36,545 research outputs found

    Comments: HIPAA Confusion: How the Privacy Rule Authorizes Informal Discovery

    Get PDF

    A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software

    Full text link
    This poster describes work on the General Data Protection Regulation (GDPR) in open-source software. Although open-source software is commonly integrated into regulated software, and thus must be engineered or adapted for compliance, we do not know how such laws impact open-source software development. We surveyed open-source developers (N=47) to understand their experiences and perceptions of GDPR. We learned many engineering challenges, primarily regarding the management of users' data and assessments of compliance. We call for improved policy-related resources, especially tools to support data privacy regulation implementation and compliance in open-source software.Comment: 2 page extended abstract for ICSE-Poster 202

    Tracking Report 2009 PVH Corp, Dominican Republic 080219447H

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2009_PVH_Corp_TR_Dominican_Republic_080219447H.pdf: 6 downloads, before Oct. 1, 2020

    Independent External Monitoring Agricultural Report 2013 Nestle, Ivory Coast Kouamekro

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2013_IEMAR_Ivory_Coast_Kouamekro.pdf: 37 downloads, before Oct. 1, 2020

    Tracking Report 2009 Nordstrom, Dominican Republic 080219447H

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2009_Nordstrom_TR_Dominican_Republic_080219447H.pdf: 18 downloads, before Oct. 1, 2020

    The Therapist Can\u27t See You Now: How Paid Sick Leave Policy Can Accommodate Mental Illness in the Workplace

    Get PDF
    Restaurants have become the “poster child” for why employers should adopt paid sick leave. Advocates suggest that employees without access to paid sick leave often show up to work ill due to their inability to sacrifice pay. Clever protest signs read, “No Boogers in my Burger” and “No Coughing in my Coffee.” Any rational customer would not appreciate the thought of a flu-ridden chef assembling their main course. However, the benefits of paid leave legislation and policies go beyond protecting cheeseburgers from flu germs. Just as employees with the flu require time off for medical attention, employees with mental illness require time to attend appointments and engage in preventative care. A staggering one in five adults in the United States have a mental health condition, and the depression rates among young adults is worsening

    Into the Breach: Using Electronic Resources Responsibly

    Get PDF
    Citation: Geuther, C. (2016). Into the Breach: Using Electronic Resources Responsibly. Poster was presented at the 2nd Joint Conference of Kansas Library Association College and University Libraries Section and the Nebraska College and University Section, Manhattan, KS.This poster will explain the conversation between technical and public services librarians at Kansas State University regarding data breaches of electronic resources and how to avoid them.  After a recent surge of breaches by Kansas State faculty and students, a workshop was needed for the librarians to relay critical information about resources to the patrons who used them.  This poster will include the protocol at Kansas State University as librarians and Information Technology Security staff are made aware of an issue, simple explanations of breach events, and suggestions for training patrons at the university level to avoid them.  This poster was presented at the 2nd Joint Conference of Kansas Library Association College and University Libraries Section and the Nebraska College and University Section on April 22, 2016.

    The Anonymous Poster: How to Protect Internet Users’ Privacy and Prevent Abuse

    Get PDF
    The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one\u27s privacy by placing a burden on the individual websites and continuing to support the Internet\u27s development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious behavior

    EEOC v. New Koosharem Corporation and Real Time Staffing Corporation

    Get PDF

    POSTERS PRESENTED, ANNUAL MEETING, SAEA, FORT WORTH, TEXAS, FEBRUARY 1991

    Get PDF
    Teaching/Communication/Extension/Profession,
    • …
    corecore