several requirements that must be satisfied by a location-based service to defend against passive attacks. Furthermore, we present Secure Logging, an auditing mechanism to defend against active attacks. We present an implementation of our architecture and demonstrate its usefulness by building two sample location-based services on top of it. The evaluation of our architecture shows that its processing delay is hardly noticeable and that timing attacks are very unlikely to succeed. 1

Urs Hengartner

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Security and privacy threats in IoT architectures  

Science Conference Proceedings (OSTI)

In this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture. ... Keywords: IoT architecture, energy consumption, future internet, privacy, security, trust

Denis Kozlov; Jari Veijalainen; Yasir Ali

2012-02-01T23:59:59.000Z

302

RFID, privacy and the perception of risk: A strategic framework  

Science Conference Proceedings (OSTI)

Against the background of the first RFID-Rollouts by large retailers in North America and Europe, this paper concerns itself with the perception of RFID technology as a risk to privacy. The objective of our contribution is to identify, at a relatively ... Keywords: Privacy, RFID, Risk perception, Technology acceptance

Frdric Thiesse

2007-06-01T23:59:59.000Z

303

Privacy-friendly energy-metering via homomorphic encryption  

Science Conference Proceedings (OSTI)

The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meters) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication ... Keywords: homomorphic encryption, privacy, smart-metering

Flavio D. Garcia; Bart Jacobs

2010-09-01T23:59:59.000Z

304

A PLA-based privacy-enhancing user modeling framework and its evaluation  

Science Conference Proceedings (OSTI)

Reconciling personalization with privacy has been a continuing interest in user modeling research. This aim has computational, legal and behavioral/attitudinal ramifications. We present a dynamic privacy-enhancing user modeling framework that supports ... Keywords: Compliance, Disclosure behavior, Performance evaluation, Privacy laws, Privacy preferences, Product line architecture, User experiment, User modeling

Yang Wang; Alfred Kobsa

2013-03-01T23:59:59.000Z

305

Judicial support systems: ideas for a privacy ontology-based case analyzer  

Science Conference Proceedings (OSTI)

Nowadays, ontology is applied as an integral part of many applications in several domains, especially in the world of law. The ontology based judicial support system is believed as a useful tool to support, for example, the legal argumentation assistant ... Keywords: privacy directives, privacy ontology, privacy ontology structure, privacy principles, woolf reforms

Yan Tang; Robert Meersman

2005-10-01T23:59:59.000Z

306

PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-. -. ., ,-- -.' * PRIVACY IMPACT ASSESSMENT: OFFICE OF LEGACY MANAGEMENT: RECORDS HANDLING SYSTEM: ELECTRONIC RECORDS KEEPING SYSTEM PIA Template Version - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1. Department of Energy Privacy Program, Appendix A. Privacy Impact Assessments. for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/02061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT Date Deparbnental Element & Site . June 4, 2009 Office of Legacy Management, Morgantown, WV :;:~:f~~r~;;:reC: LM Records Handling System (LMRHS01) - Electronic Records Keeping System exhibit Project UID 019-10-01-31-02-1014-00

307

PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

* * PRIVACY IMPACT ASSESSMENT: INL INGSM2009 PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetext/neword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT D.. June 16, 2009 Deparlnient~", Element &Site Idaho National Laboratory N.....,e,df'llnformatlon 10th International Nuclear Graphite Specialists Meeting registration web site. ,SY8tem,orIT Project exhibit Project UID Enterprise Architecture Application 10 - 223419 NewPIA D Update 0 System

308

Privacy engineering for social networks  

E-Print Network (OSTI)

. BONNEAU, J. ANDERSON, R. J. ANDERSON, AND F. STAJANO. Eight friends are enough: social graph approximation via public listings. In SNS 09: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pages 1318. ACM, Mar. 2009. doi:10... (SNS) [7] and Prying Data out of a Social Network, a summary of various methods that we used to extract information from the service, published at the 2009 International Con- ference on Advances in Social Networks Analysis and Mining (ASONAM) [8]. I...

Anderson, Jonathan

2013-01-08T23:59:59.000Z

309

Website Policies and Important Links | Scientific and Technical Information  

Office of Scientific and Technical Information (OSTI)

Website Policies and Important Links Website Policies and Important Links Print page Print page Email page Email page This page provides a comprehensive overview of the policies of this federally sponsored website, consistent with guidance established by the U.S. Office of Management and Budget (OMB) as implemented by the U.S. Department of Energy. Disclaimer Acceptable Use Policy User Privacy Copyright, Restrictions, and Permissions Notice Accessibility/Section 508 Website Security Linking to OSTI Website Linking to Outside Websites Data Rights Freedom of Information Information Quality No Fear Act Schedule for Posting Information Comments Policy USAJOBS Grants Regulations USA.gov Disclaimer This system is made available by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of

310

PETROLEUM INDUSTRY INFORMATION REPORTING ACT  

E-Print Network (OSTI)

, dealer tank wagon prices, terminal stocks, and refinery inventory levels were used in the Spring 2006 Petroleum Fuels Price Spike Report to the Governor, CEC-600-2006-012. The data supported calculations,000 individual gas stations in the state. With this tremendous reporting requirement 100 percent compliance

311

Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users  

Science Conference Proceedings (OSTI)

The present study adopts the Communication Privacy Management theory and investigates the factors that influence the extent of private information disclosure of Facebook mobile phone users. Using a sample size of 488 adult mobile phone users, the study ... Keywords: Facebook, Information disclosure, Mobile phone users, Older adults, Online privacy, Online social networks

Victoria Kisekka, Sharmistha Bagchi-Sen, H. Raghav Rao

2013-11-01T23:59:59.000Z

312

Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief Information Security Officer Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief Information Security Officer Paul Cunningham-Acting Associate CIO for Cybersecurity & Acting Chief Information Security Officer As the acting Associate Chief Information Officer for Cybersecurity, Mr. Cunningham serves as the Department's Chief Information Security Officer charged with managing the agency's enterprise cybersecurity program. Mr. Cunningham advises the Department's CIO and senior agency officials in the implementation of cybersecurity and the Department's Risk Management Approach. Mr. Cunningham provides executive leadership and guidance for joint agency and Administration cybersecurity initiatives including for the

313

A privacy-preserving index for range queries  

Science Conference Proceedings (OSTI)

Database outsourcing is an emerging data management paradigm which has the potential to transform the IT operations of corporations. In this paper we address privacy threats in database outsourcing scenarios where trust in the service provider is limited. ...

Bijit Hore; Sharad Mehrotra; Gene Tsudik

2004-08-01T23:59:59.000Z

314

Proceedings of the Sixth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Sixth Symposium On Usable Privacy and Security! This year's program features 16 technical papers, two workshops, 17 posters, 11 posters published in the past year at other conferences, a panel, five discussion sessions, and an invited ...

Lorrie Faith Cranor

2010-07-01T23:59:59.000Z

315

Energy Policy Act Transportation Rate Study: Interim Report on ...  

U.S. Energy Information Administration (EIA)

ii Energy Information Administration/ Energy Policy Act Transportation Rate Study: Interim Report on Coal Transportation Contacts This report, Energy Policy Act ...

316

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-12-20T23:59:59.000Z

317

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2012-10-01T23:59:59.000Z

318

A rhetorical analysis of the right to privacy  

E-Print Network (OSTI)

Although no guarantee exists in the Constitution to a right to privacy, it is now generally accepted that individuals have a right to be "let alone.'' In this thesis, I will propose an alternative formulation of the right to privacy, using insights gleaned from rhetorical and communication theory. I will bring "outside'' perspectives to the legal problem of privacy. The right to privacy as established in Griswold holds promise as a coherent interpretive model for evaluating the constitutionality of statutes concerning civil liberties. The systematic consideration of Kenneth Burke's writings on constitutions helps to clarify disputes in methods of constitutional interpretation, and helps to defend the right to privacy against texualists and original intent theorists. Expanding the analysis of privacy to its cultural implications, Michel Foucault's concept of "governmentality'' aids in charting the foundations of the power relationships animating contemporary society. New technologies and the Internet threaten to monopolize on the distribution of power in society. Consequently these technologies threaten the fulfillment of the ideal of a liberal political order. The understanding of the shift in the distribution of power within society facilitates recognition of the importance of subtle manifestation of resistance to the totalizing power of these technologies.

Spatz, George Reynolds

1999-01-01T23:59:59.000Z

319

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna  

E-Print Network (OSTI)

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid

Prasanna, Viktor K.

320

Radiation Protection Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

EMSL: Capabilities: American Recovery and Reinvestment Act  

NLE Websites -- All DOE Office Websites (Extended Search)

American Recovery and Reinvestment Act American Recovery and Reinvestment Act Recovery Act Logo EMSL researchers are benefitting from a recent $60 million investment in innovation through the American Recovery and Reinvestment Act. These Recovery Act funds were employed to further develop and deploy transformational capabilities that deliver scientific discoveries in support of DOE's mission. Today, they are helping EMSL accomplish the following: Establish leadership in in situ chemical imaging and procure ultrahigh-resolution microscopy tools Additional Information Investing in Innovation: EMSL and the American Recovery and Reinvestment Act Recovery Act and Systems Biology at EMSL Recovery Act Instruments coming to EMSL In the News EMSL ARRA Capability Features News: Recovery Act and PNNL Recovery Act in the Tri-City Herald

322

EMSL: Capabilities: American Recovery and Reinvestment Act  

NLE Websites -- All DOE Office Websites (Extended Search)

EMSL Procurements under Recovery Act EMSL Procurements under Recovery Act Additional Information Investing in Innovation: EMSL and the American Recovery and Reinvestment Act Recovery Act and Systems Biology at EMSL Recovery Act Instruments coming to EMSL In the News EMSL ARRA Capability Features News: Recovery Act and PNNL Recovery Act in the Tri-City Herald Related Links Recovery.gov DOE and the Recovery Act Message from Energy Secretary Chu Recovery Act at PNNL EMSL evolves with the needs of its scientific users, and the American Recovery and Reinvestment Act has helped to accelerate this evolution. Thirty-one instruments were acquired and installed at EMSL. These instruments are listed below, and each listing is accompanied by a brief overview. Each of these new and leading-edge instruments was chosen by design to

323

Selective collision based medium access control protocol for proactive protection of privacy for RFID  

Science Conference Proceedings (OSTI)

RFID is rapidly being deployed because of its versatility. However, the privacy problem cannot be handled effectively because of limited capability of RFID tags. We propose a secure medium access control(MAC) protocol to solve the privacy problem. Our ...

JuSung Park; Jeonil Kang; DaeHun Nyang

2005-12-01T23:59:59.000Z

324

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing  

E-Print Network (OSTI)

Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing CARMAN NEUSTAEDTER, S. and Boyle, M. (2006). Blur Filtration Fails to Preserve Privacy for Home-Based Video Conferencing

Greenberg, Saul

325

Privacy-preserving data mining through data publishing and knowledge model sharing  

Science Conference Proceedings (OSTI)

For the past decade or so, the needs for organizations to share data for knowledge discovery and data mining have increased significantly. Meanwhile, privacy issues have become widely recognized and motivated the research on privacy-preserving data mining ...

Hongwei Tian / Weining Zhang

2012-01-01T23:59:59.000Z

326

The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness  

E-Print Network (OSTI)

. Specifically, we detail how and why: 1. existing privacy mechanisms are leveraged for use in home-based video

Greenberg, Saul

327

A framework for context-aware privacy of sensor data on mobile systems  

Science Conference Proceedings (OSTI)

We study the competing goals of utility and privacy as they arise when a user shares personal sensor data with apps on a smartphone. On the one hand, there can be value to the user for sharing data in the form of various personalized services and recommendations; ... Keywords: Android, behavioral privacy, context-awareness, inferences, ipShield, model-based privacy

Supriyo Chakraborty; Kasturi Rangan Raghavan; Matthew P. Johnson; Mani B. Srivastava

2013-02-01T23:59:59.000Z

328

Home is safer than the cloud!: privacy concerns for consumer cloud storage  

Science Conference Proceedings (OSTI)

Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations ... Keywords: cloud storage, cross-cultural, privacy, social factors, usability

Iulia Ion; Niharika Sachdeva; Ponnurangam Kumaraguru; Srdjan ?apkun

2011-07-01T23:59:59.000Z

329

The language of privacy: Learning from video media space analysis and design  

Science Conference Proceedings (OSTI)

Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy ... Keywords: Human-computer interaction, autonomy, computer-supported cooperative work (CSCW), confidentiality, environmental psychology, privacy, social interaction, solitude, user interface design, video media spaces

Michael Boyle; Saul Greenberg

2005-06-01T23:59:59.000Z

330

ARM - Recovery Act Instruments  

NLE Websites -- All DOE Office Websites (Extended Search)

ActRecovery Act Instruments ActRecovery Act Instruments Recovery Act Logo Subscribe FAQs Recovery Act Instruments Recovery Act Fact Sheet March 2010 Poster (PDF, 10MB) External Resources Recovery Act - Federal Recovery Act - DOE Recovery Act - ANL Recovery Act - BNL Recovery Act - LANL Recovery Act - PNNL Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Recovery Act Instruments These pages provide a breakdown of the new instruments planned for installation among the permanent and mobile ARM sites. In addition, several instruments will be purchased for use throughout the facility and deployed as needed. These are considered "facility spares" and are included in the table below. View All | Hide All ARM Aerial Facility Instrument Title Instrument Mentor Measurement Group Measurements

331

Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University  

Science Conference Proceedings (OSTI)

Computer Science research and practice are raising growing privacy concerns among the public and government. Computer technology's increasing ability to capture, organize, interpret and share data about individuals raises questions about what privacy ... Keywords: data mining, ethics, face recognition, institutional review board, personal assistants, privacy, privacy technology, surveillance

Latanya Sweeney

2004-03-01T23:59:59.000Z

332

Energy Monitoring Act (Canada) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Monitoring Act (Canada) Energy Monitoring Act (Canada) Energy Monitoring Act (Canada) < Back Eligibility Commercial Developer Fuel Distributor Industrial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative State/Provincial Govt Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alberta Program Type Environmental Regulations Generation Disclosure Provider Minister of Natural Resources This act requires that every energy enterprise file with the Minister a return setting out statistics and information relating to its ownership and control; financial information; information, including financial, about its exploration for, development, production, processing, refining and

333

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... with the requirements of the Office of Management and Budget (OMB) Circular ... D-6 05-07-2013 Editorial Change SC-18 Priority Code from P1 to P2 ...

2013-05-08T23:59:59.000Z

334

Security and Privacy Controls for Federal Information Systems ...  

Science Conference Proceedings (OSTI)

... AU-15 Alternate Audit Capability P0 Not Selected Not Selected Not Selected AU-16 Cross-Organizational Auditing P0 Not Selected Not Selected ...

2013-05-09T23:59:59.000Z

335

Energy Policy Act Transportation Study: Interim Report on ...  

U.S. Energy Information Administration (EIA)

Energy Information Administration iii Energy Policy Act Transportation Study: Interim Report on Natural Gas Flows and Rates Preface This report, ...

336

On mental privacy: the having of mental states  

E-Print Network (OSTI)

In three chapters this thesis seeks to demonstrate that (i) there historically has been no consensus in the use of the term 'mental privacy' and that several problematic doctrines are based on confused accounts of this term; (ii) there are contemporary debates which are maintained, in large order, by the opposing sides subscribing to different notions of mental privacy; and (iii) a preliminary investigation makes clear that both mental states with propositional content and mental states with non-propositional content are private in that both require the agent to have the state.

Dembitzer, Simon David

1998-01-01T23:59:59.000Z

337

TERMS OF REFERENCE PARLIAMENTARY COMMITTEES ACT 2003 INQUIRY INTO IMPROVING ACCESS TO VICTORIAN PUBLIC SECTOR INFORMATION AND DATA That the Economic Development and Infrastructure Committee inquire into, consider  

E-Print Network (OSTI)

and report to Parliament on the potential application of open content 1 and open source 2 licensing to Victorian Government information and, in particular, the Committee is asked to: a) report on the potential economic benefits and costs to Victoria of maximising access to and use of Government information for commercial and/or noncommercial purposes, including consideration of: i. public policy developments elsewhere in Australia and internationally; and ii. the types of information that will provide the greatest potential benefit; b) consider whether use of open source and open content licensing models, including Creative Commons, would enhance the discovery, access and use of Government information;

unknown authors

2008-01-01T23:59:59.000Z

338

JGI - IMG-ACT  

NLE Websites -- All DOE Office Websites (Extended Search)

Education Microbial Genome Analysis Microbial Functional Genomics IMG-ACT IMG Annotation Collaboration Toolkit (IMG-ACT) is a multi-platform toolkit created to assist instructors...

339

NO FEAR Act Notice  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Energy's notice for the No FEAR Act. To learn more about the No FEAR Act, visit this page.

340

Reply comments to DOE Request for Information-Implementing the National  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reply comments to DOE Request for Information-Implementing the Reply comments to DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Reply comments to DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Reply comments from Southern California Edison on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Reply comments to DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy More Documents & Publications Re: U.S. Department of Energy Request for Information Implementing the

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Security and privacy issues for the network of the future  

Science Conference Proceedings (OSTI)

The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service ... Keywords: networks, privacy, security

Giannis F. Marias; Joo Barros; Markus Fiedler; Andreas Fischer; Harald Hauff; Ralph Herkenhoener; Antonio Grillo; Alessandro Lentini; Luisa Lima; Charlott Lorentzen; Wojciech Mazurczyk; Hermann de Meer; Paulo F. Oliveira; George C. Polyzos; Enric Pujol; Krzysztof Szczypiorski; Joo P. Vilela; Tiago T. V. Vinhoza

2012-09-01T23:59:59.000Z

342

Cyber Security and Privacy Landscape of the Electric Sector  

Science Conference Proceedings (OSTI)

This project provides ongoing updates on the status of research and development activities, federal and state policy and regulatory proposals, standards and guidance document development, key personnel, and organizations that are funding or executing smart grid cyber security and privacy activities.

2012-04-17T23:59:59.000Z

343

Protecting the sink location privacy in wireless sensor networks  

Science Conference Proceedings (OSTI)

Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. ... Keywords: Location privacy, Receiver, Sink, WSN

Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu

2013-06-01T23:59:59.000Z

344

Location privacy and resilience in wireless sensor networks querying  

Science Conference Proceedings (OSTI)

Due to the wireless nature of communication in sensor networks, the communication patterns between sensors could be leaked regardless of the adoption of encryption mechanisms-those would just protect the message content. However, communication patterns ... Keywords: Location privacy, Probabilistic algorithm, Resiliency, Security, Wireless sensor networks

Roberto Di Pietro; Alexandre Viejo

2011-03-01T23:59:59.000Z

345

Privacy nudges for social media: an exploratory Facebook study  

Science Conference Proceedings (OSTI)

Anecdotal evidence and scholarly research have shown that a significant portion of Internet users experience regrets over their online disclosures. To help individuals avoid regrettable online disclosures, we employed lessons from behavioral decision ... Keywords: facebook, nudge, online disclosure, privacy, soft paternalism

Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, Lorrie Faith Cranor

2013-05-01T23:59:59.000Z

346

Trusting to learn: trust and privacy issues in serious games  

Science Conference Proceedings (OSTI)

Organizations are increasingly investing in technology-enhanced learning systems to improve their employees' skills. Serious games are one example; the competitive and fun nature of games is supposed to motivate employee participation. But any system ... Keywords: privacy, serious games, technology-enhanced learning, trust

Miguel Malheiros; Charlene Jennett; Will Seager; M. Angela Sasse

2011-06-01T23:59:59.000Z

347

Private sector video surveillance in Toronto: not privacy compliant!  

Science Conference Proceedings (OSTI)

We report on the findings of a fieldwork study conducted on private sector video surveillance and signage in the Toronto area. The presence and operation of over 140 video surveillance camera schemes by large service providing corporations, in 2 major ... Keywords: PIPEDA, privacy, private sector, regulation, video surveillance

Andrew Clement; Joseph Ferenbok; Roxanna Dehghan; Laura Kaminker; Simeon Kanev

2012-02-01T23:59:59.000Z

348

Locanyms: towards privacy-preserving location-based services  

Science Conference Proceedings (OSTI)

Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based Services (LBS), personalizing the services ... Keywords: location-based services, privacy, ubiquitous computing

Sebastien Gambs; Marc-Olivier Killijian; Matthieu Roy; Moussa Traore

2012-05-01T23:59:59.000Z

349

Security and privacy for geospatial data: concepts and research directions  

Science Conference Proceedings (OSTI)

Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among ... Keywords: GIS, geospatial data, privacy, security

Elisa Bertino; Bhavani Thuraisingham; Michael Gertz; Maria Luisa Damiani

2008-11-01T23:59:59.000Z

350

Trust enhanced ubiquitous payment without too much privacy loss  

Science Conference Proceedings (OSTI)

Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in a customer, a means to link transactions using the same e-purse is required. ... Keywords: context, payment, privacy, trust, ubicomp

Jean-Marc Seigneur; Christian Damsgaard Jensen

2004-03-01T23:59:59.000Z

351

Proceedings of the Ninth Symposium on Usable Privacy and Security  

Science Conference Proceedings (OSTI)

Welcome to the Ninth Symposium On Usable Privacy and Security! This year's program features 15 technical papers, three workshops, 25 posters, 5 posters/papers published in the past year at other conferences, a panel, two lightning talks and demo sessions, ...

Lorrie Faith Cranor, Lujo Bauer, Konstantin Beznosov

2013-07-01T23:59:59.000Z

352

Impact of Personal Privacy Devices for WAAS Aviation Users  

E-Print Network (OSTI)

Impact of Personal Privacy Devices for WAAS Aviation Users Grace Xingxin Gao, Kazuma Gunning, Todd or monitored. Figure 1 lists some examples of PPDs currently for sale on Internet. They are low-cost jamming [3], potentially aviation users. Figure 1. PPDs for Sale on Internet Aviation users rely on Wide Area

Stanford University

353

Privacy-preserving smart metering with multiple data Consumers  

Science Conference Proceedings (OSTI)

The increasing diffusion of Automatic Meter Reading (AMR) and the possibility to open the system to third party services has raised many concerns about the protection of personal data related to energy, water or gas consumption, from which details about ... Keywords: Data privacy, Multiparty computation, Smart grid

Cristina Rottondi, Giacomo Verticale, Antonio Capone

2013-05-01T23:59:59.000Z

354

Fermilab | Recovery Act  

NLE Websites -- All DOE Office Websites (Extended Search)

NOvA NOvA In April 2010, workers set up two cranes at the construction site for the NOvA detector facility in Ash River, Minnesota. In 2009, the U.S. Department of Energy's Office of Science, under the American Recovery and Reinvestment Act, provided DOE's Fermi National Accelerator Laboratory with $114.2 million. Fermilab invested the funds in critical scientific infrastructure to strengthen the nation's global scientific leadership as well as to provide immediate economic relief to local communities. This Web site provided citizens with clear and accurate information about how Fermilab used the new funding and its immediate benefits for our neighbors and our nation. Features photo Industrial Building 3 addition Fermilab Today-November 5, 2010 IB3 addition nears completion

355

Re: U.S. Department of Energy Request for Information Implementing the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Re: U.S. Department of Energy Request for Information Implementing Re: U.S. Department of Energy Request for Information Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Re: U.S. Department of Energy Request for Information Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Florida Power & Light Company comments on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid: Data Access, Third Party Use, and Privacy Re: U.S. Department of Energy Request for Information Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy More Documents & Publications

356

inform  

Science Conference Proceedings (OSTI)

The monthly member publication of AOCS. inform Inform Magazine Membership Merchandise Subscriptions Journals Membership Merchandise 8C5A902BB64F1A5D499524EFF5918AE0 INFORM-NM 2008

357

Coastal Management Act (Georgia)  

Energy.gov (U.S. Department of Energy (DOE))

The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

358

Televisions, video privacy, and powerline electromagnetic interference  

Science Conference Proceedings (OSTI)

We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. In addition to being of scientific interest, our findings contribute to ... Keywords: electromagnetic interference, information leakage, powerline security

Miro Enev; Sidhant Gupta; Tadayoshi Kohno; Shwetak N. Patel

2011-10-01T23:59:59.000Z

359

NIST Organic Act  

Science Conference Proceedings (OSTI)

... brush fires, fires underground, oil blowout fires ... Personnel Act of 1970 who are ... and manufacturing techniques, including supply chain integration ...

2013-02-14T23:59:59.000Z

360

Cyber Security and Privacy Industry Tracking Newsletter, April 2012  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-04-11T23:59:59.000Z

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Cyber Security and Privacy Industry Tracking Newsletter, April, 2013  

Science Conference Proceedings (OSTI)

EPRIs tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-03-26T23:59:59.000Z

362

Cyber Security and Privacy Industry Tracking Newsletter, July 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-06-25T23:59:59.000Z

363

Cyber Security and Privacy Industry Tracking Newsletter: December 2012  

Science Conference Proceedings (OSTI)

The Electric Power Research Institute (EPRI) remains committed to supporting the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts, EPRI works diligently to stay abreast of the present state of standards and guideline developments, as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups and insights into future activities.This ...

2012-12-28T23:59:59.000Z

364

Cyber Security and Privacy Industry Tracking Newsletter, October 2013  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2013-10-11T23:59:59.000Z

365

Cyber Security and Privacy Industry Tracking Newsletter, October 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-09-26T23:59:59.000Z

366

Cyber Security and Privacy Industry Tracking Newsletter, July 2012  

Science Conference Proceedings (OSTI)

EPRI's tracking and outreach efforts reflect its continued commitment to support the power industry in the identification of cyber security and privacy issues and efforts for the electric sector. In support of these efforts EPRI works diligently to stay abreast of the present state of standards and guideline developments as well as regulatory governance. This newsletter provides highlights and status of ongoing efforts by numerous working groups, as well as insights into future activities.

2012-07-02T23:59:59.000Z

367

Plug-in privacy for Smart Metering billing  

E-Print Network (OSTI)

Smart Metering is a concept that allows to collect fine-grained consumption profiles from customers by replacing traditional electricity meters with Smart Meters in customers' households. The recorded consumption profile is the basis for the calculation of time-dependent tariffs but also allows deduction of the inhabitant's personal schedules and habits. The current reporting of such consumption profiles only protects this data from 3rd parties but falls short to protect the customer's privacy from illegitimate abuse by the supplier itself. We propose a privacy-preserving profile reporting protocol that enables billing for time-dependent tariffs without disclosing the actual data of the consumption profile to the supplier. Our approach relies on a zero-knowledge proof based on Pedersen Commitments performed by a plug-in privacy component that is put into the communication link between Smart Meter and supplier's back-end systems and requires no change to Smart Meter hardware and only little change to the softw...

Jawurek, Marek; Kerschbaum, Florian

2010-01-01T23:59:59.000Z

368

STANFORD UNIVERSITY NOTICE OF PRIVACY PRACTICES  

E-Print Network (OSTI)

of the workforce are committed to following the policies outlined in this Notice. HOW WE MAY USE AND DISCLOSE medical information about you to authorized federal officials for intelligence, counterintelligence

Ford, James

369

Decentralised privacy preservation in social networks  

Science Conference Proceedings (OSTI)

Social networks have become increasingly popular over the past decade, almost in all user communities. Users, in such networks, post a variety of their (personal) information on electronic profiles ? initially accessible by their friends, yet ...

Amir H. Chinaei; Rosa Karimi Adl; Chenen Liang; Ken Barker

2012-04-01T23:59:59.000Z

370

Clean Air Act. Revision 5  

SciTech Connect

This Reference Book contains a current copy of the Clean Air Act, as amended, and those regulations that implement the statute and appear to be most relevant to DOE activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. This Reference Book has been completely revised and is current through February 15, 1994.

Not Available

1994-02-15T23:59:59.000Z

371

Tracking website data-collection and privacy practices with the iWatch web crawler  

Science Conference Proceedings (OSTI)

In this paper we introduce the iWatch web crawler, a tool designed to catalogue and analyze online data practices and the use of privacy related indicators and technologies. Our goal in developing iWatch was to make possible a new type of analysis of ... Keywords: P3P, cookies, data-collection practices, demographics, legislative impact, privacy, web-crawling, webbugs

Carlos Jensen; Chandan Sarkar; Christian Jensen; Colin Potts

2007-07-01T23:59:59.000Z

372

Privacy-preserving smart metering with regional statistics and personal enquiry services  

Science Conference Proceedings (OSTI)

In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, we propose ... Keywords: authentication, privacy, smart metering

Cheng-Kang Chu; Joseph K. Liu; Jun Wen Wong; Yunlei Zhao; Jianying Zhou

2013-05-01T23:59:59.000Z

373

"I know what you did last summer": query logs and user privacy  

Science Conference Proceedings (OSTI)

We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers to map a sequence of queries into the gender, age, and location of the user ... Keywords: k-anonymity, privacy, query log analysis

Rosie Jones; Ravi Kumar; Bo Pang; Andrew Tomkins

2007-11-01T23:59:59.000Z

374

"Don't trust anyone": Privacy protection for location-based services  

Science Conference Proceedings (OSTI)

We present a decentralized approach that exploits the capability of mobile devices to form wireless personal ad-hoc networks in order to protect the privacy of users who access location-based services. The novelty of our approach is that users do not ... Keywords: Anonymity, Location-based service, Obfuscation, Privacy, Trust

Tanzima Hashem; Lars Kulik

2011-02-01T23:59:59.000Z

375

Resuscitating privacy-preserving mobile payment with customer in complete control  

Science Conference Proceedings (OSTI)

Credit/debit card payment transactions do not protect the privacy of the customer. Once the card is handed over to the merchant for payment processing, customers are "no longer in control" on how their card details and money are handled. This leads to ... Keywords: Customer centric payment model, Near field communication (NFC), Privacy, RFID, Secure mobile payment, Smartphone application

Divyan Munirathnam Konidala; Made Harta Dwijaksara; Kwangjo Kim; Dongman Lee; Byoungcheon Lee; Daeyoung Kim; Soontae Kim

2012-08-01T23:59:59.000Z

376

My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect  

Science Conference Proceedings (OSTI)

We performed a laboratory experiment to study the privacy tradeoff offered by Facebook Connect: disclosing Facebook profile data to third-party websites for the convenience of logging in without creating separate accounts. We controlled for trustworthiness ... Keywords: facebook connect, privacy, user study

Serge Egelman

2013-04-01T23:59:59.000Z

377

Android and iOS users' differences concerning security and privacy  

Science Conference Proceedings (OSTI)

We compare Android and iOS users according to their demographic differences, security and privacy awareness, and reported behavior when installing apps. We present an exploratory study based on an online survey with more than 700 German students and ... Keywords: android, ios, iphone, personal data, privacy awareness, security awareness, smartphone

Zinaida Benenson; Freya Gassmann; Lena Reinfelder

2013-04-01T23:59:59.000Z

378

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid  

E-Print Network (OSTI)

UDP: Usage-based Dynamic Pricing with Privacy Preservation for Smart Grid Xiaohui Liang, Student for smart grid in a community environment, which enables the electricity price to correspond-preserving manner. Index Terms--Smart grid; dynamic price; privacy preserva- tion; community-specific I

Shen, Xuemin "Sherman"

379

Psychological Service Center NOTICE OF PRIVACY PRACTICES  

E-Print Network (OSTI)

: · Treating all of your health information that we collect as confidential. · Stating confidentiality policies provides the insurer the right to contest the claim under the policy Uses and Disclosures with Neither for lawful intelligence, counterintelligence, and other national security activities. We may be required

Almor, Amit

380

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft Human Resource  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EI04~ PRIVACY IMPACT ASSESSMENT: INL PeopleSoft - Human Resource System PIA Template Version 3 - May, 2009 Department of Energy Privacy Impact Assessment (PIA) Guidance is provided in the template. See DOE Order 206.1, Department of Energy Privacy Program, Appendix A, Privacy Impact Assessments, for requirements and additional guidance for conducting a PIA: http://www.directives.doe.gov/pdfs/doe/doetextlneword/206/o2061.pdf Please complete electronically: no hand-written submissions will be accepted. This template may not be modified. MODULE 1- PRIVACY NEEDS ASSESSMENT June 11, 2009 oep"rtrnental Element &Site Idaho National Laboratory (INL) Building Number: REC 608 Building Name: IORC Name 'of Infonnatlon System, or IT Project INL PeopleSoft - Human Resource System exhibit ProJect UID 157044 NewPIA D Update ~ _____ i DOE PIA - Peoplesoft Final.doc

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Online query answering with differential privacy: a utility-driven approach using Bayesian inference  

E-Print Network (OSTI)

Data privacy issues frequently and increasingly arise for data sharing and data analysis tasks. In this paper, we study the problem of online query answering under the rigorous differential privacy model. The existing interactive mechanisms for differential privacy can only support a limited number of queries before the accumulated cost of privacy reaches a certain bound. This limitation has greatly hindered their applicability, especially in the scenario where multiple users legitimately need to pose a large number of queries. To minimize the privacy cost and extend the life span of a system, we propose a utility-driven mechanism for online query answering using Bayesian statistical inference. The key idea is to keep track of the query history and use Bayesian inference to answer a new query using previous query answers. The Bayesian inference algorithm provides both optimal point estimation and optimal interval estimation. We formally quantify the error of the inference result to determine if it satisfies t...

Xiao, Yonghui

2012-01-01T23:59:59.000Z

382

Recovery Act Open House  

NLE Websites -- All DOE Office Websites (Extended Search)

Recovery Act Open House North Wind Environmental was one of three local small businesses that received Recovery Funding for projects at DOE's Idaho Site. Members of the community...

383

Price-Anderson Act  

Energy.gov (U.S. Department of Energy (DOE))

The Price-Anderson Act (PAA) provides a system of indemnification for legal liability resulting from a nuclear incident in connection with contractual activity for DOE.

384

ARM - Recovery Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Act were deployed with the ARM second mobile facility (AMF2) in Steamboat Springs, Colorado. Led by the AMF2 team from Argonne National Laboratory, installation activities began...

385

Stormwater Management Act (Pennsylvania)  

Energy.gov (U.S. Department of Energy (DOE))

The policy and purpose of this act is to encourage planning and management of storm water runoff in each watershed consistent with sound water and land use practices.

386

Glossary - Energy Information Administration  

U.S. Energy Information Administration (EIA)

Energy Information Administration 137 Energy Policy Act Transportation Study: Interim Report on Natural Gas Flows and Rates Glossary Affiliated ...

387

Recovery Act Federal Register Notices | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Center » Recovery Act » Recovery Act Federal Register Information Center » Recovery Act » Recovery Act Federal Register Notices Recovery Act Federal Register Notices October 12, 2011 Federal Register Notice (PDF Version) on the DOE's invitation for public comment on its request to the Office of Management and Budget (OMB) to extend for three years the Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Comments due on or before November 7, 2011. OMB Form 83-I. ICR Supporting Statement. SGIG Reporting Guidance. Notice of OMB Action (January 10, 2012): OMB has approved DOE's request to extend information collection for three years. August 10, 2011 Federal Register Notice (PDF Version ) on the DOE's invitation for

388

Recovery Act National Institute of Standards and Technology ...  

Science Conference Proceedings (OSTI)

... the Paperwork Reduction Act (PRA), unless that collection of information displays a currently valid Office of Management and Budget (OMB) Control ...

2010-10-05T23:59:59.000Z

389

FY 2009 E-Government Act Report | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Act Report More Documents & Publications Request for Information - Operations and Maintenance (O & M) Support Services for the iManage iManage Presentation OCIO Strategic Plan...

390

Response to Request for Information from the Department of Energy:  

NLE Websites -- All DOE Office Websites (Extended Search)

to Request for Information from the Department of Energy: to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 Response to Request for Information from the Department of Energy: Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy [FR Doc. 2010-11127] July 12, 2010 EnerNOC, Inc. ("EnerNOC") is pleased to provide these comments to the Department of Energy in response to the Request for Information "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy." EnerNOC is a provider of demand response and energy efficiency solutions to utilities,

391

Commercialization and Project Management PIA, Golden Field Office...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Laboratory Freedom of Information and Privacy Act Database PIA, Idaho Operations Office MOX Services Unclassified Information System PIA, National Nuclear Services Administration...

392

Public Utilities Act (Illinois) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Utilities Act (Illinois) Public Utilities Act (Illinois) Public Utilities Act (Illinois) < Back Eligibility Commercial Industrial Municipal/Public Utility Rural Electric Cooperative Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Environmental Regulations Generating Facility Rate-Making Safety and Operational Guidelines Provider Illinois Commerce Commission This act aims to make energy services in the state reliable and efficient, while preserving the quality if the environment. It states the duties of public utilities in terms of accounts and reports. Every public utility shall furnish to the Commission all information required by it to carry into effect the provisions of this Act, and shall make specific answers to

393

WIPP - Freedom of Information Act (FOIA)  

NLE Websites -- All DOE Office Websites (Extended Search)

protect human health and the environment by operating the Waste Isolation Pilot Plant (WIPP) for the safe disposal of Transuranic (TRU) waste and by establishing an effective...

394

Wind Energy Act (Maine) | Open Energy Information  

Open Energy Info (EERE)

Development Strategies Oil & Gas Smart Grid Solar U.S. OpenLabs Utilities Water Wind Page Actions View form View source History View New Pages Recent Changes All Special...

395

Freedom of Information Act | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

for long-term protection, historical documents and data dealing with radioactive fallout from all US testing of nuclear devices. Records relating to Human Radiation...

396

Tor HTTP usage and information leakage  

Science Conference Proceedings (OSTI)

This paper analyzes the web browsing behaviour of Tor users. By collecting HTTP requests we show which websites are of interest to Tor users and we determined an upper bound on how vulnerable Tor users are to sophisticated de-anonymization attacks: up ... Keywords: information leakage, privacy, tor

Markus Huber; Martin Mulazzani; Edgar Weippl

2010-05-01T23:59:59.000Z

397

Enhancing User Privacy in Location-based Services, Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

The ubiquity of cellphones has lead to the introduction of location-based services, which are services tailored to the current location of cellphone users. For example, a cellphone user can retrieve a list of interesting, nearby places, or parents are notified when a child (i.e., her cellphone) leaves a boundary area. Location is a sensitive piece of information, so location-based services raise privacy concerns. In this paper, we identify and address one such concern. Namely, a company providing location-based services will become aware of the location of cellphone users. Therefore, the company can, maybe inadvertently, leak this information to unauthorized entities. We study the question whether it is possible for the company to provide its services without learning the location of cellphone users. We present an architecture that provides this property and show that the architecture is powerful enough to provide various, existing location-based services. Our architecture exploits Trusted Computing and Private Information Retrieval algorithms for implementing location-based services. With the help of Trusted Computing, we ensure that a location-based service operates as expected by a cellphone user and that location information becomes inaccessible to a location-based service upon a compromise of the service. With the help of Private Information Retrieval, we avoid that a company providing a location-based service becomes indirectly aware of the location of cellphone users by observing which of its location-specific information is being accessed. We also discuss an implementation of the proposed approach and alternative design strategies. 1

Urs Hengartner

2006-01-01T23:59:59.000Z

398

Recovery Act Funds at Work | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Center » Recovery Act » Recovery Act Funds at Work Information Center » Recovery Act » Recovery Act Funds at Work Recovery Act Funds at Work Funds from the American Recovery and Reinvestment Act of 2009 (Recovery Act) are being put to work to improve safety, reliability, and service in systems across the country. Idaho Power Company is accelerating development of renewable energy integration, improving access to clean power resources, and overhauling their customer information and communications systems. Oklahoma Gas and Electric has completed the 2-year pilot of a time-based rate program to reduce peak demand, which resulted in an average bill reduction of $150/customer over the summer periods. Powder River Energy Corporation is meeting the challenges of terrain and weather by building a microwave communications network to ensure higher

399

Implementing Information Security and Its Technology: A LineManagement Perspective  

Science Conference Proceedings (OSTI)

Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

Barletta, William A.

2005-08-22T23:59:59.000Z

400

Cyber Incident Information | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Guidance » Privacy » Cyber Incident Information Services » Guidance » Privacy » Cyber Incident Information Cyber Incident Information July 2013 Cyber Incident The Department of Energy has confirmed a cyber incident that occurred at the end of July and resulted in the unauthorized disclosure of federal employee Personally Identifiable Information (PII). January 2013 Cyber Incident The Department of Energy (DOE) has confirmed a cyber incident that occurred in mid-January 2013 which targeted the Headquarters' network and resulted in the unauthorized disclosure of employee and contractor Personally Identifiable Information (PII). Tips to Monitor Your Identity Here is a suggested list of tips to monitor and protect yourself. Assistive Technology Forms Guidance Capital Planning Information Collection Management

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Recovery Act Recipient Reporting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Smart Grid Investment Grant Recipients Smart Grid Investment Grant Recipients November 19, 2009 1 Outline of Presentation * OMB Reporting Requirements * Jobs Guidance * FR.gov 2 Section 1512 of American Reinvestment and Recovery Act Outlines Recipient Reporting Requirements "Recipient reports required by Section 1512 of the Recovery Act will answer important questions, such as: ▪ Who is receiving Recovery Act dollars and in what amounts? ▪ What projects or activities are being funded with Recovery Act dollars? ▪ What is the completion status of such projects or activities and what impact have they had on job creation and retention?" "When published on www.Recovery.gov, these reports will provide the public with an unprecedented level of transparency into how Federal dollars are being spent and will help drive accountability for the timely,

402

CRSP Act of 1956  

NLE Websites -- All DOE Office Websites (Extended Search)

Act of 1956 Act of 1956 An act to authorize the Secretary of the Interior to construct, operate, and maintain the Colorado River storage project and participating projects, and for other purposes. (Act of April 11, 1956, ch. 203, 70 Stat. 105) [Sec. 1. Colorado River storage project.] -- In order to initiate the comprehensive development of the water resources of the Upper Colorado River Basin for the purposes, among others, of regulating the flow of the Colorado River storing water for beneficial consumptive use, making it possible for the States of the Upper Basin to utilize, consistently with the provisions of the Colorado River Compact, the apportionments made to and among them in the Colorado River Compact and the Upper Colorado River Basin Compact, respectively providing for the reclamation of arid and semiarid land, for the control of floods and for the generation of hydroelectric power, as an incident to the foregoing purposes, the Secretary of the Interior is hereby authorized:

403

Energy and Water Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acquisition Letter 2004-02 - FY 2004 Le2islation Provisions (dated March 1.2004) Acquisition Letter 2004-02 - FY 2004 Le2islation Provisions (dated March 1.2004) Energy and Water Act AL-2004-02 provides guidance regarding the implementation of Section 30 I. 304. 307. 501,502, and Legislative Direction as provided in the Energy and Water Development Appropriation:) Act Pub. L, 108-137, also known as the E&W Act. RFP's for unfunded programs, UseJ' facilities, lobbying restrictions, and purchase of American made products are carried ovc:r from the FY 2003 Energy and Water Development Appropriations Act Pub, L, 108-7 {Division D), However, while the provision regarding competition still exists in the F'" 2004 legislation, the direction provided by Congress regarding the extend/compete process for 5 Management and Operating (M&O)contracts is

404

SNIF-ACT: a cognitive model of user navigation on the world wide web  

Science Conference Proceedings (OSTI)

We describe the development of a computational cognitive model that explains navigation behavior on the World Wide Web. The model, called SNIF-ACT (Scent-based Navigation and Information Foraging in the ACT cognitive architecture), is motivated by Information ...

Wai-Tat Fu; Peter Pirolli

2007-11-01T23:59:59.000Z

405

Meta methods for model sharing in personal information systems  

Science Conference Proceedings (OSTI)

This article introduces a methodology for automatically organizing document collections into thematic categories for Personal Information Management (PIM) through collaborative sharing of machine learning models in an efficient and privacy-preserving ... Keywords: Classification, clustering, meta methods, peer-to-peer, personal information management, restrictive methods

Stefan Siersdorfer; Sergej Sizov

2008-09-01T23:59:59.000Z

406

Quantum Private Information Retrieval with Sublinear Communication Complexity  

E-Print Network (OSTI)

This note presents a quantum protocol for private information retrieval, in the single-server case and with information-theoretical privacy, that has O(\\sqrt{n})-qubit communication complexity, where n denotes the size of the database. In comparison, it is known that any classical protocol must use \\Omega(n) bits of communication in this setting.

Gall, Franois Le

2011-01-01T23:59:59.000Z

407

Smart Grid Investment Grant Recipient Information | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery Act SGIG Smart Grid Investment Grant Recipient Information Smart Grid Investment Grant Recipient Information Electricity Advisory Committee Technology Development...

408

The Role of Narcissism on Concerns for SNS Privacy: Vulnerable Narcissism in Threatening Situations.  

E-Print Network (OSTI)

??This study aims to identify psychological factors that predict ones likelihood to disengage with privacy-threatening activities on Social Networking Sites (SNS). Particularly, it pays special (more)

Kwolek, Elizabeth A.

2012-01-01T23:59:59.000Z

409

Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data  

Science Conference Proceedings (OSTI)

Laplace noise addition is often advanced as an approach for satisfying differential privacy. There have been several illustrations of the application of Laplace noise addition for count data, but no evaluation of its performance for numeric data. In ...

Rathindra Sarathy; Krishnamurty Muralidhar

2011-04-01T23:59:59.000Z

410

Proceedings of the 3rd symposium on Usable privacy and security  

Science Conference Proceedings (OSTI)

Welcome to the Third Symposium On Usable Privacy and Security! This year's program features 13 technical papers, a workshop, two tutorials, 16 posters, a panel, three discussion sessions, and an invited talk. Continuing the tradition of interesting SOUPS ...

Lorrie Faith Cranor

2007-07-01T23:59:59.000Z

411

ACT Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ACT Update ACT Update ACT September 2011.pdf More Documents & Publications C-340 Complex D&D Final Lessons Learned (Post CD-4), Environmental Management Cleanup, Sep 2011 Plain...

412

Cyber Security and Privacy Landscape of the Electric Sector: Release 2  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies, such as the Department of Energy (DOE), the Department of Homeland Security (DHS), the Department of Defense (DOD), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the eff...

2012-07-02T23:59:59.000Z

413

DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY DATA ACCESS AND PRIVACY ISSUES RELATED TO SMART GRID TECHNOLOGIES October 5, 2010 i TABLE OF CONTENTS INTRODUCTION AND EXECUTIVE SUMMARY.................................................................... 1 Overview of Data Access and Privacy Concerns ....................................................................... 2 Summary of Recommendations .................................................................................................. 3 KEY FINDINGS ............................................................................................................................. 4 Consumer education and flexibility in both technology and pace of deployment will be critical to the long-term success of Smart Grid technologies. ................................................................ 7

414

Assessment of Technology Used to Protect the Privacy of Energy Usage Data  

Science Conference Proceedings (OSTI)

This EPRI Technical Update Report discusses proposed privacy enhancing technologies (PETs) that are applicable to advanced metering infrastructure (AMI) deployments.BackgroundNew laws are beginning to come into effect in California and Colorado in the United States and in European countries such as Germany. Ohio and the European Commission are contemplating additional laws.Potential privacy problems arise from the granularity and detail of ...

2012-12-31T23:59:59.000Z

415

Cyber Security and Privacy Landscape of the Electric Sector, Release 5  

Science Conference Proceedings (OSTI)

Cyber-physical security and data privacy have become critical priorities for utilities over the past several decades. Many federal agencies (such as the Department of Energy, the Department of Homeland Security, and the Department of Defense), state organizations, and various industry and academic organizations are currently leading and executing cyber security and privacy activities, research, and working groups for the smart grid. Without an overall map of these various activities, the efforts may ...

2013-03-27T23:59:59.000Z

416

Supporting Statement: OE Recovery Act Financial Assistance Grants OMB  

NLE Websites -- All DOE Office Websites (Extended Search)

Supporting Statement: OE Recovery Act Financial Assistance Grants Supporting Statement: OE Recovery Act Financial Assistance Grants OMB Control Number 1910-5149 Supporting Statement: OE Recovery Act Financial Assistance Grants OMB Control Number 1910-5149 Supporting Statement: OE Recovery Act Financial Assistance Grants OMB Control Number 1910-5149. This statement provides additional informaton regarding the DOE request for processing of the renewal of the proposed information collection, OE Recovery Act Financial Assistance Grants. Supporting Statement: OE Recovery Act Financial Assistance Grants OMB Control Number 1910-5149 More Documents & Publications Notice of OMB Action Approving DOE Submission to Extend Information Collection Request Title: OE Recovery Act Financial Assistance Grants Notice of Office of Management and Budget Action to Approve with Change the

417

The Affordable Care Act:  

NLE Websites -- All DOE Office Websites (Extended Search)

Affordable Care Act: Affordable Care Act: Preventive Services at 100% Preventive Care Services Covered Without Cost-sharing - Without Copay, Coinsurance or Deductible The Affordable Care Act requires non-grandfathered health plans and policies to provide coverage for "preventive care services" 1 without cost-sharing (such as coinsurance, deductible or copayment), when the member uses a network provider. Services may include screenings, immunizations, and other types of care, as recommended by the federal government. Blue Cross and Blue Shield of New Mexico (BCBSNM) is committed to implementing coverage changes to meet ACA requirements as well as the needs and expectations of our members. General Highlights of New Regulations * Applies to group health plans including insured and self-

418

UNIVERSITY OF CALIFORNIA HEALTH PLANS NOTICE OF PRIVACY PRACTICES  

E-Print Network (OSTI)

MATERIAL CONTROL AND ACCOUNTABILITY COUNTERINTELLIGENCE PROGRAM IDENTIFYING CLASSIFIED INFORMATION INTELLIGENCE INFORMATION AND SENSITIVE INFORMATION FACILITIES IMPLEMENTING PROCEDURES- APPLICABLE TO FACILITIES

Doudna, Jennifer A.

419

Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience  

E-Print Network (OSTI)

expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that were previously non-digital such as, e.g., washing machines automatically adapting to the clothes put into the machine. However, consumer response clearly shows significant concern and resistance related to consumer tracking and profiling as well as problems related to government tracking, criminal or terrorist abuse etc. Multiple conferences warn that RFID take-up is likely dependant on solving the privacy and security problems early. These concerns are not adequately addressed by current technology and legislation. In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag. The lifecycle model is analysed in order to identify potential threats to the privacy of consumers and define a threat model. We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value from utilising the potential of RFID. We propose that securing RFIDs will require a physical redesign of RFIDs but that this can be done without leaving security and privacy issues to consent or regulation.

Stephan J. Engberg; Morten B. Harning; Christian Damsgaard Jensen

2004-01-01T23:59:59.000Z

420

Microsoft Word - DOE comments privacy - 7-6 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY In the Matter of Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy ) ) ) ) ) ) ) COMMENTS OF VERIZON AND VERIZON WIRELESS The development and deployment of smart grid technology hold tremendous promise towards improving the efficiency and reliability of our nation's energy systems and empowering consumers to make better decisions about the use of electricity. Because effective communications networks will be central to the success of smart grid technology, Verizon is working closely with utilities, the developers of energy management systems, and others to use its extensive wireline and wireless broadband networks and related expertise to quickly and efficiently realize the promise of smart grid

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Massachusetts Clean Air Act (Massachusetts)  

Energy.gov (U.S. Department of Energy (DOE))

The Act contains regulations to prevent the pollution and contamination of the atmosphere. The Act establishes a contiguous metropolitan pollution control district, comprised of towns in the...

422

American Recovery and Reinvestment Act  

Energy.gov (U.S. Department of Energy (DOE))

Here is one compliance agreement for EMs American Recovery and Reinvestment Act Program on accelerated milestones for the Recovery Act program.

423

NBP RFI: Data Access Honeywell Responses To Request for Information (RFI)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Honeywell Responses To Request for Information Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments from Honeywell on DOE Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan

424

Comments of Tendril Networks, Inc. on DOE Request for Information (RFI)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments of Tendril Networks, Inc. on DOE Request for Information Comments of Tendril Networks, Inc. on DOE Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments of Tendril Networks, Inc. on DOE Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Tendril is pleased to provide these comments to the Department of Energy in response to the Request for Information "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy." Comments of Tendril Networks, Inc. on DOE Request for Information (RFI)

425

NBP RFI: Data Access Honeywell Responses To Request for Information (RFI)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access Honeywell Responses To Request for Information NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy Comments from Honeywell on DOE Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To Request for Information (RFI) from the Department of Energy on Implementing the National Broadband Plan

426

DEPARTMENT OF ENERGY Training  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Privacy Awareness Training Privacy Awareness Training The Privacy Act & Safeguarding Personally Identifiable Information (PII) 2 Purpose This training is designed to address the importance of privacy, and to ensure that DOE employees are aware of the vital role they play in safeguarding privacy and protecting Personally Identifiable Information (PII). 3 Privacy & PII is a Special Area of Interest at DOE Recent breaches of PII across the government, including some at the Department of Energy, were well publicized, costly, and prompted the Administration and Congress to take action to improve the protection of PII. 4 Privacy Act ► The Privacy Act of 1974 (5 U.S.C. 552a) establishes controls over what personal information is collected and maintained by the Executive Branch and how the

427

5. Information Sources - Energy Information Administration  

U.S. Energy Information Administration (EIA)

66 Energy Information Administration Energy Policy Act Transportation Study: Interim Report on Natural Gas Flows and Rates of purchasers. All general tariff items ...

428

Recovery Act State Summaries | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recovery Act State Summaries Recovery Act State Summaries Recovery Act State Summaries Alabama Recovery Act State Memo Alaska Recovery Act State Memo American Samoa Recovery Act State Memo Arizona Recovery Act State Memo Arkansas Recovery Act State Memo California Recovery Act State Memo Colorado Recovery Act State Memo Connecticut Recovery Act State Memo Delaware Recovery Act State Memo District of Columbia Recovery Act State Memo Florida Recovery Act State Memo Georgia Recovery Act State Memo Guam Recovery Act State Memo Hawaii Recovery Act State Memo Idaho Recovery Act State Memo Illinois Recovery Act State Memo Indiana Recovery Act State Memo Iowa Recovery Act State Memo Kansas Recovery Act State Memo Kentucky Recovery Act State Memo Louisiana Recovery Act State Memo Maine Recovery Act State Memo

429

Rehabilitation Act of 1973  

Energy.gov (U.S. Department of Energy (DOE))

In accordance with Section 504 of the Rehabilitation Act of 1973, as amended, Public Law 93-112, the Department of Energy will provide Interpreters for the Deaf/Hard of Hearing, Readers for the Blind, and Personal Assistants for Physically Disabled Headquarters employees and visitors either via the Headquarters staff interpreter or a qualified vendor.

430

Virginia Electric Utility Regulation Act (Virginia) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Electric Utility Regulation Act (Virginia) Electric Utility Regulation Act (Virginia) Virginia Electric Utility Regulation Act (Virginia) < Back Eligibility Commercial Industrial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Systems Integrator Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Virginia Program Type Safety and Operational Guidelines Provider Virginia State Corporation Commission The Virginia Electric Utility Regulation Act constitutes the main legislation in Virginia that pertains to the regulation of the state's electric utilities. The Act directs the State Corporation Commission to construct regulations for electric utilities, and contains information on

431

Fastener Quality Act (FQA)  

Science Conference Proceedings (OSTI)

... Please call (301) 975-4011 for more information. US Patent and Trademark Office Fastener Insignia Register and Recordal. ...

2013-06-28T23:59:59.000Z

432

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Act of 2002 requires Federal agencies to perform Privacy Impact Assessments (PIAs), an analysis of how information is handled, in order: (i) to ensure handling conforms to......

433

EO 13089 -- Coral Reef Protection | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Documents & Publications Privacy - Information Protection Task Force - Charter CHARTER, Price-Anderson Act Task Force REPORT TO CONGRESS ON COMPETITION IN WHOLESALE AND RETAIL...

434

PIA - Security Clearance Work Tracking and Budget System | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications Freedom of Information and Privacy Act Database PIA, Idaho Operations Office Occupational Injury & Illness System (01&15) PIA, Idaho National Laboratory TRAIN-PIA.pdf...

435

National Environmental Policy Act  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Policy Act Environmental Policy Act to. # LM-24-10 Legacy Management Project/Activity: Abandon four monitoring wells associated with the Rocky Flats, CO~ Site. A. Brief Projecti Activity Description The U.S. Department of Energy (DOE) Office of Legacy Management (LM) proposes to abandon four groundwater monitoring wells that were installed in the 1990s near the Rocky Flats, Colorado, Site. Three of the wells are adjacent to the Great Western Reservoir, and one is adjacent to Standley Lake; the attached map shows the well locations. Wells 11994~ 11894; and 49192 are in the city of Broomfield, and well 49292 is in the city of Westminster. The wells are no longer needed for groundwater monitoring purposes and are scheduled to be abandoned before the end of 20 1 0 and in accordance with regulations

436

National Environmental Policy Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Policy Act (NEPA) Environmental Policy Act (NEPA) Public inquiries should be directed to: Gary S. Hartman DOE ORO NEPA Compliance Officer P.O. Box 2001, SE-32 Oak Ridge, TN 37831 (865) 576-0273 hartmangs@oro.doe.gov *Categorical Exclusion Determination Documents (CX Determinations): Date Title Reference No. Program 02/01/2010 Receipt and Processing of TRU Soils from Nuclear Fuel Services (NFS) in Erwin, Tennessee by the Transuranic (TRU) Waste Processing Center (TWPC) on the Oak Ridge Reservation, Tennessee CX-TWPC-09-0001 EM 02/01/2010 Conducting Macroencapsulation Treatment in the Parking Lot of the Contact Handled Marshalling Building (CHMB) at the TRU Waste Processing Center (TWPC) on the Oak Ridge Reservation, Tennessee CX-TWPC-09-0003 EM 03/02/2010 East Campus Parking Structure at the Oak Ridge National Laboratory (ORNL)

437

and Acting NOAA Administrator  

NLE Websites -- All DOE Office Websites (Extended Search)

30 30 th 9:00-9:30 Welcome * Dr. Kathryn Sullivan, Acting Under Secretary of Commerce for Oceans and Atmosphere and Acting NOAA Administrator 9:30-10:30 What does Open Data Look Like? This session will provide some case studies of the use of open data to illustrate some of the issues associated with presentation of the data in a way which optimises its usefulness for end-users. It will consider different types of data, guiding principles, and different uses of data, including both research data and national agricultural data-sets. Moderator: * Tim Benton, Champion, UK Global Food Security Programme, UK Speakers: * Johannes Keizer, Team Leader, FAO United Nations, Italy * Dr. Sander Janssen, Wageningen, Netherlands * Dr. Rajeev Varshney, Director, Center of Excellence in Genomics (CEG), ICRISAT, Hyderabad,

438

Fermilab | Recovery Act | Videos  

NLE Websites -- All DOE Office Websites (Extended Search)

Videos Videos Watch videos documenting progress on Fermilab projects funded by the American Recovery and Reinvestment Act. NOvA - Community Voices - September 2009 Residents of northern Minnesota and construction workers building the NOvA detector facility discuss the benefits the high-energy physics research project has brought their communities. Congressman Bill Foster at Fermilab Congressman Bill Foster speaks to Fermilab Technical Division employees and members of the media at a press conference on Wednesday, August 5 to announce an additional $60.2 million in Recovery Act funds for the lab. NOvA first blast On July 20, construction crews began blasting into the rock at the future site of the NOvA detector facility in northern Minnesota. NOvA groundbreaking ceremony

439

Fermilab | Recovery Act | Features  

NLE Websites -- All DOE Office Websites (Extended Search)

Features - Archive Features - Archive photo Industrial Building 3 addition Fermilab Today-November 5, 2010 IB3 addition nears completion The future site of Fermilab’s new materials laboratory space has evolved from a steel outline to a fully enclosed building over the past five months. Read full column photo Fermilab Today-October 22, 2010 Recovery Act gives LBNE team chance to grow Thanks to funding from the American Recovery and Reinvestment Act, the collaboration for the Long-Baseline Neutrino Experiment, LBNE, has expanded its project team. Read full column photo cooling units Fermilab Today-October 15, 2010 Local company completes FCC roof construction A local construction company recently completed work on the roof of the Feynman Computing Center, an important step in an ongoing project funded by

440

Elster July 12, 2010 Reply to DOE Request for Information of May 11, 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

Elster July 12, 2010 Reply to DOE Request for Information of May Elster July 12, 2010 Reply to DOE Request for Information of May 11, 2010 regarding Data Privacy Elster July 12, 2010 Reply to DOE Request for Information of May 11, 2010 regarding Data Privacy The DOE questions are restated followed by an answer. Please note that this matter is also related to the May 11, 2010 RFI on needs for utility communications. If data is provided to third parties there is a data processing and communications cost that depends on how many parties data is provided to and by how often data is communicated. These costs are minimized if an in-home display and/or smart thermostat are provided data directly from a smart meter. Elster July 12, 2010 Reply to DOE Request for Information of May 11, 2010 regarding Data Privacy More Documents & Publications

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Regarding Request for Information Published at 75 Fed. Reg. 26,203 (May 11,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Regarding Request for Information Published at 75 Fed. Reg. 26,203 Regarding Request for Information Published at 75 Fed. Reg. 26,203 (May 11, 2010) "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy" Regarding Request for Information Published at 75 Fed. Reg. 26,203 (May 11, 2010) "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy" The Real Estate Roundtable is pleased to provide these comments in response to the Request for Information issued by the U.S. Department of Energy ("DOE"), published at 75 Fed. Reg. 26,203 (May 11, 2010) entitled, "Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy."

442

NIST Global Standards Information The United States  

Science Conference Proceedings (OSTI)

... standards (by a large margin) were related to radiation detection. ... statement / Disclaimer / Freedom of Information Act (FOIA) / No Fear Act Policy ...

443

NIST Global Standards Information Other Government ...  

Science Conference Proceedings (OSTI)

... test methods for testing of Passive and Active External Radiation Dosimetry and ... Disclaimer / Freedom of Information Act (FOIA) / No Fear Act Policy ...

444

A Distributed k-Anonymity Protocol for Location Privacy, Centre for Applied Cryptographic Research  

E-Print Network (OSTI)

AbstractTo benefit from a location-based service, a person must reveal her location to the service. However, knowing the persons location might allow the service to re-identify the person. Location privacy based on k-anonymity addresses this threat by cloaking the persons location such that there are at least k ? 1 other people within the cloaked area and by revealing only the cloaked area to a location-based service. Previous research has explored two ways of cloaking: First, have a central server that knows everybodys location determine the cloaked area. However, this server needs to be trusted by all users and is a single point of failure. Second, have users jointly determine the cloaked area. However, this approach requires that all users trust each other, which will likely not hold in practice. We propose a distributed approach that does not have these drawbacks. Our approach assumes that there are multiple servers, each deployed by a different organization. A users location is known to only one of the servers (e.g., to her cellphone provider), so there is no single entity that knows everybodys location. With the help of cryptography, the servers and a user jointly determine whether the k-anonymity property holds for the users area, without the servers learning any additional information, not even whether the property holds. A user learns whether the k-anonymity property is satisfied and no other information. The evaluation of our sample implementation shows that our distributed k-anonymity protocol is sufficiently fast to be practical. Moreover, our protocol integrates well with existing infrastructures for location-based services, as opposed to the previous research. I.

Ge Zhong; Urs Hengartner

2008-01-01T23:59:59.000Z

445

Microsoft Word - NNSA Act 100110  

National Nuclear Security Administration (NNSA)

October 1, 2010 October 1, 2010 Source: Title XXXII of the National Defense Authorization Act for Fiscal Year 2000, Pub. L. 106-65, as amended by the Energy and Water Development Appropriations Act, 2001, Pub. L. 106-377; the Floyd D. Spence National Defense Authorization Act for Fiscal Year 2001, Pub. L. 106-398; the National Defense Authorization Act for Fiscal Year 2002, Pub. L. 107-107; the National Defense Authorization Act for Fiscal Year 2004, Pub. L. 108-136; the Ronald W. Reagan National Defense Authorization Act for Fiscal Year 2005, Pub. L. 108- 375; the Energy Policy Act of 2005, Pub. L. 109-58; the John Warner National Defense Authorization Act for Fiscal Year 2007, Pub. L. 109-364; the National Defense Authorization Act for Fiscal Year 2008, Pub. L. 110-181; the Duncan Hunter National

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Triple acting radial seal  

SciTech Connect

A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.

Ebert, Todd A (West Palm Beach, FL); Carella, John A (Jupiter, FL)

2012-03-13T23:59:59.000Z

462

Private whispers/public eyes: Is receiving highly personal information in a public place stressful?  

Science Conference Proceedings (OSTI)

The use of technology to access personal information in public places is increasingly common, but can these interactions induce stress? Sixty-eight participants were led to believe that extremely sensitive personal information would be displayed via ... Keywords: Privacy, Public places, Stress, Technology

Linda Little; Pam Briggs

2009-08-01T23:59:59.000Z

463

The Influence of Information Control upon On-line Shopping Behavior  

Science Conference Proceedings (OSTI)

Previous studies have explored privacy instruments and disclosures as factors that affect on-line shopping intentions or attitudes. However, few have evaluated how information control affects this behavior. This paper draws on psychological and social ... Keywords: Cognitive Absorption, Information Control, Intrinsic Motivation, On-Line Behavior, Procedural Practice Justice

Milam Aiken; Jianfeng Wang; Linwu Gu; Kustim Wibowo

2011-01-01T23:59:59.000Z

464

Recovery Act | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Act Act Recovery Act Total Federal Payments to OE Recovery Act Recipients by Month, through November 30, 2013 Total Federal Payments to OE Recovery Act Recipients by Month, through November 30, 2013 American Recovery and Reinvestment Act Overview PROJECTS TOTAL OBLIGATIONS AWARD RECIPIENTS Smart Grid Investment Grant $3,482,831,000 99 Smart Grid Regional and Energy Storage Demonstration Projects $684,829,000 42 Workforce Development Program $100,000,000 52 Interconnection Transmission Planning $80,000,000 6 State Assistance for Recovery Act Related Electricity Policies $48,619,000 49 Enhancing State Energy Assurance $43,500,000 50 Enhancing Local Government Energy Assurance $8,024,000 43 Interoperability Standards and Framework $12,000,000 1 Program Direction1 $27,812,000 --

465

Microsoft Word - DOE E-Government Act Report 11.16.06 Final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E-Government Act Report E-Government Act Report Fiscal Year 2006 DOE E-Government Act Report page ii T a b l e o f C o n t e n t s Section 1: Overview of DOE's Implementation of the Act ......................................................... 1 Section 2: Process for Determining Which Information Will Be Made Available on the Internet...................................................................................................................................................... 2 Section 3: Process for How Information Dissemination Activities are Coordinated with FOIA Operations..................................................................................................................................... 3 DOE E-Government Act Report page 1 Section 1: Overview of the Department of Energy's Implementation of the Act

466

The magic window : balancing privacy and awareness in office settings .  

E-Print Network (OSTI)

??Co-workers who are physically distributed in the same building often obtain information about others through the windows in office doors. Using the information gathered by (more)

Kim, Hyun Hoi James

2007-01-01T23:59:59.000Z

467

Proposal Information Questionnaire (PIQ) for WFO Non-Federal ...  

proposal no. _____ brookhaven national laboratory. proposal information questionnaire (piq) non-federal or act sponsors. i. general information

468

The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The American Recovery and Reinvestment Act (ARRA) Energy Assurance The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, January 3 2012, Volume 3 No. 1 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, January 3 2012, Volume 3 No. 1 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin provides information on energy assurance planning resources, upcoming events, training opportunities, and important grant deliverable dates. VOLUME 3, NUMBER 1. January 2012 Energy Assurance Planning Bulletin Volume 3 No 1.pdf More Documents & Publications The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, July 1 2010, Volume 1 No. 3 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning

469

The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The American Recovery and Reinvestment Act (ARRA) Energy Assurance The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, April 1 2010, Volume 1 No. 2 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, April 1 2010, Volume 1 No. 2 The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin provides information on energy assurance planning resources, upcoming events, training opportunities, and important grant deliverable dates. VOLUME 1, NUMBER 2. The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, April 1 2010, Volume 1 No. 2 More Documents & Publications The American Recovery and Reinvestment Act (ARRA) Energy Assurance Planning (EAP) Bulletin, July 1 2010, Volume 1 No. 3

470

Recovery Act: State Assistance for Recovery Act Related Electricity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2012 Section 1222 of the Energy Policy Act 2005 International Electricity Regulation Presidential Permits Export Authorizations Pending Applications NEPA Other Regulatory...

471

Double acting bit holder  

DOE Patents (OSTI)

A double acting bit holder that permits bits held in it to be resharpened during cutting action to increase energy efficiency by reducing the amount of small chips produced. The holder consist of: a stationary base portion capable of being fixed to a cutter head of an excavation machine and having an integral extension therefrom with a bore hole therethrough to accommodate a pin shaft; a movable portion coextensive with the base having a pin shaft integrally extending therefrom that is insertable in the bore hole of the base member to permit the moveable portion to rotate about the axis of the pin shaft; a recess in the movable portion of the holder to accommodate a shank of a bit; and a biased spring disposed in adjoining openings in the base and moveable portions of the holder to permit the moveable portion to pivot around the pin shaft during cutting action of a bit fixed in a turret to allow front, mid and back positions of the bit during cutting to lessen creation of small chip amounts and resharpen the bit during excavation use.

Morrell, Roger J. (Blommington, MN); Larson, David A. (Minneapolis, MN); Ruzzi, Peter L. (Eagan, MN)

1994-01-01T23:59:59.000Z

472

COLORADO RECOVERY ACT SNAPSHOT | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

COLORADO RECOVERY ACT SNAPSHOT COLORADO RECOVERY ACT SNAPSHOT The American Recovery & Reinvestment Act (ARRA) is making a meaningful down payment on the nation's energy and...

473

Selling power back to the grid in a secure and privacy-preserving manner  

Science Conference Proceedings (OSTI)

Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenue. However, the process of power selling ... Keywords: anonymous credential, authentication, blind signature, power selling, privacy-preservation, smart grid

Tat Wing Chim; Siu Ming Yiu; Lucas Chi Kwong Hui; Victor On Kwok Li; Tin Wing Mui; Yu Hin Tsang; Chun Kin Kwok; Kwun Yin Yu

2012-10-01T23:59:59.000Z

474

Pythia: a privacy aware, peer-to-peer network for social search  

Science Conference Proceedings (OSTI)

Emerging "live social search" systems such as Aardvark.com allow users to pose questions to their social network in real time. People can thus obtain answers from real humans for questions that prove too complex for web searches. Centralized systems ... Keywords: peer-to-peer, privacy, question-and-answer systems, social search

Shirin Nilizadeh; Naveed Alam; Nathaniel Husted; Apu Kapadia

2011-10-01T23:59:59.000Z

475

Conflicts between privacy and property: The discourse in personal and organizational knowledge  

Science Conference Proceedings (OSTI)

The paper critically examines knowledge ownership when personal or organizational knowledge is transferred between individuals or between individuals and organizations. Employing a form of discourse analysis, we analyse the data from three complementary ... Keywords: Knowledge transfer, Organizational knowledge, Personal knowledge, Privacy rights, Property rights, Strategic knowledge

Alina Dulipovici; Richard Baskerville

2007-06-01T23:59:59.000Z

476

IPv6 stateless address autoconfiguration: balancing between security, privacy and usability  

Science Conference Proceedings (OSTI)

Included in the IPv6 suite is a method for devices to automatically configure their own addresses in a secure manner. This technique is called Cryptographically Generated Addresses (CGAs). CGA provides the ownership proof necessary for an IPv6 address ... Keywords: IPv6 address autoconfiguration, IPv6 security, users' privacy

Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel

2012-10-01T23:59:59.000Z

477

Understanding motivations for facebook use: usage metrics, network structure, and privacy  

Science Conference Proceedings (OSTI)

This study explores the links between motives for using a social network service and numerical measures of that activity. Specifically, it identified motives for Facebook use by employing a Uses and Gratifications (U&G) approach and then investigated ... Keywords: computer-mediated communication, facebook, privacy, social network sites, social networks, uses and gratifications

Tasos Spiliotopoulos; Ian Oakley

2013-04-01T23:59:59.000Z

478

A spotlight on security and privacy risks with future household robots: attacks and lessons  

Science Conference Proceedings (OSTI)

Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household robots will offer numerous benefits, they also have the potential to introduce ... Keywords: cyber-physical systems, domestic robots, household robots, multi-robot attack, privacy, robots, security, single-robot attack, ubiquitous robots

Tamara Denning; Cynthia Matuszek; Karl Koscher; Joshua R. Smith; Tadayoshi Kohno

2009-09-01T23:59:59.000Z

479

Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data  

Science Conference Proceedings (OSTI)

Record linkage techniques have been widely used in areas such as antiterrorism, crime analysis, epidemiologic research, and database marketing. On the other hand, such techniques are also being increasingly used for identity matching that leads to the ... Keywords: data partitioning, data swapping, privacy, record linkage

Xiao-Bai Li; Sumit Sarkar

2011-12-01T23:59:59.000Z

480

Anonyfrag: an anonymization-based approach for privacy-preserving BPaaS  

Science Conference Proceedings (OSTI)

Many cloud providers offer on demand applications as BPaaS "Business Process as a Service" through multi-tenant cloud platforms, allowing many companies to outsource their business processes. That is, an increasing amount of personal data involved in ... Keywords: anonymity, business process, cloud privacy

Mehdi Bentounsi; Salima Benbernou; Cheikh S. Deme; Mikhail J. Atallah

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "information act privacy" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Third-party Apps on Facebook: Privacy and the Illusion of Control  

E-Print Network (OSTI)

Little research examines the privacy threats associated with the use of third-party apps on Facebook. To address this gap in the literature, we systematically study third-party apps ' current practices for privacy notice and consent by: i) collecting data from the 1800 most popular Facebook apps to record their data collection practices concerning users and their friends, and ii) developing our own Facebook app to conduct a number of tests to identify problems that exist in the current design of authentication dialogs for third-party apps on Facebook. To address these problems, we propose two new interface designs for third-party apps authentication dialogs to: i) increase user control of apps' data access and restrict apps ' publishing ability during the process of adding them to users profiles, and ii) alert users when their global privacy settings on Facebook are violated by apps. This research provides both conceptual and empirical insights in terms of design recommendations to address privacy concerns toward third-party apps on Facebook.

Na Wang; Heng Xu; Jens Grossklags

2011-01-01T23:59:59.000Z

482

A Privacy Preservation Model for Facebook-Like Social Network Systems  

E-Print Network (OSTI)

Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. Due to the distributed nature of access control in Facebook-style social network systems, it is difficult for a user to anticipate the privacy consequence of such actions as modifying a privacy setting or befriending another user. This work takes a first step in addressing this challenge, by proposing an access control model that formalizes and generalizes the privacy preservation mechanism of Facebook. The model can be instantiated into a family of Facebook-style social network systems, each with a recognizably different access control mechanism, so that Facebook is but one instantiation of the model. We also demonstrate that the model can be instantiated to express policies that, on the one hand, are not currently supported by Facebook, but on the other hand possess rich and natural social significance. This work thus deepens our understanding of the design space of privacy preservation mechanisms for social network systems, and lays out a formal framework for policy analysis in these systems.

Philip W. L. Fong; Mohd Anwar; Zhen Zhao

2009-01-01T23:59:59.000Z

483

DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies  

Energy.gov (U.S. Department of Energy (DOE))

DOE's Office of Electricy Delivery and Energy Reliability (OE) issued a notice of an open meeting on Tuesday, February 26, 2013 (9:30 a.m. to 4:30 p.m. ET) of the smart grid data privacy multi...

484

Recovery Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Economy » Recovery Act Energy Economy » Recovery Act Recovery Act December 18, 2013 BPA Wins Platts Global Energy Award for Grid Optimization Platts awarded the Bonneville Power Administration (BPA) a Global Energy Award for grid optimization on December 12 in New York City for its development of a synchrophasor network. BPA is part of the Recovery Act-funded Western Interconnection Synchrophasor Program. December 13, 2013 Cumulative Federal Payments to OE Recovery Act Recipients, through November 30, 2013 Graph of cumulative Federal Payments to OE Recovery Act Recipients, through November 30, 2013. December 12, 2013 Energy Department Announces $150 Million in Tax Credits to Invest in U.S. Clean Energy Manufacturing Domestic Manufacturing Projects to Support Renewable Energy Generation as

485

Resource Conservation and Recovery Act  

NLE Websites -- All DOE Office Websites (Extended Search)

Resource Conservation and Recovery Act (RCRA) Resource Conservation and Recovery Act (RCRA) In 1965 the Solid Waste Disposal Act [Public Law (Pub. L.) 89-72] was enacted to improve solid waste disposal methods. It was amended in 1970 by the Resource Recovery Act (Pub. L. 91-512), which provided the Environmental Protection Agency (EPA) with funding for resource recovery programs. However, that Act had little impact on the management and ultimate disposal of hazardous waste. In 1976 Congress enacted the Resource Conservation and Recovery Act (RCRA, Pub. L. 94-580). RCRA established a system for managing non-hazardous and hazardous solid wastes in an environmentally sound manner. Specifically, it provides for the management of hazardous wastes from the point of origin to the point of final disposal (i.e., "cradle to grave"). RCRA also promotes resource recovery and waste minimization.

486

Recovery Act State Memos Louisiana  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Louisiana Louisiana For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

487

Recovery Act State Memos Alabama  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alabama Alabama For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

488

Recovery Act State Memos Oklahoma  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oklahoma Oklahoma For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

489

Recovery Act State Memos Massachusetts  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Massachusetts Massachusetts For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

490

Recovery Act State Memos Mississippi  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Mississippi Mississippi For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 4

491

Recovery Act State Memos Wyoming  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wyoming Wyoming For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 ELECTRIC GRID ........................................................................................................ 4

492

Recovery Act State Memos Connecticut  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Connecticut Connecticut For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 4

493

Recovery Act State Memos Oregon  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oregon Oregon For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 4 RENEWABLE ENERGY ............................................................................................. 5

494

Recovery Act State Memos Utah  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Utah Utah For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

495

Recovery Act State Memos Nebraska  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nebraska Nebraska For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 4

496

Recovery Act State Memos Alaska  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alaska Alaska For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

497

Recovery Act State Memos Arkansas  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Arkansas Arkansas For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 4

498

Recovery Act State Memos Indiana  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Indiana Indiana For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 5

499

Recovery Act State Memos Guam  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guam Guam For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 ELECTRIC GRID ........................................................................................................ 4

500

Recovery Act State Memos Iowa  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Iowa Iowa For questions about DOE's Recovery Act activities, please contact the DOE Recovery Act Clearinghouse: 1-888-DOE-RCVY (888-363-7289), Monday through Friday, 9 a.m. to 7 p.m. Eastern Time https://recoveryclearinghouse.energy.gov/contactUs.htm. All numbers and projects listed as of June 1, 2010 TABLE OF CONTENTS RECOVERY ACT SNAPSHOT................................................................................... 1 FUNDING ALLOCATION TABLE.............................................................................. 2 ENERGY EFFICIENCY ............................................................................................... 3 RENEWABLE ENERGY ............................................................................................. 4