Free Essay

It Didn't Have the Data

In:

Submitted By tiffy5858
Words 3672
Pages 15
1.1 Purpose and Scope
The information security concern regarding information disposal and media sanitization resides not in the media but in the recorded information. The issue of media disposal and sanitization is driven by the information placed intentionally or unintentionally on the media. Electronic media used on a system should be assumed to contain information commensurate with the security categorization of the system’s confidentiality. If not handled properly, release of these media could lead to an occurrence of unauthorized disclosure of information. Categorization of an information technology (IT) system in accordance with Federal Information Processing Standard
(FIPS) 199, Standards for Security Categorization of Federal Information and Information
Systems1
, is the critical first step in understanding and managing system information and media.
Based on the results of categorization, the system owner should refer to NIST Special
Publication (SP) 800-53 Revision 4, Security and Privacy Controls for Federal Information
Systems and Organizations2
, which specifies that “the organization sanitizes information system digital media using approved equipment, techniques, and procedures. The organization tracks, documents, and verifies media sanitization and destruction actions and periodically tests sanitization equipment/procedures to ensure correct performance. The organization sanitizes or destroys information system digital media before its disposal or release for reuse outside the organization, to prevent unauthorized individuals from gaining access to and using the information contained on the media.”
This document will assist organizations in implementing a media sanitization program with proper and applicable techniques and controls for sanitization and disposal decisions, considering the security categorization of the associated system’s confidentiality.
The objective of this special publication is to assist with decision making when media require disposal, reuse, or will be leaving the effective control of an organization. Organizations should develop and use local policies and procedures in conjunction with this guide to make effective, risk-based decisions on the ultimate sanitization and/or disposition of media and information.
The information in this guide is best applied in the context of current technology and applications. It also provides guidance for information disposition, sanitization, and control decisions to be made throughout the system life cycle. Forms of media exist that are not addressed by this guide, and media are yet to be developed and deployed that are not covered by this guide. In those cases, the intent of this guide outlined in the procedures section applies to all forms of media based on the evaluated security categorization of the system’s confidentiality according to FIPS 199.
1 Federal Information Processing Standards (FIPS) Publication 199 Standards for Security Categorization of Federal
Information and Information Systems, February 2004, 13 pp. http://csrc.nist.gov/publications/PubsFIPS.html#199.
2 NIST Special Publication (SP) 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and
Organizations, April 2013 (includes updates as of January 15, 2014), 460 pp. http://dx.doi.org/10.6028/NIST.SP.800-53r4.
1

NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
Before any media are sanitized, system owners are strongly advised to consult with designated officials with privacy responsibilities (e.g., Privacy Officers), Freedom of Information Act
(FOIA) officers, and the local records retention office. This consultation is to ensure compliance with record retention regulations and requirements in the Federal Records Act. In addition, organizational management should also be consulted to ensure that historical information is captured and maintained where required by business needs. This should be ongoing, as controls may have to be adjusted as the system and its environment changes.
1.2 Audience
Protecting the confidentiality of information should be a concern for everyone, from federal agencies and businesses to home users. Recognizing that interconnections and information exchange are critical in the delivery of government services, this guide can be used to assist in deciding what processes to use for sanitization or disposal.
1.3 Assumptions
The premise of this guide is that organizations are able to correctly identify the appropriate information categories, confidentiality impact levels, and location of the information. Ideally, this activity is accomplished in the earliest phase of the system life cycle.3 This critical initial step is outside the scope of this document, but without this identification, the organization will, in all likelihood, lose control of some media containing sensitive information.
This guide does not claim to cover all possible media that an organization could use to store information, nor does it attempt to forecast the future media that may be developed during the effective life of this guide. Users are expected to make sanitization and disposal decisions based on the security categorization of the information contained on the media.
1.4 Relationship to Other NIST Documents
The following NIST documents, including FIPS and Special Publications, are directly related to this document:
 FIPS 199 and NIST SP 800-60 Revision 1, Guide for Mapping Types of Information and
Information Systems to Security Categories4
, provide guidance for establishing the security categorization for a system’s confidentiality. This categorization will impact the level of assurance an organization should require in making sanitization decisions.
3 NIST SP 800-64 Revision 2, Security Considerations in the Systems Development Life Cycle, October 2008, 67 pp. http://csrc.nist.gov/publications/PubsSPs.html#800-64. 4 NIST SP 800-60 Revision 1, Guide for Mapping Types of Information and Information Systems to Security Categories,
August 2008, 2 vols. http://csrc.nist.gov/publications/PubsSPs.html#800-60.
2

NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
 FIPS 200, Minimum Security Requirements for Federal Information and Information
Systems5
, sets a base of security requirements that requires organizations to have a media sanitization program.
 FIPS 140-2, Security Requirements for Cryptographic Modules6
, establishes a standard for cryptographic modules used by the U.S. Government.
 NIST SP 800-53 Revision 4 provides minimum recommended security controls, including sanitization, for Federal systems based on their overall system security categorization.  NIST SP 800-53A Revision 1, Guide for Assessing the Security Controls in Federal
Information Systems and Organizations: Building Effective Security Assessment Plans7
,
provides guidance for assessing security controls, including sanitization, for federal systems based on their overall system security categorization.
 NIST SP 800-111, Guide to Storage Encryption Technologies for End User Devices8
,
provides guidance for selecting and using storage encryption technologies.
 NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable
Information (PII)9
, provides guidance for protecting the confidentiality of personally identifiable information in information systems.
1.5 Document Structure
The guide is divided into the following sections and appendices:
 Section 1 (this section) explains the authority, purpose and scope, audience, assumptions of the document, relationships to other documents, and outlines its structure.
 Section 2 presents an overview of the need for sanitization and the basic types of information, sanitization, and media.
5 FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, March 2006, 17 pp. http://csrc.nist.gov/publications/PubsFIPS.html#200. 6 FIPS 140-2, Security Requirements for Cryptographic Modules, May 25, 2001 (includes change notices through December 3,
2002), 69 pp. http://csrc.nist.gov/publications/PubsFIPS.html#140-2.
7 NIST SP 800-53A Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations:
Building Effective Security Assessment Plans, June 2010, 399 pp. http://csrc.nist.gov/publications/PubsSPs.html#800-53A.
8 NIST SP 800-111, Guide to Storage Encryption Technologies for End User Devices, November 2007, 40 pp. http://csrc.nist.gov/publications/PubsSPs.html#800-111. 9 NIST SP 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), April 2010, 59 pp. http://csrc.nist.gov/publications/PubsSPs.html#800-122. 3 NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
 Section 3 provides an overview of relevant roles and responsibilities for the management of data throughout its lifecycle.
 Section 4 provides the user with a process flow to assist with sanitization decision making.  Section 5 summarizes some general sanitization techniques.
 Appendix A specifies the minimum recommended sanitization techniques to Clear,
Purge, or Destroy various media. This appendix is used with the decision flow chart provided in Section 4.
 Appendix B defines terms used in this guide.
 Appendix C lists tools and external resources that can assist with media sanitization.
 Appendix D contains considerations for selecting a storage device implementing
Cryptographic Erase.
 Appendix E identifies a set of device-specific characteristics of interest that users should request from storage device vendors.
 Appendix F contains a bibliography of sources and correspondence that was essential in developing this guide.
 Appendix G provides a sample certificate of sanitization form for documenting an organization’s sanitization activities.
4
NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
2 Background
Information disposition and sanitization decisions occur throughout the information system life cycle. Critical factors affecting information disposition and media sanitization are decided at the start of a system’s development. The initial system requirements should include hardware and software specifications as well as interconnections and data flow documents that will assist the system owner in identifying the types of media used in the system. Some storage devices support enhanced commands for sanitization, which may make sanitization easier, faster, and/or more effective. The decision may be even more fundamental, because effective sanitization procedures may not yet have been determined for emerging media types. Without an effective command or interface-based sanitization technique, the only option left may be to destroy the media. In that event, the media cannot be reused by other organizations that might otherwise have been able to benefit from receiving the repurposed storage device.
A determination should be made during the requirements phase about what other types of media will be used to create, capture, or transfer information used by the system. This analysis, balancing business needs and risk to confidentiality, will formalize the media that will be considered for the system to conform to FIPS 200.
Media sanitization and information disposition activity is usually most intense during the disposal phase of the system life cycle. However, throughout the life of an information system, many types of media, containing data, will be transferred outside the positive control of the organization. This activity may be for maintenance reasons, system upgrades, or during a configuration update.
2.1 Need for Proper Media Sanitization and Information Disposition
Media sanitization is one key element in assuring confidentiality. Confidentiality is defined as
“preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information…”10 Additionally, “a loss of confidentiality is the unauthorized disclosure of information.”11
In order for organizations to have appropriate controls on the information they are responsible for safeguarding, they must properly safeguard used media. An often rich source of illicit information collection is either through dumpster diving for improperly disposed hard copy media, acquisition of improperly sanitized electronic media, or through keyboard and laboratory reconstruction of media sanitized in a manner not commensurate with the confidentiality of its information. Media flows in and out of organizational control through recycle bins in paper form, out to vendors for equipment repairs, and hot swapped into other systems in response to hardware or software failures. This potential vulnerability can be mitigated through proper understanding of where information is located, what that information is, and how to protect it.
10 “Definitions,” Title 44 U.S.Code, Sec. 3542. 2006 ed. Supp. 5. Available: http://www.gpo.gov/; accessed 7/21/2014.
11 FIPS 199, p.2.
5

NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
2.2 Types of Media
There are two primary types of media in common use:
 Hard Copy. Hard copy media are physical representations of information, most often associated with paper printouts. However, printer and facsimile ribbons, drums, and platens are all examples of hard copy media. The supplies associated with producing paper printouts are often the most uncontrolled. Hard copy materials containing sensitive data that leave an organization without effective sanitization expose a significant vulnerability to “dumpster divers” and overcurious employees, risking unwanted information disclosures.
 Electronic (i.e., “soft copy”). Electronic media are devices containing bits and bytes such as hard drives, random access memory (RAM), read-only memory (ROM), disks, flash memory, memory devices, phones, mobile computing devices, networking devices, office equipment, and many other types listed in Appendix A.
In the future, organizations will be using media types not specifically addressed by this guide.
The processes described in this document should guide media sanitization decision making regardless of the type of media in use. To effectively use this guide for all media types, organizations and individuals should focus on the information that could possibly have been recorded on the media, rather than on the media itself.
2.3 Trends in Data Storage Media
Historical efforts to sanitize magnetic media have benefitted from the wide use of a single common type of storage medium implemented relatively similarly across vendors and models.
The storage capacity of magnetic media has increased at a relatively constant rate and vendors have modified the technology as necessary to achieve higher capacities. As the technology approaches the superparamagnetic limit, or the limit at which magnetic state can be changed with existing media and recording approaches, additional new approaches and technologies will be necessary in order for storage vendors to produce higher capacity devices.
Alternative technologies such as flash memory-based storage devices, or Solid State Drives
(SSDs), have also become prevalent due to falling costs, higher performance, and shock resistance. SSDs have already begun changing the norm in storage technology, and—at least from a sanitization perspective—the change is revolutionary (as opposed to evolutionary).
Degaussing, a fundamental way to sanitize magnetic media, no longer applies in most cases for flash memory-based devices. Evolutionary changes in magnetic media will also have potential impacts on sanitization. New storage technologies, and even variations of magnetic storage, that are dramatically different from legacy magnetic media will clearly require sanitization research and require a reinvestigation of sanitization procedures to ensure efficacy.
Both revolutionary and evolutionary changes make sanitization decisions more difficult, as the storage device may not clearly indicate what type of media is used for data storage. The burden falls on the user to accurately determine the media type and apply the associated sanitization procedure. 6
NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
2.4 Trends in Sanitization
For storage devices containing magnetic media, a single overwrite pass with a fixed pattern such as binary zeros typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data. One major drawback of relying solely upon the native
Read and Write interface for performing the overwrite procedure is that areas not currently mapped to active Logical Block Addressing (LBA) addresses (e.g., defect areas and currently unallocated space) are not addressed. Dedicated sanitize commands support addressing these areas more effectively. The use of such commands results in a tradeoff because although they should more thoroughly address all areas of the media, using these commands also requires trust and assurance from the vendor that the commands have been implemented as expected.
Users who have become accustomed to relying upon overwrite techniques on magnetic media and who have continued to apply these techniques as media types evolved (such as to flash memory-based devices) may be exposing their data to increased risk of unintentional disclosure.
Although the host interface (e.g. Advanced Technology Attachment (ATA) or Small Computer
System Interface (SCSI)) may be the same (or very similar) across devices with varying underlying media types, it is critical that the sanitization techniques are carefully matched to the media. Destructive techniques for some media types may become more difficult or impossible to apply in the future. Traditional techniques such as degaussing (for magnetic media) become more complicated as magnetic media evolves, because some emerging variations of magnetic recording technologies incorporate media with higher coercivity (magnetic force). As a result, existing degaussers may not have sufficient force to effectively degauss such media.
Applying destructive techniques to electronic storage media (e.g., flash memory) is also becoming more challenging, as the necessary particle size for commonly applied grinding techniques goes down proportionally to any increases in flash memory storage density. Flash memory chips already present challenges with occasional damage to grinders due to the hardness of the component materials, and this problem will get worse as grinders attempt to grind the chips into even smaller pieces.
Cryptographic Erase (CE), as described in Section 2.6, is an emerging sanitization technique that can be used in some situations when data is encrypted as it is stored on media. With CE, media sanitization is performed by sanitizing the cryptographic keys used to encrypt the data, as opposed to sanitizing the storage locations on media containing the encrypted data itself. CE techniques are typically capable of sanitizing media very quickly and could support partial sanitization, a technique where a subset of storage media is sanitization. Partial sanitization, sometimes referred to as selective sanitization, has potential applications in cloud computing and mobile devices. However, operational use of CE today presents some challenges. In some cases, it may be difficult to verify that CE has effectively sanitized media. This challenge, and possible approaches, is described in Section 4.7.3. If verification cannot be performed, organizations should use alternative sanitization methods that can be verified, or use CE in combination with a sanitization technique that can be verified.
A list of device-specific characteristics of interest for the application of sanitization techniques is
7
NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization included in Appendix E. These characteristics can be used to drive the types of questions that media users should ask vendors, but ideally this information would be made readily available by vendors so that it can be easily retrieved by users to facilitate informed risk based sanitization decisions. For example, knowing the coercivity of the media can help a user decide whether or not the available degausser(s) can effectively degauss the media.
2.5 Types of Sanitization
Regarding sanitization, the principal concern is ensuring that data is not unintentionally released.
Data is stored on media, which is connected to a system. This guidance focuses on the media sanitization component, which is simply data sanitization applied to a representation of the data as stored on a specific media type. Other potential concern areas exist as part of the system, such as for monitors, which may have sensitive data burned into the screen. Sensitive data stored in areas of the system other than storage media (such as on monitor screens) are not addressed by this document.
When media is repurposed or reaches end of life, the organization executes the system life cycle sanitization decision for the information on the media. For example, a mass-produced commercial software program contained on a DVD in an unopened package is unlikely to contain confidential data. Therefore, the decision may be made to simply dispose of the media without applying any sanitization technique. Alternatively, an organization is substantially more likely to decide that a hard drive from a system that processed PII needs sanitization prior to
Disposal.
Disposal without sanitization should be considered only if information disclosure would have no impact on organizational mission, would not result in damage to organizational assets, and would not result in financial loss or harm to any individuals.
The security categorization of the information, along with internal environmental factors, should drive the decisions on how to deal with the media. The key is to first think in terms of information confidentiality, then apply considerations based on media type.
In organizations, information exists that is not associated with any categorized system. This information is often hard copy internal communications such as memoranda, white papers, and presentations. Sometimes this information may be considered sensitive. Examples may include internal disciplinary letters, financial or salary negotiations, or strategy meeting minutes.
Organizations should label these media with their internal operating confidentiality levels and associate a type of sanitization described in this publication.
Sanitization is a process to render access to target data (the data subject to the sanitization technique) on the media infeasible for a given level of recovery effort. The level of effort applied when attempting to retrieve data may range widely. For example, a party may attempt simple keyboard attacks without the use of specialized tools, skills, or knowledge of the media characteristics. On the other end of the spectrum, a party may have extensive capabilities and be able to apply state of the art laboratory techniques.
8
NIST SP 800-88 Rev. 1 Guidelines for Media Sanitization
Clear, Purge, and Destroy are actions that can be taken to sanitize media. The categories of sanitization are defined as follows:
 Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typically applied through the standard Read and Write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state
(where rewriting is not supported).
 Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the art laboratory techniques.
 Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data.
A more detailed summary of sanitization techniques is provided in Section 5. Sanitization requirements for specific media/device types are provided in Appendix A.
It is suggested that the user of this guide categorize the information, assess the nature of the medium on which it is recorded, assess the risk to confidentiality, and determine the future plans for the media. Then, the organization can choose the appropriate type(s) of sanitization. The selected type(s) should be assessed as to cost, environmental impact, etc., and a decision should be made that best mitigates the risk to confidentiality and best satisfies other constraints imposed on the process.

Similar Documents

Premium Essay

Unit 10 M2 Business Enterprise

...In this assignment I will be explaining the reasons for selecting the particular method of data collection for a selected product/service. The selected product that I will be collecting data for is an anti-depression medication made my HML (Hutchinsons Medical Limited). The data collecting method I’ve chosen is face to face interviews in order to get the respondents full attention and collect data without any distractions. I intend on finding out the respondent’s age, whether they suffer from depression/anxiety, whether they take medication for their depression/anxiety, and which form of our product they would prefer to purchase (roll on, cream, liquid, pills). The sampling method that I chose was probability sampling. I chose this method because it means everyone gets the chance to be picked meaning that the results will represent the whole group of interest. Another example of the fairness in this method is someone reaching into a box full of names and picking one out. The selection process ensures that everyone has a chance of winning. The advantages are that it’s not bias and as aforementioned it represents the whole group of interest. The results can also be used to calculate any further statistical analysis. I rejected non random sampling as it’s an unfair selection process as you get to pick people which makes in an unequal selection process. The people that are picked out might not represent the rest of the group and unlike probability sampling you can’t use the results...

Words: 595 - Pages: 3

Premium Essay

Ballard Integrated Managed Services

...refreshing each hospital room, including changing the linens on empty beds, replacing towels, and sanitizing bathrooms, which includes maintaining the public areas: hallways, lobbies, and elevators. The Physical Plant Maintenance division, led by Matt Lee, is responsible for the nonmedical equipment and physical aspects of the medical center (University of Phoenix). Overview The problem is that in recent months, the general manager, Barbara Tucker, noticed a decline in staff morale, a higher turnover rate, an increase in the amount of sick time used, and poor work ethics. Exit interviews did not provide new information on employees’ sudden changes. Even though replacing staff is not difficult to accomplish, it is costly. Barbara agreed to have the human resources manager, Debbie Horner, conduct a survey focusing on what would motivate employees. Debbie asked questions that pertained to work conditions, shift hours, quality of training, and level of...

Words: 1343 - Pages: 6

Free Essay

Midsouth Chamber of Commerce

...further  help  the  organization  in  its  core  business  (marketing,  handling  conferences  and  seminars,  pushing  the  Legislature  for  new  laws).   They started with hiring a full‐time computer  programmer (Simon  Kovecki),  and  started  looking  at  software packages for the organization.  While Lassiter was not in charge of computer operations (Jeff Hedges was put in charge of  computer operations), Lassiter pushed the organization to purchase a new system from a company  called UNITRAK.  It seemed like Lassiter was the “champion” behind the software, there was little or  no support from the people who were in charge.  Employees where concerned that they were not  consulted,  and  Kovecki  (who  was  frustrated  because  he  didn't  get  the  promotion  to  be  head  of  computer  operations)  raised  concerns  regarding  the  fact  that  employees  had  access  to  all  of...

Words: 1320 - Pages: 6

Premium Essay

Nt1310 Unit 3 Assignment 3

...I have decided the best way to visualise how the application will look like from the user prospective will be to make a storyboard. This story board I created illustrates how the user is interacting with the GUI of the application. To produce this, I used a software called Balsamiq Mockups 3, the advantage of using this is that I could hyperlink storyboards together and run a simulation of the software. This was very helpful to me because it allowed me to visualise how the GUI will work and look before implementing it. The Story board is located in appendix A. EER diagram is for illustrating entities, relationships and attributes in your database but this does not show how the data is manipulated by the application. First the data has to be...

Words: 517 - Pages: 3

Premium Essay

Apple V. DOJ Case Summary

...• Also All Writs doesn’t apply because Apple is a information services provider that’s exempted by CALEA. (Apple here extends the limits of CALEA since CALEA is only for real time surveillance. But this case involves recovering data already on a phone. Apple makes the jump to this case by assuming the same rules in a different context.) (https://www.justsecurity.org/wp-content/uploads/2015/10/Apple-All-Writs-Apple-Post-Hearing-Brief.pdf ) • The fact that CALEA doesn’t cover the context of data stored on phones was intentionally not put because it was power the supreme court didn’t want given to the government, not because it didn’t consider it. • It should be in the realm of Congress to debate legislation involving smartphones, not case by case in the judicial system, and thus. The fact it’s taking so long for amendments shows how complex and delicate the problem is and thus shouldn’t be hastily made in one court case. All Writs application shouldn’t be used to circumvent discussion • Because of the lack of solid laws that explicitly force Apple to comply, complying would breach the trust between Apple and...

Words: 1000 - Pages: 4

Premium Essay

Ultraviolet Light Science Lab Report

...Ultraviolet Light Science Lab Report Purpose: To see what and how we are protected from Ultraviolet Lights. Introduction: I am trying to test the effect of ultraviolet rays from the Sun on the skin. The ultraviolet rays from the Sun cannot be seen with the eye, but can still hurt you. The Sun releases radiation, which is electromagnetic waves of infrared (IR) to ultraviolet rays (UV). The electromagnetic spectrum ranges from longer wavelengths (IR) to shorter wavelengths (UV). Ultraviolet rays are closer to the shorter wavelengths, and can go through layers of skin and harm our bodies. The two types of ultraviolet rays are UVA and UVB. UVA are long wavelengths that go through the many layers of the skin, and may cause cancer. UVB are shorter wavelengths, and do not go through the multiple layers of the skin, but can also cause skin cancer. Sunscreen helps protect the skin from these harmful rays. The higher SPF (Sun Protection Factor) of the sunscreen, the better protected your skin will be. The prediction is one of the beads with the sunscreen will work better than the other because of the SPF number. The higher the SPF sunscreen, the better it will work. It will block the ultraviolet rays from the Sun from going through multiple layers of your skin. Sunscreen only protects us from UVB rays The independent variable is the Ultraviolet Light and the dependent variable is the different sunscreen. The control is the beads without sunscreen. The constants...

Words: 727 - Pages: 3

Premium Essay

Observations of Physical and Chemical Changes

...to carefully snip off the tips of pipets containing chemicals. Set upright in wells using well plate as a pipet holder. Set the second well-plate on sheet of white paper and arrange so that A1-well is in upper left-hand corner. In well 1, place 4 drops of sodium bicarbonate (NaHCO3) and then add 4 drops of hydrochloric acid (HCl) to sodium bicarbonate. Swirl well-plate as necessary to thoroughly mix two chemicals together. Immediately observe the interaction between chemicals (using white and black sheets of paper as background) and record observations in Data Table 1. From observations, make a conclusion (yes or no) if a chemical change occurred and record in Data Table 1. Repeat steps 4-7 for the remaining 11 reactions in Data Table 1. When all reactions have been executed and all observations have made, determine if they, the chemicals, if a chemical change has or has not occurred. Record your conclusions in Data Table 1. Use paper towels to carefully blot up any chemicals that remain in well plates or pour the chemical mix down sink and flush with a lot of water....

Words: 1219 - Pages: 5

Free Essay

Mr.Kitsos

...profit selling the IBM products. Magirus at start was ordering products from IBM using Lotus Notes, a program made by IBM and customized for Magirus needs.IBM didn’t have a common direct linkage with its partners around Europe. Every company needed to order products from IBM had a different type of proccesion. Another point we need to refer is that IBM changed all the time its systems for ordering dissatisfying its partners that couldn’t follow this changes.Thus the companies couldn’t trust IBM, cause it didn’t have established practises and taking decissions without consider their needs. So we can see that IBM didn’t have a satisfactory communication in B2B. Both IBM and Magirus seems to be initiative companies for different reasons. IBM needs was to establish a global system for communication via its partners, and saw an oppurtinity creating a system with Magirus that would use after for all of its partners.On the other side, Magirus wanted efficiancy in ordering items, looking for fast, low cost, and not complex proccedures. At the during of their collaboration, they had some communications problems they wanted to solve.IBM first invention was in PC/S system, an organization structure for ordering that was not succed because of the incompability of the pre-exist ordering system of Magirus. Magirus didn’t have another choice except using PC/S system although needed to pass two times all orders, loosing that way time, efforts and money.Without smooth communication between...

Words: 1211 - Pages: 5

Free Essay

Memo

...told us that they witnessed a woman steal our wallet and my cell phone and then throw my cell phone in the flowerbed and then that woman was running away and one of the sinkiang people point out a direction. My boyfriend was angry and just ran to that direction and didn’t find any clues. When we calmed down, we thought that maybe those two sinkiang people did that and lied to us to avoid any suspect. My boyfriend ran to them and yelled to them: “Give me back the wallet!” However, they didn’t admit that they have our wallet and just go away. Explanation 1 (causal) There are two most plausible explanations in this event about who actually stolen my boyfriend’s wallet. The first explanation for the theft of the wallet is that an unknown woman opened my bag without my noticing and took the wallet. This could be true because the skills of thieves stealing things are really good nowadays and they live on this for their career. Subway must be the most frequently used transportation in Beijing. The most passengers in subway are people who don’t have cars and got less salary and they go almost everywhere by subway because it is cheap and convenient. There are varieties kinds of people no matter what educational level they have or...

Words: 1713 - Pages: 7

Premium Essay

Nature V. Nurture

...same and it shows. As a child, I was very shy and quiet. I liked to be alone and was pretty quiet. I was not out-going even when I hung out with friends. I was and still am an introvert. I did not like confrontation and avoided it at all costs. Now, as an adult, I am somewhat the same but I have changed. I have not only changed since being a child, I am not the same person I was even 10 years ago, personality wise. I remember when I first got married, I let my husband get away with a lot. I didn’t nag or complain. Now, we have been married for almost 21 years and I let him have it. I am no longer a pushover. I cannot explain this change except to say that I have had it and believe that I can speak freely; just as he does. One thing that has changed about me is that I have more confidence. I guess I have become more comfortable in my own skin. I still like to be in the background but if necessary I can be out-going. I have been told that I have a great personality and am very funny. I would like to think that I have more positive personality traits than negative. I remember as a kid, I was very honest and I tried to follow the rules at all times more so because I didn’t want to get into trouble. I am still that way but understand that while it is a good thing to follow the rules, it is not the end of the world if I don’t. I follow the rules...

Words: 1051 - Pages: 5

Premium Essay

Database Records and Relational Data Worksheet

...University of Phoenix Material Database Records and Relational Data Worksheet Complete Parts A and B of this worksheet. Cite your sources. Part A: Database Records l Answer the following patient information questions using the table provided. Refer to figure 4-10 on p. 83 of Health Information Technology and Management for assistance. 1. What patient resides in California? What is the patient number? The patient that resides in California Sofia Yakaria Pallares. Her patient number is 10259. Gartee, R. (2011). 2. Who is the provider of Sofia Yakaria Pallares? What credentials does her provider have? Ruth Ann Raymond is Sofia’s provider and Ruth Ann Raymond has her MD license. Gartee, R. (2011). 3. What patient was seen on 11/05/2010? What is the patient’s date of birth? John Peters was seen on 11/05/2010 and his date of birth is 05/25/1965. Gartee, R. (2011). 4. What date and time did patient #1298 visit the doctor’s office? What is the patient’s name and date of birth? The patient had a visit to the doctor on 06/04/2011 at 17:15 or 5:15. The patient is Lucy Ann Johnson and her date of birth is 06/12/1975. Gartee, R. (2011). 5. What patient lives in 1704 N. Atlantic Ave Ontario, AZ 85320? What is its encounter number? John Peters lives at 1704 N. Atlantic Ave Ontario, AZ 85320 with and encounter number of 111218. Gartee, R. (2011). Patient Info Table Pat# Last_Name First_Name Middle_Name Birthdate 10259 Pallares Sofia Yakaria...

Words: 994 - Pages: 4

Premium Essay

Nothing

... In the video, the narrator said “The data is considered as the greatest source of power in the 21st Century”. Discuss this by using several examples from real life. Big data is a Term that have been used a lot in the recent years also there been various studies dedicated into extracting those type of Data. and if we search for the meaning of the word data we find that its defined as pieces of information that is needed to understand the universe. and now its the age is Big Data. as we go through the documentary movie we learned a lot about why Big Data became the new generation of Data. the police force has recognized its value and adapted a new program which apply mathematical algorithms to predict when and where crime will be committed by simple going through the database of previous crime and then highlight areas of recurrent crimes. shifted from another area data can make us rich which as we witnessed inn London Metal Exchange they hired elite staff of scientist, and analysis to monitor the data and give almost accurate prediction of stocks rate which can assist brokers to understand the market and avoid some type of risks. Big data didn't stop at only this two fields but spread to reach healthcare as we saw how they have started into understanding causes of diseases by examining the DNA by implementing the Big Data into it, also consumers now are targeted by personalized advertisement which is now possible by the use of big data which helps in giving clear and accurate...

Words: 643 - Pages: 3

Premium Essay

Emotional Intelligence

...some areas like the military or police force, it is not very effective in the modern day office. Our goal is to be results oriented and maximizing productivity while we have our employees engaged and challenged. John is this case study was rightfully terminated. First they reached out to John in an attempt to adjust his style, but those attempts were not successful. Since he couldn’t change then he was let go. He was not a team player, didn’t encourage the team, and couldn’t reach maximum potential without the engagement of the entire team. John was weak in social competence where he didn’t give any inspirational leadership, vision, or teamwork. He certainly didn’t embrace developing others as he rather yell when expectation were not met. Scenario 2 This scenario has Jane as an Executive VP with an outstanding career. She was tasked with a highly visible and important task because of her past success. This is not all that uncommon where due to employees past success in their past they are promoted into higher positions. Some of these positions require different skills or a higher skill level. In this case Jane has great technical skills which led to her promotions. As we see though once she arrived at her new position, she lacked the emotion intelligence for this position. She didn’t have the social awareness and perception of other around her to see that some employees were burned out and all of the problems that were present. She focused on what she knew...

Words: 852 - Pages: 4

Premium Essay

Challenger Disaster

...ROGER”S commission offered NASA 9 recommendations that were to be implemented before shuttle flight resumed. 6. The o-rings had no test data to support any expectation of successful launch in such conditions. 7. Challenger was originally set to launch from Kennedy space center in Florida at 2:42 EST Jan 22. 8. Launch was delayed 1st to Jan 23 then 2nd to Jan 24, 3rd to Jan 25 due the bad weather at the TAL site in Senegal. NASA decided to use Casablanca as TAL site but it wasn’t equipped for night landings so they had to move it to the morning to Florida. 4th to Jan 27 9:37 as of unaccepted weather at Kennedy space center and5th to Jan 28 as by problems with the exterior access hatch. 9. Delayed 5 times shows lack of good decision making and management of NASA’s managers. 10. Morton Thiokol is the contractor responsible for the construction and maintenance of the shuttle’s SRBs. 11. Rockwell international is the shuttle’s prime contractor. 12. Jan 28th forecast predicted an unusual cold morning with temps close to 31f (-1 c) , that’s the minimum temp. Permitted for launch. 13. Roger Boisjoly and some engineers of Morton Thiokol expressed their concern about the effect of the temp. on the resilience of the o-rings. 14. Thiokol engineers argued that if the o-rings were colder than 53f (12 c) , they didn’t have enough...

Words: 1586 - Pages: 7

Free Essay

Scientific Frauds

...scientific community making headlines and some them have reached the public who have paid the price of such frauds such as in the case of Autism linked MMR vaccine, which had caused a stir and people still remain to be affected by it and then there is the case of Woo-Suk Hwang,an stem cell researcher who rose to fame however soon it was known that the data was fabricated and the papers were retracted.The general public wasnt affected by it however it does involve and time and money to replicate such results and which is never acheived. So it actually a fraud or a human error, the only difference between a fraud and an error is intention. It could be argued that is there any room for scientists to make errors and yes we all are capable of making errors, they can make errors too however they have the chance to correct such errors before publishing such data instead such papers do see the light of the day, a lot is dependent on these scientific researchers then why is the data tampered and results are achieved per the own needs, a research shouldn’t driven as per the needs of an individual or for any sector [1]. It is based on any actual data which may eventually lead to saving lives or aiming for a better world or better resources or a better environment. Driving factors for scientific frauds Science is a result driven discipline, a ‘Publish or Perish ‘environment which is like the survival of the fittest, where everything is data in facts, figures and tables. It could be an increase...

Words: 1653 - Pages: 7