Sentences with phrase «individuals with access to information»

To ensure confidentiality, participants were identified by numeric code and data were entered by individuals with no access to information identifying the participant.
To strengthen our community, the Montgomery - Floyd Regional Library provides individuals with access to information, experiences and ideas.
In a finding under PIPEDA published on the OPC website, the Assistant Privacy Commissioner of Canada found that an airline's obligation to provide an individual with access to his information continues to exist even if there is litigation pending between the applicant and the organization.

Not exact matches

He also requested documents and communications related to Kushner's contacts with Russians; all classified information that Flynn and Kushner have had access to since December 2016; any information on whether President Donald Trump or other White House officials granted access to classified information to individuals under law enforcement investigation or had been previously convicted of a crime; and their policies related to such individuals.
They contend that its open policies prove the benefits of experimenting with data and using information to establish a «direct relationship between an individual's decisions and their impact on the business» — something the grocery chain accomplishes by giving each employee high - level access to the company's financial data, and therefore a greater stake in the business.
The PhD Project provides direct access to these individuals, so companies providing funding at or above a certain level can connect with participants and their students to share information about careers, scholarships and other educational initiatives.
We are aware of the need for user privacy and risks associated with use of the Internet, so access to user information is monitored and restricted to specific individuals with appropriate login credentials.
«You» or «your» refers to the individual who uses this website, features, and services, or accesses available information, or engages with us directly by email or telephone.
When possible, every effort will be made to reduce disruption to individuals with disabilities using MaRS services or facilities by contacting them and / or arranging alternate meeting / work locations or alternative means of accessing MaRS information.
However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions can not disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information.
Interactive networks could offer a communication process empowering individuals and groups to deal with many ethical dilemmas of the «Information Age» such as: how to provide more equitable access to information technologies information overload; privacy; and unemployment caused by Information Age» such as: how to provide more equitable access to information technologies information overload; privacy; and unemployment caused by information technologies information overload; privacy; and unemployment caused by information overload; privacy; and unemployment caused by technology.
LeadTogether allows individuals to collaborate with colleagues through forums, to meet and converse one - on - one with peers online, and to access comprehensive information in regular newsletters, blogs and other sources filled with insights on issues related to governance, leadership and school development.
The following information is meant to assist individuals with disabilities to access the year round facilities and activities we provide here at Scenic Caves Nature Adventures.
If past is prologue, campaigns have very little concrete history to work with when it comes to individual voters — which is one reason that canvassing and phone - banking are so important, since each one has the potential to yield significantly more information about a voter's beliefs and intentions than a campaign will otherwise have access to.
While Lord West's review has found no systematic failings in our procedures for checking potential suspects, it has highlighted the importance of enhancing existing cooperation to share more information between police and immigration services and internationally across countries: - within the EU to enable British law enforcement authorities to access immigration information on existing EU databases; - bilaterally with other member states to mutually exchange information; - and joining up criminal records databases throughout the EU so that our authorities can quickly identify individuals charged with crimes, no matter where in Europe they are convicted.
On criticisms that personal liberty would be undermined, he said individuals «will have the right to see what information is held on them; the register will not contain medical records, tax or benefits information and full accreditation will be required for any organisation to access the data with the individual's consent».
Links to individual databases on the Databases Page will provide you with any necessary information about how to access these sources.
A direct affiliation with the Licensee may include, for example, (a) current employees whether on a permanent, temporary, contract, or visiting basis, but excluding employees at a foreign affiliate or constituent university and (b) individuals who are: (1) officially enrolled as a registered student at the Licensee's institution; (2) authorized to use the library network from within the library premises or from such other places where such persons work or study (including but not limited to offices and homes, halls of residence, and student dormitories) and who have been issued by the Licensee with a password or other authentication method for such use of the library network, but (3) excluding students at a foreign affiliate or constituent university; or (c) walk - in users who are permitted to use Licensee's library or information service and permitted to access the library network but only from computer terminals within the Licensee's library premises («Authorized Users»).
Using available databases reflecting the utilization of health services in California, Florida and Nebraska — all three of which give access to deidentified information on individual patients — the research team identified 2,261 obese patients with asthma who underwent bariatric surgery from 2007 to 2009 and for whom information covering the two years before and after their surgery was available.
It provides practitioners with detailed information on state policies, statewide programs, and access to tools that help individual educators achieve goals with their students.
This website provides access to information from research - to - practice initiatives funded by the Office of Special Education Programs that address the provisions of the Individuals With Disabilities Education Act and the Every Student Succeeds Act.
Information, Media and Technology Skills: Today we live in a technology and media - suffused environment with: 1) access to an abundance of information, 2) rapid changes in technology tools, and 3) the ability to collaborate and make individual contributions on an unprecedeInformation, Media and Technology Skills: Today we live in a technology and media - suffused environment with: 1) access to an abundance of information, 2) rapid changes in technology tools, and 3) the ability to collaborate and make individual contributions on an unprecedeinformation, 2) rapid changes in technology tools, and 3) the ability to collaborate and make individual contributions on an unprecedented scale.
With access to a robust set of reporting options, educators can see individual and group activity and progress, providing valuable information to make decisions regarding course or program modifications.
One of the programs that helps FAA fulfill its safety mission is the Investigative Tracking System (ITS), which records, tracks, and reports on investigations pertaining to security background checks and clearances on employees, contractors and other individuals with access to FAA facilities, systems or information, as well as internal administrative investigations relative to inappropriate conduct and associated disciplinary actions and tort claims against FAA.
User access controls were developed to ensure that the number of individuals with access to restricted information in CoTs DOT LAN was kept to a minimum and was restricted to only those with a need to know.
User access controls were developed to ensure that the number of individuals with access to restricted information in A&I Online was kept to a minimum and was restricted to only those with a need to know.
User access controls have been developed to ensure that the number of individuals with access to restricted information stored in or retrieved by CDLIS - Gateway is kept to a minimum and is limited to only those individuals with a need to know.
The information collected by FAA MedXPress is not used by any system, process, or individual until the applicant grants access permission to a selected AME by providing that AME with the confirmation number received from FAA after the application is submitted.
Top Brand Cars Are Delighted To Offer This Fantastic Bmw 740LD XDrive M Sport, This Car Is Still Covered Under Manufacturer's Warranty And Has A Service Pack Included, Upgrades - Sky Lounge Panoramic Glass Sunroof, BMW Touch Command, Soft - Close Doors, Headlining, BMW Individual Alcantara, Adaptive Headlights, Alloy Wheels - 20in M Double - Spoke 648M Bi-Colour, BMW Gesture Control, Ceramic Finish for Controls, Standard Features - Electric Windows - Front and Rear with Open / Close Fingertip Control, Anti-Trap Facility and Comfort Closing Function All Round, Seat Heating - Front and Rear, Seat Adjustment - Front and Rear, Electric with Massage Function, Front, Voice Control, Rain Sensor, Metallic Paint, DAB Digital Radio, BMW Professional Radio with Single CD Player (with MP3 and DVD Playback Capability), 20 GB Hard Disc Drive (HDD) Memory, WIFI Hotspot Preparation, Enhanced Bluetooth with Wireless Charging, Navigation System - BMW Professional Multimedia, Park Distance Control (PDC), Front and Rear with Reversing Assist Camera, Cruise Control with Brake Function, Air Conditioning, Automatic with Four - Zone Control, BMW ConnectedDrive Services, BMW Emergency Call, BMW TeleServices, Remote Services, BMW Apps Interface and Information Plus, Ambient Interior Lighting - 6 Selectable Light Desings; White, Blue, Orange, Yellow, Lilac and Green, LED Headlights with High - Beam Assistant, LED Daytime Running Lights and Follow - Me - Home Function, Comfort Access with Smart Opener, BMW Display Key (1x Display Key, 2x Remote Keys, 1x Mechanical Key), Favourite Buttons, M Specific Key (Spare Remote Key Only), Bootlid Operation, Powered.
Clifford Lynch, executive director of the Coalition for Networked Information, called the library ebook situation «appalling,» explaining that denying libraries unfettered access to ebooks threatens the library mission to «preserve cultural heritage, provide accommodation for people with disabilities, and protect individual privacy,» according to the report.
In the (surprisingly few) cases of insider trading that are prosecuted, it tends to be an individual (or small group) with early access to information that the broader market doesn't have being able to buy or sell ahead of the broader market.
The disputed activity has been performed or initiated by an individual with whom you have shared your account access information or to whom you have granted trading authority or a power of attorney over your account (s);
With our detailed, mobile - friendly site, individuals can access information about different FHA products, the latest loan limits, and numerous other resources to make their homebuying experience easier.
«In other words, individual investors do not have access to certain information that would allow them to assess whether the fees they are paying are acceptable in light of a particular fund's overlap with its benchmark,» the report says.
The program provides individual investors and market professionals with access to information on nearly all OTC public and private fixed income trading activity.
You should obtain the consent of other individuals prior to providing us with their personal information and travel preferences, as any access to view or change their information will be available only through your Hotels.com account.
You should obtain the consent of other individuals prior to providing us with their personal information and travel preferences, as any access to view or change their information will be available only through your account.
The most important use of the information about you that is gathered at the JTS Site is to provide the training and incentive services made available through the JTS Site, such as providing you with access to and real time correction of the individual exams or permitting you entrance to the JTS Site each visit without re-registration.
Along with access, it is the form (or formlessness) of this information that distinguishes our moment from earlier ones — libraries and museums present organizational systems while the Internet allows each individual to create his / her own in a space where information is ubiquitous but completely dematerialized.»
Yollotl Alvarado recognized that the algorithms that guide our interaction with the internet are «political statements» that can «expose the forces at play in our access to information,» while Louise Gagliardi alerted us to the fact that our personal devices, rather than serving as a portal to new information, are in fact «individual mirrors.»
The Committee then listed six different situations where lawyers might consider a more secure communication method than email, including when: 1) communicating highly sensitive or confidential information via email or unencrypted email connections, 2) sending an email to or from an account that the email sender or recipient shares with others, 3) sending an email to a client when it is possible that a third person (such as a spouse in a divorce case) knows the password to the email account, or to an individual client at that client's work email account, especially if the email relates to a client's employment dispute with his employer 4) sending an email from a public computer or a borrowed computer or where the lawyer knows that the emails may be read on a public or borrowed computer or on an unsecure network, 5) sending an email if the lawyer knows that the recipient may access it on devices that are potentially accessible to third persons or are not protected by a password, or 6) sending an email if the lawyer is concerned that the NSA or other law enforcement agency may read the email, with or without a warrant.
The second technique is by merely allowing the creation of a user name and password without prior verification of the identity of the individual, such as by filling out an online form requiring certain personal information and then receiving an automatic email with a temporary password enabling the individual to access the system (as is the case for the Alberta Utilities commission).
With individual company histories stretching back to the 1700s and some of the richest and best customers in the world, able themselves to profit from their access to legal information, I hope that opportunities in the future will be enormous.
This Model Policy reduces the issue of access to court information in a few simple access rules, effectively achieving a recommended balance between the right of the public to open courts with the right of an individual to privacy.
(b) to protect the privacy of individuals with respect to personal information about themselves held by institutions and to provide individuals with a right of access to that information.
In this day and age of 24/7 online expanded connectivity and immediate access to digitized information, new analytic tools and algorithms now make it possible, not only to link a number with a name, but also to combine information from multiple sources, ultimately creating an accurate profile of a personally identifiable individual.
The resource also suggests that individuals that follow through with accessing their health information utilize mobile apps to manage the data.
Business Development: Brokering various business dealings that further the diversification of Indian economies Developing and accessing commercial financial programs and services for tribal governments, including tax - exempt offerings and federally - guaranteed housing loans Serving as issuer or underwriter's counsel in tribal bond issuances Ensuring tribal compliance with Bank Secrecy Act and other federal financial regulatory requirements Handling federal and state income, excise, B&O, property and other tax matters for tribes and tribal businesses Chartering tribal business enterprises under tribal, state and federal law Registering and protecting tribal trademarks and copyrights Negotiating franchise agreements for restaurants and retail stores on Indian reservations Custom - tailoring construction contracts for tribes and general contractors Helping secure federal SBA 8 (a) and other contracting preferences for Indian - owned businesses Facilitating contractual relations between tribes and tribal casinos, and gaming vendors Building tribal workers» compensation and self - insurance programs Government Relations: Handling state and federal regulatory matters in the areas of tribal gaming, environmental and cultural resources, workers» compensation, taxation, health care and education Negotiating tribal - state gaming compacts and fuel and cigarette compacts, and inter-local land use and law enforcement agreements Advocacy before the Washington State Gambling Commission, Washington Indian Gaming Association and National Indian Gaming Commission Preparing tribal codes and regulations, including tribal court, commercial, gaming, taxation, energy development, environmental and cultural resources protection, labor & employment, and workers» compensation laws Developing employee handbooks, manuals and personnel policies Advocacy in areas of treaty rights, gaming, jurisdiction, taxation, environmental and cultural resource protection Brokering fee - to - trust and related real estate and jurisdictional transactions Litigation & Appellate Services: Handling complex Indian law litigation, including commercial, labor & employment, tax, land use, treaty rights, natural and cultural resource matters Litigating tribal trust mismanagement claims against the United States, and evaluating tribal and individual property claims under the Indian Claims Limitation Act Defending tribes and tribal insureds from tort claims brought against them in tribal, state and federal courts, including defense tenders pursuant to the Federal Tort Claims Act Assisting tribal insureds in insurance coverage negotiations, and litigation Representing individual tribal members in tribal and state civil and criminal proceedings, including BIA prosecutions and Indian probate proceedings Assisting tribal governments with tribal, state and federal court appeals, including the preparation of amicus curiae briefs Our Indian law & gaming attorneys collaborate to publish the quarterly «Indian Legal Advisor ``, designed to provide Indian Country valuable information about legal and political developments affecting tribal rights.
Insider trading is the trading of a public company's stock or other securities (such as bonds or stock options) by individuals with access to nonpublic information about the company.
Such vital data which are usually shielded utilizing top information security providers can be used by unauthorized individuals to commit crimes tender etc. that were repair, such as insider - trading States around the globe have regulations to prevent such unauthorized information access and noncompliance with the guidelines is cognizable offense against the corporations spending substantial fees to the government, if the data security measures are broken.
a b c d e f g h i j k l m n o p q r s t u v w x y z