352 resultados para confidentiality


Relevância:

10.00% 10.00%

Publicador:

Resumo:

From introduction. This paper discusses the arguments in favour of extending legal privilege to in-house lawyers in the light of the CJEU‟s judgement in AKZO. The previous jurisprudence is unambiguous, as the Court clearly stated in AM & S that the confidentiality of written communications between an undertaking and its lawyer is protected under Union law only when two cumulative conditions are fulfilled: they must be connected to the exercise of the client‟s rights of defence and the lawyer must be independent, that is, “not bound to the client by a relationship of employment”.1 This protection also applies to internal notes confined to reporting the content of communications with independent lawyers containing legal advice.2

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação apresentada para a obtenção do grau de mestre em Ciências da Educação - área de Supervisão e Orientação Pegagógica

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Illinois Dept. of Public Health routinely collects personal health data on Illinois residents and visitors from vital records, health and licensing information. Data dissemination and use of collected information requires record confidentiality and guidelines to safeguard individual privacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Current pharmacotherapies for psychiatric disorders are generally incompletely effective. Many patients do not respond well or suffer adverse reactions to these drugs, which can result in poor patient compliance and poor treatment outcome. Adverse drug reactions and non-response are likely to be influenced by genetic polymorphisms. Pharmacogenetics holds some promise for improving the treatment of mood disorders by utilising information about genetic polymorphisms to match patients to the drug therapy that is the most effective with the fewest side effects. Pharmacogenomics promises to facilitate the development of new drugs for treatment. However, these technologies raise many ethical, economic and regulatory issues that need to be addressed before they can be integrated into psychiatry, and medicine more generally. We discuss ethical and policy issues arising from pharmacogenetic testing and pharmacogenomics research, such as informed consent, privacy and confidentiality, research on vulnerable persons and discrimination; and economic viability of pharmacogenetics and pharmacogenomics. We conclude with recommendations for the regulation and distribution of pharmacogenetic testing services and pharmacogenomic drugs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The therapeutic letter has a long history, with roots in psychoanalytic work and continuing application in family therapy. The advent of e-mail has allowed another form for therapeutic written communication which, while incorporating the benefits of therapeutic letters, adds to these. It has also opened up some potential risks. This article incorporates a brief review of the literature covering therapeutic written communication and offers a case example where e-mail was used as an adjunct in face-to-face therapy with a client who experienced attachment difficulties. This therapy was informed by systemic and psychoanalytic traditions. The authors explore a variety of technical matters including the timing and Crafting of e-mail responses, the integration of written communication with face-to-face therapy, impact on the therapeutic relationship and management of crisis. Ethical issues such as confidentiality and duty of care are also considered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic communications devices intended for government or military applications must be rigorously evaluated to ensure that they maintain data confidentiality. High-grade information security evaluations require a detailed analysis of the device's design, to determine how it achieves necessary security functions. In practice, such evaluations are labour-intensive and costly, so there is a strong incentive to find ways to make the process more efficient. In this paper we show how well-known concepts from graph theory can be applied to a device's design to optimise information security evaluations. In particular, we use end-to-end graph traversals to eliminate components that do not need to be evaluated at all, and minimal cutsets to identify the smallest group of components that needs to be evaluated in depth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

All staff members of a child and adolescent mental health service were invited to participate in a survey about the use of email. Sixty-two of the 105 staff members responded to the survey, a participation rate of 59%. Of the respondents, 32 were allied health staff, 10 were nurses, seven were administrative staff, six were medical staff, three were operational staff and four were acting in a combination of these roles. The respondents reported extensive work-related email usage and considered that they were confident in using email despite low levels of training. However, they did not feel that they understood the legal and ethical issues involved. Furthermore, there was limited incorporation of email into standard record keeping. The majority of respondents thought that increased use of email would lead to a greater workload, a consequence they considered would probably increase over time. Many commented on the quick and practical use of this medium, but were wary about using email with individuals outside the service organization, especially if it were to contain clinical material. There was low use of email directly with clients, and clinicians were ambivalent about incorporating email into therapy. The results suggest that it is timely to consider the utility and appropriateness of email communication with clients and external service providers, and to formulate guidelines and procedures to ensure the confidentiality of client information and the safety of clients and staff.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: The aim of this paper is to examine some of the factors that facilitate and hinder interagency collaboration between child protection services and mental health services in cases where there is a parent with a mental illness and there are protection concerns for the child(ren). The paper reports on agency practices, worker attitudes and experiences, and barriers to effective collaboration. Method: A self-administered, cross-sectional survey was developed and distributed via direct mail or via line supervisors to workers in statutory child protection services, adult mental health services, child and youth mental health services, and Suspected Child Abuse and Neglect (SCAN) Teams. There were 232 completed questionnaires returned, with an overall response rate of 21%. Thirty-eight percent of respondents were statutory child protection workers. 39% were adult mental health workers, 16% were child and youth mental health workers, and 4% were SCAN Team medical officers (with 3% missing data). Results: Analysis revealed that workers were engaging in a moderate amount of interagency contact, but that they were unhappy with the support provided by their agency. Principle components analysis and multivariate analysis of variance (MANOVA) on items assessing attitudes toward other workers identified four factors, which differed in rates of endorsement: inadequate training, positive regard for child protection workers, positive regard for mental health workers, and mutual mistrust (from highest to lowest level of endorsement). The same procedure identified the relative endorsement of five factors extracted from items about potential barriers: inadequate resources, confidentiality, gaps in interagency processes, unrealistic expectations, and professional knowledge domains and boundaries. Conclusions: Mental health and child protection professionals believe that collaborative practice is necessary; however, their efforts are hindered by a lack of supportive structures and practices at the organizational level. (c) 2005 Published by Elsevier Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our research described in this paper identifies a three part premise relating to the spyware paradigm. Firstly the data suggests spyware is proliferating at an exponential rate. Secondly ongoing research confirms that spyware produces many security risks – including that of privacy/confidentiality breaches via illicit data collection and reporting. Thirdly, anti-spyware controls are improving but are still considered problematic for several reasons. Our research then concludes that control measures to counter this very significant challenge should merit compliance auditing – and this auditing may effectively target the vital message passing performed by all illicit data collection spyware. Our research then evolves into an experiment involving the design and implementation of a software audit tool to conduct the desired compliance auditing. The software audit tool is positioned at the protected network’s gateway. The software audit tool uses ‘phone-home’ IP addresses as spyware signatures to detect the presence of the offending software. The audit tool also has the capability to differentiate legitimate message passing software from that produced by spyware – and ‘learn’ both new spyware signatures and new legitimate message passing profiles. The testing stage of the software has proven successful – albeit using very limited levels of network message passing variety and frequency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este estudo teve por objetivos, identificar a percepção do padrasto sobre suas relações com seu(s) enteado(s) e identificar a percepção do padrasto acerca da sua função e papel na família. Utilizou-se de uma investigação clínica de referencial psicanalítico que levantou os dados por meio de entrevistas semi-dirigidas e do Desenho de família com estórias, em 3 participantes adultos e que eram padrastos. Os atendimentos foram realizados em ambiente de consultório, respeitando-se questões técnicas e éticas da pesquisa e da Psicologia em especial, tais como sigilo e consentimento dos participantes. A análise do conteúdo mostrou que havia peculiaridades em cada caso estudado, entretanto, havia fatores comuns em seus sentimentos e ações sobre a família e enteados: a) houve uma ambivalência pois tanto se perceberam como homens provedores e orientadores dos filhos e enteados, quanto havia também uma a percepção de que os sentimentos pelo filho biológico eram diferentes daqueles sentidos por seus enteados. b) todos os padrastos revelaram entraves nas relações por uma não definição clara de seu papel e função no contexto familiar, muitas vezes reforçado pelas esposas- mães, tidas como aquelas que detém o poder sobre o filho/enteado e, esta confusão gerava rivalidade entre padrasto e enteado, numa disputa pelo amor da esposa e mãe. c) do ponto de vista psíquico, foi observado que muitos conflitos os remetiam aos períodos precoces do desenvolvimento, especialmente à resolução edipiana, como numa reedição; assim, o exercício da função de padrasto se dá à base da qualidade de suas relações com seus pais na infância tal como se dá no exercício da paternidade consangüínea. De modo que, a função de padrasto, assim como a paterna se dá por um compromisso evolutivo . Sugerem-se outros trabalhos, pois se entendeu que esse tipo de estudo relacionado à Psicologia do desenvolvimento pode auxiliar em ações de saúde e prevenção em saúde mental.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Focal points: Patient views on pharmacists' access to medical records was studied using a self-completion questionnaire in medical practice and two community pharmacies There was some support for pharmacist access to records with a third of the sample being unsure There was a majority support when the purpose was clearly pharmacy related A clear majority was confident of confidentiality in the pharmacy

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose: This paper sets out to contribute to the advancement of knowledge, particularly with regard to the processes of implementation and the role of managers engaged in such high commitment strategies and work practices. Design/methodology/approach: This study is part of a research project investigating the extent to which employee involvement predicts job performance (as well as job satisfaction, wellbeing and organisational commitment) in the NHS, using both quantitative and qualitative methods. The main focus of this paper is to present evidence from four of the 20 case studies to show the barriers to implementing employee involvement as well as highlighting the techniques and practices that have proven to be most successful. Findings: Employee involvement is used successfully by management and has enabled frontline staff to contribute their knowledge to their work. Research limitations/implications: The ethical issues of confidentiality and anonymity permeated the research process throughout. Practical implications: The link between "high commitment" strategies and organisational performance is of great interest to academics and practitioners alike. One of these "high commitment" strategies, namely employee involvement, has been an important HR strategy for the NHS in the UK. Originality/value: Other organisations can learn from the findings by implementing the successful parts. © Emerald Group Publishing Limited.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The introduction of agent technology raises several security issues that are beyond conventional security mechanisms capability and considerations, but research in protecting the agent from malicious host attack is evolving. This research proposes two approaches to protecting an agent from being attacked by a malicious host. The first approach consists of an obfuscation algorithm that is able to protect the confidentiality of an agent and make it more difficult for a malicious host to spy on the agent. The algorithm uses multiple polynomial functions with multiple random inputs to convert an agent's critical data to a value that is meaningless to the malicious host. The effectiveness of the obfuscation algorithm is enhanced by addition of noise code. The second approach consists of a mechanism that is able to protect the integrity of the agent using state information, recorded during the agent execution process in a remote host environment, to detect a manipulation attack by a malicious host. Both approaches are implemented using a master-slave agent architecture that operates on a distributed migration pattern. Two sets of experimental test were conducted. The first set of experiments measures the migration and migration+computation overheads of the itinerary and distributed migration patterns. The second set of experiments is used to measure the security overhead of the proposed approaches. The protection of the agent is assessed by analysis of its effectiveness under known attacks. Finally, an agent-based application, known as Secure Flight Finder Agent-based System (SecureFAS) is developed, in order to prove the function of the proposed approaches.