967 resultados para Personal rain protection
Resumo:
Volunteering is a very important part of life in Australia with an estimated 36% of the adult population volunteering in 2010. Voluntary work generates economic benefits, addresses community needs and develops the social networks that form the backbone of civil society. Without volunteers, many essential services would either cease to exist or become too expensive for many people to afford. These volunteers, who by definition are not in receipt of any remuneration for their work and services, are exposed to personal injury and to legal liability in the discharge of their functions. It is therefore appropriate that statutory protection is extended to volunteers and that volunteer organisations procure public liability and personal accident cover where possible. However, given the patchwork quilt of circumstances where statutory or institutional cover is available to volunteers and the existence of many and diverse exclusions, it is important to have regard also to what scope a volunteer may have to avail themselves of protection against liability for volunteering activity by relying upon their own personal insurance cover. This article considers the extent of private insurance cover and its availability to volunteers under home and contents insurance and under comprehensive motor vehicle insurance. The most common policies in the Australian market are examined and the uncertain nature of protection against liability afforded by these policies is discussed. This uncertainty could be reduced should the Federal Government through amendments to the Insurance Contracts Regulations standardise the circumstances and extent to which liability protection was afforded to an insured holding home and contents insurance and comprehensive motor vehicle insurance cover.
Resumo:
The QUT Outdoor Worker Sun Protection (OWSP) project undertook a comprehensive applied health promotion project to demonstrate the effectiveness of sun protection measures which influence high risk outdoor workers in Queensland to adopt sun safe behaviours. The three year project (2010-2013) was driven by two key concepts: 1) The hierarchy of control, which is used to address risks in the workplace, advocates for six control measures that need to be considered in order of priority (refer to Section 3.4.2); and 2) the Ottawa Charter which recommends five action means to achieve health promotion (refer to Section 2.1). The project framework was underpinned by a participatory action research approach that valued peoples’ input, took advantage of existing skills and resources, and stimulated innovation (refer to Section 4.2). Fourteen workplaces (small and large) with a majority outdoor workforce were recruited across regional Queensland (Darling Downs, Northwest, Mackay and Cairns) from four industries types: 1) building and construction, 2) rural and farming, 3) local government, and 4) public sector. A workplace champion was identified at each workplace and was supported (through resource provision, regular contact and site visits) over a 14 to 18 month intervention period to make sun safety a priority in their workplace. Employees and employers were independently assessed for pre- and postintervention sun protection behaviours. As part of the intervention, an individualised sun safety action plan was developed in conjunction with each workplace to guide changes across six key strategy areas including: 1) Policy (e.g., adopt sun safety practices during all company events); 2) Structural and environmental (e.g., shade on worksites; eliminate or minimise reflective surfaces); 3) Personal protective equipment (PPE) (e.g., trial different types of sunscreens, or wide-brimmed hats); 4) Education and awareness (e.g., include sun safety in inductions and toolbox talks; send reminder emails or text messages to workers);5) Role modelling (e.g., by managers, supervisors, workplace champions and mentors); and 6) Skin examinations (e.g., allow time off work for skin checks). The participatory action process revealed that there was no “one size fits all” approach to sun safety in the workplace; a comprehensive, tailored approach was fundamental. This included providing workplaces with information, resources, skills, know how, incentives and practical help. For example, workplaces engaged in farming complete differing seasonal tasks across the year and needed to prepare for optimal sun safety of their workers during less labour intensive times. In some construction workplaces, long pants were considered a trip hazard and could not be used as part of a PPE strategy. Culture change was difficult to achieve and workplace champions needed guidance on the steps to facilitate this (e.g., influencing leaders through peer support, mentoring and role modelling). With the assistance of the project team the majority of workplaces were able to successfully implement the sun safety strategies contained within their action plans, up skilling them in the evidence for sun safety, how to overcome barriers, how to negotiate with all relevant parties and assess success. The most important enablers to the implementation of a successful action plan were a pro-active workplace champion, strong employee engagement, supportive management, the use of highly visual educational resources, and external support (provided by the project team through regular contact either directly through phone calls or indirectly through emails and e-newsletters). Identified barriers included a lack of time, the multiple roles of workplace champions, (especially among smaller workplaces), competing issues leading to a lack of priority for sun safety, the culture of outdoor workers, and costs or budgeting constraints. The level of sun safety awareness, knowledge, and sun protective behaviours reported by the workers increased between pre-and post-intervention. Of the nine sun protective behaviours that were assessed, the largest changes reported included a 26% increase in workers who “usually or always” wore a broad-brimmed hat, a 20% increase in the use of natural shade, a 19% increase in workers wearing long-sleeved collared shirts, and a 16% increase in workers wearing long trousers.
Resumo:
The IEC 61850 family of standards for substation communication systems were released in the early 2000s, and include IEC 61850-8-1 and IEC 61850-9-2 that enable Ethernet to be used for process-level connections between transmission substation switchyards and control rooms. This paper presents an investigation of process bus protection performance, as the in-service behavior of multi-function process buses is largely unknown. An experimental approach was adopted that used a Real Time Digital Simulator and 'live' substation automation devices. The effect of sampling synchronization error and network traffic on transformer differential protection performance was assessed and compared to conventional hard-wired connections. Ethernet was used for all sampled value measurements, circuit breaker tripping, transformer tap-changer position reports and Precision Time Protocol synchronization of sampled value merging unit sampling. Test results showed that the protection relay under investigation operated correctly with process bus network traffic approaching 100% capacity. The protection system was not adversely affected by synchronizing errors significantly larger than the standards permit, suggesting these requirements may be overly conservative. This 'closed loop' approach, using substation automation hardware, validated the operation of protection relays under extreme conditions. Digital connections using a single shared Ethernet network outperformed conventional hard-wired solutions.
Resumo:
Objectives: We aimed to identify current practice of sun protection and factors associated with effective use in four outdoor worker industries in Queensland, Australia. Methods: Workplaces in four industries with a high proportion of outdoor workers (building/construction, rural/farming, local government, and public sector industries) were identified using an online telephone directory, screened for eligibility, and invited to participant via mail (n=15, recruitment rate 37%). A convenience sample of workers were recruited within each workplace (n=162). Workplaces’ sun protective policies and procedures were identified using interviews and policy analysis with workplace representatives, and discussion groups and computer-assisted telephone interviews with workers. Personal characteristics and sun protection knowledge, attitudes and behaviors were collated and analysed. Results: Just over half the workplaces had an existing policy which referred to sun protection (58%), and most provided at least some personal protective equipment (PPE), but few scheduled work outside peak sun hours (43%) or provided skin checks (21%). Several worker and workplace characteristics were associated with greater sun protection behaviour among workers, including having received education on the use of PPE (p<0.001), being concerned about being in the sun (p=0.002); and working in a smaller workplace (p=0.035). Conclusions: Uptake of sun protection by outdoor workers is affected by a complex interplay of both workplace and personal factors, and there is a need for effective strategies targeting both the workplace environment and workers’ knowledge, attitudes and behaviors to decrease harmful sun exposure further.
Resumo:
Identity crime is argued to be one of the most significant crime problems of today. This paper examines identity crime, through the attitudes and practices of a group of seniors in Queensland, Australia. It examines their own actions towards the protection of their personal data in response to a fraudulent email request. Applying the concept of a prudential citizen (as one who is responsible for self-regulating their behaviour to maintain the integrity of one’s identity) it will be argued that seniors often expose identity information through their actions. However, this is demonstrated to be the result of flawed assumptions and misguided beliefs over the perceived risk and likelihood of identity crime, rather than a deliberate act. This paper concludes that to protect seniors from identity crime, greater awareness of appropriate risk-management strategies towards disclosure of their personal details is required to reduce their inadvertent exposure to identity crime.
Resumo:
In Tanzania, indigenous forests can still be found whose existence is based on the management systems of precolonial society. This study covers material from over 900 forests. There are similar types of forests elsewhere in Africa, and similar forests can also be found in indigenous cultures on every continent. In this study they are called traditionally protected forests (TPFs). They have a high level of endemism and a rich biodiversity. The field study was carried out during the years 1997-2003 using participatory methods. An active debate is going on concerning the capacity of local communities to manage their environment. The role of indigenous people and their institutions in the development of the physical environment is a central issue in the debate. This study discusses the opportunities that the local people have had to decide on how to conserve, maintain, utilise, and manage their environment during different political periods. The study explains what kinds of changes have taken place in these forests and institutions in northeastern Tanzania among the matrilinear Zigua and patrilinear Gweno ethnic groups. About 2% of the land area of the communities was still protected by the precolonial structures. The communities have established their protection systems for different reasons, not only because of their beliefs but also because of different secular and clearly environmentally motivated reasons. There are different TPF types. Less than half of them are directly related to spirituality, and more than half are not. In earlier research elsewhere, it has been commonly understood that spiritual reasons played the main role in the protection of these environments. This study is also part of the postcolonial geographical discussion on the precolonial landscape and environmental management which was started by Carl Sauer. In the Zigua case study villages, only two out of five first comer clans have performed rain rituals in the past 30 years. Many of the most respected sacred sites do not have a ritual maker or even a person who knows how to perform rituals any longer. The same is happening with male initiation rites. In all case study villages there have been illegal cuts in the TPFs, but variations can be seen between the communities. The number of those who neither respect indigenous regulations nor accept indigenous penalties is growing. Positive developments have also taken place. Nowadays, the Forest Act of 2002 is in effect, which works as a cornerstone of community-based land ownership and also allows elders to protect TPFs, and by-laws are created with the support of different projects. Moreover, during the field study it was found that many young people are ignorant about their village's TPF sites, but interested in learning about their history and values.
Resumo:
Precipitation-induced runoff and leaching from milled peat mining mires by peat types: a comparative method for estimating the loading of water bodies during peat production. This research project in environmental geology has arisen out of an observed need to be able to predict more accurately the loading of watercourses with detrimental organic substances and nutrients from already existing and planned peat production areas, since the authorities capacity for insisting on such predictions covering the whole duration of peat production in connection with evaluations of environmental impact is at present highly limited. National and international decisions regarding monitoring of the condition of watercourses and their improvement and restoration require more sophisticated evaluation methods in order to be able to forecast watercourse loading and its environmental impacts at the stage of land-use planning and preparations for peat production.The present project thus set out from the premise that it would be possible on the basis of existing mire and peat data properties to construct estimates for the typical loading from production mires over the whole duration of their exploitation. Finland has some 10 million hectares of peatland, accounting for almost a third of its total area. Macroclimatic conditions have varied in the course of the Holocene growth and development of this peatland, and with them the habitats of the peat-forming plants. Temperatures and moisture conditions have played a significant role in determining the dominant species of mire plants growing there at any particular time, the resulting mire types and the accumulation and deposition of plant remains to form the peat. The above climatic, environmental and mire development factors, together with ditching, have contributed, and continue to contribute, to the existence of peat horizons that differ in their physical and chemical properties, leading to differences in material transport between peatlands in a natural state and mires that have been ditched or prepared for forestry and peat production. Watercourse loading from the ditching of mires or their use for peat production can have detrimental effects on river and lake environments and their recreational use, especially where oxygen-consuming organic solids and soluble organic substances and nutrients are concerned. It has not previously been possible, however, to estimate in advance the watercourse loading likely to arise from ditching and peat production on the basis of the characteristics of the peat in a mire, although earlier observations have indicated that watercourse loading from peat production can vary greatly and it has been suggested that differences in peat properties may be of significance in this. Sprinkling is used here in combination with simulations of conditions in a milled peat production area to determine the influence of the physical and chemical properties of milled peats in production mires on surface runoff into the drainage ditches and the concentrations of material in the runoff water. Sprinkling and extraction experiments were carried out on 25 samples of milled Carex (C) and Sphagnum (S) peat of humification grades H 2.5 8.5 with moisture content in the range 23.4 89% on commencement of the first sprinkling, which was followed by a second sprinkling 24 hours later. The water retention capacity of the peat was best, and surface runoff lowest, with Sphagnum and Carex peat samples of humification grades H 2.5 6 in the moisture content class 56 75%. On account of the hydrophobicity of dry peat, runoff increased in a fairly regular manner with drying of the sample from 55% to 24 30%. Runoff from the samples with an original moisture content over 55% increased by 63% in the second round of sprinkling relative to the first, as they had practically reached saturation point on the first occasion, while those with an original moisture content below 55% retained their high runoff in the second round, due to continued hydrophobicity. The well-humified samples (H 6.5 8.5) with a moisture content over 80% showed a low water retention capacity and high runoff in both rounds of sprinkling. Loading of the runoff water with suspended solids, total phosphorus and total nitrogen, and also the chemical oxygen demand (CODMn O2), varied greatly in the sprinkling experiment, depending on the peat type and degree of humification, but concentrations of the same substances in the two sprinklings were closely or moderately closely correlated and these correlations were significant. The concentrations of suspended solids in the runoff water observed in the simulations of a peat production area and the direct surface runoff from it into the drainage ditch system in response to rain (sprinkling intensity 1.27 mm/min) varied c. 60-fold between the degrees of humification in the case of the Carex peats and c. 150-fold for the Sphagnum peats, while chemical oxygen demand varied c. 30-fold and c. 50-fold, respectively, total phosphorus c. 60-fold and c. 66-fold, total nitrogen c. 65-fold and c. 195-fold and ammonium nitrogen c. 90-fold and c. 30-fold. The increases in concentrations in the runoff water were very closely correlated with increases in humification of the peat. The correlations of the concentrations measured in extraction experiments (48 h) with peat type and degree of humification corresponded to those observed in the sprinkler experiments. The resulting figures for the surface runoff from a peat production area into the drainage ditches simulated by means of sprinkling and material concentrations in the runoff water were combined with statistics on the mean extent of daily rainfall (0 67 mm) during the frost-free period of the year (May October) over an observation period of 30 years to yield typical annual loading figures (kg/ha) for suspended solids (SS), chemical oxygen demand of organic matter (CODmn O2), total phosphorus (tot. P) and total nitrogen (tot. N) entering the ditches with respect to milled Carex (C) and Sphagnum (S) peats of humification grades H 2.5 8.5. In order to calculate the loading of drainage ditches from a milled peat production mire with the aid of these annual comparative values (in kg/ha), information is required on the properties of the intended production mire and its peat. Once data are available on the area of the mire, its peat depth, peat types and their degrees of humification, dry matter content, calorific value and corresponding energy content, it is possible to produce mutually comparable estimates for individual mires with respect to the annual loading of the drainage ditch system and the surrounding watercourse for the whole service life of the production area, the duration of this service life, determinations of energy content and the amount of loading per unit of energy generated (kg/MWh). In the 8 mires in the Köyhäjoki basin, Central Ostrobothnia, taken as an example, the loading of suspended solids (SS) in the drainage ditch networks calculated on the basis of the typical values obtained here and existing mire and peat data and expressed per unit of energy generated varied between the mires and horizons in the range 0.9 16.5 kg/MWh. One of the aims of this work was to develop means of making better use of existing mire and peat data and the results of corings and other field investigations. In this respect combination of the typical loading values (kg/ha) obtained here for S, SC, CS and C peats and the various degrees of humification (H 2.5 8.5) with the above mire and peat data by means of a computer program for the acquisition and handling of such data would enable all the information currently available and that deposited in the system in the future to be used for defining watercourse loading estimates for mires and comparing them with the corresponding estimates of energy content. The intention behind this work has been to respond to the challenge facing the energy generation industry to find larger peat production areas that exert less loading on the environment and to that facing the environmental authorities to improve the means available for estimating watercourse loading from peat production and its environmental impacts in advance. The results conform well to the initial hypothesis and to the goals laid down for the research and should enable watercourse loading from existing and planned peat production to be evaluated better in the future and the resulting impacts to be taken into account when planning land use and energy generation. The advance loading information available in this way would be of value in the selection of individual peat production areas, the planning of their exploitation, the introduction of water protection measures and the planning of loading inspections, in order to achieve controlled peat production that pays due attention to environmental considerations.
Resumo:
This workshop is jointly organized by EFMI Working Groups Security, Safety and Ethics and Personal Portable Devices in cooperation with IMIA Working Group "Security in Health Information Systems". In contemporary healthcare and personal health management the collection and use of personal health information takes place in different contexts and jurisdictions. Global use of health data is also expanding. The approach taken by different experts, health service providers, data subjects and secondary users in understanding privacy and the privacy expectations others may have is strongly context dependent. To make eHealth, global healthcare, mHealth and personal health management successful and to enable fair secondary use of personal health data, it is necessary to find a practical and functional balance between privacy expectations of stakeholder groups. The workshop will highlight these privacy concerns by presenting different cases and approaches. Workshop participants will analyse stakeholder privacy expectations that take place in different real-life contexts such as portable health devices and personal health records, and develop a mechanism to balance them in such a way that global protection of health data and its meaningful use is realized simultaneously. Based on the results of the workshop, initial requirements for a global healthcare information certification framework will be developed.
Resumo:
"The Protection of Traditional Knowledge Associated with Genetic Resources: The Role of Databases and Registers" ABSTRACT Yovana Reyes Tagle The misappropriation of TK has sparked a search for national and international laws to govern the use of indigenous peoples knowledge and protection against its commercial exploitation. There is a widespread perception that biopiracy or illegal access to genetic resources and associated traditional knowledge (TK) continues despite national and regional efforts to address this concern. The purpose of this research is to address the question of how documentation of TK through databases and registers could protect TK, in light of indigenous peoples increasing demands to control their knowledge and benefit from its use. Throughout the international debate over the protection of TK, various options have been brought up and discussed. At its core, the discussion over the legal protection of TK comes down to these issues: 1) The doctrinal question: What is protection of TK? 2) The methodological question: How can protection of TK be achieved? 3) The legal question: What should be protected? And 4) The policy questions: Who has rights and how should they be implemented? What kind of rights should indigenous peoples have over their TK? What are the central concerns the TK databases want to solve? The acceptance of TK databases and registers may bring with it both opportunities and dangers. How can the rights of indigenous peoples over their documented knowledge be assured? Documentation of TK was envisaged as a means to protect TK, but there are concerns about how documented TK can be protected from misappropriation. The methodology used in this research seeks to contribute to the understanding of the protection of TK. The steps taken in this research attempt to describe and to explain a) what has been done to protect TK through databases and registers, b) how this protection is taking place, and c) why the establishment of TK databases can or cannot be useful for the protection of TK. The selected case studies (Peru and Venezuela) seek to illustrate the complexity and multidisciplinary nature of the establishment of TK databases, which entail not only legal but also political, socio-economic and cultural issues. The study offers some conclusions and recommendations that have emerged after reviewing the national experiences, international instruments, work of international organizations, and indigenous peoples perspectives. This thesis concludes that if TK is to be protected from disclosure and unauthorized use, confidential databases are required. Finally, the TK database strategy needs to be strengthened by the legal protection of the TK itself.
Resumo:
The tension created when companies are collaborating with competitors – sometimes termed co-opetition - has been subject of research within the network approach. As companies are collaborating with competitors, they need to simultaneously share and protect knowledge. The opportunistic behavior and learning intent of the partner may be underestimated, and collaboration may involve significant risks of loss of competitive edge. Contrastingly, the central tenet within the Intellectual Capital approach is that knowledge grows as it flows. The person sharing does not lose the knowledge and therefore knowledge has doubled from a company’s point of view. Value is created through the interplay of knowledge flows between and within three forms of intellectual capital: human, structural and relational capital. These are the points of departure for the research conducted in this thesis. The thesis investigates the tension between collaboration and competition through an Intellectual Capital lens, by identifying the actions taken to share and protect knowledge in interorganizational collaborative relationships. More specifically, it explores the tension in knowledge flows aimed at protecting and sharing knowledge, and their effect on the value creation of a company. It is assumed, that as two companies work closely together, the collaborative relationship becomes intertwined between the two partners and the intellectual capital flows of both companies are affected. The research finds that companies commonly protect knowledge also in close and long-term collaborative relationships. The knowledge flows identified are both collaborative and protective, with the result that they sometimes are counteracting and neutralize each other. The thesis contributes to the intellectual capital approach by expanding the understanding of knowledge protection in interorganizational relationships in three ways. First, departing from the research on co-opetition it shifts the focus from the internal view of the company as a repository of intellectual capital onto the collaborative relationships between competing companies. Second, instead of the traditional collaborative and sharing point of departure, it takes a competitive and protective perspective. Third, it identifies the intellectual capital flows as assets or liabilities depending on their effect on the value creation of the company. The actions taken to protect knowledge in an interorganizational relationship may decrease the value created in the company, which would make them liabilities.