807 resultados para privacy violations


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les efforts pour créer une Cour pénale internationale au niveau global remontent à la fin du 19e siècle, quand Gustave Moynier- l’un des fondateurs du Comité international de la Croix-Rouge propose la création d’un tribunal d’arbitrage international destiné à pénaliser les violations des lois humanitaires internationales perpétrées durant la guerre franco-prussienne de 1870-71. Quelques années plus tard, la société des Nations reprit la tâche en 1937, en adoptant une convention pour la création d’une Cour pénale internationale, mais cette convention n’entra jamais en vigueur. Suite à l’établissement des tribunaux de Nuremberg et de Tokyo, après la Seconde Guerre Mondiale afin d’améliorer la situation, l’Assemblée générale des Nations unies adopta une résolution en 1948 chargeant la Commission du droit international (CDI) de la tâche de préparer un projet de statut pour la création d’un tribunal pénal international permanent ayant une compétence pour juger le génocide et d’autres crimes de ce genre. En effet, la Cour pénale internationale (CPI) a été créée en 1998, pour que les responsables de génocide, de crime contre l’humanité et des crimes de guerre répondent enfin de leurs actes. C’est-à-dire être jugés devant un tribunal pénal international et que les victimes soient reconnues et réhabilitées pour prévenir la récurrence des graves crimes qu’elles ont subis et pour retenir la main des criminels. Prévu par le Statut de Rome de 17 Juillet 19981 dans son article 5 paragraphe 1er, ces crimes sont classés en quatre types : « Les crimes de guerres ; les crimes contre l’humanité ; les crimes de génocide et le crime d’agression ». Notamment, ce Statut de Rome, organise la compétence de la cour, son mode de fonctionnement, le droit applicable, ainsi que les modalités de coopération entre les Etats parties. Par ailleurs, la Cour pénale internationale est une institution indépendante, ayant une personnalité juridique internationale qui n’appartient pas au système des Nations Unies. Son siège se trouve à la Haye. Cependant, ses dépenses sont assurées par les Etats parties et certaines organisations internationales, des particuliers, les organisations non gouvernementales…

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter analyzes titling institutions and the regulation of supporting conveyancingservices. After examining the tradeoff of enforcement benefits and consent costs posed byproperty rights, it explains how different public titling systems (privacy, recording andregistration) try to solve this tradeoff, and what the consequences are for the nature andregulation of private conveyancing services. The chapter ends with a discussion of someempirical issues and data which are useful for comparing, designing and managing titlingand conveyancing systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper tests the internal consistency of time trade-off utilities.We find significant violations of consistency in the direction predictedby loss aversion. The violations disappear for higher gauge durations.We show that loss aversion can also explain that for short gaugedurations time trade-off utilities exceed standard gamble utilities. Ourresults suggest that time trade-off measurements that use relativelyshort gauge durations, like the widely used EuroQol algorithm(Dolan 1997), are affected by loss aversion and lead to utilities thatare too high.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Iowa Department of Natural Resources (IDNR) administers the Public Drinking Water Program in Iowa under delegation of authority from the United States Environmental Protection Agency (EPA). The 1996 re-authorized Safe Drinking Water Act (SDWA) requires that each state that has been granted primary implementation authority prepare an annual report on violations of national primary drinking water regulations within the state, make the report readily available to the public, and submit it to the EPA. This report fulfills this responsibility in Iowa for the 2006 calendar year, and includes violations of maximum contaminant levels, maximum residual disinfectant levels, treatment technique requirements, major monitoring or reporting requirements, action level exceedances, and operation certification requirements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report contains information about Iowa's public drinking water program for the calendar year 2007. Included in the report are descriptions of Iowa's systems, monitoring and reporting requirements of the systems, and violations incurred during the year. This report meets the federal Safe Drinking Water Act's requirement of an annual report on violations of national primary drinking water regulations by public water supply systems in Iowa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random-ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in orderto obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality of the resulting graphs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For more than 20 years, many countries have been trying to set up a standardised medical record at the regional or at the national level. Most of them have not reached this goal, essentially due to two main difficulties related to patient identification and medical records standardisation. Moreover, the issues raised by the centralisation of all gathered medical data have to be tackled particularly in terms of security and privacy. We discuss here the interest of a noncentralised management of medical records which would require a specific procedure that gives to the patient access to his/her distributed medical data, wherever he/she is located.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Young women in the juvenile justice system present with characteristics and experiences that differentiate them from their male counterparts. As such, the juvenile justice system in Iowa must consider these factors if it is to effectively and efficiently impact recidivism, rehabilitation and public safety. Data reveal the following trends: All youth in the juvenile justice system experience a significantly higher rate of child maltreatment than do youth in the general population. Additionally, young women have a distinctly higher percentage of reported sexual abuse. Young women commit primarily non-violent offenses, with shoplifting and running away being the only two areas where they exceed young men in number. Young women are held in detention for a substantially higher percentage of misdemeanor versus felony offenses than young men. Young women of color, particularly African American females, are far more likely to come into contact with the juvenile justice system. Additionally, arrests of minority females have increased during the same time frame as arrests of Caucasian females have decreased. The general type of offense committed by young women is against public order (i.e. alcohol related violations, disorderly conduct) or property (i.e. shoplifting), though young women with subsequent charges of a violent nature are likely to have had violent offenses initially as well. Historically, young women have been a smaller segment of the juvenile justice population. They remain so today. Consequently, they are easy to overlook. But Iowa’s response to them is no less important. Perhaps, because they are fewer in number, our system can have a true and meaningful influence, with prevention of further penetration into both the juvenile and adult systems being the ultimate goal. The Iowa Task Force on Young Women recommends the following measures to facilitate movement toward that goal: 1. Facilities and programs striving to provide the most effective and efficient services to young women will opt for single gender environments with female responsive programming that includes components to address trauma. 2. All institutions and agencies that work with females involved in the juvenile justice system and which receive state funding should be required to provide annual female responsive training to their employees. Training should be research based, progressive, ongoing and result in an implementation plan. 3. As detention reform proceeds, gender and the disproportionate number of females in detention for misdemeanor offenses must be an integral part of policy and decision making discussions including any recommendations for solutions to be implemented. 4. As research, data and planning progresses related to disproportionate minority contact with the juvenile system, the needs of girls of color be given equal consideration. Specifically, assessment tools must be without race/ethnic bias and they must also be female responsive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

PURPOSE: Human immunodeficiency virus (HIV)-positive adolescents face a number of challenges in dealing with their disease, treatment, and developmental tasks. This qualitative study describes some of the reasons why, and the extent to which, adolescents may or may not disclose their condition to others. METHODS: A semistructured interview lasting 40-110 minutes was conducted with each of 29 adolescents 12-20 years old, 22 female and seven male) living in Switzerland. Interviews were tape recorded and transcribed verbatim. The analysis of the content of interviews allowed us to identify salient topics (e.g., disclosure), which were then explored in detail. RESULTS: Of 29 participants, eight had not disclosed their condition to anyone outside the family, 19 had disclosed it to good friends, and 16 had disclosed it to some teachers. Four participants had engaged in public disclosure, and six of 10 sexually active teenagers disclosed their status to their partners. The attitudes toward disclosure among younger adolescents were mostly related to those of the parents, particularly the mother. Older adolescents, engaged in their search for autonomy, tended to decide independently what to say and to whom. Although foster/adoptive parents would often encourage disclosure, biological parents, especially HIV-positive mothers, insisted on not disclosing the adolescent's status for fear of stigma. CONCLUSION: The health care team should systematically address the issue of disclosure with the adolescent and his family (or foster parents), the aim being to balance the right of the adolescent and that adolescent's family to maintain privacy against the concerns of sexual partners, as well as the adolescent's interest in divulging HIV status to relatives, school staff, and friends.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report includes violations of maximum contaminant levels, maximum residual disinfectant levels, treatment technique requirements, action level exceedances, major monitoring or reporting requirements, and operation certification requirements of public water supplies in the state of Iowa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report contains information about Iowa's public drinking water program for the calendar year 2009. Included in the report are descriptions of Iowa's systems, monitoring and reporting requirements of the systems, and violations incurred during the year. This report meets the federal Safe Drinking Water Act's requirement of an annual report on violations of national primary drinking water regulations by public water supply systems in Iowa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report contains information about Iowa's public drinking water program for the calendar year 2010. Included in the report are descriptions of Iowa's systems, monitoring and reporting requirements of the systems, and violations incurred during the year. This report meets the federal Safe Drinking Water Act's requirement of an annual report on violations of national primary drinking water regulations by public water supply systems in Iowa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A mobile ad hoc network (MANET) is a decentralized and infrastructure-less network. This thesis aims to provide support at the system-level for developers of applications or protocols in such networks. To do this, we propose contributions in both the algorithmic realm and in the practical realm. In the algorithmic realm, we contribute to the field by proposing different context-aware broadcast and multicast algorithms in MANETs, namely six-shot broadcast, six-shot multicast, PLAN-B and ageneric algorithmic approach to optimize the power consumption of existing algorithms. For each algorithm we propose, we compare it to existing algorithms that are either probabilistic or context-aware, and then we evaluate their performance based on simulations. We demonstrate that in some cases, context-aware information, such as location or signal-strength, can improve the effciency. In the practical realm, we propose a testbed framework, namely ManetLab, to implement and to deploy MANET-specific protocols, and to evaluate their performance. This testbed framework aims to increase the accuracy of performance evaluation compared to simulations, while keeping the ease of use offered by the simulators to reproduce a performance evaluation. By evaluating the performance of different probabilistic algorithms with ManetLab, we observe that both simulations and testbeds should be used in a complementary way. In addition to the above original contributions, we also provide two surveys about system-level support for ad hoc communications in order to establish a state of the art. The first is about existing broadcast algorithms and the second is about existing middleware solutions and the way they deal with privacy and especially with location privacy. - Un réseau mobile ad hoc (MANET) est un réseau avec une architecture décentralisée et sans infrastructure. Cette thèse vise à fournir un support adéquat, au niveau système, aux développeurs d'applications ou de protocoles dans de tels réseaux. Dans ce but, nous proposons des contributions à la fois dans le domaine de l'algorithmique et dans celui de la pratique. Nous contribuons au domaine algorithmique en proposant différents algorithmes de diffusion dans les MANETs, algorithmes qui sont sensibles au contexte, à savoir six-shot broadcast,six-shot multicast, PLAN-B ainsi qu'une approche générique permettant d'optimiser la consommation d'énergie de ces algorithmes. Pour chaque algorithme que nous proposons, nous le comparons à des algorithmes existants qui sont soit probabilistes, soit sensibles au contexte, puis nous évaluons leurs performances sur la base de simulations. Nous montrons que, dans certains cas, des informations liées au contexte, telles que la localisation ou l'intensité du signal, peuvent améliorer l'efficience de ces algorithmes. Sur le plan pratique, nous proposons une plateforme logicielle pour la création de bancs d'essai, intitulé ManetLab, permettant d'implémenter, et de déployer des protocoles spécifiques aux MANETs, de sorte à évaluer leur performance. Cet outil logiciel vise à accroître la précision desévaluations de performance comparativement à celles fournies par des simulations, tout en conservant la facilité d'utilisation offerte par les simulateurs pour reproduire uneévaluation de performance. En évaluant les performances de différents algorithmes probabilistes avec ManetLab, nous observons que simulateurs et bancs d'essai doivent être utilisés de manière complémentaire. En plus de ces contributions principales, nous fournissons également deux états de l'art au sujet du support nécessaire pour les communications ad hoc. Le premier porte sur les algorithmes de diffusion existants et le second sur les solutions de type middleware existantes et la façon dont elles traitent de la confidentialité, en particulier celle de la localisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Public travel by motor vehicles is often necessary in road and street sections that have been officially closed for construction, repair, and/or other reasons. This authorization is permitted in order to provide access to homes and businesses located beyond the point of closure. The MUTCD does address appropriate use of specific regulatory signs at the entrance to closed sections; however, direct guidance for temporary traffic control measures within these areas is not included but may be needed. Interpretation and enforcement of common practices may vary among transportation agencies. For example, some law enforcement officers in Iowa have indicated a concern regarding enforcement and jurisdiction of traffic laws in these areas because the Code of Iowa only appears to address violations on roadways open to “public travel.” Enforcement of traffic laws in closed road sections is desirable to maintain safety for workers and for specifically authorized road users. In addition, occasional unauthorized entry by motor vehicles is experienced in closed road areas causing property damage. Citations beyond simple trespass may be advisable to provide better security for construction sites, reduce economic losses from damage to completed work, and create safer work zones.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IPI is comprised of three divisions. Private Sector funds are handed over to the General Fund. Traditional Industries and Farms funds are managed by IPI. The auditor of the state provides oversight on policies, procedures, and compliance with state law. Each year, the auditor is responsible for providing the Governor, legislature, Director of Corrections, and the public the findings of their comprehensive audits. IPI has received a clean bill of health and has not been cited for any violations in ten (10) years. IPI operates under the guidance of an advisory board, comprised of seven members. The advisory board meets at least four (4) times per year at a location of the board‟s choice, generally at a different prison each quarter. The board reviews the financials, policies, approves any new private sector ventures and offers comprehensive guidance on issues that will impact correctional industries as well as the public and local businesses. Each member serves for two (2) years and may be re-appointed. IPI has found that retaining board members has helped immensely with the continuity of transition and has afforded IPI with superb leadership and guidance. IPI is 100% self-funding. We receive no appropriations from the general fund. We hire our staff, pay their salaries, and pay the stipend of the offenders. We pay for our raw materials, equipment, and construct our buildings all from the proceeds of our sales. We operate with a revolving fund and retain any earnings at year-ends. The retained earnings are used for expansion of our work programs.