899 resultados para Privacy, Right of
Resumo:
"September 20, 2005."
Resumo:
Since the early 1970's, Canadians have expressed many concerns about the growth of government and its impact on their daily lives. The public has requested increased access to government documents and improved protection of the personal information which is held in government files and data banks. At the same time, both academics and practitioners in the field of public administration have become more interested in the values that public servants bring to their decisions and recommendations. Certain administrative values, such as accountability and integrity, have taken on greater relative importance. The purpose of this thesis is to examine the implementation of Ontario's access and privacy law. It centres on the question of whether or not the Freedom of Information and Protection of Privacy Act, 1987, (FIPPA) has answered the demand for open access to government while at the same time protecting the personal privacy of individual citizens. It also assesses the extent to which this relatively new piece of legislation has made a difference to the people of Ontario. The thesis presents an overview of the issues of freedom of information and protection of privacy in Ontario. It begins with the evolution of the legislation and a description of the law itself. It focuses on the structures and processes which have been established to meet the procedural and administrative demands of the Act. These structures and processes are evaluated in two ways. First, the thesis evaluates how open the Ontario government has become and, second, it determines how Ill carefully the privacy rights of individuals are safeguarded. An analytical framework of administrative values is used to evaluate the overall performance of the government in these two areas. The conclusion is drawn that, overall, the Ontario government has effectively implemented the Freedom of Information and Protection of Privacy Act, particularly by providing access to most government-held documents. The protection of individual privacy has proved to be not only more difficult to achieve, but more difficult to evaluate. However, the administrative culture of the Ontario bureaucracy is shown to be committed to ensuring that the access and privacy rights of citizens are respected.
Resumo:
Cover title.
Resumo:
WI docs. no.: Leg.3:SB/1976/4.
Resumo:
"Provides a copy of all notices of VA systems of records subject to the Privacy Act of 1974..."--p. [1].
Resumo:
Description based on: June 30, 1979.
Resumo:
Cover title.
Resumo:
"August 1990."
Resumo:
Hearings held on S. 3418, 3633, 3116, 2810, and 2542.
Resumo:
The Attorney General’s Consumer Protection Division receives hundreds of calls and consumer complaints every year. Follow these tips to avoid unexpected expense and disappointments. This record is about:Consumer “Private Right of Action” -- What Consumers Need to Know
Resumo:
This manual summarizes the roadside tree and brush control methods used by all of Iowa's 99 counties. It is based on interviews conducted in Spring 2002 with county engineers, roadside managers and others. The target audience of this manual is the novice county engineer or roadside manager. Iowa law is nearly silent on roadside tree and brush control, so individual counties have been left to decide on the level of control they want to achieve and maintain. Different solutions have been developed but the goal of every county remains the same: to provide safe roads for the traveling public. Counties in eastern and southern Iowa appear to face the greatest brush control challenge. Most control efforts can be divided into two categories: mechanical and chemical. Mechanical control includes cutting tools and supporting equipment. A chain saw is the most widely used cutting tool. Tractor mounted boom mowers and brush cutters are used to prune miles of brush but have significant safety and aesthetic limitations and boom mowers are easily broken by inexperienced operators. The advent of tree shears and hydraulic thumbs offer unprecedented versatility. Bulldozers are often considered a method of last resort since they reduce large areas to bare ground. Any chipper that violently grabs brush should not be used. Chemical control is the application of herbicide to different parts of a plant: foliar spray is applied to leaves; basal bark spray is applied to the tree trunk; a cut stump treatment is applied to the cambium ring of a cut surface. There is reluctance by many to apply herbicide into the air due to drift concerns. One-third of Iowa counties do not use foliar spray. By contrast, several accepted control methods are directed toward the ground. Freshly cut stumps should be treated to prevent resprouting. Basal bark spray is highly effective in sensitive areas such as near houses. Interest in chemical control is slowly increasing as herbicides and application methods are refined. Fall burning, a third, distinctly separate technique is underused as a brush control method and can be effective if timed correctly. In all, control methods tend to reflect agricultural patterns in a county. The use of chain saws and foliar sprays tends to increase in counties where row crops predominate, and boom mowing tends to increase in counties where grassland predominates. For counties with light to moderate roadside brush, rotational maintenance is the key to effective control. The most comprehensive approach to control is to implement an integrated roadside vegetation management (IRVM) program. An IRVM program is usually directed by a Roadside Manager whose duties may be shared with another position. Funding for control programs comes from the Rural Services Basic portion of a county's budget. The average annual county brush control budget is about $76,000. That figure is thought not to include shared expenses such as fuel and buildings. Start up costs for an IRVM program are less if an existing control program is converted. In addition, IRVM budgets from three different northeastern Iowa counties are offered for comparison in this manual. The manual also includes a chapter on temporary traffic control in rural work zones, a summary of the Iowa Code as it relates to brush control, and rules on avoiding seasonal disturbance of the endangered Indiana bat. Appendices summarize survey and forest cover data, an equipment inventory, sample forms for record keeping, a sample brush control policy, a few legal opinions, a literature search, and a glossary.
Resumo:
Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.