Digital Devices and Learning to Grow Up

Last week the NY Times ran the sort of op-ed on digital culture that the cultured despisers love to ridicule. In it, Jane Brody made a host of claims about the detrimental consequences of digital media consumption on children, especially the very young. She had the temerity, for example, to call texting the “next national epidemic.” […]

http://thefrailestthing.com/2015/07/12/digital-devices-and-learning-to-grow-up/

Access denied | Center for Democracy & Technology >> How Ironic!

Recent Blog Posts

The staggering amount of personal health data now being collected for treatment or billing purposes has a life beyond the doctor’s clipboard. The data is collected, stripped of personally identifying information (“de-identified”) and re-used in ways that are vital for medical breakthroughs, improving patient care, or predicting public health trends.  And it’s just as valuable when used for targeted marketing campaigns or eliminating inefficiencies in the healthcare…

In a case that raises as many questions as the average sighting of Big Foot, a panel of the Sixth Circuit Court of Appeals ruled earlier this week that law enforcement officers didn’t need a warrant to obtain GPS location information generated by his cell phone.

The court’s analysis has been roundly criticized as legally incorrect,…

Consumer use of mobile technologies to stay healthy or manage a chronic health condition is increasing; likewise, an increasing number are using these technologies as a digital link to their doctors.  Yet, unlike health care providers who must follow federal privacy and security rules when using mobile technologies to share a patient’s health information, no such rules…

Access denied

You are not authorized to access this page.

https://www.cdt.org/job/job-opportunity-national-security-law-fellow

Access denied | Center for Democracy & Technology >> How Ironic!

Recent Blog Posts

The staggering amount of personal health data now being collected for treatment or billing purposes has a life beyond the doctor’s clipboard. The data is collected, stripped of personally identifying information (“de-identified”) and re-used in ways that are vital for medical breakthroughs, improving patient care, or predicting public health trends.  And it’s just as valuable when used for targeted marketing campaigns or eliminating inefficiencies in the healthcare…

In a case that raises as many questions as the average sighting of Big Foot, a panel of the Sixth Circuit Court of Appeals ruled earlier this week that law enforcement officers didn’t need a warrant to obtain GPS location information generated by his cell phone.

The court’s analysis has been roundly criticized as legally incorrect,…

Consumer use of mobile technologies to stay healthy or manage a chronic health condition is increasing; likewise, an increasing number are using these technologies as a digital link to their doctors.  Yet, unlike health care providers who must follow federal privacy and security rules when using mobile technologies to share a patient’s health information, no such rules…

Access denied

You are not authorized to access this page.

https://www.cdt.org/job/job-opportunity-national-security-law-fellow

Computer Disposal Procedure

Computer Disposal Procedure

A. Reason for Procedure

 Equipment that is obsolete and no longer in use needs to be disposed of in a secure and environmentally friendly manner. Secure disposal is critical to protect personally identifiable data and other sensitive information. For these reasons, disposal of computer equipment must be done in accordance with clearly-defined and documented procedures.

B. Responsible Office and/or Officer

The Department of Computing and Information Services (CIS) is responsible for the maintenance of these procedures, and for responding to questions regarding them.  The responsible official is V. Ena Haines, Director of Information Technology.

C. Procedures

  • TC user calls CIS Help Desk to report a computer which needs to be replaced or disposed of.
    • If user contacts Facilities first, Facilities will direct user to CIS.
  • CIS Help Desk staff member will arrange a visit  to the office
    • Help Desk staff member physically removes internal hard drive from CPU
    • Help Desk staff places neon-red ‘Ready for Disposal’ sticker on CPU and monitor to be disposed of.
    • Mice and keyboards can be trashed or recycled depending on wear, but do NOT need special arrangements for pickup.
  • CIS Help Desk staff member creates a Facilities work order (at facilities.tc.columbia.edu) indicating the room number and in the description field enters ‘Computer Disposal Pickup.”
  • Facilities will go to office and pick up CPU and monitor and deliver to Shipping and Receiving for holding and appropriate disposal with approved vendor.

Tagged:

Computer Disposal Procedure

Computer Disposal Procedure

A. Reason for Procedure

 Equipment that is obsolete and no longer in use needs to be disposed of in a secure and environmentally friendly manner. Secure disposal is critical to protect personally identifiable data and other sensitive information. For these reasons, disposal of computer equipment must be done in accordance with clearly-defined and documented procedures.

B. Responsible Office and/or Officer

The Department of Computing and Information Services (CIS) is responsible for the maintenance of these procedures, and for responding to questions regarding them.  The responsible official is V. Ena Haines, Director of Information Technology.

C. Procedures

  • TC user calls CIS Help Desk to report a computer which needs to be replaced or disposed of.
    • If user contacts Facilities first, Facilities will direct user to CIS.
  • CIS Help Desk staff member will arrange a visit  to the office
    • Help Desk staff member physically removes internal hard drive from CPU
    • Help Desk staff places neon-red ‘Ready for Disposal’ sticker on CPU and monitor to be disposed of.
    • Mice and keyboards can be trashed or recycled depending on wear, but do NOT need special arrangements for pickup.
  • CIS Help Desk staff member creates a Facilities work order (at facilities.tc.columbia.edu) indicating the room number and in the description field enters ‘Computer Disposal Pickup.”
  • Facilities will go to office and pick up CPU and monitor and deliver to Shipping and Receiving for holding and appropriate disposal with approved vendor.

Tagged:

Entrez Programming Utilities Help – NCBI Bookshelf -E-utiility news from the NIH

E-utility News

  • Alternative version 2.0 DocSums now available from ESummary

  • EFetch 2.0 to be released on February 15, 2012

  • Please see the Release Notes for details and changes.

The Entrez Programming Utilities (E-utilities) are a set of eight server-side programs that provide a stable interface into the Entrez query and database system at the National Center for Biotechnology Information (NCBI). The E-utilities use a fixed URL syntax that translates a standard set of input parameters into the values necessary for various NCBI software components to search for and retrieve the requested data. The E-utilities are therefore the structured interface to the Entrez system, which currently includes 38 databases covering a variety of biomedical data, including nucleotide and protein sequences, gene records, three-dimensional molecular structures, and the biomedical literature.

Contents

Entrez Programming Utilities Help – NCBI Bookshelf -E-utiility news from the NIH

E-utility News

  • Alternative version 2.0 DocSums now available from ESummary

  • EFetch 2.0 to be released on February 15, 2012

  • Please see the Release Notes for details and changes.

The Entrez Programming Utilities (E-utilities) are a set of eight server-side programs that provide a stable interface into the Entrez query and database system at the National Center for Biotechnology Information (NCBI). The E-utilities use a fixed URL syntax that translates a standard set of input parameters into the values necessary for various NCBI software components to search for and retrieve the requested data. The E-utilities are therefore the structured interface to the Entrez system, which currently includes 38 databases covering a variety of biomedical data, including nucleotide and protein sequences, gene records, three-dimensional molecular structures, and the biomedical literature.

Contents