953 resultados para Data protection


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Previous studies have associated activating Killer cell Immunoglobulin-like Receptor (KIR) genes with protection from cytomegalovirus (CMV) replication after organ transplantation. Whether KIR-associated protection is operating in the context of primary infection, re-activation, or both, remains unknown. Here we correlated KIR genotype and CMV serostatus at the time of transplantation with rates of CMV viremia in 517 heart (n=57), kidney (n=223), liver (n=165) or lung (n=72) allograft recipients reported to the Swiss Transplant Cohort Study. Across the entire cohort we found B haplotypes-which in contrast to A haplotypes may contain multiple activating KIR genes-to be protective in the most immunosuppressed patients (receiving anti-thymocyte globulin induction and intensive maintenance immunosuppression) (hazard ratio after adjustment for covariates 0.46, 95% confidence interval 0.29-0.75, P=0.002). Notably, a significant protection was detected only in recipients who were CMV-seropositive at the time of transplantation (HR 0.45, 95% CI 0.26-0.77, P=0.004), but not in CMV seronegative recipients (HR 0.59, 95% CI 0.22-1.53, P=0.28). These data indicate a prominent role for KIR-and presumably natural killer (NK) cells-in the control of CMV replication in CMV seropositive organ transplant recipients treated with intense immunosuppression.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The U.S. Environmental Protection Agency (EPA), the Alcoa – Davenport Works Facility (Alcoa), and concerned citizens and community leaders of Riverdale, Iowa requested the Iowa Department of Public Health (IDPH) Hazardous Waste Site Health Assessment Program to evaluate the health impacts of exposures to volatile organic vapors detected within residences located immediately to the west of the Alcoa property. This health consultation addresses inhalation exposure to individuals that may have occupied the currently vacant residences in which the air sampling was completed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Iowa Department of Public Health (IDPH), Hazardous Waste Site Health Assessment Program was asked by the US Environmental Protection Agency (EPA) to review a round of air sampling data. The air data was collected and analyzed during a removal action at the Le Mars Coal Gas Site in Le Mars, Iowa. EPA asked IDPH to determine from the air data if additional monitoring is necessary throughout the removal action to protect nearby residents from exposure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pro-gradu tutkielman tavoitteena on tutkia, miten yritykset tasapainoilevat tiedon jakamisen ja suojaamisen välillä innovaatioyhteistyöprojekteissa, ja miten sopimukset, immateriaalioikeudet ja luottamus voivat vaikuttaa tähän tasapainoon. Yhteistyössä yritysten täytyy jakaa tarpeellista tietoa kumppanilleen, mutta toisaalta niiden täytyy varoa, etteivät ne menetä ydinosaamiseensa kuuluvaa tietoa ja kilpailuetuaan. Yrityksillä on useita keinoja tietovuodon estämiseen. Tutkielmassa keskitytään patenttien, sopimusten ja liikesalaisuuksien käyttöön tietoa suojaavina mekanismeina. Kyseiset suojamekanismit vaikuttavat luottamukseen kumppaneiden välillä, ja täten myös näiden halukkuuteen jakaa tietoa kumppaneilleen. Jos kumppanit eivät jaa tarpeeksi tietoa toisilleen, voi yhteistyö epäonnistua. Sopimusten, immateriaalioikeuksien ja luottamuksen rooleja ja vuorovaikutusta tutkitaan kahdenvälisissä yhteistyöprojekteissa. Tutkielmassa esitellään neljä case-esimerkkiä, jotka on koottu suomalaisen metsätoimialan yrityksen haastatteluista.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

INTRODUCTION: Occupational exposure to grain dust causes respiratory symptoms and pathologies. To decrease these effects, major changes have occurred in the grain processing industry in the last twenty years. However, there are no data on the effects of these changes on workers' respiratory health. OBJECTIVES: The aim of this study was to evaluate the respiratory health of grain workers and farmers involved in different steps of the processing industry of wheat, the most frequently used cereal in Europe, fifteen years after major improvements in collective protective equipment due to mechanisation. MATERIALS AND METHOD: Information on estimated personal exposure to wheat dust was collected from 87 workers exposed to wheat dust and from 62 controls. Lung function (FEV1, FVC, and PEF), exhaled nitrogen monoxide (FENO) and respiratory symptoms were assessed after the period of highest exposure to wheat during the year. Linear regression models were used to explore the associations between exposure indices and respiratory effects. RESULTS: Acute symptoms - cough, sneezing, runny nose, scratchy throat - were significantly more frequent in exposed workers than in controls. Increased mean exposure level, increased cumulative exposure and chronic exposure to more than 6 mg.m (-3) of inhaled wheat dust were significantly associated with decreased spirometric parameters, including FEV1 and PEF (40 ml and 123 ml.s (-1) ), FEV1 and FVC (0.4 ml and 0.5 ml per 100 h.mg.m (-3) ), FEV1 and FVC (20 ml and 20 ml per 100 h at >6 mg.m (-3) ). However, no increase in FENO was associated with increased exposure indices. CONCLUSIONS: The lung functions of wheat-related workers are still affected by their cumulative exposure to wheat dust, despite improvements in the use of collective protective equipment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mitochondrial function and dynamics are essential for neurotransmission, neural function and neuronal viability. Recently, we showed that the eutherian-specific Armcx gene cluster (Armcx1-6 genes), located in the X chromosome, encodes for a new family of proteins that localise to mitochondria, regulating mitochondrial trafficking. The Armcx gene cluster evolved by retrotransposition of the Armc10 gene mRNA, which is present in all vertebrates and is considered to be the ancestor gene. Here we investigate the genomic organisation, mitochondrial functions and putative neuroprotective role of the Armc10 ancestor gene. The genomic context of the Armc10 locus shows considerable syntenic conservation among vertebrates, and sequence comparisons and CHIP-data suggest the presence of at least three conserved enhancers. We also show that the Armc10 protein localises to mitochondria and that it is highly expressed in the brain. Furthermore, we show that Armc10 levels regulate mitochondrial trafficking in neurons, but not mitochondrial aggregation, by controlling the number of moving mitochondria. We further demonstrate that the Armc10 protein interacts with the KIF5/Miro1-2/Trak2 trafficking complex. Finally, we show that overexpression of Armc10 in neurons prevents A beta-induced mitochondrial fission and neuronal death. Our data suggest both conserved and differential roles of the Armc10/Armcx gene family in regulating mitochondrial dynamics in neurons, and underscore a protective effect of the Armc10 gene against A beta-induced toxicity. Overall, our findings support a further degree of regulation of mitochondrial dynamics in the brain of more evolved mammals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mitochondrial function and dynamics are essential for neurotransmission, neural function and neuronal viability. Recently, we showed that the eutherian-specific Armcx gene cluster (Armcx1-6 genes), located in the X chromosome, encodes for a new family of proteins that localise to mitochondria, regulating mitochondrial trafficking. The Armcx gene cluster evolved by retrotransposition of the Armc10 gene mRNA, which is present in all vertebrates and is considered to be the ancestor gene. Here we investigate the genomic organisation, mitochondrial functions and putative neuroprotective role of the Armc10 ancestor gene. The genomic context of the Armc10 locus shows considerable syntenic conservation among vertebrates, and sequence comparisons and CHIP-data suggest the presence of at least three conserved enhancers. We also show that the Armc10 protein localises to mitochondria and that it is highly expressed in the brain. Furthermore, we show that Armc10 levels regulate mitochondrial trafficking in neurons, but not mitochondrial aggregation, by controlling the number of moving mitochondria. We further demonstrate that the Armc10 protein interacts with the KIF5/Miro1-2/Trak2 trafficking complex. Finally, we show that overexpression of Armc10 in neurons prevents A beta-induced mitochondrial fission and neuronal death. Our data suggest both conserved and differential roles of the Armc10/Armcx gene family in regulating mitochondrial dynamics in neurons, and underscore a protective effect of the Armc10 gene against A beta-induced toxicity. Overall, our findings support a further degree of regulation of mitochondrial dynamics in the brain of more evolved mammals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The intellectual property (IP) environment in China is still very immature. There are several problems in legal, political, economic, social-cultural, competitive and labor environment which have hindered IP legal enforcement. Under such circumstances, IP misappropriation is a major concern especially for foreign small and medium-sized enterprises (SMEs) doing business in China. These circumstances require foreign companies, no matter whether they are multinational corporations (MNCs) or SMEs and have own manufacturing in China or not, to take strong IP actions. Therefore, the purpose of this study is to discuss how IP can be protected in China in the case of outsourcing and in the case of own manufacturing. The comparison will consider the process of outsourcing and own manufacturing consisting two stages: preparation stage and operation stage. In order to clarify the conceptual arguments, two illustrative case studies were studied. The case data bases on two semi-structured interviews of the managing directors, field notes and archival data. The findings propose that attention in IP protection should be given to following issues: integrating IP strategy into the company’s business strategy, protecting the most critical knowledge, regarding IP steps as a whole in the protection mechanism and making IP strategy as proactive as possible. The major difference between outsourcing and own manufacturing in IP protection is in the operation stage. Besides, the findings also provide managerial advice on IP protection, e.g. foreign managers should be prepared for IP risks in China, they should establish an own IP protection mechanism which matches the company’s situation and they should consider IP protection as an on-going process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bullying can be viewed as goal-oriented behavior in the strive for dominance and prestige in the peer group (Salmivalli, 2010). To ensure the effectiveness of their power demonstrations, bullies often choose targets from among their vulnerable peers (Salmivalli, 2010; Veenstra et al., 2007). A large number of studies have also shown that victimization has severe consequences for the victims’ psychosocial adjustment (Reijntjes, Kamphuis, Prinzie, & Telch, 2010; Ttofi, Farrington, Lösel, & Loeber, 2011). In this thesis I investigate – based on three empirical studies – whether similar dynamics on the risk factors and consequences apply to same- and other-sex victimization. In the empirical studies, we used the data from the randomized control trial of the KiVa antibullying program for the elementary school grades 4–6 (2007–2008), and for the middle school grades 7–9 (2008–2009). We measured same- and other-sex victimization, and victims’ defending relationships by dyadic questions: “By which classmates are you victimized?” and “By which classmates are you supported, comforted, or defended?” In addition, we used self-reports and peer reports to measure adjustment and social status. The findings imply that other-sex victimization may be challenging for antibullying work. First, although targets of bullying seemed to be selected from among vulnerable peers for the most part, perceived popularity increased the risks of other-sex victimization. Popularity of these victims may falsely lead to an impression that the victims are doing well. Second, the consequences considering victims’ later psychosocial adjustment were alarming concerning girls bullied by boys. Thus, despite the fact that the targets may be perceived as popular, other-sex victimization can have even more severe consequences than same-sex victimization. Third, we found that defending relationships were mostly same-sex relationships, and consequently, we may ask whether defending is effective against other-sex bullies. Finally, the KiVa antibullying program was less effective against other-sex victimization in the adolescent sample. The findings altogether emphasize the importance of taking into account the sex composition of the bully-victim dyad, both considering future research on bullying and in the antibullying work with children and adolescents.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Communications play a key role in modern smart grids. New functionalities that make the grids ‘smart’ require the communication network to function properly. Data transmission between intelligent electric devices (IEDs) in the rectifier and the customer-end inverters (CEIs) used for power conversion is also required in the smart grid concept of the low-voltage direct current (LVDC) distribution network. Smart grid applications, such as smart metering, demand side management (DSM), and grid protection applied with communications are all installed in the LVDC system. Thus, besides remote connection to the databases of the grid operators, a local communication network in the LVDC network is needed. One solution applied to implement the communication medium in power distribution grids is power line communication (PLC). There are power cables in the distribution grids, and hence, they may be applied as a communication channel for the distribution-level data. This doctoral thesis proposes an IP-based high-frequency (HF) band PLC data transmission concept for the LVDC network. A general method to implement the Ethernet-based PLC concept between the public distribution rectifier and the customerend inverters in the LVDC grid is introduced. Low-voltage cables are studied as the communication channel in the frequency band of 100 kHz–30 MHz. The communication channel characteristics and the noise in the channel are described. All individual components in the channel are presented in detail, and a channel model, comprising models for each channel component is developed and verified by measurements. The channel noise is also studied by measurements. Theoretical signalto- noise ratio (SNR) and channel capacity analyses and practical data transmission tests are carried out to evaluate the applicability of the PLC concept against the requirements set by the smart grid applications in the LVDC system. The main results concerning the applicability of the PLC concept and its limitations are presented, and suggestion for future research proposed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Glutathione is the major intracellular antioxidant thiol protecting mammalian cells against oxidative stress induced by oxygen- and nitrogen-derived reactive species. In trypanosomes and leishmanias, trypanothione plays a central role in parasite protection against mammalian host defence systems by recycling trypanothione disulphide by the enzyme trypanothione reductase. Although Kinetoplastida parasites lack glutathione reductase, they maintain significant levels of glutathione. The aim of this study was to use Leishmania donovani trypanothione reductase gene mutant clones and different Leishmania species to examine the role of these two individual thiol systems in the protection mechanism against S-nitroso-N-acetyl-D,L-penicillamine (SNAP), a nitrogen-derived reactive species donor. We found that the resistance to SNAP of different species of Leishmania was inversely correlated with their glutathione concentration but not with their total low-molecular weight thiol content (about 0.18 nmol/10(7) parasites, regardless Leishmania species). The glutathione concentration in L. amazonensis, L. donovani, L. major, and L. braziliensis were 0.12, 0.10, 0.08, and 0.04 nmol/10(7) parasites, respectively. L. amazonensis, that have a higher level of glutathione, were less susceptible to SNAP (30 and 100 µM). The IC50 values of SNAP determined to L. amazonensis, L. donovani, L. major, and L. braziliensis were 207.8, 188.5, 160.9, and 83 µM, respectively. We also observed that L. donovani mutants carrying only one trypanothione reductase allele had a decreased capacity to survive (~40%) in the presence of SNAP (30-150 µM). In conclusion, the present data suggest that both antioxidant systems, glutathione and trypanothione/trypanothione reductase, participate in protection of Leishmania against the toxic effect of nitrogen-derived reactive species.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Chagas' disease, caused by the protozoan Trypanosoma cruzi, is a major cause of cardiovascular disability in countries where it is endemic. Damage to the heart microvasculature has been proposed to be an important factor in the pathogenesis of heart dysfunction. Endothelin-1 (ET-1) is a potent vasoconstrictor and exerts its effects via specific ET A and ET B receptors. A few studies have suggested a role for ET-1 and its receptors in the pathogenesis of Chagas' disease. We investigated the effects of treatment with bosentan, an ET A/ET B receptor antagonist, on the course of T. cruzi infection (Y strain) in C57Bl/6 mice. Treatment with bosentan (100 mg kg-1 day-1) was given per os starting day 0 after infection until sacrifice. Bosentan significantly increased myocardial inflammation, with no effects on parasitemia. Although the total number of nests was similar, a lower number of intact amastigote nests was found in the heart of bosentan-treated animals. Bosentan failed to affect the infection-associated increase in the cardiac levels of the cytokines IFN-g and TNF-a and the chemokines CCL2/MCP-1, CCL3/MIP-1a and CCL5/RANTES. In vitro, pre-incubation with ET-1 (0.1 µM) 4 h before infection enhanced the uptake of the parasites by peritoneal macrophages, and this effect was abrogated when macrophages were pre-treated with bosentan (1 µM) 15 min before incubation with ET-1. However, ET-1 did not alter killing of intracellular parasites after 48 h of in vitro infection. Our data suggest that bosentan-treated mice have a delay in controlling parasitism which is compensated for exacerbated inflammation. Infection is eventually controlled in these animals and lethality is unchanged, demonstrating that ET-1 plays a minor role in the protection against acute murine T. cruzi infection.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since the early 1970's, Canadians have expressed many concerns about the growth of government and its impact on their daily lives. The public has requested increased access to government documents and improved protection of the personal information which is held in government files and data banks. At the same time, both academics and practitioners in the field of public administration have become more interested in the values that public servants bring to their decisions and recommendations. Certain administrative values, such as accountability and integrity, have taken on greater relative importance. The purpose of this thesis is to examine the implementation of Ontario's access and privacy law. It centres on the question of whether or not the Freedom of Information and Protection of Privacy Act, 1987, (FIPPA) has answered the demand for open access to government while at the same time protecting the personal privacy of individual citizens. It also assesses the extent to which this relatively new piece of legislation has made a difference to the people of Ontario. The thesis presents an overview of the issues of freedom of information and protection of privacy in Ontario. It begins with the evolution of the legislation and a description of the law itself. It focuses on the structures and processes which have been established to meet the procedural and administrative demands of the Act. These structures and processes are evaluated in two ways. First, the thesis evaluates how open the Ontario government has become and, second, it determines how Ill carefully the privacy rights of individuals are safeguarded. An analytical framework of administrative values is used to evaluate the overall performance of the government in these two areas. The conclusion is drawn that, overall, the Ontario government has effectively implemented the Freedom of Information and Protection of Privacy Act, particularly by providing access to most government-held documents. The protection of individual privacy has proved to be not only more difficult to achieve, but more difficult to evaluate. However, the administrative culture of the Ontario bureaucracy is shown to be committed to ensuring that the access and privacy rights of citizens are respected.