386 research outputs found

    Facial Recognition and the Fourth Amendment

    Get PDF

    Final report

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1375/thumbnail.jp

    Adviser\u27s guide to health care: Volume 3, Consulting with Professional Practices

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1802/thumbnail.jp

    Texas Law Review

    Get PDF
    Journal containing articles, notes, book reviews, and other analyses of law and legal cases

    Technological Leap, Statutory Gap, and Constitutional Abyss: Remote Biometric Identification Comes of Age

    Get PDF
    Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, vascular patterns, hormones, and gait, which, when paired with surveillance of public space, give rise to novel questions of law and policy. These technologies constitute what can be termed Remote Biometric Identification (“RBI”). That is, they give the government the ability to ascertain the identity (1) of multiple people, (2) at a distance, (3) in public space, (4) absent notice and consent, and (5) in a continuous and on-going manner. RBI fundamentally differs from what can be understood as Immediate Biometric Identification (“IBI”)--i.e., the use of biometrics to determine identity at the point of arrest, following conviction, or in conjunction with access to secure facilities. IBI, in contrast, tends to be focused (1) on a single individual, (2) close-up, (3) in relation either to custodial detention or in the context of a specific physical area related to government activity, (4) in a manner often involving notice and often consent, and (5) is a one-time or limited occurrence. The types of legal and policy questions raised by RBI significantly differ from those accompanying IBI. In the absence of a statutory framework, we are driven to Constitutional considerations, where the Court’s jurisprudence proves inadequate as a way of addressing the concerns that present in the realm of RBI. The Fourth Amendment’s guarantee to protection against unreasonable search and seizure and the probable cause requirement for the issuance of warrants; the Fifth Amendment’s right against self-incrimination; the First Amendment’s protection of speech and assembly; and the Fifth and Fourteenth Amendments’ due process protections fail to account for the way in which such measures fundamentally challenge the current norms. The article calls for Congressional action and a judicial framing commensurate with the threat posed by these new and emerging technologies

    Continuous auditing technologies and models

    Get PDF
    Continuous auditing is not a totally new concept, but it has not been widely implemented, and has existed mostly as a point of debate amongst the auditing fraternity. This may soon change, as continuous auditing has become a topic of great interest, especially in the last decade. This may be due to a combination of reasons. In the last decade, much of the confidence in auditors’ reports was lost due to corporate governance scandals. This also brought about a greater desire for faster, more reliable reporting on which to base decisions. This desire has been transposed into regulations such as the Sarbanes-Oxley act in the United States, which encourages real-time auditing activities, which would benefit from continuous auditing. A second, possible contributing factor to the heightened interest in continuous auditing is that much of the requisite technology has matured to a point where it can be successfully used to implement continuous auditing. It is the technologies which form the focus of this research. It is therefore, the primary objective of this research to investigate and identify the essential technologies, and identify and define their roles within a continuous auditing solution. To explore this area, three models of continuous auditing are compared according to the roles of the technologies within them. The roots of some auditing technologies which can be adapted to the paradigm of continuous auditing are explored, as well as new technologies, such as XML-based reporting languages. In order to fully explore these technologies, the concepts of data integrity and data quality are first defined and discussed, and some security measures which contribute to integrity are identified. An obstacle to implementing a continuous model is that even with the newly available technologies, the multitudes of systems which are used in organisations, produce data in a plethora of data formats. In performing an audit the continuous auditing system needs to first gather this data and then needs to be able to compare “apples with apples”. Therefore, the technologies which can be used to acquire and standardise the data are identified

    Testing in the Professions

    Get PDF
    Testing in the Professions focuses on current practices in credentialing testing as a guide for practitioners. With a broad focus on the key components, issues, and concerns surrounding the test development and validation process, this book brings together a wide range of research and theory—from design and analysis of tests to security, scoring, and reporting. Written by leading experts in the field of measurement and assessment, each chapter includes authentic examples as to how various practices are implemented or current issues observed in credentialing programs. The volume begins with an exploration of the various types of credentialing programs as well as key differences in the interpretation and evaluation of test scores. The next set of chapters discusses key test development steps, including test design, content development, analysis, and evaluation. The final set of chapters addresses specific topics that span the testing process, including communication with stakeholders, security, program evaluation, and legal principles. As a response to the growing number of professions and professional designations that are tied to testing requirements, Testing in the Professions is a comprehensive source for up-to-date measurement and credentialing practices

    Bulk Collection

    Get PDF
    In June 2013, Edward Snowden revealed a secret US government program that collected records on every phone call made in the country. Further disclosures followed, detailing mass surveillance by the UK as well. Journalists and policymakers soon began discussing large-scale programs in other countries. Over two years before the Snowden leaks began, Cate and Dempsey had started researching systematic collection. Leading an initiative sponsored by The Privacy Projects, they commissioned a series of country reports, asking national experts to uncover what they could about government demands that telecommunications providers and other private-sector companies disclose information about their customers in bulk. Their initial research found disturbing indications of systematic access in countries around the world. These programs, often undertaken in the name of national security, were cloaked in secrecy and largely immune from oversight, posing serious threats to personal privacy. After the Snowden leaks, the project morphed into something more ambitious: an effort to explore what should be the rules for government access to data and how companies should respond to those demands within the framework of corporate responsibility. This volume concludes the nearly six-year project. It assembles 12 country reports, updated to reflect recent developments. One chapter presents both descriptive and normative frameworks for analyzing national surveillance laws. Others examine international law, human rights law, and oversight mechanisms. Still others explore the concept of accountability and the role of encryption in shaping the surveillance debate. In their conclusion, Cate and Dempsey offer recommendations for both government and industry

    Broadening participation in biological monitoring: handbook for scientists and managers.

    Full text link

    Healthcare Access

    Get PDF
    Adequate healthcare access not only requires the availability of comprehensive healthcare facilities but also affordability and knowledge of the availability of these services. As an extended responsibility, healthcare providers can create mechanisms to facilitate subjective decision-making in accessing the right kind of healthcare services as well various options to support financial needs to bear healthcare-related expenses while seeking health and fulfilling the healthcare needs of the population. This volume brings together experiences and opinions from global leaders to develop affordable, sustainable, and uniformly available options to access healthcare services
    • …
    corecore