996 resultados para Code set
Resumo:
The document should be read as supplementary to existing requirements as set out both in statute â?" particularly legislation specific to your organisation, the Health Acts 1947-2004, Ombudsman Act, 1980, Data Protection Acts 1988 & 2003, Freedom of Information Acts 1997-2003, Ethics in Public Office Acts 1995 & 2001, Ombudsman for Children Act, 2002 and the Comptroller and Auditor General (Amendment) Act, 1993 – and in Government approved guidelines, including the Code of Practice for the Governance of State Bodies (2001), Public Financial Procedures, The Role and Responsibilities of Accounting Officers (2003) and Risk Management Guidance for Government Departments and Offices (2004). Read the report (PDF, 1.4mb) Â
Resumo:
Code of Practice on Fluoridation of Drinking Water 2007 Fluoridation of drinking water, the main aim of which is the prevention and control of dental caries (dental decay), commenced in Ireland in 1964 after the introduction of the Health (Fluoridation of Water Supplies) Act 1960. The Act provides that health authorities shall arrange for the fluoridation of public piped water supplies. The Act also provides that sanitary (local) authorities may act as the agents of health authorities in fluoridating public piped water supplies. Currently approximately 73% of the population receives fluoridated water from public water supplies. Click here to download PDF 195kb
Segimon Comas : importància i contextualització històrica d'un universitari i acadèmic del set-cents
Resumo:
Contextualització històrica dels inicis de l'Acadèmia de Bones Lletres al segle XVIII, i un dels seus artífexs, Segimon Comas.
Resumo:
AbstractDigitalization gives to the Internet the power by allowing several virtual representations of reality, including that of identity. We leave an increasingly digital footprint in cyberspace and this situation puts our identity at high risks. Privacy is a right and fundamental social value that could play a key role as a medium to secure digital identities. Identity functionality is increasingly delivered as sets of services, rather than monolithic applications. So, an identity layer in which identity and privacy management services are loosely coupled, publicly hosted and available to on-demand calls could be more realistic and an acceptable situation. Identity and privacy should be interoperable and distributed through the adoption of service-orientation and implementation based on open standards (technical interoperability). Ihe objective of this project is to provide a way to implement interoperable user-centric digital identity-related privacy to respond to the need of distributed nature of federated identity systems. It is recognized that technical initiatives, emerging standards and protocols are not enough to guarantee resolution for the concerns surrounding a multi-facets and complex issue of identity and privacy. For this reason they should be apprehended within a global perspective through an integrated and a multidisciplinary approach. The approach dictates that privacy law, policies, regulations and technologies are to be crafted together from the start, rather than attaching it to digital identity after the fact. Thus, we draw Digital Identity-Related Privacy (DigldeRP) requirements from global, domestic and business-specific privacy policies. The requirements take shape of business interoperability. We suggest a layered implementation framework (DigldeRP framework) in accordance to model-driven architecture (MDA) approach that would help organizations' security team to turn business interoperability into technical interoperability in the form of a set of services that could accommodate Service-Oriented Architecture (SOA): Privacy-as-a-set-of- services (PaaSS) system. DigldeRP Framework will serve as a basis for vital understanding between business management and technical managers on digital identity related privacy initiatives. The layered DigldeRP framework presents five practical layers as an ordered sequence as a basis of DigldeRP project roadmap, however, in practice, there is an iterative process to assure that each layer supports effectively and enforces requirements of the adjacent ones. Each layer is composed by a set of blocks, which determine a roadmap that security team could follow to successfully implement PaaSS. Several blocks' descriptions are based on OMG SoaML modeling language and BPMN processes description. We identified, designed and implemented seven services that form PaaSS and described their consumption. PaaSS Java QEE project), WSDL, and XSD codes are given and explained.
Resumo:
In recent years, the fight against money laundering has emerged as a key issue of financial regulation. The Wolfsberg Group is an important multistakeholder agreement establishing corporate responsibility (CR) principles against money laundering in a domain where international coordination remains otherwise difficult. The fact that 10 out of the 25 top private banking institutions joined this initiative opens up an interesting puzzle concerning the conditions for the participation of key industry players in the Wolfsberg Group. The article presents a fuzzy-set analysis of seven hypotheses based on firm-level organizational factors, the macro-institutional context, and the regulatory framework. Results from the analysis of these 25 financial institutions show that public ownership of the bank and the existence of a code of conduct are necessary conditions for participation in the Wolfsberg Group, whereas factors related to the type of financial institution, combined with the existence of a black list, are sufficient for explaining participation.
Resumo:
(Résumé de l'ouvrage) Das Deuteronomium nimmt sowohl in der Literaturgeschichte der alttestamentlichen Geschichtsbücher Josua bis Könige eine Schlüsselstellung ein als auch für die Entstehung des Pentateuchs. Wie lassen sich diese beiden Funktionen vereinbaren? Mit der Verhältnisbestimmung haben sich namhafte Wissenschafter der Arbeitsgruppe »Biblical and Ancient Near Eastern Law« im Rahmen der Internationalen Treffen der Society of Biblical Literature in Berlin (2002) und Cambridge (2003) befasst. Der Band präsentiert die neuesten Forschungsergebnisse. Er enthält Vorträge von E. Otto, K. Schmid, H.-C. Schmitt, T. Römer, W.M. Schniedewind, G.N. Knoppers, R. Achenbach, M.M. Zahn und C. Nihan.
Resumo:
This guidance follows on from the publication of the Government's obesity strategy Healthy Weight, Healthy Lives: A Cross-Government strategy for England. The guidance provides advice to PCTs and local authorities on how to set child obesity goals as part of the Vital Signs and the National Indicator Set. This will be followed shortly with full guidance on developing local plans.
Resumo:
We present a method for segmenting white matter tracts from high angular resolution diffusion MR. images by representing the data in a 5 dimensional space of position and orientation. Whereas crossing fiber tracts cannot be separated in 3D position space, they clearly disentangle in 5D position-orientation space. The segmentation is done using a 5D level set method applied to hyper-surfaces evolving in 5D position-orientation space. In this paper we present a methodology for constructing the position-orientation space. We then show how to implement the standard level set method in such a non-Euclidean high dimensional space. The level set theory is basically defined for N-dimensions but there are several practical implementation details to consider, such as mean curvature. Finally, we will show results from a synthetic model and a few preliminary results on real data of a human brain acquired by high angular resolution diffusion MRI.
Analysis of a complete disjunctive table in which all the questions have the same set of categories.