Government Information

Earl Gregg Swem Library

Best Practices for Determining Subgroup Size in Accountability Systems While Protecting Personally Identifiable Student Information

Categories: Disability,Education,Income/Poverty,Laws/Regulations,Privacy,Statistics

https://nces.ed.gov/pubs2017/2017147.pdf

The Every Student Succeeds Act of 2015 requires that states create plans with strategies for reporting education outcomes by grade for all students and particular categories of students.  This report helps states determine the sample size needed for significant results while protecting individual privacy.  From the National Center for Education Statistics

 

Confidentiality Concerns and Sexual and Reproductive Health Care Among Adolescents and Young Adults Aged 15 to 25

Categories: Health/Medical,Privacy,Sex Issues,Statistics,Youth

https://www.cdc.gov/nchs/data/databriefs/db266.pdf

This report describes two measures related to confidentiality and sexual/reproductive health for young adults: concerns that parents might find out and the opportunity to spend time alone with a health care provider without the presence of parents or guardians.  From the National Center for Health Statistics

 

Strategy for Countering Violent Extremism

Categories: Crime/Justice,Federal State Relations,Homeland Security,Privacy,Terrorism

https://www.dhs.gov/sites/default/files/publications/16_1028_S1_CVE_strategy.pdf

Calls for linking federal and local efforts in opposing violent extremism around four major goals.  From the Department of Homeland Security

 

Protecting Personal Information: A Guide for Business

Categories: Business/Economics,Consumer Info/Protection,Privacy,Telecommunications/Internet

https://www.ftc.gov/system/files/documents/plain-language/pdf-0136_proteting-personal-information.pdf

A guide for businesses on how to secure personal information of customers.  Presents 5 key principles for a sound data security plan.  From the Federal Trade Commission

Chairman Wheeler’s Proposal to Promote Fairness, Competition, and Investment in the Business Data Services Market

Categories: Antitrust/Monopoly,Laws/Regulations,Privacy,Telecommunications/Internet

http://transition.fcc.gov/Daily_Releases/Daily_Business/2016/db1007/DOC-341659A1.pdf

Proposal that would promote competition in the telecommunications industry by revising regulatory environment.  Calls for lowering price caps and changing policies on sharing of sensitive customer data by telecom companies.  Represents a revision of an earlier proposal.  From the Federal Communications Commission

 

The OPM Data Breach: How the Government Jeopardized Our National Security for More Than a Generation

Categories: Govt Personnel,Govt/Business Scandals,Headlines,Homeland Security,Privacy,Telecommunications/Internet

https://oversight.house.gov/wp-content/uploads/2016/09/The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf

Committee staff report on the hacking of Office of Personnel Management data bases by foreign sources in 2015.  The report blames the agency for failing to heed repeated warnings about inadequate security and for misleading the public on the extent of the damage.  From the House Committee on Government Oversight and Reform

 

Joint Doctrine Note 2-16: Identity Activities

Categories: Defense/Military,Homeland Security,Privacy,Terrorism

http://fas.org/irp/doddir/dod/jdn2_16.pdf

Attempts to provide guidance for military authorities to plan, execute, and assess identity activities, described as establishing and characterizing the identity of persons of interest, known adversaries, and others who contribute to the rise of anonymous, dispersed, and concealed threats.  From the Defense Department, posted by the Federation of American Scientists

 

Regulation of Drones

http://www.loc.gov/law/help/regulation-of-drones/regulation-of-drones.pdf

Surveys the rules that apply to the operation of civilian drones in thirteen countries and the European Union including concerns about public safety, privacy, and national security. From the Law Library of Congress

 

« Previous PageNext Page »