Confidential Information Sources


Book Description

This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and purchase from reliable vendors. Carroll also examines troubling issues of ethics, accuracy, and privacy in our age of electronic information transfer. - Discusses the way the nation collects, stores, and uses personal information - Addresses the ethical questions about how personal data should be used - Highlights the changes in information collection brought about by computers




Corporate Privileges and Confidential Information


Book Description

Corporate Privileges and Confidential Information is designed to assist inside and outside counsel in negotiating obstacles to maintaining corporate secrecy.




Human Sources


Book Description

Human sources, also known as confidential informants, are an essential law enforcement resource in the fight against crime and terrorism. How they are managed has changed little over the years. This book provides law enforcement with details of how to manage human sources, in line with the goals of intelligence-led policing, and in a way that maximizes the amount of information obtained. The book is based on over 35 years of real-world experience and uses research gained from interviews carried out internationally, with hundreds of law enforcement officers. It delivers the structures necessary to ensure ethical behavior and to minimize the risk of corruption. It includes details of new methods that apply psychology, to gain a much greater amount of more accurate information, in interviews with human sources. Written by an internationally recognized expert, it is essential reading for anyone interested in how informants should be managed.




Innovations in Federal Statistics


Book Description

Federal government statistics provide critical information to the country and serve a key role in a democracy. For decades, sample surveys with instruments carefully designed for particular data needs have been one of the primary methods for collecting data for federal statistics. However, the costs of conducting such surveys have been increasing while response rates have been declining, and many surveys are not able to fulfill growing demands for more timely information and for more detailed information at state and local levels. Innovations in Federal Statistics examines the opportunities and risks of using government administrative and private sector data sources to foster a paradigm shift in federal statistical programs that would combine diverse data sources in a secure manner to enhance federal statistics. This first publication of a two-part series discusses the challenges faced by the federal statistical system and the foundational elements needed for a new paradigm.




Gurry on Breach of Confidence


Book Description

Francis Gurry's renowned work, Breach of Confidence, published in 1984, was groundbreaking and invaluable in the field of intellectual property as the first text to synthesise the then burgeoning case law on breach of confidence into a systematic form. A highly regarded book, it was the first point of resort for practitioners and a key source for judges. Aplin, Bently, Johnson and Malynicz bring us a new edition of this important work, which remains faithful to the original in its approach, but is fully updated in light of the developments since the first edition. The authors expand upon the original work, in particular adding new material on the history and current relevance of the action for breach of confidence, . The authors stress both the advantages and disadvantages of the action for breach of confidence and, like Gurry, they constantly distinguish the action from associated legislative regimes which regulate the access to, acquisition, use and disclosure of information. The book extensively references the many analyses of the data protection regime and considers also issues of jurisdiction and choice of applicable law. Bringing together their particular skills and interests, the three authors produce a fresh re-writing of a highly significant text which retains the academic quality and precision of the original and stakes its claim once more as the leading authority in the field.




Research Confidential


Book Description

"We all know that the actual process of empirical research is a messy, complicated business that at best only approximates the models we impart to students. Research Confidential pulls back the curtain on this process, laying bare the sordid details of the research process, but doing so in a way that respects the ideals of social research and that provides useful lessons for young scholars. It should be required reading for our research methods courses." ---Michael X. Delli Carpini, Dean, Annenberg School for Communication, University of Pennsylvania "In this impressive volume, some of the brightest young lights in social research have taken us backstage to share what they learned from their innovative projects. Besides providing a wealth of help with methodological concerns, the book includes theoretical and career issues to consider when doing research. Anyone doing research should benefit from reading it." ---Caroline Hodges Persell, Professor of Sociology, New York University "Research Confidential complements existing methods literature by providing refreshingly honest accounts of key challenges and decision forks-in-the-research-road. Each chapter enlightens and entertains." ---Kirsten Foot, Associate Professor of Communication, University of Washington "A must-read for researchers embarking on new projects. Rather than the abstract descriptions of most methods textbooks, this volume provides rich accounts of the firsthand experiences of actual researchers. An invaluable resource of practical advice. Critically, it will make new researchers aware of the actual challenges that they are likely to face in their work." ---Christopher Winship, editor of Sociological Methods and Research and Professor of Sociology, Harvard University This collection of essays aims to fill a notable gap in the existing literature on research methods in the social sciences. While the methods literature is extensive, rarely do authors discuss the practical issues and challenges they routinely confront in the course of their research projects. As a result, editor Eszter Hargittai argues, each new cohort is forced to reinvent the wheel, making mistakes that previous generations have already confronted and resolved. Research Confidential seeks to address this failing by supplying new researchers with the kind of detailed practical information that can make or break a given project. Written in an informal, accessible, and engaging manner by a group of prominent young scholars, many of whom are involved in groundbreaking research in online contexts, this collection promises to be a valuable tool for graduate students and educators across the social sciences. Eszter Hargittai is Associate Professor of Communication Studies at Northwestern University and Fellow at the Berkman Center for Internet & Society at Harvard University. Cover art courtesy of Dustin Gerard




Model Rules of Professional Conduct


Book Description

The Model Rules of Professional Conduct provides an up-to-date resource for information on legal ethics. Federal, state and local courts in all jurisdictions look to the Rules for guidance in solving lawyer malpractice cases, disciplinary actions, disqualification issues, sanctions questions and much more. In this volume, black-letter Rules of Professional Conduct are followed by numbered Comments that explain each Rule's purpose and provide suggestions for its practical application. The Rules will help you identify proper conduct in a variety of given situations, review those instances where discretionary action is possible, and define the nature of the relationship between you and your clients, colleagues and the courts.




Registries for Evaluating Patient Outcomes


Book Description

This User’s Guide is intended to support the design, implementation, analysis, interpretation, and quality evaluation of registries created to increase understanding of patient outcomes. For the purposes of this guide, a patient registry is an organized system that uses observational study methods to collect uniform data (clinical and other) to evaluate specified outcomes for a population defined by a particular disease, condition, or exposure, and that serves one or more predetermined scientific, clinical, or policy purposes. A registry database is a file (or files) derived from the registry. Although registries can serve many purposes, this guide focuses on registries created for one or more of the following purposes: to describe the natural history of disease, to determine clinical effectiveness or cost-effectiveness of health care products and services, to measure or monitor safety and harm, and/or to measure quality of care. Registries are classified according to how their populations are defined. For example, product registries include patients who have been exposed to biopharmaceutical products or medical devices. Health services registries consist of patients who have had a common procedure, clinical encounter, or hospitalization. Disease or condition registries are defined by patients having the same diagnosis, such as cystic fibrosis or heart failure. The User’s Guide was created by researchers affiliated with AHRQ’s Effective Health Care Program, particularly those who participated in AHRQ’s DEcIDE (Developing Evidence to Inform Decisions About Effectiveness) program. Chapters were subject to multiple internal and external independent reviews.




Guide to Protecting the Confidentiality of Personally Identifiable Information


Book Description

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.