content
stringlengths 71
484k
| url
stringlengths 13
5.97k
|
---|---|
Can a child get a COVID-19 vaccine in Ontario without their parent's permission?
Share:
TORONTO -- It's not uncommon to see a teary eye or hear a child wail when they get a shot—but it is rare to see a health practitioner refuse to vaccinate a child because they would not provide consent.
Children between the ages of five and 11 became eligible to get their first paediatric dose of the COVID-19 vaccine in Ontario on Nov. 23, just days after Health Canada approved it.
Parents were told they could book appointments for their kids using the provincial portal or their local public health units. They could also get the shot at select pharmacies or through their family doctor.
In order to get the vaccine, parents of children in this age group must provide consent, either before or at the time of the appointment. However, the provincial website also says that children and youth must also provide informed consent to get the shot, which means the individual must understand what the vaccine involves, why they are getting it and what the risks and benefits are.
The province goes on to say that if an individual is unable to provide that informed consent, they will need consent from someone who can make the decision on their behalf.
"Parents or substitute decision makers of children aged five to 11 will, for the most part, have to provide consent on behalf of the child at the time of the appointment before their children can receive a vaccine," the website says.
In Ontario, there is no minimum age of consent under the Health Care Consent Act, meaning that as long as a person is deemed capable of making an informed decision about their health, they have the right to do so.
"In order to give informed consent, the person giving the consent has to be able to understand the reason for the intervention, the benefits and risks of the disease," said Associate Medical Officer of Health Dr. Vinita Dubey.
"And so, while in Ontario, there is no age of consent in the Health Care Consent Act … developmentally most children under 12 are not able, or as we say in medicine capable, to provide their own consent, which is why it falls to the parent or guardian."
Dubey said that most of the time the reason why a child doesn't want a vaccine is because of needle fear or anxiety. She urged parents to discuss the vaccine with their child prior to going to a clinic.
Children and youth over the age of 12 in Ontario can get the COVID-19 vaccine without parental consent, although Dubey said that regardless of age, if an individual is determined not to be able to provide informed consent they would need a guardian or caregiver to do so.
CAN A CHILD GET A COVID-19 VACCINE WITHOUT PARENTAL CONSENT?
Experts say that a child can get the COVID-19 vaccine without their parents' permission, but that it would be extremely rare as the child would have to prove they are mentally capable of making the decision.
Dubey said that in this scenario, a physician would do an assessment to determine if the child has a complete understanding of what they are agreeing too. The process would likely be "a bit more intense" than what would be required of an adult, she said.
"It's one of the reasons why, at our Toronto Public Health Clinics for example, we're requiring parental consent because our nurses don't necessarily have that expertise to do that kind of assessment. But you know, in a family doctor's office, for example, perhaps even some pharmacists might be able to determine that."
Dr. Adam Kassam, president of the Ontario Medical Association, admits that a child wanting to get a vaccine without parental consent is a "very challenging situation" but could be determined by a family doctor or someone with a pre-established relationship with the child.
"If a child is considered a mature minor, they can make an informed decision about care without a parent agreement," he said. "We see this also happen in other circumstances that are not vaccine related. So, for example, in teen pregnancy, in conversations about abortion, for example, these are obviously intimate and important conversations to have but those are similar conversations that have happened within the private provider of patient relationships."
Individuals between the ages of 12 and 18 – the age group in which a youth is officially considered an adult – are allowed to get the COVID-19 vaccine without parental consent, something that Kassam says is usual in terms of vaccinations. However, those doses are typically provided in school settings or at a family doctor's office, not at a clinic or pharmacy.
CAN A CHILD REFUSE A VACCINE IF THEIR PARENTS WANT THEM TO GET IT?
The same rules apply for children that do not want to get the shot. However, for the most part, if a child shows up with their parents to a clinic, there is implied consent.
Anna Banerji, infectious disease expert with the University of Toronto's Dalla Lana School of Public Health, says that it's not uncommon for kids to be worried or afraid of getting a vaccine, but if parents give permission, health practitioners usually give the shot.
"In most situations, we find a way to get give the kid the needle," she told CTV News Toronto. "I vaccinate refugee children and if they need it for school and the parents want the kids to get it, you know, someone sits there, holds the kid's legs and arms and we just give it."
"It's rare that that the kid says no, that the clinician refuses. At that point you find a solution."
Banerji goes on to say that she is doubtful that a five-year-old child would be able to comprehend what a vaccine is, as well as the benefits or risks involved. However, she adds that an older child aged 10 or 11 could be able to prove they have an understanding of the process.
According to Kassam, if a parent brings a child to a clinic to get the vaccine, it's assumed they will get the vaccine.
"If the parent and family comes to a doctor's office or to a vaccine clinic, and they're very much set on getting the vaccine, you've already had your informed consent by virtue of them coming in and making the trip."
Consent then continues as the health practitioner asks the family the usual questions about the vaccine and allergies prior to giving the shot.
Kassam says that in some cases, if a child is really resistant, the parent may take them home and try another day.
Health experts say that regardless of age, it's important that everyone understand why they are getting medical treatment. For kids, this would involve parents sitting them down beforehand and explaining what the vaccine is and why they are going to get it.
"We have links to other resources as well to help parents have those conversations prepare their child, and really to address the child's specific fear," Dubey said. "Because when the child says I don't want it, it's really important to understand why."
"The preparation is really important. We really do want parents to involve their children. We want children to involve their parents. I think that having a good clinic experience can often be prepared for." | https://toronto.ctvnews.ca/can-a-child-get-a-covid-19-vaccine-in-ontario-without-their-parent-s-permission-1.5686963?cache=yesclipId104062%3FclipId%3D104069%3FclipId%3D373266%3FcontactForm%3Dtrue%3FcontactForm%3Dtrue |
Last week, the Centre published its draft Personal Data Protection Bill, 2018, which follows from the recommendations put forward by the Justice Srikrishna Committee on data security.
Data is the new gold. With multiple cases of Aadhaar leaks, fears that the ‘Big Brother’ (government) is constantly monitoring us and the unauthorised collection of data by private companies, the Srikrishna committee was tasked with delivering a model law on how India will regulate data.
This bill takes further precedence because of the apex court’s historic judgement last year, which said privacy is a fundamental right. The committee has delivered both a report on India’s data landscape and a consequent draft bill which would regulate it.
However, the committee’s recommendations are not binding. IT Minister Ravi Shankar Prasad told the press last week that the Bill will undergo extensive consultations in the Parliament before it is put up for a vote. In other words, the final bill deliberated on in Parliament could be very different from what you read in this commission’s draft bill and report.
Before getting into its analysis, it is imperative to understand a few definitions the bill has set out. Personal data, for example, refers to any information specific to a particular citizen or “data about or relating to a natural person who is directly or indirectly identifiable”.
What the bill seeks to regulate is the “processing” of that personal data which includes how it is recorded, collected, adapted, indexed and disclosed.
Going a step further, the bill also elaborates on what it means by “sensitive personal data.”
Among other things, it includes passwords, financial data, health data, official identifiers, sex life, sexual orientation, biometric data, genetic data, caste or tribe and religious or political beliefs and affiliations.
A fundamental underpinning of this entire exercise is to establish how personal data is utilised in such a way that a person’s individual privacy is protected.
The bill then goes on to spell out how this exercise is to be done and who has the necessary authority to perform it.
The bill lists out six grounds under which your personal data can be processed. (Read CHAPTER III: GROUNDS FOR PROCESSING OF PERSONAL DATA – Page 14)
If you give your explicit, informed, specific and clear consent to a person or an entity like the government or company. However, you are capable of withdrawing your consent.
This is where the bill gets a touch problematic as the scope for how and when the government can collect or use that information with or without consent is very broad. Let’s take the example of Section 13 of the Bill under Chapter III, which exempts the government from acquiring consent for certain types of data processing. The provision reads:
“Processing of personal data for functions of the State:
(1) Personal data may be processed if such processing is necessary for any function of Parliament or any State Legislature.
(2) Personal data may be processed if such processing is necessary for the exercise of any function of the State authorised by law for:
(a) the provision of any service or benefit to the data principal from the State; or
(b) the issuance of any certification, license or permit for any action or activity of the data principal by the State.”
These provisions are exceedingly vague and open to a whole host of interpretations. The government might as well process my personal data without my consent for any reason it damn pleases. One hopes that the final bill tabled in the Parliament brings in a lot more clarity.
Other circumstances in which authorities can process your data are:
For legal cases: Any court or tribunal can demand access to your personal data without your consent. However, there is no clarity on whether the data it seeks is germane to the case or not.
In emergency situations: Authorities can collect your data without consent if your life is under threat from a medical emergency, natural disaster or an outbreak of a serious disease.
Your employers: They can access and use your personal data without consent for recruitment or firing, benefits, attendance, and work performance. Here, there is one safeguard that has been put in place. They can access your personal data only if the process of acquiring your consent is proving to be cumbersome or your job contract states otherwise.
It also specifies a few other “special reasons” that the Data Protection Authority of India (DPAI), a statutory body that will monitor these regulations, will list out including prevention of unlawful activity and whistleblowing, among others.
On the subject of processing sensitive personal data, the bill lists out some important criteria:
(1) Sensitive personal data may be processed on the basis of explicit consent.
(2) For the purposes of sub-section (1), consent shall be considered explicit only if it is valid
as per section 12 (read processing of personal data) and is additionally:
(a) informed, having regard to whether the attention of the data principal has been
drawn to purposes of or operations in processing that may have significant consequences for the data principal;
(b) clear, having regard to whether it is meaningful without recourse to inference from conduct in a context; and
(c) specific, having regard to whether the data principal is given the choice of separately consenting to the purposes of, operations in, and the use of different categories of sensitive personal data relevant to processing.
Moreover, you can withdraw your consent. The exception on requiring consent is more or less the same here as well.
However, one major difference with the reasons listed out for personal data is that consent has to be explicit, which in other words states the person understand the implications of giving up his/her data and what it means.
In the chapter titled, Data Principal Rights, the bill lists out the number of rights that in theory, every citizen has on how they want to control his/her data:
1) Right to confirmation and access: Where every citizen has the right to find out what’s being done with their data.
2) Right to correction: Where you can correct or update your data. It is imperative on the organisation which collects your data to update the said information and pass that onto other entities that drew from it.
3) Right to data portability: This right “Allows individuals to obtain and reuse their personal data for their own purposes across different services. It allows them to move, copy or transfer personal data easily from one IT environment to another in a safe and secure way, without affecting its usability.”
However, the bill lists out some exceptions.
1) Right to be forgotten: Unlike the European Union interpretation of this principle which allows people to withdraw consent and demand their data be completely erased, the bill requires citizens to issue a claim to an Adjudicating Officer, who will then decide whether it is fair or not.
One essential facet of this bill is the establishment of the Data Protection Authority of India; a statutory body made up of seven members including a chairperson, who will oversee data processing regulations in India and inquiries into specific cases, including the power to search and seize.
These committee members will be selected by Chief Justice of India or a judge nominated by him/her, the Cabinet Secretary and one expert nominated by the Chief Justice or the nominated judge.
The bill has also listed out punishments for various violations committed by those holding your data. A data security breach, for example, could entail a fine of “up to five crore rupees or two per cent of its total worldwide turnover of the preceding financial year, whichever is higher.”
Also Read: Mob Lynching: Never Mind WhatsApp, Only These Measures Can Stop The Mobs
On more serious charges, the said entity faces “a penalty which may extend up to fifteen crore rupees or four per cent of its total worldwide turnover of the preceding financial year, whichever is higher.” Those wronged by an agency collecting their data can approach the DPAI for compensation.
However, there is very little conversation on the Aadhaar, which comes under a person’s “sensitive personal data.” Moreover, the matter is currently sub-judice in the Supreme Court. There are other concerns as listed in this tweet. | https://www.thebetterindia.com/154124/data-protection-bill-aadhaar-justice-srikrishna/ |
Our goal is to innovate and develop for the different technology sectors to have services that provide added value to other sectors and offer the possibility of continuing to improve in order to continue growing together.
We always look for the best option for our clients analyzing the information provided, defining the limits of application, trying to give alternative solutions and if possible developing a better solution.
This ability to always seek better solutions and the team of professionals that is part of our family has led us to have a great technological experience which allows us to have in our charge multiple open source projects in technologies of more than 10 years, something that makes us proud and motivates us to continue ahead.
The General Data Protection Regulation (EU) 2016/679 ("GDPR") is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. Superseding the Data Protection Directive 95/46/EC, the regulation contains provisions and requirements pertaining to the processing of personal data of individuals (formally called data subjects in the GDPR) inside the EEA, and applies to an enterprise established in the EEA or—regardless of its location and the data subjects' citizenship—that is processing the personal information of data subjects inside the EEA.
Controllers of personal data must put in place appropriate technical and organisational measures to implement the data protection principles. Business processes that handle personal data must be designed and built with consideration of the principles and provide safeguards to protect data (for example, using pseudonymization or full anonymization where appropriate), and use the highest-possible privacy settings by default, so that the data is not available publicly without explicit, informed consent, and cannot be used to identify a subject without additional information stored separately. No personal data may be processed unless it is done under a lawful basis specified by the regulation, or unless the data controller or processor has received an unambiguous and individualized affirmation of consent from the data subject. The data subject has the right to revoke this consent at any time. | https://www.confiared.com/en/company |
43 Barnton Road,
Dumfries,
DG1 4HN
www.burnstoursdumfries.co.uk
GDPR Compliance Policy
Burns Tours Dumfries handles personal data on an ad-hoc basis and is aware of its responsibilities in respect of complying with GDPR regulations and is fully committed to maintaining information security to protect customers, suppliers and individuals.
We understand the importance of this and have a robust system in place to ensure compliance.
We have informed and educated our employees in respect of how it impacts our business, what process we have to follow and why it is important we do so.
As a data processor we are responsible for the safe handling, transfer and destruction of personal files and have the following in place to ensure this is carried out securely:
- We have conducted an information audit to map information and data flow throughout the business.
- We document all personal data held, its origin, who it is shared with and what purpose we hold it for.
- We have an appropriate data protection policy which is management led and promoted positively throughout the business.
- We have implemented appropriate technical and organisational measures to integrate data protection into our processes.
- We have effective controls will which identify, manage and resolve personal data breaches.
- We have provided effective data protection awareness training to all staff.
- We have a robust but flexible process which can respond to the needs of the data controller in respect of supply, retention, back-up and suppression of specific personal data.
- Our systems are protected to the highest level from viruses and Malware using the latest anti-virus software.
- We are committed to continuously improve our data protection management system.
- We have customer and supplier contracts which legally comply with GDPR.
For the purposes of clarification we have expanded on the following:
Identity:
Burns Tours Dumfries is the data processor and our customer is the data controller or processor. We undertake to carry out personal data services based on our customer having either explicit consent to use this information or having agreed legitimate interest. Therefore the onus is on our customer to have this consent and the controls in place to process the information legitimately and we will not assume liability if this transpires not to be the case.
Data subject rights:
Individuals have the right (subject to conditions) to the following under GDPR –
To object to the processing of their personal data
For data portability
To request that their data is updated and corrected
For the erasure of their personal data
To restrict the processing of their personal data
To withdraw their consent to the processing of that data
To lodge a complaint with the data protection authority
We will observe all of the above and facilitate those rights in a timely,
efficient and professional manner within GDPR guidelines. | https://www.burnstoursdumfries.co.uk/privacy-policy/ |
As we mentioned in the introduction, GDPR came into force across the EU in April 2018. GDPR is one of the most far-reaching data protection laws anywhere in the world, and as such it has had a huge impact globally.
This is because, unlike many national data protection laws, GDPR applies to any company that deals with EU residents, wherever they are in the world. In this section we will look at the specific impact GDPR has had on analytics.
We begin with a brief refresher on what data GDPR covers and why you need to comply.
The complexity here lies in the fact that it covers data that might indirectly identify a person. Often a single piece of data on its own will not be sufficient to identify a person (for instance the John Smith example we already met). However, if you also know that John Smith lives in Edinburgh and works for Starbucks then you may have narrowed it down enough to identify him.
How Does GDPR Define Consent?
GDPR requires that individuals must have freely given informed consent before their personal data can be used. This means that not only must they give the consent, they must understand precisely what they are consenting to and must take some explicit action to indicate this. Importantly, this consent can also be withdrawn at any time.
What Penalties Can GDPR Impose?
GDPR carries some of the toughest penalties in the world for any company that breaches the rules. The potential fines are 20 million Euros or 4% of annual global turnover, whichever is higher. The EU will also have the power to ban non-compliant organisations from trading with any nation that has adopted the GDPR into national law.
What Other Rights Does GDPR Give to Individuals?
What Else is Covered by GDPR?
This requirement is purposely described in a flexible manner to take account of the specific circumstances of a company. For instance, a boutique coffee shop who keeps a customer mailing list would not be expected to put in place such stringent security measures as a bank.
Another important requirement is the need to promptly notify the authorities and any affected individuals in the event of any security breach.
GDPR defines ‘promptly’ as being within 72 hours of a breach being identified. Companies must also have a plan in place to deal with potential breaches (a so-called Incident Response process). A key part of this is ensuring that all staff have appropriate training and that management in particular know exactly what should be done if they are informed of a potential data breach.
is considered as one of the most modern and comprehensive legislations that effects the processing of data.
GDPR is not the only data protection legislation you need to be aware of. Many companies might find themselves covered by the US Health Insurance Portability and Accountability Act (HIPAA). Like GDPR, HIPAA has rules covering privacy, security, breach notification and compliance. Unlike GDPR, HIPAA carries both civil penalties (fines) and criminal penalties (with a potential maximum sentence of up to 10 years in prison). However, unlike GDPR, HIPAA only relates to data about health care and health insurance.
While GDPR applies across the EU, its requirements are a minimum standard that must be met. In certain cases more stringent rules may be applied by member countries or states. For instance, within Germany, certain states like Brandenburg have far more strict rules relating to health records.
The HIPAA Privacy Rule for example protects most “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or medium.
One of the greatest impacts of GDPR is it means companies need to adopt the principle of privacy by design. This directly impacts how a modern analytics stack needs to be built. For instance, the requirement that consent can be withdrawn at any time means that you can’t assume that because a given analysis didn’t breach GDPR in the past that will always be true. Consent may have been withdrawn in the meantime, and so this needs to be explicitly checked each time you run the analysis.
It also pays companies to design a system that allows an individual to easily access their own data and to give or withdraw their consent. Clearly this has big implications for the Data Security function since it is vital to ensure that it really is the correct individual who is requesting the data.
What If My Existing System Isn’t Compliant?
Of course, many companies have already got existing analytics stacks. For these companies they have the choice of either retrospectively adding in privacy-preserving techniques or replace their entire stack. Which of these options is best will depend on a number of factors. These include the scale of your system, the volume of data you hold, whether your data includes large amounts of personal data and whether you expect to need to use that data.
Later in this paper we will explain how anonymization can help you achieve GDPR compliance without the need to completely replace your analytics stack. We will also show why pseudonymisation and other simple approaches to anonymization may not suffice. | https://aircloak.com/background/analytics-and-privacy/analytics-gdpr/ |
The Difference between First Person Narrative and Third Person Narrative
The first or third person narrative denotes from whose view or perspective the writing is being told. When you write in the first person, you use personal pronouns such as we, I, me, and us, as well as the possessive pronouns mine, my, our, and ours. On the other hand, if the story is narrated using the third person format, the pronouns used are she, he, it, they, and them, together with the possessive pronouns hers, his, its, their, and theirs. Using the third person will impact the verbs used. That is the reason why you should choose the appropriate perspective for different types of writing genres.
There are some who unconsciously use the “I” form when telling stories. For them, this format is easier. However, there are those who feel more comfortable with the he-she format. They feel that they can provide more insight with their stories if they use the third person scheme.
The First Person Perspective
When you relate a story in the first person, it means you are talking about yourself. The sentence, “I saw her going to the police station” is a fine example of this form of narrative. It denotes a thing or an event expressed from his point of view. If the speaker is part of a group, then the sentence would be transformed to, “We saw her going to the police station”.
The Third Person Perspective
When you opt for a third person narrative, the pronouns he, she, and it are used together with the gender-specific objective pronouns him and her. There are two main types of third person writing: omniscient and limited. In omniscient writing, the writer can jump from one character to another and disclose more information, giving the reader more data that is beyond the coverage of the protagonist’s actions. In limited writing, the writer offers only what the protagonist is aware of.
In most schools, instructors usually promote the use of the third person format instead of the first person perspective. The first person perspective is deemed as informal and unsuitable for academic audiences. It can only be considered acceptable in academic writing if the teacher requires a personal informal approach on a specific article.
In fact, even though the first person perspective in writing is common when writing a person’s autobiography, some works use this perspective when telling a story using the point of view of a character that is part of the story. | http://www.melodybussey.com/the-difference-between-first-person-narrative-and-third-person-narrative-2/ |
“And you’ll return to real life. You need to live it to the fullest. No matter how shallow and dull things might get, this life is worth living. I guarantee it.”
Haruki Murakami’s new novel, Colorless Tsukuru Tazaki and His Years of Pilgrimage, is ostensibly an account of a young man longing for an explanation of his past. Tsukuru Tazaki, the 36-year-old title character, searches for the reason that he was ostracized by his friends sixteen years earlier. There is a seemingly uncomplicated and almost flat unfolding of purpose in the events that make up Tsukuru’s inquiry; however, the lean textures of his pilgrimage also express sublime emotions that reveal a way of understanding the world by engaging mood. The placing of value on mood as a legitimate aesthetic emotion, as opposed to relying solely on empirical facts, is in the same vein as the Romantic artists who embraced melancholy. Colorless Tsukuru Tazaki is a melancholic novel, but it is from the ache of melancholy that possibility grows. The pilgrimage is about Tsukuru’s attempts to attune himself with mood in way that will permit him to freely negotiate a future that does not rely exclusively on facts, but blooms in the ecstatic possibilities of emotion.
The first hint that Colorless Tsukuru Tazaki is a novel about mood can be found in the North American cover. The colour bars and map displayed in flat juxtaposition to the gray background are rendered in the style of Colour Field Painting. The connection to the style is even more direct on the Japanese cover, which reproduces Morris Louis’s Pillar of Fire (1961). Colour Field Painting is a New York style of Abstract Expressionism that depicts huge, flat fields of solid colour. The larger-than-life paintings encroach on the spectator’s world, especially when seen up close, as there is not a single point-of-reference where the background and foreground can be distinguished. The style presents fields as oppose to a traditional window on the world. The artist’s goal is to invoke an emotional experience. You can see examples of this style in Barnett Newman’s Voice of Fire (1967) and Mark Rothko’s No. 16 (1957) at the National Gallery of Canada in Ottawa. If we take our point-of-departure from the cover, this is not a novel that provides a window onto the protagonist’s perspective of things, but it is an invitation to empathize with his melancholic mood and his quest to become attuned to that mood in a way that brings meaning to the world.
“Maybe I am fated to always be alone, Tsukuru found himself thinking. People came to him, but in the end they always left.”
Tsukuru spent his youth with four close friends in the town of Nagoya during the early 1990s. Although the crew is “like five fingers of a glove,” Tsukuru is somewhat different because, unlike his friends whose surnames each contain the name of a colour, his surname, Tazaki, means “to build”. His surname is colourless. The boys are Kei Akamatsu, who is Aka (Red) and Yoshio Oumi, who is Ao (Blue). The girls are Yuzuki Shirane, who is Shiro (White) and Eri Kurono, who is Kuro (Black). Tsukuru leaves Nagoya after High School to study in Tokyo. He wants to pursue his childhood fascination with trains by becoming a train station designer. He wants to become the builder his moniker suggests. During his second year in college his friends cut off all relations with him without any explanation. The deeply disturbing fracture makes him feel like “an empty person, lacking in color and identity” and he even has suicidal tendencies, like one who has “fallen into the bowels of death, one untold day after another, lost in a dark, stagnant void.” When the event is recounted to Tsukuru’s girlfriend Sara Kimoto sixteen years after it happened, she proposes that it has caused his emotions to atrophy. If he is to have any personal growth or attain progress in their relationship, she suggests, he will have to discover what was at the root of his rejection.
In some ways this straightforward approach to fix the problem unfolds like detective pulp fiction. The implication is that Tsukuru’s pilgrimage will establish facts about a given point in time that will, in turn, cultivate closure in a happy ending realized in a logical understanding of things. The path to uncover the mystery of Tsukuru’s being cut off from the Pillar of Fire is surprisingly uncomplicated. Sara utilizes the speed and availability of information on Google and Facebook to immediately track down the friends. Tsukuru claims that he cannot look them up because he does not have an Internet account, but this reasoning seems shallow. He could have looked them up at any point. Something other than a lack of technology has held him back. Tsukuru is inexorably tied to a technological sense of time through his profession as a train station designer. Train stations are the original dwelling place of the modern sense of time. They are the place where clocks across the landscape were first synchronized to increase efficiency by putting the world on a unified schedule. (Incidentally, it was in figuring out how to synchronize train station clocks that inspired Albert Einstein to think about his theory of relativity.) It this sense of modern technological time that he has to step out of to begin his true pilgrimage. The detective work of locating the friends and finding out what happened—that Tzukuru has been falsely accused of raping one of his friends who has since passed away—does not turn out to be any kind of detective work at all. Most importantly, the information does nothing to cure his pain and suffering. The attempt to recast the Pillar of Fire in terms of an event leaves Tsukuru and the reader in the cold. In the same way that Tsukuru must reach beyond the event and build a connection to the world of mood and emotion, the reader is also forced to either withdraw from a shallow story or enter it passionately, in a way that is attuned to the mood expressed in the pilgrimage’s field of colours.
“Most people see Liszt’s piano music as more superficial, and technical. Of course, he has some tricky pieces, but if you listen very carefully […] you discover a depth to it you don’t notice at first. Most of the time it’s hidden behind all these embellishments.”
One “field of colour” in the novel that calls Tsukuru out of technological time is Franz Liszt’s Romantic piano piece Années de pèlerinage, from which the novel’s title takes its cue. Tsukuru’s university friend Haida, whose name contains the colour gray, reintroduces him to this same piece that his friend Shiro played on the piano in his youth. The piano piece was written in the first half of the 19th Century. Romantic artists at the time valued intense emotion as a source of aesthetic experience and accentuated emotions such as dread, horror, and awe in light of the new aesthetic categories of the sublimity and beauty of nature. Tsukuru and Haida form a close bond which resonates in Haida’s emphasis of Le mal du pays in the first suite, Première année: Suisse. The piece expresses the intense melancholic ache of homesickness that Haida describes as “a groundless sadness called forth in a person’s heart by a pastoral landscape.” It becomes more than just homesickness. In discussing Shiro’s playing of the piece, Haida proclaims that Tsukuru’s description of it having a “calm sadness” must mean that “she must have played it well.” Haida says that “it’s hard to get the expression right … the way you use the pedal makes all the difference, and can change the entire character of the piece.” It is emotion that gives life to the piece and the passionate suite does touch Tsukuru’s emotions. They are expressed in a shocking dream in which the eros of friendship is realized as sexual desire. The erotic dream dispenses with linear time by conflating a sexual encounter that begins with Shiro and Kuro into one with Haida just before the climax. Tsukuru is left wondering if the dream is real. He is unable to resolve the issue by rooting out facts because Haida disappears, leaving only his copy of Années de pèlerinage. Although Tsukuru is left speculating what the dream means, including wondering if he is bisexual, the fundamental question is not one of psychology, but one that understands friendship as something that cannot be calibrated. It is a challenging expression of mood. Tsukuru, however, cannot attune himself to this kind of intense emotion at this point in his life. The loss of a relationships with friends leaves him despondent and continues to weigh him down.
“Each individual has their own unique color, which shines faintly around the contours of their body. Like a halo. Or a backlight. I’m able to see those colors clearly.”
The final emotional “colour field” that I will look at concerns comportment towards death as it arises as an aspect of being attuned to mood. In a story-within-a-story, Haida relates his father’s account of meeting Tokyo jazz pianist Midorikawa. Haida offers to tell the story late one evening when the boys have been sitting around discussing death. Although the story is said to be events that actually occurred involving Haida’s father, it is told in a dreamy and confusing fashion in which reality and time seems to shift. Tsukuru is associated with the synchronization of linear time in the building of train stations; however, in the case of this Romantic tale, he is unable to separate particular people and events in time. It is difficult to say exactly who the perspective is taken from, but the narration states that Haida and his father “began to overlap in Tsukuru’s mind.” In this perplexing atmosphere where “the two distinct temporalities had blended into one,” we find out about the magic qualities of a person who can see colours associated with people, but it comes with a special understanding of or attitude toward death. Midorowaka is a sensitive musician who gives a private performance of Thelonious Monk’s ‘Round Midnight to Haida’s father. It is a song that expresses the ache of midnight memories of an absent lover. He is a sensitive musician who brings passion to his rendition of the most interpreted and melancholic jazz standard there is. Perhaps it is his last performance of the piece as Midorokawa says he only has a month to live. Although he says death can be temporarily avoided by transferring a “death token” to another person, he has decided he would like to “die as soon as possible.” Accepting the death token not only gives one the power to see colours but it also presents the ability to expand ones consciousness:
“You’re able to push open what Aldous Huxley calls ‘the doors of perception.’ Your perception becomes pure and unadulterated. Everything around you becomes clear, like the fog lifting. You have an omniscient view of the world and see things you’ve never seen before.”
For a novel that does not provide any kind of explicit epiphany for the protagonist, Tsukuru is brought into a kind of ecstatic dream presence that blends the past into the present and calls forth an individual and inevitable death that is particular and finite. It is a rejection of the video-game aspiration to extend life without end or limit. A kind of dread arises out of this which is the realization that no one is really at home in the world. Homesickness as a longing memory becomes more than a sentimentality for the past. We are invited to become open to the fog lifting to uncover hidden colours. Like Tsukuru, we are offered access to an omniscient view to reveal things. More importantly, we learn that the things that are hidden can only be approached by way of emotion, in ecstasy.
It is difficult to say exactly where Tzukuru stands by the end of the novel, but can we say that the meaning of a spiritual pilgrimage is revealed in appeals to ecstasy. We must interpret Pillar of Fire, Le mal du pays, ‘Round Midnight, Colorless Tsukuru Tazaki and His Years of Pilgrimage by way of our own attunement, passionately clutching our own death token.
Visit harukimurakami.com.
Visit the National Gallery of Canada.
Read Deep Chords: Haruki Murakami’s ‘Colorless Tsukuru Tazaki and His Years of Pilgrimage’ by Patti Smith. | http://coyoteoutlook.ca/tag/franz-liszt/ |
“Where does your light comes from?” is a question I ask myself when I paint or apply artistic effect to a photo.
Why does light matter in images?
While painting or drawing a clear point from which the subject is illuminated helps you establish dimension. It also makes your image more visually appealing. It helps to focus the eye on a certain part of the image which draws the viewer in. In other words it helps to establish a focus point.
When your image has a clear focus point, it will hold the attention of the viewer for longer. Images that make you feel are the ones that really capture your viewer.
Take a look at these examples. All the images are created from the same basic photograph of a dead tree. The picture was taken in natural sunlight, in direction with the sun.
Image 1 is the photo as it was before any lighting or visual effects where applied.
It is a pretty interesting tree. Take note of how the shadow falls. But in itself this image does not really capture the viewer’s eye.
Now let’s look at the same picture with some artistic effect applied.
Image 2 leaves open more interpretation to the viewer. The background is vaguer and the color scheme is different.
Now let me take image 2 and only apply a lighting effect to it.
Your eye’s focus is different. Of all these three images which one captures your gaze for just a little bit longer?
It is the same with writing. A book that engages the readers’ emotion rather than his intellect is a master piece of pure genius.
What does light teach you about writing?
The light in an image can be viewed as your point of view in writing. From where is your writing directed?
There are three main types of writing perspective.
- First person perspective
- Third person perspective
- Omnipresent
First person perspective
A book written in first person perspective shines the light on only those aspects that the protagonist can see. The entire book universe is told from his or her perspective, which leaves many places completely in the dark. Another character is seen only as your protagonist sees them. Places are seen only as your protagonist sees them. The reader becomes intimately accustomed to the protagonist’s way of thinking and knowledge. The Reader feels what your protagonist is feeling; he sees what your protagonist is seeing. Or at least as a talented writer this is what you aim to achieve by using this point of view.
Image 4 is a good example of first person perspective.
This is still the very same tree. However just look what difference it makes viewing only a part of that picture and different color scheme applied. Part of that tree is almost in your face.
Omnipresent
Omnipresent is like a picture with no clear indication of where your light is coming from. You can see everything. It gives you a lot of information, yet little emotional engagement. Image 1 would be a good example of an omnipresent. If I were to write a few lines in omnipresent narrative about Image 1 it would sound something like:
The think branches of the dead tree were all that remained of the once flourishing camel thorn. Indigenous to this area, it had died decades ago when the water table of the ground water started to drop. The sun had beat down on those branches leaving them almost blackened as they are dry.
Yay! Now you have read a lecture on the Namibian Flora. I bet that was real interesting! (Note the sarcasm)
Third person perspective
Third person perspective has the ability to jump from one head to another. Yet this is not advisable. A scene is much more interesting told from one perspective only. In this way you can get just as intimate as the first person perspective. Yet you can also move away and gain distance from the story as needed.
Image 2 is a good example of third person perspective with some distance, while Image 3 captures the intimacy of telling it from one person’s point of view. You tell your story from in the third person tone, while coloring your narrative with the emotions of the protagonist of the scene.
If I were to write a sentence on image 3 it would be something like:
“Come keep me company!” it called into the harsh wind. No response. If only the menacing sun would stop beating it, with her harsh rays. If only… its thoughts trailed off.
Go with the light
When you are taking a photograph in natural light, it is advisable to photograph with the light not against it. The same applies for writing. Go with the point of view you are portraying. Make it work for your story. Show your reader only those aspects which he needs to see at that time. A picture with a few dark areas makes for far more an interesting image than one which shines a light on everything at once.
Show the reader only an aspect of the character of a person. They don’t need to know the entire history of that person for your story to work. Similarly if you are describing a place or an aspect of how society functions. Back-story has a way of killing the flow of your front story. It interrupts your tale rather than advancing it. Your aims as a fiction writer must be to engage your reader’s emotions, without letting him or her know you are even there doing it. Let the reader live the story not read it.
I’m currently reading “self-editing for fiction writers”. It is an excellent book for writers to understand this craft.
About the Author:
Born and raised in the African Desert country Namibia (where she currently lives), Serins often sat on the peaks of the Dunes watching the ocean tide drift in. Writing is both a passion and a calling for her. She sees it as the method by which to bring phantasy into reality.
Serins will dabble in all types of creative writing, such as poetry to fiction. She is an open minded human being who will enchant you with her flair and creativity. What’s more being a creative spirit she paints and loves photography, often combining these two interests into masterful artistic photography. | https://thestoryreadingapeblog.com/2015/05/30/what-visual-art-can-teach-you-about-writing-pov/ |
In The Production of Space (1991), Henri Lefebvre acknowledges the impact of production, consumption, and multiplicity of authorship in the built environment. He asserts that cities, buildings, and interiors are hybrid productions mobilized not only by designers, but also through cultural traditions, social practices, and autonomous interventions. By reframing the design of the built environment with the inverse—the quotidian impact of people reshaping space—Lefebvre celebrates the commonplace and unschooled actions that cities, buildings, and interiors receive apart from the top–down hand of designers. He fixes his gaze on the lives of buildings and interiors well beyond the moment of their completion. Working in a manner similar to geographers, sociologists, anthropologists, and historic preservationists, how can interior designers, architects, and planners cultivate a design culture that embraces and advocates for diverse modes of spatial occupancy? How might interior design practices promote, rather than subvert, these influences to recast spatial obsolescence toward higher performance futures? How might interior design engage a more organic mode of practice? For immigrants, refugees, and underrepresented persons, establishing a rooted narrative often begins within building interiors. Such interventions are primarily introduced as spatial, temporal, and adaptive gestures that reveal enduring values, perceptions, practices, and methods of production. This paper posits that obsolete buildings of American suburbia offer clues to an alternative future. It examines how incrementally adapted shopping malls allow immigrant and underrepresented communities to seek socioeconomic freedom via cultural practices and mercantilism. These adapted commercial interior environments demonstrate how historically marginalized communities have found safe spaces to forge identities. Two sites—one in Houston and the other in Cleveland—speculate on the transcontinental extent of retail obsolescence and shopping mall adaptation. Case studies are used to demonstrate how commercial interiors often migrate toward futures that markedly contrast with their original design intentions. | https://experts.syr.edu/en/publications/internal-appropriations-multiculturalism-and-the-american-shoppin |
The Atelier de la Conception de l’Espace (ALICE), affiliated with the School of Architecture at the École Polytechnique Fédérale de Lausanne, is an educational facility focusing on preparing students for the practice of architecture. To cultivate the ability to create or shape space, students must be confronted with an educational frame work that prepares them for the field’s many practical challenges, from cultural, social, environmental, and physical concerns to working with the wide range of collaborators who must bring their creativity and expertise together in the design process.
Edited by Dieter Dietz, Matthias Michel and Daniel Zamarbide
With texts by Matthias Michel
Photographs by Dylan Perrenoud
In cooperation with Atelier de la Conception de l’Espace ALICE
The Invention of Space is the initial volume in a four-part series on ALICE, this new book focuses on how its innovative curriculum primes students to recognize the cultural practices embedded in the invention of space. Architectural spaces are conceived—and experienced—collectively within the incorporating culture. How can culture, together with a raft of com¬peting concerns, be best translated in the design process? The book explores this and related questions through a fictional narrative, in essays and with more than three-hundred images.
The second volume in a four-part series on ALICE, The House 1 Catalog focuses on a prototype, House I, developed and constructed throughout the academic year. This mobile structure incorporates ALICE’s core values of communication and collaboration in building processes, and it will travel as part of an exhibition to several major cities, where it will be continually modified and reconfigured. With five hundred illustrations, this book continues the experimental narrative Dieter Dietz, Matthias Michel, and Daniel Zamarbide began in The Invention of Space, which will be further developed in the forthcoming third and fourth volumes in the series.
ALICE plays a key role in the success of one of Europe’s leading schools of architecture, and this book, together with the three other volumes in the series, provides an opportunity to explore the exceptional learning environment ALICE offers. | https://bureau.ac/publications/all-about-space-3/ |
With a background in communication and cultural studies, Wen Yau’s practice shows her keen concern over the public dimensions of art. She stages performances in public space, presents work of institutional critique, develops participatory methodologies in her research, and more. In this talk, she will discuss the ideas behind her public practices and how she tries to engage the audience and/or other counterparts to reimagine their roles in public sphere in a performative manner. She will also share the challenges and dilemma she faced and the inspirations she had gained in her work processes.
As a cross-media artist, researcher, curator and writer, Wen Yau has focused on performance/live art and social practices in the past decade. Her works often grapple with cultural difference and intimacy in public space and have been presented internationally. She worked as a Researcher at Asia Art Archive (2005-2012) and obtained her PhD at the Academy of Visual Arts, Hong Kong Baptist University, with a thesis entitled Performing Identities: Performative Practices in Post-Handover Hong Kong Art and Activism. In 2015-2016, she served as Fulbright Visiting Scholar at the Performance Studies Department at Northwestern University. Recent projects include A Drop and Two Dots: WK Realty Expo & Auction (2018), Wahnsinn Homage to All Peaceful Revolutionaries (cross-media, 2014-), Painting like an Artist (conceptual painting, 2010-), I am a Grade D Artist (mixed media, 2009-2013), Seeing is Existing (pinhole photographic series, 2008-), cop.ied (cross-media, 2008-), Civil Left/Right (video & performance, 2007-), i-(s)wear (one-to-one performance, 2007-), TengSeWong/Voice-Writer series (media & live art, 2005-), I pledge (not) guilty (live art, 2004-05), among others.
This discussion series tackles questions related to the role of interdisciplinarity in contemporary architectural design and scholarship. It brings humanities-oriented researchers, artists, and writers from outside the discipline of architecture to the Faculty of Architecture to share their scholarly approaches to questions that are shaping debates both within and ancillary to architecture and the humanities.
Through this series, we hope to begin conversations and introduce new approaches and ways of thinking that might influence how we research, study, and practice. Are there ways in which interdisciplinary approaches can help address chronic imbalances and deficiencies in the ways architecture has been historically conceived, produced, and studied? Does interdisciplinarity risk eroding the specific methods of inquiry that make architecture unique?
The Architecture, Urbanism, and the Humanities Initiative (AUHI) comprises a group of designers, theorists, and historians at the University of Hong Kong. Collectively, we work to understand how buildings and cities shape our relationship to each other and to the world at large. One of the objectives of the AUHI is to address the complexities at work in architecture and urbanization through a range of sources; this lecture series is part of that attempt to open architecture to a broader cultural debate. | https://www.arch.hku.hk/event_/wen-yau-%E9%AD%82%E6%B8%B8/?subcat=auhi |
“Space, like language, is socially constructed; and like the syntax of language, the spatial arrangements of our buildings and communities reflect and reinforce the nature of gender, race, and class relations in society” (Weisman, 1992, p. 2). While institutions of higher education have granted physical access to African-American women over the last 150 years, their presence on American campuses has not been readily reflected in the physical design of the walls within which they learn. In examining the historical foundations of institutions of higher education, we cannot deny institutions consciously embed their values and basic assumptions within their physical manifestation (Bess & Dee, 2008). The architectural design of a campus reflects its history as well as its future aspirations (Markus & Cameron, 2002). In this way, the built educational environment has an important role in shaping and informing its community members of what education looks and feels like (Strange & Banning, 2001). The message of predominantly white institutions still remains founded in the voice and values of those in power. Therefore, in order for African-American women to succeed in the academy, they have adapted their racial and gender identities to fit the predominant culture (Fordham, 1993).
However, the hidden and unspoken messages that reflect the historical, social, and cultural context of American societal discrimination based on race and gender still remain in the built educational environment. In order to center the voices, experiences, and perceptions of African-American women within a predominantly white community, this study uses a critical black feminist lens. In addition, through an interdisciplinary conceptual model founded on the tenets of equal access federal policy, semiotics, organizational cultural transmission, and inclusive excellence, this study seeks to explore the dynamic that occurs between the built educational environment and its AfricanAmerican female students. Utilizing the portraiture methodology, nine women participated in the study through cognitive tours, individual interviews, self-reflective journaling, and photo documentation. The findings of the study depict a portrait of African-American women’s ability to reclaim the built educational environment of their predominantly white institution by physically and psychologically walking on its red brick path.
Krusemark, Stephanie L., "Walking on the Red Brick Path: A Portrait of African-American Women's Experiences with the Built Environment of a Predominantly White Institution" (2010). Electronic Theses and Dissertations. 349. | https://digitalcommons.du.edu/etd/349/ |
1289 S. Torrey Pines Dr.
Las Vegas, NV 89146
Main Number: 1-702-258-9895
Toll Free: 1-888-258-9895
member station
Among the easiest gardens to establish, maintain and use, even here in the challenging Mojave, are herb gardens. This of course, begs the question: “What’s the definition of an herb?” There really isn’t any clear-cut definition; we could simply describe it as a plant that isn’t a tree, a vine or a shrub. Frequently (but not always) it has a noticeable flavor or an aroma that attracts us. We usually think of them as seasonings, but many of them have a history of medicinal. Before people had local pharmacies where they could obtain medications for their various ailments, they went out to the garden or field to find whatever possible remedies were growing around. The healing properties of some herbs are still widely recognized; think of aloe for burns and other skin problems. Even if people do not now produce fennel and mint to ease an upset stomach, or grow “rosemary for remembrance” as old English herbalists would say, they’re still attractive plants that survive in the Southern Nevada environment.
These days, even though we rarely have to rely on herbs to deal with our infirmities, many of them are pretty and simple to grow. Gardeners in this region have good reason to complain about our difficult environmental conditions, but with just a little extra attention, many herbs grow easily in Southern Nevada landscapes. Even more are perfect for a windowsill garden.
Here are a few herbs you can try here Southern Nevada. They thrive in full sun, although they might not all do terrifically well during the hottest days of July and August. Then again, who does?
Aloe is the genus of a large number of desert plants that are common in xeriscape, but they can grow perfectly well in pots. Some can grow to be four feet tall and as just as wide when they’re planted outside. Since they did not originate in the Mojave, they need to be protected from chilling. Botanically, what we call aloe vera is actually Aloe barbiensis, but say the word “aloe”, and it means the same thing to most of us.
Fennel can grow to be four to five feet tall. When planting the seeds, just put a very thin layer of soil over them, and keep them about one foot apart. Don’t try transplanting them; this isn’t one to start indoors.
Some of us think of garlic as a vegetable, even a food group unto itself, but for others, it is a culinary herb. This, despite research indicating it may be beneficial for anything from atherosclerosis to tuberculosis. Individual cloves are planted, pointed end up - four inches deep and four inches apart – in the fall and harvested in the spring. Healthy plants have rich green leaves that contrast with other colors in the garden. They are also reputed to repel insects and diseases from other plants.
Peppermint is often used for digestion. It can get up to three feet tall. If you’re planting it in a bed put the plants about 18” apart. Remember though, that this and any of the mints are mighty aggressive. To prevent it from overrunning your entire garden, grow it in a pot.
Rosemary is so common in Southern Nevada landscapes that we might forget it’s an herb. And, In addition to its supposed memory-improving properties, some research indicates it might be a baldness cure! Some varieties can grow to six feet tall, although there’s also a prostrate cultivar that can be a ground cover.
Duke University Medical School has a demonstration herb garden that’s part of its History of Medicine collection. If you look at the University of Maryland website there’s an extensive list of herbs and their medicinal uses, along with precautions concerning them. That’s definitely something to take a look at before you start thinking about using any herb medicinally.
For KNPR’s Desert Bloom, this is Dr. Angela O’Callaghan of the University of Nevada Cooperative Extension. | https://knpr.org/knpr/2013-11/herb-gardens |
Turmeric is a spice grown in India and other tropical regions of Asia. It has a long history of use in herbal remedies, particularly in China, India, and Indonesia. The root and rootstock, or rhizome, of the plant contain curcumin, which is considered to be the active ingredient. Curcumin is not related to cumin, which is a spice made from the seeds of a different plant.
Overview
Turmeric is a common food flavoring and coloring in Asian cooking. Animal and laboratory studies have found that curcumin, an antioxidant that is an active ingredient in turmeric, demonstrated some anti-cancer effects in the lab. But human research is needed to determine curcumin’s role in cancer prevention and treatment in people. Several types of cancer cells are inhibited by curcumin in the laboratory, and curcumin slows the growth and spread of some cancers in some animal studies. Clinical trials are underway to find out if it can help humans as well.
Curcumin is being studied to find out whether it helps other diseases such as arthritis, Alzheimer’s disease, and stomach ulcers. It is also being studied to see whether it can help lower “bad cholesterol” and improve outcome in kidney transplants. A few early studies have been done in humans, but much more human research is still needed to find out if curcumin can be effective in these uses.
How is it promoted for use?
Some proponents believe turmeric may prevent and slow the growth of a number of types of cancer, particularly tumors of the esophagus, mouth, intestines, stomach, breast, and skin.
Turmeric is promoted mainly as an anti-inflammatory herbal remedy and is said to produce fewer side effects than commonly used pain relievers. Some practitioners prescribe turmeric to relieve inflammation caused by arthritis, muscle sprains, swelling, and pain caused by injuries or surgical incisions. It is also promoted as a treatment for rheumatism and as an antiseptic for cleaning wounds. Some proponents claim turmeric interferes with the actions of some viruses, including hepatitis and HIV.
Supporters also claim that turmeric protects against liver diseases, stimulates the gallbladder and circulatory systems, reduces cholesterol levels, dissolves blood clots, helps stop external and internal bleeding, and relieves painful menstruation and angina (chest pains that often occur with heart disease). It is also used as a remedy for digestive problems such as irritable bowel syndrome, colitis, Crohn’s disease, and illnesses caused by toxins from parasites and bacteria.
Because lab studies suggest that curcumin can help slow the growth of cancer cells, some people say that it can do the same in humans.
What does it involve?
Turmeric root is on the Commission E (Germany’s regulatory agency for herbs) list of approved herbs, used for dyspepsia (upset stomach) and loss of appetite. It is available in powdered form as a spice in most grocery stores. It can also be made into a tea or purchased as a tincture, capsule, or tablet, and is sometimes sold in combination formulas with other herbs. Ointments or pastes made from turmeric can be applied to the skin. Although there is no standardized dose for turmeric, some practitioners recommend taking a teaspoon of the powdered spice with each meal. The dried root of turmeric normally contains from 3% to 5% curcumin.
Because curcumin is thought to be the most active component of turmeric, many buyers seek out purer formulas of curcumin rather than whole turmeric. Some sellers market supplements that claim to be standardized to contain 95% curcumin compounds. Others sell mixed products that are supposed to promote the absorption of curcumin into the bloodstream.
What is the history behind it?
The use of turmeric was described in traditional Chinese and Indian medicine as early as the seventh century AD. In various Asian folk medicine traditions, turmeric has been used to treat a long list of conditions, including diarrhea, fever, bronchitis, colds, parasitic worms, leprosy, and bladder and kidney inflammations. Herbalists have applied turmeric salve to bruises, leech bites, festering eye infections, mouth inflammations, skin conditions, and infected wounds. Some people inhale smoke from burning turmeric to relieve chronic coughs. Turmeric mixed with hot water and sugar is considered by some herbalists to be a remedy for colds.
In India and Malaysia, there is a custom of making turmeric paste to apply directly onto the skin, a practice now under study for the possibility that it may prevent skin cancer. The bright red forehead mark worn by some Hindu women is sometimes created by mixing turmeric with lime juice. Chefs frequently add turmeric to their creations because of its rich flavor and deep yellow-orange color. The seasoning is an important ingredient in Indian curries. It is also used to add color to foods such as butter, margarine, cheese, and mustard; to tint cotton, silk, paper, wood, and cosmetics; as a food preservative; and to make pickles.
What is the evidence?
Curcumin, an active ingredient in turmeric, is an antioxidant. Antioxidants are compounds often found in plants that can protect the body’s cells from damage caused by activated molecules known as free radicals. Laboratory studies have also shown that curcumin interferes with several important molecular pathways involved in cancer development, growth, and spread. Researchers have reported that curcumin inhibited the formation of cancer-causing enzymes in rodents. | http://csglobe.com/turmeric-curcumin-kills-cancer-cells/ |
Ibsen's herb garden
Dømmesmoen in Grimstad – one of the country's most stunning parks – is home to Ibsen's herb garden, featuring plants used in medicine in the mid-1800s.
Ibsen's herb garden is a true gem in the beautiful park at Dømmesmoen. Discover herbs of former pharmaceutical importance – the same species as Henrik Ibsen used when preparing medicines as an apothecary's apprentice in Grimstad (1843–1850). The herbs have been arranged in groups according to the ailments for which they were used. I.e. medication for healing various conditions relating to the mind, skin, stomach, intestines, bile, lungs, mouth, bladder/kidneys, heart, and rheumatism. There are also herbs believed to heal pain and cramps, and herbs used in cooking.
The herb garden is at its best in June and July, but is worth a visit all year round. Explore on your own, or experience the park and herb garden together with one of our competent guides. Guided tours can be booked via Grimstad Tourist Office. | https://www.gbm.no/norsk-hagebruksmuseum/en/ibsens-herb-garden/ |
Inflammation is both a root cause and a symptom in a wide variety of health conditions. Eating a plant based diet and that includes herbs is in itself anti-inflammatory, as opposed to a meat and dairy heavy diet. Almost all herbs and plants are anti-inflammatory to some degree, some with a more pronounced action than others where the effect is secondary yet still an important part of the overall synergistic effect of the herb. Since this makes a complete listing of all plants with any inflammatory action quite long, the herbs listed below are just a subset of the more potent ones. Anti-inflammatory herbs can be used to decrease inflammation and painful swelling in arthritis , skin disorders, and may have an important role in the prevention of cancers and other serious conditions linked to chronic inflammation. | https://anniesremedy.com/antiinflammatory-property-5.php |
There’s no question about it. Modern techniques of farming as well as livestock rearing have given us larger and better-shaped vegetables as well as good-looking meat, however what’s taken place to the preference?
So what do you do when you wish to try as well as obtain a bit much more taste back into your food? Do what our ancestors have been doing for centuries by making normal use of herbs for food preparation. The ideal choice of herbs can make the blandest of dishes tempting as well as exciting – even more so when they are fresh from your very own natural herb yard.
The Cook’s Herb Yard Plan
When created your herb garden will certainly supply you with a conveniently available supply of all the natural herbs you desire in generous quantities. Don’t stress if you have never ever grown herbs prior to.
I don’t intend to inform you everything about natural herb horticulture in this article, but if you adhere to the actions I have actually recommended you’ll have a good layout and also strategy that will certainly lay a foundation for cultivating all the plants you need.
4 Actions to Produce Your Natural Herb Garden Plan
1. Pick Your Herbs
The very first thing you need to do is determine which herbs you wish to expand. As well as leave out some of the others that are essentials for your food preparation if you don’t invest some time thinking regarding this you’ll finish up growing some you do not need.
There are 100’s of herbs to pick from that you could consist of in your strategy. You require to understand about the optimal conditions for each of your chosen natural herbs so that you can place them appropriately in the yard you’ll establish as soon as you have actually generated your strategy.
Start picking your natural herbs by jotting down a list of the ones that you know with or that are generally used in cooking. In your checklist compose the names first, but leave area to additionally write down the kind (yearly or seasonal), the most effective position (bright, shade) and also ideal dirt problems (well-drained, moist etc). Additionally leave space to include the height that each plant will expand to.
Now prolong your list with other herbs. Consider picking from the complying with herbs that are frequently used in cooking – sage, tarragon, marjoram, basil, lemon thyme, fennel, chives, parsley, rosemary, bay, thyme, mint and also garlic.
You’ll need to do some research to finish your listing, yet this is a really crucial step in developing your strategy. When your listing is completed it should include the names of twelve approximately herbs as well as the additional info I defined above.
2. Select Area & Pick a Natural Herb Garden Design
Ideally your natural herb garden should be near the kitchen area to ensure that it’s easy to harvest the herbs fresh when you need them. An excellent dimension for the yard is 4ft x 6ft. This should enable you to plant all the herbs on your listing, consisting of a number of bushy perennials. Attempt and also pick a spot which is south dealing with. , if some of the herbs you have actually selected need a dubious area strategy to use the larger plants such as tarragon, and also, and bay to shade them.
.
The easiest herb yard style to pick is a rectangular shape, yet additionally think about various other layouts such as the “island” and also the increased bed. Or think about developing a long herb garden boarder (excellent if you have a bright wall surface in your yard). Selecting your layout can be lots of fun. Below once more, do some study and attempt on various layouts in your local library or on the web.
The right option of natural herbs can make the blandest of recipes amazing and appealing – also extra so when they are fresh from your own herb garden.
As soon as we loved these marijuana seeds 4 sale at Marijuanaseedsavings created your natural herb yard will certainly provide you with a quickly accessible supply of all the herbs you want in charitable quantities. You require to understand regarding the excellent conditions for each of your picked natural herbs so that you can place them correctly in the garden you’ll create when you have actually created your plan.
Preferably your natural herb yard must be near the cooking area so that it’s very easy to harvest the herbs fresh when you require them. Or believe concerning developing a lengthy herb yard boarder (good if you have a bright wall in your garden). | http://bloonstdbattleshack.com/natural-herb-yard-plans-easy-steps-for-the-herb-gardening-newbie/ |
Description:
Phellodendron amurense Rupr. is a species of tree in the family Rutaceae, commonly called the Amur cork tree. It is a major source of huáng bò, one of the 50 fundamental herbs used in traditional Chinese medicine.
It is a medium-sized deciduous tree grows to between 30′ and 45′ tall. Generally trees are significantly wider than they are talland the branching is broad spreading
short main trunk and several large main branches. Most trees frequently become almost flat-topped with maturity and picturesque branching.
Summer Foliage:->…..
Leaves are opposite and p innately compound. 5 to 11 leaflets per leaf and leaves are 10″ to 15″ long, leaflets are 2.5″ to 4.5″ long . The leaf color is a very nice, lustrous dark green. Crushed foliage gives off a turpentine odor.
Autumn Foliage:->CLICK & SEE
yellow and short-lived ,not especially showy
Flowers:->CLICK & SEE
Dioecious, with male and female plants. Flowers are small and greenish-yellow, not ornamentally significant and blooms in late May and early June.
Fruit:–> CLICK & SEE
Pea-sized fruits that change from green to black , aromatic when crushed. Only on female plants held in clusters
Bark:–CLICK & SEE
Conspicuously ridged and furrowed, light gray color.Bark is soft and cork-like to the touch, attractive in a subtle way.
Cultivation:
Prefers a moisture retentive well-drained deep rich loam in full sun. Prefers a neutral to alkaline soil. Succeeds in shallow chalky soils. Grows best in areas with long hot summers. Plants are gross feeders and require a rich soil if they are to perform well. Dormant plants are fully hardy in Britain, but the young growth is liable to damage from late spring frosts. The leaves are aromatic. This species is occasionally cultivated for timber in S.E. Europe. Dioecious. Male and female plants must be grown if seed is required.
Propagation:
Seed – best sown in the autumn in a cold frame. Stored seed requires 2 months cold stratification, sow in late winter in a cold frame[78, 113]. Germination is usually good. When they are large enough to handle, prick the seedlings out into individual pots and grow them on in the cold frame for their first winter. Plant them out into their permanent positions in late spring or early summer, after the last expected frosts. Cuttings of half-ripe wood, 7 – 10cm with a heel, July/August in a frame. Pot up in autumn and over winter in a cold frame. Fair to good percentage. Root cuttings – obtain in December and store in leafmold in a warm place for 3 weeks. Cut into 4cm lengths and plant horizontally in pots. Grow on in a warm greenhouse. Good percentage[
Medicinal Uses:
Anti-inflammatory, antipyretic,Antibacterial; Bitter; Cholagogue; Diuretic; Expectorant; Hypoglycaemic; Ophthalmic; Skin; Stomachic; Vasodilator.lowers blood sugar.
Amur cork tree, called Huang Bai in China, is commonly used in Chinese herbalism, where it is considered to be one of the 50 fundamental herbs, but one that should be used with care. A strongly bitter remedy, the bark acts strongly on the kidneys and is regarded as a detoxicant for hot damp conditions. Recent research has shown that the plant is useful in the treatment of meningitis and conjunctivitis. Huang Bai should only be used under professional supervision and should not be take during pregnancy. The bark is alterative, antibacterial, antirheumatic, aphrodisiac, bitter stomachic, cholagogue, diuretic, expectorant, febrifuge, hypoglycaemic, ophthalmic, skin, vasodilator and tonic. It is taken internally in the treatment of acute diarrhoea, dysentery, jaundice, vaginal infections including Trichomonas, acute urinary tract infections, enteritis, boils, abscesses, night sweats and skin diseases. It is commonly used in conjunction with Scutellaria baicalensis and Coptis chinensis in a preparation called ‘injection of three yellow herbs’. It is given intramuscularly for upper respiratory tract infections. The bark of 10 year old trees is harvested in the winter or spring and dried for later use. The fruit is expectorant
Purges heat, detoxifies, clears damp heat. Used for infections and inflammation with possible symptoms of discharge from the anus, vagina, or penis. It also is customarily used for night sweats, afternoon fever, and nocturnal emissions. Phellodendron is an effective herb used topically for sores and damp heat conditions of the skin.
You may click to see :->What Are the Medical Uses of Phellodendron Amurense?
Safety: Phellodendron should not be used by those with spleen or stomach deficiency with or without diarrhea.
Other Uses:
Cork; Dye; Insecticide; Oil; Wood.
A yellow dye is obtained from the inner bark. An oil obtained from the seed has insecticidal properties similar to pyrethrum. Wood – heavy, hard, strong, close grained. Used for furniture. The bark is a cork substitute
The mature gray-brown bark is decorative, with ridges and furrows in a cork-like pattern. A suitable tree for large lots and park landscaping, which is generally free of pests. Very tolerant of soil conditio.
Disclaimer:
The information presented herein is intended for educational purposes only. Individual results may vary, and before using any supplements, it is always advisable to consult with your own health care provider.
Resources: | https://findmeacure.com/2010/09/30/phellodendron-amurense/ |
Those new to the art and science of growing herbs need to know the importance of the soil that will be used. No matter how much sunlight the plant gets or how often it is watered, without the proper soil mixture, the herb will not reach its maximum potential and may not even grow.
The most important thing that you need to know about growing herbs is that most, if not all of them, will flourish under a variety of soil types. A lot of them of course will blossom more quickly if the land is moist, but too wet a surface will spoil the plant. Another potential problem will be the drainage system, because the lack of it will hamper the growth of the plants.
If you plan on growing herbs like rosemary and sage, they require very good drainage systems aside from quality oil. Even if the soil is of good quality, without a good draining system it will be of no use because the plants will not benefit from it. The best way to remedy this situation is by raising the beds and adding compost (about 100 sq ft per prior to plating).
Contrary to popular belief, growing herbs in high fertility soil is not recommended, and it is better to use the low or medium fertility types. When you use the high fertility kind, the end result will usually be herbs with plenty of leaves but poor flavor. If you use the low to medium types, the maximum flavor will be attained.
Be careful when you use fertilizers. Although you may be tempted to use plenty of fertilizers for growing herbs because you used the low fertility type, such is not the case. The properties inherent in low and medium soil will be sufficient to nourish the plants, together with the appropriate draining system and of course, sunlight and watering.
The amount you need to do regarding the latter will depend on the prevailing conditions of course. The hotter it is, the more frequently you will need to moisten the soil. However for the most part, you will be able to determine the amount necessary by checking if it is moist. If it is, there is no need to water it.
Because growing herbs depend a great deal on the soil, it is important that you spend the time needed for researching and working on it. The more time you invest in this aspect of gardening, the more satisfying the results of your labors will be. | https://www.herbatorium.com/282/the-importance-of-soil-in-growing-herbs/ |
Dasapushpam (The Ten flowers) are a group of ten herbs, which have a very important place in the healing & spiritual tradition of Kerala. These sacred herbs were used to worship and to make medicines. The Ayurveda healers of Kerala have been using the Dasapushpam traditionally to make oils to fight skin diseases, especially in infants. Most of the herbs in this group has strong proven anti-microbial activity and can prevent an array of skin diseases. The oil made out of Dasapushpam is a good solution to day to day skin problems like dry skin and help to achieve a lustrous complexion. Therefore Dasapushpam oil was used to massage the new-born daily before a herbal bath. This practice ensured proper build up of immunity in the new born and adequate skin care.
Ayurveda utilizes various herbal preparations to rejuvenate the body and cure diseases. Fairly good collection of plants over 200 taxa used in Ayurveda include Dasapushpam, The ten sacred Flowers / Plants have a very important place in the healing & spiritual tradition of Kerala and its culture.
As per the Tradition of Kerala, the women wears Dasapushpam garland on their head for it was considered sacred. In front of the household shrine, the ten sacred plants of dasapushpam were displayed in a gleaming brass plate in the Malayalam month of Karkkidakam (the monsoon season in Kerala) in the olden days. It was also prescribed by the rajavaidyas (doctors of the king) to the ladies to wear these plants on their head, due to the medicinal value imparted by them. | https://aarshaveda.com/blogs/news/the-10-sacred-flowers-dasapushpam |
Herbal medicine is the use of plant based medicine to treat disease and enhance wellbeing. It is the oldest and still the most widely used system of medicine in the world today.
Herbal medicine is increasingly being validated by scientific investigation which seeks to understand the active chemistry of the plant. Many modern pharmaceuticals have been modeled on, or derived from chemicals found in plants. An example is the heart medication digoxin derived from foxglove (Digitalis purpurea). Using plants as medicine provides significant advantages for treating many conditions, as the therapeutic activity of a plant is due to its complex chemical nature with different parts of the plant providing certain therapeutic effects.
As a Naturopath and Herbalist Rebecca has an understanding of the consciousness of herbs which allows her to form an insightful relationship with each client in order to be able to select herbs that can assist each person's consciousness, mind and body to heal, to resolve, to develop and grow.
Illness is a reflection of the consciousness, body and mind being out of balance. A person's balance can be restored through the use of herbs, by the body absorbing the essence and physiological effect of plant based medicine, it will begin to heal and restore itself- regaining balance.
Herbal remedies are used to treat a wide range of disorders including colds and flu, upper (sinus) and lower (asthma/bronchitis) respiratory conditions, digestive complaints, anxiety, depression, arthritis, high blood pressure, insomnia, male and female hormonal imbalances, migraines, skin problems such as eczema, weight lose and many more. | https://www.rebeccacooknaturopathy.com/herbal-medicine |
Aromatherapy involves the use of essential oils, often through massage. Individual blends are prepared by the practitioner, in a base of cold pressed oil and then applied to your skin through a relaxing massage.
As a holistic treatment, aromatherapy can have a profound effect on your physical and psychological well-being. There exists the belief that scent, as the most enduring of our senses, has the power to transform our emotions, and heal our bodies.
Essential oils used in aromatherapy are extracted from plants and herbs to treat conditions ranging from infections and skin disorders to immune deficiencies and stress. When aromas are detected in the nasal cavity, impressions associated with previous experiences and emotions are created. Combining this with the fact that the parts of the brain that control heart rate, blood pressure, breathing, memory, stress levels and hormone balance are also related to the nasal cavity, it is evident that the use of essential oils contributes to and achieves many beneficial effects. | http://www.sub-4.co.uk/march-offer-35-instead-40-60-mins-aromatherapy-massage/ |
Amala Soumyanath led the research that discovered piperine as a potential treatment for vitiligo. Here she tells the story from her personal point of view and brings us up to date with current developments:
A Personal Passion: My First Introduction to Vitiligo
My connection with vitiligo began on an ordinary working day at King's College London - almost 20 years ago! As a registered pharmacist with a Ph.D, I held a faculty position in the Department of Pharmacy, where I taught and led a research group in my favorite subject – pharmacognosy, the scientific study of medicinal agents from nature. One day, our of the blue, I received a telephone call from a "Maxine Whitton of the Vitiligo Society." She stated that a member had received a Chinese herbal prescription with several named plants, and asked if I could find out if any of them might be estrogenic. I agreed to help, but the first thing I had to do was to look up what "vitiligo" was! I was surprised to discover that "vitiligo" was the name of a skin disorder that I had observed in multiple individuals. The condition is characterized by patches of depigmented skin, and I already knew of it by another name, "leucoderma." As a pharmacist and scientist studying medicinal plants I was immediately intrigued by the disease, its causes, and the fact that PUVA therapy for vitiligo, was based on psoralens which are derived from plants. I also learned that there was no really effective treatment for vitiligo. I decided right then to apply my scientific skills to search for a new treatment, and that this search would begin with plants used in traditional herbal medicine. Little did I know that I would go on to develop vitiligo myself, making my pursuit of a treatment more than just an interesting research project.
The Discovery of Piperine
The first step was to research and compile a list of herbs described in different herbal medicine systems for the treatment of vitiligo. We focused on Ayurvedic and Chinese medicinal plants as these systems were well documented. The first graduate students to work on this project were Dania Kowalska and Zhixiu Lin. We obtained plant samples, made extracts of these herbs, and developed a method to test them for the ability to stimulate melanocyte (pigment cell) growth . This property would be necessary to repigment vitiligo patches. The cells we used were mouse melan-a cells grown in culture dishes and were provided by Professor Dorothy Bennett, St. Georges Hospital, London an expert in melanocyte biology. Out of almost 30 herbs we tested- one extract stood out! A water extract of black pepper not only made the pigment cells grow faster, it also made them put out finger-like projections called dendrites which are important for their function in the skin. One component from black pepper, a compound called piperine, also showed the same effects . In pharmaceutical parlance, piperine represented a "lead" molecule, one that could be developed, in original or modified form, for use in treating a disease.
Validating Piperine as a "Lead" Molecule
Our early work was supported by pilot grants from the Vitiligo Society UK and the Institute of Chinese Medicine, UK. A donation of £250 from the Gulam K Noon Foundation allowed us to buy a multichannel micropipettor, an essential piece of lab equipment! However, once we had our lead compound, I was able to raise substantially larger funding (£200,000) from BTG plc, a UK technology transfer company. My research also brought me into close contact with the Vitiligo Society UK. I was honored to serve the Society as a council member and secretary for a number of years. This valuable experience gave me a greater understanding of the issues and difficulties faced by people with vitiligo.
Over the next few years (1997–2002), we completed additional studies at King's College London, in which we made chemical variations (analogs) of piperine and tested them for their ability to stimulate melanocyte proliferation in culture dishes . Two analogs of piperine, abbreviated to THP and RCHP, showed particularly good activity, so we then tested piperine, THP and RCHP for effects on skin pigmentation in mice. We were thrilled to find that all three compounds were able to stimulate the growth of pigment cells in a special strain of lightly pigmented mice, causing their skin to visibly darken. This effect was enhanced if we used UV light in addition to the compounds . Essential to this research were collaborations I had established with Professor Robert Hider (a medicinal chemist) and Professor Antony Young (a photobiologist), and the dedication and hard work of Radhakrishnan Venkatasamy (a graduate student) and Dr. Laura Faas (a postdoctoral fellow). These studies allowed us to secure international patents for the use of piperine and its analogs to treat vitiligo.
Keeping the Vitiligo Fire Burning
At this point, I had an exciting development in my personal life – I got married and relocated to the USA. I left King’s College London in late 2002, and found employment as a research faculty member in the Department of Neurology at Oregon Health & Science University (OHSU), Portland, Oregon. Although the emphasis of my research shifted to studying herbs used in neurological diseases, I had not forgotten piperine and vitiligo! The Department of Neurology Chair, Dr. Dennis Bourdette, was very supportive of my continuing this work, so I set about making contacts at OHSU who could help move the piperine project forward.
Having shown effectiveness in cells and in mouse skin earlier in London, my next goal was to move toward testing piperine in humans. OHSU incorporates a medical school, research centers, and most importantly, a hospital. The Department of Dermatology has a strong research focus, and I approached Dr. Andrew Blauvelt, who worked in that department, to support my efforts. This led to an introduction to dermatologists Dr. Eric Simpson and Dr. Ben Ehst, with whose help I developed a detailed plan (protocol) for a clinical trial of piperine in patients with vitiligo. However, prior to actually performing a clinical study, it was important to get more data on piperine's effects on human pigment cells, as opposed to cells from mouse skin. It was also important to investigate the safety of piperine when applied to the skin. Of particular relevance are piperine's effects on the development of melanoma (a pigment cell cancer). I was fortunate to find, and enlist the support of Dr. Philippe Thuillier, an expert in skin cancer studies and an assistant professor at OHSU’s Department of Public Health and Preventive Medicine. Our experiments, funded by AdPharma, Inc., showed that piperine does indeed stimulate the replication of human melanocytes in culture, including those from uninvolved skin of a vitiligo patient. We used cell lines that were kindly provided by Dr. Caroline lePoole of Loyola University, Chicago. Piperine also stimulated human melanocytes when grown within a reconstructed skin model . For this project we had excellent support from colleagues in OHSU's Biomedical Engineering and Dermatology departments (Professor Steven Jacques, Dr Kevin Phillips and Ravikant Samatham) who used innovative optical methods to image pigmentation and melanocytes in the skin models .
Significantly, and in agreement with other laboratories, we found that piperine has an inhibitory effect on cultured melanoma cells and prevents melanoma cell growth in a reconstructed full skin model . To further this aspect of our study, we have introduced the HGF mouse model of melanoma (developed by the National Cancer Institute) to OHSU with the help of funds I raised from OCTRI (the Oregon Clinical and Translational Research Institute). We are presently studying the effects of piperine in this model with funding from the Department of Dermatology's Jesse Ettelson Fund for the Advancement of Dermatology Research. These ongoing studies are important to establish the safety of piperine.
Heading for the Homestretch: Will Piperine work in humans?
In July 2013, this project received a tremendous boost with the appointment a new chair of dermatology, Professor Sancy Leachman. Dr. Leachman is a dermatologist and research scientist. Fortuitously for this project, Dr. Leachman is an expert in pigment cell biology, and has a particular interest in pigment cell disorders such as vitiligo and melanoma! She is extremely enthusiastic about this project and has pledged her commitment and expertise to developing piperine as a new treatment for vitiligo. As a bonus, she has also brought two additional team members on board. The first is Dr. Pamela Cassidy, a medicinal chemist with experience in skin culture techniques, and with the HGF mouse model of melanoma mentioned earlier. The second addition is Eric Smith, a talented scientist with expertise in the immunohistochemical evaluation of skin samples.
My Personal and Professional Commitment to Discovering a Treatment. Will Piperine Treat Vitiligo?
So, a simple phone call from Maxine Whitton (recently awarded an MBE for her services to vitiligo), the spark of an idea, and a good measure of commitment and persistence on my part have brought piperine to the brink of being tested in humans. It has been rewarding to apply my knowledge of the drug development process to such an exciting and potentially groundbreaking project. This has only been possible due to the support of all the excellent collaborators, postdoctoral fellows and students who have joined and supported my vision for piperine and vitiligo, with their unique areas of expertise. As mentioned earlier, my goal to develop piperine as a treatment for vitiligo has an additional personal impetus. In 2006, after a vacation in Central America, I too developed vitiligo. I now have noticeable patches on my face, hands and legs. I feel privileged that my research has led to new hope of a treatment for this difficult condition.
I am determined to continue research on piperine and vitiligo – to evaluate its efficacy in humans and to understand more about its effects on melanocytes. The piperine project has attracted the dedication and commitment of a talented team of researchers at OHSU – a world renowned center with outstanding facilities for clinical and basic science research. At the project helm is Dr. Sancy Leachman, an experienced dermatologist and pigment cell expert, and has my continued dedication and scientific vision as initiator and ongoing champion of this project. If we are able to define how piperine works and to demonstrate the safety and efficacy of piperine in a small "proof of concept" human study, this would be sufficient to attract a large pharmaceutical company to move forward rapidly with a product for treating vitiligo. Sadly, the missing element is funding for these studies. We continue to approach standard funding sources, but response time is slow and resources are limited. With this excellent team ready to get to work on this project, we hope to accelerate the pace of the project by reaching out to the general community for funding. Funds raised will support our ongoing studies on piperine at both the clinical and basic science levels. With the high incidence of vitiligo worldwide, donations of any size from those affected by this condition would soon add up and make a real difference to our rate of progress.
You can support our research on piperine for vitiligo, by making an online donation to our Vitiligo Research Fund.
I thank you in advance for your support.
Amala Soumayanath
References
- Lin ZX, Hoult JR, Raman A. Sulphorhodamine B assay for measuring proliferation of a pigmented melanocyte cell line and its application to the evaluation of crude drugs used in the treatment of vitiligo. J Ethnopharmacol 1999; 66(2): 141-150
- Lin Z et al. Stimulation of mouse melanocyte proliferation by Piper nigrum fruit extract and its main alkaloid, piperine. Planta Med 1999; 65(7): 600-603
- Venkatasamy R et al. Effects of piperine analogues on stimulation of melanocyte proliferation and melanocyte differentiation. Bioorg Med Chem 2004; 12(8): 1905-1920
- Faas L et al. In vivo evaluation of piperine and synthetic analogs as potential treatments for vitiligo using a sparsely pigmented mouse model. British Journal of Dermatology 2008; 158: 941-950
- Thuillier P et al. Effects of piperine on human melanocytes and melanoma cells in vitro. Manuscript prepared, awaiting submission.
- Samatham R et al, Progress in Biomedical Optics and Imaging - Proceedings of SPIE 7883 , art. no. 788309, 2011. | https://www.ohsu.edu/xd/health/services/dermatology/giving/soumyanath.cfm |
Most herbs are easy to grow once you understand their habits and the conditions they prefer. Herbs can be classified into six main plant types.
Annuals
Annuals live for only one growing season. They die after flowering and producing seed. (eg. dill, coriander, salad rocket). Some plants that would be perennial (ie. everlasting) in their native conditions, but cannot tolerate our Irish winters, are treated as annuals (eg. basil, lemongrass).
Biennials
Biennials live for two growing seasons. In the first year they provide plenty of green leaves, in the second year they flower, produce seed and die. (eg. parsley, chervil).
Herbaceous Perennials
Herbaceous Perennials are long lasting plants that die back in winter.
(eg. chives, lovage).
Evergreen Perennials
Evergreen perennials are long lived plants that retain their foliage all year. (eg. oregano, clove pinks).
Evergreen Shrubs
Evergreen Shrubs also retain their foliage throughout the year. Most shrubby herbs are of Mediterranean origin (eg rosemary, sage, thyme, lavender).
Trees
Generally, trees are not thought of as herbs, but many of them are important medicinal plants (eg elder, hawthorn, gingko).
SITUATION
Contrary to the popular opinion that all herbs need a sunny site, many thrive in moist, semi-shaded conditions. Plants that produce lush, green leaves (eg parsley, chives, chervil, sorrel) will do well in partial shade. In full sun the leaves will be tougher & tend to scorch. Plants with small or narrow, tough leaves generally need full sun and well-drained soil, to thrive (eg lavender, rosemary, sage, thyme).
PROPAGATION
Seed Sowing
All hardy annuals, biennials and hardy perennials can be sown directly outdoors, from about the middle of April through to September, into a well-prepared seedbed. Rake in lightly and keep well watered and weeded, until the plants are established. Plants produce seed after they have flowered, so in natural conditions they self-seed from late summer through to early winter.
Tender annuals and perennials are best sown in spring, in pots, plug trays or modules. Use a fine, seed grade compost. Fill pots or trays to the brim with compost. Tap the pot or tray to settle the compost, and top up if necessary. The compost needs to be neither too loose or too compacted. Water the sowing containers well and allow to drain.
Sow seed sparingly on the surface. Cover larger seed with its own depth of compost or vermiculite. Cover the container to retain warmth and moisture and check every few days for signs of germination. Do not allow the surface of the compost to dry out. If necessary, use a hand mist sprayer to gently water the surface, without dislodging the seeds. When the seed has germinated, move the trays into the light, but protect from strong direct sunlight.
When the young seedlings have produced two true leaves (or are about 4cm in height) it is time to pot them on. Water the pots or trays and allow to drain. Transplant the seedlings into small pots. (I use 8cm square pots). Treat the seedlings gently. Rough handling of stems or roots of the young seedlings at this stage will set them back. It is really important to ease the seedlings out of their pots or modules. Squeeze them from underneath to loosen the root ball of the the young plants. It is best to handle the leaves only and preferably without using any gloves. If you need to use gloves, (and many people do due to skin conditions or allergies) you can buy surgical gloves from most pharmacies.
When the seedlings have been potted on, they need to be watered. Use the finest watering setting on your hose or watering can. Keep the young plants out of direct sunlight for a week or so, until they are perking up and looking happy.
Before planting out into the garden, containers on the balcony, window boxes or hanging baskets, the plants need to be 'hardened-off'. This means you gradually acclimatise them to their final growing positions. If the weather is nice, warmish, and not too wet or windy, put the plants outside during the day and bring them back into shelter overnight. Do this for a couple of weeks. When all danger or frost is over, plant your herbs into their final position.
If you are growing them in the garden, you just need to remember to keep them well watered in the first few weeks, especially if the weather is dry. They will establish very quickly and thrive. In no time they will need very little care apart from a tiny bit of weeding. You will have herbs for life!
If you are growing in containers, your herbs will need a little more attention. When the weather is very dry they will need regular watering. Placing a tray under the pot will help to retain water. I will add more to the container growing section of this page soon.
Late-summer and autumn sown seedlings may need some protection over winter, ie. an unheated polytunnel, greenhouse or cloche. Horticultural fleece is also very useful.
For more detailed information on specific seed varieties, please go to the seed list. Click on the photo for basic information about plant type, propagation and growing preferences.
(Advice on propagating from stem and root cuttings will be added soon).
DESIGN
Planning your Herb Garden
The most important thing to consider when planning your herb garden is its location. It needs to be as close as possible to your kitchen, so that it only takes a minute to run out and pick some herbs, even if you are in the middle of cooking. It is also a good idea to grow your favourite herbs beside a path, or patio, if you have one. I don’t, but I have a few stepping stones placed among my kitchen herbs, so I can still access them quickly, even in awful weather, without putting on rain gear and wellies.
The next thing to consider is the aspect and the soil. A reasonable amount of sun and a little bit of shade is ideal. Refer to ‘Situation’ above.
In most cases, the actual design and structure of the garden will be determined by cost and how much you can afford, or are willing to spend. Ideally, I would love to have old brick or stone paths linking separate beds that are surrounded by box hedging. Gravel paths are cheaper and look good but they require some maintenance. Bark mulch is another option. Grass paths are inexpensive and look fine but they need to be mowed and edged regularly. For a small kitchen herb garden, paving slabs or stepping stones interspersed between the plants are a cheap and practical option.
When working on the planting plan for an herb garden, the first thing I try to imagine is how it will look during the winter months. In winter there won’t be too many pretty flowers or lush green leaves, so it is important to position your evergreen shrubs and plants first, making sure to allow them enough space to mature. These plants will form the structure of your garden, particularly in winter, when annuals and herbaceous perennials have died back.
Herbaceous perennials can then be planted in the spaces between the evergreen plants. These plants can spread very quickly, so make sure to leave adequate space for them. Lastly, use annuals and biennials to fill in the spaces between the permanent plants.
For a pleasing arrangement, height, foliage shape and colour, flowering time and colour, must all be considered. Complimentary colours placed next to each other will provide a gentle, calming effect, (eg. pink works well with blue, purple or lavender tones). Contrasting colours will create a more vibrant picture, (eg. blue with orange or yellow, red with green).
We offer a specialist Herb Garden Design and Consultancy service. If you need some advice or help with creating your own customised herb garden, contact Denise here ((insert link to contact page)).
CONTAINER GROWING
Herbs will grow quite happily in containers, once they are given adequate care and attention. Make the most use of available space by using large decorative pots, window boxes, strawberry planters and hanging baskets. Use an organic potting compost. Keep containers well watered in hot, sunny weather. Place a tray under the container to retain moisture. Container grown herbs need to be potted on each spring into a slightly larger pot, using fresh compost.
FRAGRANT AND DECORATIVE HERBS
Herbs are beautiful plants in their own right and deserve a place in the decorative garden. They provide flowers and foliage of outstanding beauty, colour and fragrance. Many also have decorative seedheads which add height and structure to the winter garden. Herbs also attract birds, butterflies, bees and many beneficial insects to the garden. Most herbs dry well and retain their scent when dried, making them useful for winter arrangements and pot-pourri.
|Decorative Flowers||Columbine, Echinacea, Elecampane, Foxglove, Hollyhock, Honesty, Meadowsweet, Monkshood, Poppies, Loosestrife, Rocket, Sweet Rocket, Telekia, Vervain|
|Decorative Seedheads||Artichoke, Columbine, Elecampane, Poppies, Teasel, Telekia, Thistle|
|
|
Fragrant Flowers
|Chamomile, Clove Pinks, Evening Primrose, Honesty, Lemon Balm, Meadowsweet, Muskmallow, Pinks, Stock, Sweet Rocket|
|
|
Aromatic Plants
|Anise Hyssop, Balm of Gilead, Chamomile, Dill, Fennel, Feverfew, Lovage, Marjoram, Oregano, Pelargoniums, Sage, Savory, Southernwood, Thyme|
|
|
Structural Plants
|Artichoke, Elecampane, Fennel, Teasel, Thistle|
|
|
Attract Butterflies and Bees
|Anise Hyssop, Aquilegia, Borage, Campion, Comfrey, Elecampane, Hemp Agrimony, Loosestrife, Mallow, Marjoram, Nettle, Oregano, Salad Rocket, Sweet Rocket, Teasel, Telekia, Thistle|
|Attract Birds||Dandelion, Fennel, Teasel, Telekia, Thistle|
ORGANIC GROWING
I am still working on this page. In the meantime you will find plenty of information on organic growing at http://organictrust.ie/
THIS PAGE IS STILL UNDER CONSTRUCTION.
MORE DETAILED INFORMATION WILL BE ADDED SOON. | http://theherbgarden.ie/index.php/using-herbs/growing-herbs/Propagation |
I am gearing up to make an all-purpose healing herbal salve. But first, I made a batch of herbal oil. In this post I share a herbal oil recipe template when using fresh(ly wilted) and/or freshly dried herbs.
There are many herbs you can choose for making a healing herbal oil. A few that I like are Yarrow, Plantain, Calendula, Comfrey and St. John’s Wort.
Herbal oils: Slow medicine for fast times
I love making herbal oils.
Like tinctures and elixirs, they take a good 6 weeks or more to make. This allows me to be my slow medicine self. Once the herbs are steeping in the oil, they can macerate for as long as it takes me to get around to them.
Rosemary Gladstar says there is some sort of magic that prevents herbal oils from going rancid while the herbs are steeping in them. Once you strain out the herbs, the oxidation clock starts ticking. It varies, but one year is kind of typical for the shelf life of a strained herbal oil.
So don’t feel bad if it takes you a few months (or a year) to get around to straining the oil.
However, there is one thing I am a little picky about when I make herbal oils: I like to have a source of warmth. Warmth of the summer heat is my preference.
A second ideal situation would be a warm place in a house, like over a radiator, a sunny windowsill, next to a heater, or on a stove top that is warm to the touch when the oven is in use (but not on a burner of course).
Yes, you can warm the oil up gently in a double boiler from time to time. I have definitely done that in the past. It works quite well. But right now I am all about embracing my inner lounger Taurus rising.
One more thing I like to do when I make oils is to moisten the herbs with a small amount of alcohol prior to adding in the oil. This helps makes a more of a multifractional extract. I wrote about this in this article Multi-Fractional Lavender Herbal Oil Recipe.
How I make herbal oils is really quite simple: mix a small enough amount of alcohol into an herb so that there isn’t any alcohol to pool at the bottom of the jar, but yet the herb is fully and equally saturated by the alcohol.
Herbal body oils for the nervous system
Another reason I love herbal oils (besides being easy to make) is that they are valuable medicine.
Herbal oils are soothing to the skin, of course. The oil medium is moisturizing and softening. But herbal oils are also simultaneously soothing to the nervous system and the immune system. I believe this to be true regardless of the individual properties of the herbs in the oil.
I wrote about this in this blog entry about Multifractional Lavender herbal Oil.
“Anything we apply to our skin is absorbed by the dermis and makes contact with the immune and nervous system very quickly (this is one of the reasons I love herbal foot baths so much, too).
“The skin is partially made up of phagocytes, a white blood cell and part of the immune system, and they are tasting everything they come in contact with.
“The body is an integrated unit. We can’t separate where the functions of one system ends and another begins. They all feed back on each other.
“The skin is a sense organ of the nervous system, a connective tissue organ and an immune organ. It has afferent nerve tissue which sends sensory information to the central nervous system. It is partly because of its connection to the nervous system and immunity that skin helps to maintain homeostasis.
“Massaging herbal oil into the skin is a way to feed and nourish the nervous system. Using pressure and heat increases the rate of absorption of constituents through the skin and thus delivers the medicine more thoroughly.”
Herbs to choose for a healing oil (and eventually for a salve)
There are many herbs to choose from when making an herbal healing oil.
Which freshly growing herbs do you have access to at this time?
At the time of writing this, it is November in the northern hemisphere. Here in Oregon herbs are still going strong, so I could choose just about anything I would’ve in June.
In a snowy, cold climate, you may have to look harder, but I bet there are a few healing herbs around.
Yarrow leaves, close to the ground.
Chickweed in protected areas sheltered from the cold wind. They thrive in the cooler, wetter shoulder seasons.
Plantain, scraggly but still tough as nails.
Maybe a few Calendula blooms. Calendula got their name because of their capability to bloom every month of the calendar.
St. John’s Wort is done, even here in our temperate climate.
But I still have a few Chamomile flowers and a vibrant patch of Comfrey. Random Roses will start to bloom around December and January (crazy, I know).
You can use dried herbs, too. If you do this, definitely use heat as part of the extraction process, like with a double boiler. You can also make a alcohol intermediary herbal oil with dried herbs.
When I use dried herbs, I like to use ones that I have freshly dried, like a few days ago to a few weeks at max. They seem to extract a little better for me than commercially available dried herbs.
But that’s just me. There are many great herbal oils out there that start with dried herbs. And I think some dried herbs extract well regardless of it they are fresh or dried. St John’s Wort is one herb to use freshly wilted, though.
Freshly wilted herbs
If you have access to fresh herbs, I recommend letting them wilt for 6-24 hours while laid out on a towel. You may cut them before wilting into smaller pieces.
Wilting allows the excess moisture to evaporate. The herbs shrink.
The slightly less watery herbs extracts a more fully because there is less water that ends up in the mixture. Fresh herbs contain quite a bit of moisture, even if they don’t feel wet to the touch.
What is a healing oil, anyway?
Before we go further, let’s talk about what a healing oil is, exactly.
Healing oil, and the healing salve it is going to be the base for, are generic terms. They are something I kind of made up but yet is a common herbal staple.
The word salve denotes what it will do: soothe, calm, heal, protect.
An herbal oil does the same. It’s just a little bit more oily.
In short, healing herbal oils are a topical remedy for skin irritations, itching, burns, bumps, bruises, scrapes, dryness.
We can format herbal oils like we do for teas and tinctures. We can make ones pain, for specific skin conditions, for soothing the nervous system, for belly aches, pelvic decongestion, varicose veins and hemorrhoids, headaches and so on.
The individual herbs have their own actions, too. I’ve wrote about St. John’s Wort and its many uses medicinal and magical. Aromatic Mugwort oil is a nice pelvic mover and subtly pain relieving, and a potent oil for rituals and dream anointment. Ginger oil is very warming, and especially nice in Sesame oil.
Chinese herbalism has all sorts of aromatic, Blood moving herbs herbs in a variety of herbs oils, and more often, herbal liniments. Myrrh is really nice in herbal oils.
List of herbs to consider for a healing salve
- Calendula
- Plantain
- St. John’s Wort unopened buds
- Comfrey leaf
- Yarrow flowers and leaves
- Arnica flowers
- Marshmallow leaves
- Chickweed
- Violet leaves
- Rose petals
- Chamomile
- Cottonwood buds
- Conifer tips or resins
There are many ways to look at the medicinal qualities of these herbs. The overlap between them is immense, meaning an herb that is a wound wort can be a skin soother and so on.
Herbs do not have one single use. They do not belong to one single “category”.
But to keep things simple, I am going to stop myself from going in too much. I want to keep this inspiring and do-able (we can study materia medica later). Still, this is just scratching the surface.
Wound Worts: Pain, Bruising, Contusions, minor cuts and scratches
St. John’s Wort – Hypericum perforatum – SJW is specific for pain, especially nerve pain. I love SJW for bruises and contusions. Anytime my kids get a bump, we rub in the SJW and most of the time a bruise won’t even form. Also great for burns.
Comfrey leaf (and root) – Symphytum officinale – This is a very mucilaginous herb. Comfrey is very soothing to the dermis and promoting healing, they are a notable skin healer when water extracted. But I think they are more of a wound wort when extracted in oil.
Yarrow – Achillea millefolium – As a water extract or a direct spit poultice, I love Yarrow for cuts, contusions, pain and bruises.
As an oil extraction, I still think Yarrow will help in those situations, but don’t use oil directly in the new cut. Wait until the cut heals before using oil or salve on the area.
Yarrow oil or salve will definitely help when the wound area has been through the initial healing stages and is stagnant, dry, crusty and surrounded by bruising, and needing some gentle blood moving qualities.
Arnica – Arnica montana – Arnica is such a wonderful healing and pain-relieving remedy for bruising and acute trauma to the skin and body.
Skin Healers: Relieving itching, irritation, cuts, stings, and inflamed, infected states
Calendula – Calendula officinalis – Calendula is a reliable antimicrobial. As a aromatic, balsamic plant, they are cleansing, drying and uplifting to stagnant, boggy, congested areas. Excellent for diaper rash (this sunny being is known for working in areas ‘where the sun don’t shine’), after a direct application of a cleansing and healing herbal poultice.
Also a good lymphatic support herb. With Violet in an oil for breast, axial (armpit) and inguinal lymphatic support.
Plantain – Plantago spp. What can I say about Plantain? Very healing to the skin!
Skin Soothers: similar to Calendula and Plantain but with more cooling, moistening, vulnerably properties
Marshmallow leaves and root – Althea officinalis – Lovely skin feel. Excellent carrier of the aromatics of other plants, like blended with powdered Rose petals or Vanilla. Decedent in rich animal fats or coconut oil. Silky smooth demulcent properties (moreso in the root).
Chickweed – Stellaria media – A itch-stopping, skin healing remedy, as well as a lymphatic supporter. I used this a lot when I had a dog with severe eczema. Softening to hardness. Effective for lipomas in dogs, take internally too.
Violet leaves – Viola odorata – Green skin cooler soother, also supportive to lymphatic tissues and functions, especially breast tissue. Softens hard edges, like Chickweed.
Aromatic skin soothers: Anti-inflammatory, soothing and cooling with a scent
Rose – Rosa spp. Imparts a very subtle Rose aroma to an herbal oil while harmonizing the whole blend into one cohesive formula. Powdered Rose petals are nice to mix into an oil or salve, for extra cooling or ritual/magical properties.
Chamomile – Matricaria recutita – I love this physician of a plant in oils where I’m looking for cleansing, anti-inflammatory and relaxing properties. Chamomile oil is especially indicated for children and babies.
Lavender – Lavandula angustifolia – Very very calming to the nervous system. Lavender herbal oil regulates, vents and chills out our emotional body, partly because this plant soothes the Liver (capitalizing because I’m thinking of the Liver from a Chinese Medicine perspective).
Conifer tips and resins – Incredibly refreshing, uplifting and yet grounding. Conifer oils are medicinal to the entire being. Use more sparingly at first, they can be potent.
Cottonwood – Populus spp. – Cottonwood oil massage on a congested chest or aching muscles affected by wind, damp and cold is one of the most kindly things you can do for yourself. That scent! Cottonwood is one of those ‘heaven on Earth” plants for me.
Basic Herbal Healing Oil Recipe
- Gather fresh herbs for your oil.
- Wilt for a day or overnight, if desired.
- Fill a jar about halfway with those wilted, freshly dried herbs.
- Pour a small amount of alcohol, grain or 40 proof like brandy or vodka into the jar and mix thoroughly with a spoon to fully saturate the herb. I use about 2 tablespoons alcohol for a half filled quart jar and about one tablespoon for a half filled pint jar.
- Let the alcohol-mixed herbs sit for a couple of hours.
- Pour your favorite carrier oil into the jar. Make sure there is about 1-2 inches of “head space” in your jar. This means there is about 2 inches of oil above the level of the herbs. Often the oil will not be directly on top of the herbs but under or in between the herbs. Wherever it is, try to make it be 1-2 inches. You will probably have to add more oil a day or two later as the herbs absorb it through the steeping process.
- Cover. Shake well! Let sit in the sun for a minimum of 6-8 weeks. It’s up to you.
- Wilted or freshly dried herbs will be less likely to cause moisture to build up in the jar and cause mold. But it is still possible. Check inside the jar frequently for moisture before you go to shake it. Wipe out with a clean, dry cloth if you see it.
- Strain through a colander or strainer, the strain again through cheesecloth.
- Label your newly strained oil and store in dark jars. Keep them in the fridge to extend their life even longer, if desired.
- Use liberally, daily even. Massage into your entire body, or just your earlobes. Use for acute pain, and for chronic achiness. Use however you please.
Sending you the soothing healing comfort of a jar of herbal oil.
Thanks for being here and thanks for playing with the plants. They are here for our nervous and immune systems and our whole being.
Take good care, | https://celialinnemann.com/2020/11/08/healing-herbal-oil-recipe-with-yarrow-plantain-calendula-and-comfrey/ |
Plant List & Reference Guide
The following chart is designed to provide a quick reference to important features of indoor plants, as well as to vital aspects of their cultivation needs. By examining this chart you can get a preliminary idea of which plants are most likely to fit into specific positions for decorative purposes, and whether or not a given plant is appropriate for the growing conditions available in any such position.
If you want to skip all the verbiage, you can go straight to the high resolution image.
Each entry relates to a particular genus. In cases, however, where certain species look very different from the rest or require a different kind of care, those species are treated separately from the genus to which they belong. Occasionally more than one species fits this secondary description. In such cases only one species is mentioned but it is followed by an asterisk (*).
A few additional comments about the above guide:
- The word “foliage” is used here to cover not only leaves but also the stems of such leafless plants as cacti.
- The guide to plant shape is a rough indicator since plants are so variable in form that precise classification is virtually impossible. Therefore, most creeping plants are listed below as “climbing / trailing,” and “bushy” refers to the general look of a plant rather than to whether or not it literally fits the accepted definition of the word “bush”. Descriptions of some plants (for instance, “globular” for many cacti) are self-explanatory.
- Many plants change their appearance as they age. Some palms, for example, become tall and upright after a period of bushy, lower growth. Descriptive terms in this chart normally apply to plants of the size most frequently available in garden stores and nurseries.
- Watering instructions and maximum and minimum recommended temperatures are usually given for both active growth and rest periods. Rest-period recommendations are omitted, however, for plants that grow actively throughout the year in normal room conditions. | https://infolific.com/leisure/plant-list-and-reference-guide/ |
In the Animal Herbalism course, we are talking right now about developing a working group of herbs we use regularly for dog and cat care, to address the minor issues our four legged friends regularly present us with. I’ve suggested students grow the herbs whenever they can, some or all of them – wildcraft if they have access to pristine areas and absolutely, 100% know the species, or simply purchase the herb in various forms from a high-quality supplier. Getting to know your plants is a long process of working with them, using them in a wide variety of ways – and growing some is about as good as it gets. In this post I thought I’d share a bit about what I grow in my own little Animal Apothecary Garden. Plants of such beauty and usefulness, I don’t know how I’d get along without them. I hope readers as well as students will consider a similar project, too.
First; while I have been studying herbs since the 1980s, I am not a master gardener! Growing these plants has been a learning curve for me as well. I do a fair bit of wildcrafting and am blessed to live where I do, in the Gatineau Hills where most places are untouched by chemicals, and vast acres of wild forest and field is all about me. Some herbal staples I regularly wildcraft include; Prunella vulgaris (Self heal), Solidago canadensis (Goldenrod), Verbena Hastata (Blue Vervain), Stellaria media (Chickweed), Plantago Major (plantain), Polygonatum biflorum (Solomon’s Seal), Agrimonia Eupatoria (Agrimony), Verbascum thapsus ( Mullein), Hypericum perforatum (St. John’s Wort) ,Sambucus canadensis (Elderflower) and the ubiquitous burdock, dandelion, stinging nettle, several violets and numerous other species. In addition I make good use of our wonderful medicinal trees, including wild cherry, yellow birch, alder, various conifers and both local populus species.
All of these make powerful wild medicines for my dogs and cats, as well as human family and household. I treat everyday issues like feline abscess, cuts and scratches, soft tissue injuries, transient diarrhea, mild urinary tract infections,an assortment of respiratory conditions, hot spots, arthritis, various mild infections and anxiety with these gifts from the woodland.
Danny investigates a Goldenrod harvest
Boneset (Eupatorium perfoliatum) is a medicine I use with kennel cough and other acute respiratory conditions.
But there are other plants I have come to rely on and use almost daily, and not all of these are available in the areas surrounding my home. And to be clear – nothing replaces the joy of starting seeds, nurturing the babies, transplanting when the time is right and eventually harvesting the grown plants, to make into tinctures and compresses and teas and salve. There is a depth of relationship and knowledge that comes from growing herbs that is different from wildcrafting, and much different form simply purchasing extracted herbal products or even the harvested and prepared plant material. I would consider my small garden to cover many of the basics that people starting out in herbs could make excellent use of with animals; all are easy to grow and very safe to use, and – taken altogether – the plants cover a wide range of needs and uses. So, here is my own Animal Apothecary garden – what I have grown so far, and very briefly, what I do with it all. 🙂
Calendula, Marshmallow, Echinacea, Hyssop, Skullcap, Chamomile, Yarrow, Feverfew, Motherwort, Catnip, Lemon Balm, Bee Balm, Valerian, Comfrey, Common sage, Evening primrose, Elecampane, Rosa rugosa, Borage, Lady’s Mantle, Wood betony,. This is my core Animal Garden; in years past I have grown Fuller’s teasel (and likely will again) Milk Thistle ( probably not – the plants are too large for my current space and the yield to small for the work it takes) and every year I grow a number of so-called culinary herbs that we use primarily for seasoning, but thyme ( all varieties!) does double duty as one of my favorite steams for my own allergy season and subsequent congestion; rosemary goes into many skin rinses for the dogs, and parsley I use in small amounts with some urinary tract problems.
This group, along with the wildcrafted plants I gather, covers so many of my everyday needs: Mallow, calendula and chamomile offer soothing help for the skin, demulcent support for the urinary, respiratory and digestive tracts, lymphatic support(calendula) and chamomile can be of course used for it’s relaxing nervine properties as well as the anti-inflammatory effect on skin…Motherwort is an important nervine for agitated animals, particularly with injury and feeling fearful; Skullcap helps over time with agitation and chronic discomfort associated with advanced age. Hyssop is a warming touch of respiratory help when used with mullein and elder for viral infection involving the lungs; echinacea gets regular use both internally and topically with my cats as well as dogs. Monarda fistulosa (Bee Balm) is one of my most-used herbs, for both animals and our own species; I use it on its own or in formulas to address infection, anxiety, gastric upset and pain, its diffusive action often helping other analgesics reach the painful area more rapidly.
Of the myriad medicines I make using my own wild rose bushes, I probably use the rose-petal vinegar, rose tincture ( a few drops only) and the dried flowers infused in water for skin relief most often. We humans get the honeys, elixirs, pastilles, and tisanes, and make regular use of rose salve (usually with a variety of other cooling, skin-healing herbs) all summer long. I also like to mix fresh rose infusion with Castille soap for a lovely, cooling and beautifully scented shampoo.
All these plants go into teas and infusions, tinctures and glycerites, are dried and powdered and put into capsules, infused in a variety of oils and used as salve and ointment. All of them are easy to grow, although working with them over the past several years I have learned to move them around, water more or less, harvest at specific times, plant some together and others not so close…it takes time, effort and careful notekeeping to build the Apothecary garden. I am hoping to hear from students – currently very excited! about their own adventures, experiments, successes and failures(that always teach) as the year goes on…and build my own garden as well.
New England Aster (Aster novae-angliae) a plant I only started using a few years back, but now rely on with both feline asthma and as part of any calming, relaxing formula where there is tension in the animals throat and chest.
I get many of my seeds from Horizon Herbs- a fantastic resource: https://www.horizonherbs.com/
Richter’s has seeds and information galore: http://www.richters.com/show.cgi?page=MagazineRack/Articles/GrowingHerbsIndoors.html
Information on starting seeds: https://www.herbsociety.org/hsa-learn/hsa-learn-landing.html
More information: http://www.herb-gardening-help.com/growing-herbs-from-seeds/
Can’t forget MountainRose Herbs – a nice selection of organic seeds, and so much else as well: https://www.mountainroseherbs.com/
Now get growing! | https://thepossiblecanine.com/animal-apothecary-garden |
The flora of the island of Kythera has a number of 723 plant species. Many of these plants show beneficial properties for human body and they are called herbs. Herbs are being used in folk medicine for thousands of years while today they are an alternative healing solution. The prerequisite for use of herbs is knowledge and experience so that it contributes to therapy and it does not cause a risk to the body’s health. This is why it’s better to ask for the advise of a botanologist – therapist for a more proper and safe use of herbs and also to inform the family doctor in cases where the patient suffers from other conditions as well.
Here we are presenting the most important healing herbs that grow on the island that are developing either freely on forest, wild and cultivated areas either with human care in peri-urban areas such as gardens and crofts. The selection of herbs was based on the album “Bee Flight Paths”, a publication of the Kythera Union of Athens regarding the Kythera flora, which granted to us a special license to use photographs and information from the album. For every herb, the main information are mentioned such as its scientific name, its family, the various names we meet in Kythera and all over Greece. Furthermore we considered it would be useful to mention the main healing properties and the collection procedure for every herb based on the information we gathered mostly from the Kostas Bazaios publication (“100 herbs, 1000 treatments”, Bazaios publications.). Finally, we mention smart ideas for another usage of these herbs.
Therefore, get to know the Kythera herbs, walk on the island paths to discover them and exploit their healing properties. Enjoy your trip! | https://visitkythera.com/kythera-healing-herbs/ |
5 Reasons Herbal Medicine Doesn't Work for You
"Herbs don't really work." "That's just placebo." "I tried this tea and it didn't work for me." "Herbs don't actually cure things." Etc etc etc.
Sound familiar?
I hear these things from people all the time, and it can be super frustrating because the problem isn't that the herbs don't work. It's that people are largely uninformed about how to use herbs in ways that are helpful.
1. You don't know how to prepare them properly.
To make tea: cover the cup while it's steeping. This prevents the volatile oils (which contain medicinal benefits) from evaporating (aka leaving your drink, and not entering your body.) For flowers and leaves, steep for 15-20 minutes. For roots, you need to create a decoction, which means you need to simmer them in water, covered, on the stove for 20 minutes.
Teas (technically infusions) and tinctures are most effective. Herbs in capsules are least effective (and sometimes, those capsules you're buying don't even contain the herbs you think they do, because they're not very regulated..)
2. You aren't consistent.
Herbs are not drugs. Let me repeat that: herbs are not drugs. You cannot treat them like drugs. You cannot drink one cup of tea one time and think that that will help you. Try to think of a plant as a type of energy, a living being, as opposed to a drug. The plant will help you if you work with it in the way that is best. Generally, in an acute situation (think stomachache, cold, moodiness, cramps), it's best to take a small amount of the herb very frequently until symptoms disappear. So 4-8 oz of tea every 2-3 hours. Or taking the proper amount of tincture every 2-3 hours (varies by herb.) For a chronic condition (anxiety/depression that's been there for months/years, chronic pain, etc), it's usually better to take a smaller amount less frequently but for a longer period of time. So for depression, taking St. John's Wort tincture every day, and not expecting it to work for a few months. For hormonal issues, taking Chaste Tree Berry the same way. Herbal medicine may not always be immediately effective, especially if it's treating a condition that's been there for a long time.
3. You are using bad quality herbs or information.
Herbs that come in a tea bag you buy in a grocery store might be so old or treated in such a way that they have lost most of their effective properties. Get your herbs from trusted sources. I love Mountain Rose Herbs.
Good information about herbal medicine is also difficult to find, because there is so much conflicting information out there. I had a really hard time wrapping my mind around this when I first started learning about herbal medicine. Googling things was impossible, because I didn't know what I could trust and what I couldn't, and I didn't understand why there couldn't just be one herb that worked for one thing.
My advice is this: only take information from people who have experience. You can google well-known herbalists like Rosemary Gladstar or Susun Weed. Susun Weed in particular has a ton of free information online — I've had awesome luck with googling "susun weed anxiety," for example (substitute the word "anxiety" with any issue you're having.) She also has a free radio show every Tuesday night where you can call and get her advice.
Also, again, think of herbs more as people. You don't expect a person to have just one quality that you can use for one specific thing. Herbs have personalities. Don't be frustrated by the fact that you can look for herbs that will support your liver and come up with 15 different options. Instead, learn more about each herb and what else it's used for. That can help you decide which one might help your body best. For example, burdock, dandelion, and yellow dock all help the liver. But burdock also helps the respiratory system and skin issues. Dandelion helps the kidneys and gallbladder. Yellow dock supports healthy blood.
4. You are using too many herbs at once.
A typical tea blend you buy at a store might combine 10 different plants in one tiny little tea bag! You aren't getting enough of any one herb for it to really be all that effective. Plus, you probably don't even need most of those plants — it's just a matter of finding the one that will fit your body best. I don't suggest using more than three. I like using two even more. Just haphazardly using a bunch of things every so often probably isn't going to work.
5. You don't really believe that they'll work.
Your mind is a powerful thing. Think of this as a placebo effect in kind of an opposite way. If you don't think it's going to help you, it's probably not going to help you.
This won't be true for all herbs - if you take something poisonous, obviously it's going to be poisonous whether you believe it is or not. Some herbs are stronger/more dangerous than others. Some have also been proven by numerous studies to work regardless. But in general, it is just really not helpful to not believe in the medicine you're taking.
PS — if this all sounds interesting but overwhelming and you don't know where to begin, work with me. I'll teach you all the basics of herbalism in 2 one-on-one, online sessions, spaced a few weeks apart.
You'll learn about 10+ of the most common/my favorite plants, and you'll choose a plant (with my guidance) to connect more deeply with during the time we are working together. You will learn basic herbal preparations, including how to make infusions, oils, tinctures, vinegars, salves, oxymels, and syrups. We'll also talk about forming a relationship with plants, how that works, and how you can incorporate them into your life. (ps I am mostly against essential oils, so that won't be a topic we discuss here). | http://fitnesswitch.net/5-reasons-herbal-medicine-doesnt-work-for-you |
Herbs — Genesis 2-29: “And God said, behold I have given you every herb bearing seed, which is upon the face of all the earth, and every tree, which is the fruit of the tree yielding seed; to you it shall be for meat.”
What are the 7 Holy herbs?
For the Druid priest-healers the seven ‘sacred’ herbs were clover, henbane, mistletoe, monkshood, pasque-fiower, primrose and vervain. This herbal knowledge may go back further than has been thought.
What does the Bible say about medicinal plants?
Only five species are mentioned explicitly as medicinal plants in the Bible: Fig (Ficus carica), Nard (Nardostachys jatamansi), Hyssop (Origanum syriacum), ‘Balm of Gilead’ (Commiphora sp.), and Mandrake (Mandragora officinarum).
Where is herb mentioned in the Bible?
As the Bible states in Psalms 104:14, God provides us with “herbs for the service of man.” Hopefully, after reading this article, you can start incorporating some of these health-boosting Biblical herbs into your life daily.
What Plants Can we eat according to the Bible?
The Original Biblical Diet Plan—Plant Based Diet
- Every tree bearing seed. Examples: apples, avocados, grapefruit, pecans, papaya, cherries, olives.
- Every plant bearing seed. Examples: tomatoes, beans, lentils, wheat, berries, squash, corn, rye.
What does Bible say about plants?
Jonathan: God said, “Behold I have given to you every plant whose seed is sown, that is upon the face of all the earth, and every unfruitful tree for the requirements of building and for burning; and (every tree) on which there is fruit whose seed is sown shall be yours for food.
What is the most spiritual plant?
Seven of the most sacred plants in the world
- Lotus Flower. Jahnavi Harrison explains how the lotus is a plant that, for those educated in an eastern spiritual context, evokes layers of meaning and narrative. …
- Mistletoe. …
- Holy Basil (Ocimum Sanctum) …
- Peyote. …
- Yew Tree. …
- Marijuana. …
- Basil (Ocimum Basilicum)
Is Aloe Vera mentioned in the Bible?
Two plants in the Bible are called “aloe.” The New Testament plant, used in the burial of Jesus, is without a doubt the well-known Aloe vera . But the Old Testament plant translated aloe is obscure. According to Psalm 45: 8, it is apparently very fragrant as it is associated with myrrh and cassia.
What does the Bible say about doctors and medicine?
We should always seek help from God as well as going for appropriate medical treatment – not instead of doing so. In Matthew 9, the Pharisees asked Jesus why he spent time with sinners. He replied, ‘It is not the healthy who need a doctor, but the sick’ (Matthew 9:12). Jesus recognised that sick people need doctors.
What Herb is mentioned in the Book of Exodus?
Coriander (Coriandrum sativum) is referenced several times in the Old Testament. (Exodus 16:31) Now the house of Israel called its name manna; it was like coriander seed, white, and the taste of it was like wafers made with honey.
How many plants are mentioned in the Bible?
Biblical garden plants are referenced continually throughout the Bible. In fact, more than 125 plants, trees, and herbs are noted in scriptures.
Are flowers mentioned in the Bible?
the Bible mentioned only a few species of flowers, even though there were over 2,000 different types of plants and flowers in Palestine and Western Syria. Moreover, the flowers in the Bible describes the frailty and transitory nature of human life.
What does flowers symbolize in the Bible?
What does the flower symbolize in the Bible? Flowers symbolize beauty, fragility, and love of God, yet, they also represent the fall of humankind. The beauty of a flower fades and eventually dies.
Did they eat eggs in the Bible?
Game, birds, eggs, and fish were also eaten, depending on availability. Most food was eaten fresh and in season. Fruits and vegetables had to be eaten as they ripened and before they spoiled.
What foods are forbidden in Christianity?
Prohibited foods that may not be consumed in any form include all animals—and the products of animals—that do not chew the cud and do not have cloven hoofs (e.g., pigs and horses); fish without fins and scales; the blood of any animal; shellfish (e.g., clams, oysters, shrimp, crabs) and all other living creatures that …
What foods did Jesus Eat?
Based on the Bible and historical records, Jesus most likely ate a diet similar to the Mediterranean diet, which includes foods like kale, pine nuts, dates, olive oil, lentils and soups. They also baked fish. | https://allsaintsvabeach.org/biblical-reading/what-the-bible-says-about-plants-and-herbs.html |
Database of the Medicinal plants
A-Z list of herbal plants used in Ayurveda medicines with details...
The Process of Medicinal plants to prepare medicines
The different process of herbs to prepare Ayurveda medicines...
Categories of Ayurveda Medicines
Different categories of Ayurvedic medicines used in the Ayurveda treatments...
Different types of Ayurveda Treatments
Different types of Ayurvedic treatment for different types of illness like...
Ayurveda colleges & Research Centers
List of Indian Ayurveda college and University Research centers ...
Indian Ayurveda Resorts & Treatments
List of Indian Ayurveda Resorts and Treatment centers in India....
Important Ayurveda Books
List of important Ayurvedic books and its authors name, to get vast knowledge ...
Draksharishtam
Draksharishtam is an Ayurveda medicine in the form of fermented decoction, mainly used in the treatment of respiratory problems and intestinal disorders. It can also useful in the treatment of cold, cough, throat problems, Asthma, improve strength, treatment of skin diseases due to Pitta dosha.
The main ingredient of Draksharishtam is Draksha (dry grapes),
Draksharishtam is prepared according to the reference of Sahasrayogam. | http://www.medicinalplantsindia.com/draksharishtam.html |
Citation: Berti, M., Gesch, R., Eynck, C., Anderson, J., Cermak, S. 2016. Camelina uses, genetics, genomics, production and management. Industrial Crops and Products. 94:690-710.
Interpretive Summary: Interest in the annual oilseed crop camelina has resurfaced due to its unique oil composition and properties that are valued for production of biofuels, jet fuel, biobased-products, feed, and food. This renewed interest is evidenced by the exponential increase in peer-reviewed publications containing the word ‘camelina’ between 2013 and 2016. The most common themes reported in these publications include new uses for camelina oil and meal, altered camelina oil composition through genetic transformation, and camelina physiology and agronomic management. The objective of this review was to compile and summarize new and existing information in order to identify gaps in knowledge and areas for future research. Thus, this review includes the most recent publications describing camelina origin, uses, genetics, genomics, breeding, molecular genetics, physiology, agronomic management, and ecosystem services. The review also includes a summary of the numerous uses for camelina oil and meal, new research on agronomic adaptation and physiology, and areas that require further research to enhance agronomically important traits.
Technical Abstract: Camelina [Camelina sativa L. Crantz] is an annual oilseed crop in the Brassicaceae family that has been cultivated since 4000 BC. Recently, interest in its oil and meal and the products developed from it have increased research in this crop. This renewed interest is evidenced by the tremendous increase in peer-reviewed publications containing the word ‘camelina.’ Databases report 335 publications between 2013 and 2016, with 149 of those published since 2015. The objective of this review was to compile and summarize new and existing information in order to identify gaps in knowledge and areas for future research. This review includes the most recent publications in camelina description and origin, uses, genetics, genomics, breeding, molecular genetics, physiology, agronomic management, and ecosystem services. Although the breadth of research in camelina over the last few years is impressive, several areas that would benefit from further research were identified. The development of new uses and the refinement of existing uses from camelina oil and meal will continue to add value to this crop. Advances in genetics, breeding and genomics of camelina will speed up the development of high yielding cultivars, with improved quality, disease and insect resistance. Understanding and improving freezing tolerance in camelina will advance the use of winter camelina as a cover crop or cash cover crop in double and relay cropping systems. Better management practices and weed control alternatives will be needed to increase camelina production worldwide. Lastly, commercial development of camelina will add one more crop to the already low agricultural diversity in many parts of the world. | https://www.ars.usda.gov/research/publications/publication/?seqNo115=329657 |
Some 50 social scientists from the U4 network universities (comprising professors, postdocs and PhD students from Gent, Groningen, Göttingen and Uppsala) gathered in Göttingen for a conference on 12-14 October 2012. In what was termed a "bazaar conference" (focusing more on existing research than a single topic) they looked for common research interests and seeked to establish areas for future cooperation.
In total 35 presentations were given over the three days, ranging from market regulation, europeanisation, and governance to analyses of political institutions and legal matters. In addition, participants learned about each others' work and discussed shared areas of interest.
Three themes where plans for future cooperation among some participants have already emerged are "Financial Market Regulation", "Energy and environment" and "Politics, privacy and information".
The Social Sciences, Economics and Law cluster intends to continue the successful format in order to intensify cooperation next year in Groningen [or Gent], then in combination with panels on the new areas of cooperation. | https://u4society.eu/index.php/events/conferences/221-u4-conference-global-governance-and-regulation-goettingen-12-14-october-2012 |
Published on February 22, by Shona McCombes. Revised on March 9, A literature review is a survey of scholarly sources on a specific topic. It provides an overview of current knowledge, allowing you to identify relevant theories, methods , and gaps in the existing research. Writing a literature review involves finding relevant publications such as books and journal articles , critically analyzing them, and explaining what you found.
Sarah Clark, 18, Port Chester, New York. I needed assistance with writing a research paper for undergraduate studies. I gave them 2 weeks to complete the job. They returned it to me within 10 days. There were some minor revisions needed. I returned the paper to the Writer and he/she completed it within the day. I have to say - EssayBox - PRODUCED!Overall, I would use them again and refer them in a heartbeat!
Writing A Literature Review: General Guidelines
Writing a Literature Review for a Research Paper
Please check course or programme information and materials provided by teaching staff , including your project supervisor, for subject-specific guidance. A literature review is a piece of academic writing demonstrating knowledge and understanding of the academic literature on a specific topic placed in context. A literature review also includes a critical evaluation of the material; this is why it is called a literature review rather than a literature report. To illustrate the difference between reporting and reviewing, think about television or film review articles. Similarly the two main objectives of a literature review are firstly the content covering existing research, theories and evidence, and secondly your own critical evaluation and discussion of this content. Usually a literature review forms a section or part of a dissertation, research project or long essay.
Kristiana Schmidt, 25, Galloway, New Jersey. I use them all the time and havent had any issues. I always get decent grades and have no issues with plagiarism
How to Write a Literature Review
This handout will explain what literature reviews are and offer insights into the form and construction of literature reviews in the humanities, social sciences, and sciences. And a review does not necessarily mean that your reader wants you to give your personal opinion on whether or not you liked these sources. A literature review discusses published information in a particular subject area, and sometimes information in a particular subject area within a certain time period. A literature review can be just a simple summary of the sources, but it usually has an organizational pattern and combines both summary and synthesis. A summary is a recap of the important information of the source, but a synthesis is a re-organization, or a reshuffling, of that information.
The format of a literature review may vary from discipline to discipline and from assignment to assignment. However, a literature review must do these things:. A literature review is not a list describing or summarizing one piece of literature after another. Try and avoid starting every paragraph with the name of a researcher or the title of the work. Rather, try organizing the literature review into sections that present themes or identify trends, including relevant theories.
12 comment
02.05.2021 0:45:58 Lion S.:
My last chance was to order a paper somewhere.
03.05.2021 5:39:19 Juan V.:
com! I have tried numerous websites and they were horrible but boomessays used professional writer that complete work on time.
03.05.2021 11:58:06 John C.:
I had an amazing experience, they are professional and active.
03.05.2021 17:22:26 Russell C.:
I got an excellent mark for the research paper made by Essay Masters!
05.05.2021 16:29:47 Pedro A. G.:
Over all, I like the site because, I am not a great writer.
06.05.2021 1:05:19 Zhipeng X.:
But working with you totally changed my perception.
06.05.2021 4:12:14 Sundeep D.:
You helped me with it.
08.05.2021 0:07:12 Joe T.:
it was good
08.05.2021 2:55:52 Rasol S.:
It has definitely helped me alot
09.05.2021 2:59:44 Larry S.:
I came across Goassignmenthelp.
09.05.2021 11:17:02 Saysay M.:
The quality of my essay is good, Ive already submitted it.
10.05.2021 13:15:12 Braden C.:
Your service is every students dream! Thanks to your help, I managed to get a lot more time to spend on my hobby! | https://n-dv.info/homework-gives/in-writing-a-literature-review-one-must-11947.php |
Open to all BC School District and independent school personnel, this super-workshop has been created to help learning support, resource, and classroom teachers understand, identify, and choose appropriate intervention strategies for students who have lacking or lagging social skills. A focus will be on students who have autism spectrum disorder, but care has been taken to introduce strategies and resources which benefit a myriad of students.
objectives
Learning outcomes include:
- Identify autism spectrum disorders' core impairments
- Review additional characteristics and theories affecting social skills such as self-regulation, theory of mind and executive functions
- Explore the link between social skill deficits and executive functions deficits
- Interpret social skill assessment results and their impact on interventions
- Explore common areas of social skills deficits such as basic functional skills, conversation skills, social understanding and social anxiety & avoidance
- Interpret and review case studies by identifying common characteristics, social skill impairments and possible interventions
registration details
POPARD super‑workshops are open to all BC School District and Independent School personnel. Click here to choose a workshop session. | http://autismoutreach.ca/node/5966 |
Researchers have shown that movement increases brain function, improves mental health, supports cognitive development for students, and reduces sedentary time, all which can influence overall health. Research concerning learning with intentional movement is limited. In the United States, Common Core State Standards (CCSS) are being mandated, and teachers are challenged to teach the standards creatively and to maximize time used for instruction. The purpose of this qualitative study was to explore the lived experiences and perceptions of elementary general education (GE) teachers who taught CCSS using a kinesthetic learning plan (KLP). Bandura's self-reinforcement and social learning theories provided the conceptual framework; the principles of interpretative phenomenological analysis were used to structure the study. Research questions were framed to understand how the teachers experienced teaching the KLP and their perceptions related to how students learned the CCSS. Data were elicited through individual interviews with 11 GE teachers from primarily rural areas in the western part United States. In vivo coding and iterative analyses revealed themes and findings. Themes included teacher understanding (confidence and comfort), implementing resources (creativity and resourcefulness), teacher feelings (pressure and success), making the mind-body connection, and teacher beliefs and perceptions about their practices. Teachers perceived KLPs as useful in teaching the CCSS and experienced support for expanding their teaching practices. Positive social change implications include helping teachers maximize instructional time and helping students achieve standards and address health needs. | https://scholarworks.waldenu.edu/dissertations/3879/ |
Week 2 Assignment: Conduct a Literature Review Activity Description Write a literature review by analyzing different key underlying theories and themes that will support your proposed research study. Begin the literature review with an introductory section that alerts the reader to the organization and the contents of the paper. Next, use themes and/or subtopics as headings. Identify the themes or sub-topics around which the literature review has been organized into a coherent narrative discussion.
In the review, discuss at least 10 of the most important studies that touch upon the dissertation topic or problem. Be sure to include studies that provide alternate or opposing perspectives on the proposed topic area to demonstrate unbiased research. Focus particularly on those studies that address main ideas in the field, spell out areas of controversy, and indicate areas of incomplete knowledge and relate them to the envisioned study’s problem, purpose, and research questions. Include historical and germinal as well as current studies (within the last 5 years).
Support your review with at least seven (7) peer-reviewed sources. Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy. Length: 5-7 pages (not including title and reference pages).
Price of Answer: Just US$15 only
Need Assistance…?? email us at [email protected].
If you need any type of help regarding Homework, Assignments, Projects, Case study, Essay writing or any thing else then just email us at [email protected]solvemyquestion.com. We will get back to you ASAP. Do not forget to maintain the time frame you need you work to be done. | https://solvemyquestion.com/13402/ |
The curriculum for middle school students spans over three years and covers a wide variety of topics based upon themes. In those three years, students experience the themes of “How Things Work,” “Journeys,” and “Homes and Habitats.” Within each theme, curriculum is designed with the Grade Level Content Expectations (GLCEs) in mind, but tailored towards projects that the students use to display their scientific thinking. At the middle school level, students continue to increase/display their understanding of knowledge through 4 strands, scientific processes, physical sciences, life sciences, and earth sciences.
Pedagogy
Through a combination of scientific inquiry and problem-based learning, students are highly encouraged to share their thoughts and theories on how they use science as a tool to understand the natural world around them. Through in class discussions, homework, and hands-on learning activities, the lessons challenge the students to get beyond simple responses to be able to explain how something works, why it reacts that way, and/or use the scientific method to investigate it further.
Assessments happen through both formative and summative examples throughout a unit. In each unit, the GLCEs are the intended objectives students will focus towards, while extending themselves sometimes in areas of personal interest and also creative outputs. They also move towards displaying mastery in these areas through these projects and coursework. Students use lab time, homework, projects, and in class participation to experience introductions to new material, practice demonstrating what they learned, and display mastery of expectations. | http://honeycreekschool.org/inside-our-classrooms/middle-school/science |
LAST UPDATED: JULY, 2018.
Welcome to the Cookie and Privacy Policies of the EmbroideryBadge.UK Website (the “Policies”), which shall be construed as a binding agreement between you, the User (in this policy, the “User” or “You” or “Your”, where the term User shall incorporate “Purchaser” for the purpose of these policies), and BADGES AND EMBROIDERY UK LTD and its owners Net Digitizing UK Ltd which runs and administers the website located at embroiderybadge.uk, its pending sub-domains and parent domains and folders, (altogether referred to herein as the “Site”), and owns the trademark Badges&Embroidery(for purposes of this Policy, referred to as “Badges&Embroidery”). This Policy is set out for you to understand what information EmbroideryBadge.UK gathers, where it goes, and what EmbroideryBadge.UK does with such gathered information; it is very important that you understand and have full information when you consent to the gathering, storing and use of your personal data. In case of any requests, observations, questions or other feedback, or personal data removal, please contact us by sending an email to embroiderybadge.uk.
ALL THE DEFINITIONS AS WELL AS TERMS AND CONDITIONS OF THE TERMS OF SERVICE AVAILABLE ON THE PLATFORM THROUGH THIS LINK, APPLY TO THIS SET OF POLICIES. WE RECOMMEND THAT ALL USERS READ THESE POLICIES CAREFULLY AND REGULARLY, TO REMAIN INFORMED OF HOW THE INFORMATION WHICH IS COLLECTED FROM IS HANDLED. IN CASE YOU DO NOT AGREE WITH ANY OF THE PROVISION OF THESE POLICIES, YOU MAY INFORM US, BUT WE STRONGLY SUGGEST YOU IMMEDIATELY STOP YOUR USE AND ACCESS TO THE WEBSITE.
1. DEFINITIONS
To make sure that you understand all the terms and conditions of these Policies correctly we want to clarify and define some key concepts which appear throughout this document:
1.1 Website shall be used to refer to the online webpages which are publicly available and accessible on embroiderybadge.uk.
1.2 Services shall be used to refer to all the Services available on the Websites, including deriving white label products and similar packages, which may not appear on the Website and are agreed with each individual corporate client.
1.3 Platform shall be used herein to refer to the interface accessible through the Website by means of a previously created account, which allows the use, access and purchase of the Services available thereon.
1.4 Account shall mean the online account which is created by the User, or in some cases, created by EmbroideryBadge.UK for a corporate client, through which such User can access the Services.
1.5 User shall be used in these policies to refer to the individuals who visit the Websites or access the Platform by means of an account, regardless of them being clients or freelancers.
1.6 Data Subjects shall be the individuals of which EmbroideryBadge.UK may gather information and data of, pursuant to what is determined in these Policies.
2. INFORMATION WHICH EMBROIDERYBADGE.UK COLLECTS
Whenever a User browses, interacts or creates an account on the Websites Badges&Embroidery, the Company collects different kind of data to be able to provide the Services thereon available. Such information can be as follows:
2.1 NON-Identifiable Information
This kind of information is data collected from Users automatically when they browse or navigate the Website, regardless of them being logged in or not. The information is NON-Identifiable, which means that we cannot or would not be able to identify a particular User with such data.
This gathered data in this category includes:
a) IP Address
b) Device
c) Browser
d) Plugin details
e) Language preference
f) Time zone
g) Screen size
h) Operating System
The way this data is gathered is mainly from cookies, beacons and third-party service logs and analytics tools.
2.2 Provided Information
This data is sent by you to EmbroideryBadge.UK to register an account on the Website or to access and use the Services. You may do so directly or you may choose to disclose such information through a third party. The data you decide to disclose and enter is stored by us on our servers and cloud systems. This information may include the following:
a) Name
b) Username
c) Email Address
d) Location
e) Password
f) Gender
g) Telephone numbers
h) Descriptions
i) Payment Information
j) Office and Delivery addressess
2.3 Project requirements and Profile Information
This gathered information is for the purpose of EmbroideryBadge.UK to render its manufacture services. The information is only shared within the company to employees and other relevant parties. Such information may include:
a) Image and picture files
b) Videos
c) Trademarks and tradenames
d) Other designs and images for the purpose of the embroidery services and badge manufacture which may be proprietary to individuals or collective entities
Privacy levels and settings may apply and you may decide to input, change, hide or delete any of the information you have willingly entered. This may not apply to ratings, job scores,
2.4 Payment Information
This information is shared by you when you pay for a project pursuant to your requests of the services, in strict compatibility with what is set out in the Terms of Service. Such information may be used by a third-party payment processor and is not specifically stored on our servers. Once payment has been approved and completed, this data is deleted. Each time you make a new request you may enter new payment information which will then again be deleted for the system. EmbroideryBadge.UK shall only keep general payment information for financial and tax reasons, as required by applicable law and regulations.
3. USE OF THE GATHERED INFORMATION
EmbroideryBadge.UK does not intend to share, sell or otherwise commercialize your information. The data collected is used by us to run the functionalities and features of the Website and the Platform itself, to enable you to benefit from the Services available thereon and sometimes to improve parts of the Website and Services.
Most non-identifiable information is used by us to better understand your activities on the Website.
Other information is for us to do some due diligence when you open an account, verifying your identity, and sometimes making sure that other data such as academic and work information is true and verifiable.
We may use your email to send you information about the services which we consider may be important to you, such as payment receipts, and other important notices and information such as those relevant to your projects. We can also send you information warning you have received messages, offers or bids. You may enable and disable the frequency and preferences of such email notices by means of the platform.
Users may also subscribe to newsletters, email promotions, and other similar commercial notices, provided that they enable and register such subscription on the Website or Platform.
EmbroideryBadge.UK shall only share this information pursuant to a legal order or subpoena which burdens EmbroideryBadge.UK with the legal obligation of the disclosure of such personal information. If such obligation appeared we shall inform the affected User or Users within a reasonable timeframe.
Notwithstanding what is stated in this Section, some parts of your collected information is shared with third parties, such as Stripe.com, Mailchimp, Imapt, Sendee, ,Xero, HubSpot, QuickBooks, Google suite, and Google Analytics.
4. PROTECTION OF YOUR INFORMATION
About the security of Users’ information and data, EmbroideryBadge.UK is committed to make reasonable efforts to protect its servers and databases, using third party security and encryption software to protect and attempt to keep harmless the confidentiality and privacy of User’s information and personal data. Even so, Users hereby agree and acknowledge that the internet is not a safe place, and that -by far- there is no website or mobile application that is 100% safe, despite of any efforts from any company whatsoever, to prevent breaches or attacks. Therefore, User states to understand that, despite of any efforts of EmbroideryBadge.UK efforts, information may from time to time be accessed by any means of breach or shared or used in any way, or that such malicious parties may depositing any sort of malware or malicious software on our servers and which EmbroideryBadge.UK does not have knowledge of.
From time to time parts of your information may be processed by a third party; such party shall be obligated to uphold these Policies, to protect the sensitive and personal data of Users of the Website, in the same proportion, or better manner than EmbroideryBadge.UKdoes.
5. NOTICES
6. CHANGES TO THESE POLICIES
EmbroideryBadge.UK may amend, change, or update these Policies from time to time, to either improve this section, or compliance with new laws and regulations which may affect the handling, collecting and management of personal data, pursuant to any changes or innovations to applicable law. The changes to the Terms of Sale or these Policies shall be informed to the User’s Provided email address.
7. GENERAL DATA PROTECTION REGULATION
If you are a Citizen of the EU or the EEA, including the United Kingdom, this Section shall apply to You and grant you additional rights regarding the collected data.
8.1 Principles pursued
a) As suggested by the GDPR, the amount of collected data has been kept to the minimum, and just suffices what EmbroideryBadge.UK needs to satisfy the Services;
b) EmbroideryBadge.UK shall inform you to your provided e-mail address of any changes made to this section or to these policies;
c) The system shall require you to affirmatively consent with these policies and the terms of service of Badges&Embroidery, when you report you come from a UE member country or the United Kingdom;
d) As soon as EmbroideryBadge.UK becomes certain of a data breach, we will send out an email informing about such breach.
8.2 Rights conferred
You may send an email to embroiderybadge.uk to reasonably exercise any of the following rights:
a) You may at any time require access to the data collected from you by Badges&Embroidery;
b) You may request that the collected data be deleted pursuant to your right to be forgotten;
c) You may require that your collected data is transferred to you in a digital and readable format, and, if technically possible and feasible, the collected data be transferred to a different data collector, if such bridge where also technologically available;
d) You may require rectification regarding any information collected from you which contains mistakes or has been misconstrued.
Kindly allow our staff to respond to you in a reasonable amount of time for any email sent to the aforementioned address, for any of the rights considered in this Section 8. | https://www.embroiderybadge.uk/privacy-policy/ |
This Policy Statement governs the manner in which Search4maid Limited (“Search4maid”) collects, uses, maintains and discloses information collected from users (each, a “User”) of our Channels. This Policy Statement applies to our Channels and all products and services offered by Search4maid.
1. Personal identification information or data
We may collect personal identification information or data from Users in a variety of ways, including, but not limited to, when Users visit our Channels, register on our Channels , subscribe to the newsletter, fill out a form, and in connection with other activities, services, features or resources we make available on our Channels. Users may be asked for, as appropriate, name, email address, mailing address, phone number, WhatsApp number, Interview Video and Facebook ID. Users may, however, visit our Channels anonymously. Users can always refuse to supply personal identification information, except that it may prevent them from engaging in certain activities on our Channels.
2. Non-personal identification information or data
We may collect non-personal identification information or data about Users whenever they interact with our Channels. Non-personal identification information or data may include browser name, type of computer and technical information about Users’ means of connection to our Channels, such as the operating system and the Internet service providers utilized and other similar information or data.
We will collect, keep and/or use information or data solely with the objective of fulfilling those purposes specified by us and for other compatible purposes, unless we obtain the consent of the individual concerned or as required by law.
We will only retain personal information or data as long as necessary for the fulfilment of those purposes.
We will collect personal information by lawful and fair means and, where appropriate, with the knowledge or consent of the individual concerned.
Personal information or data should be relevant to the purposes for which it is to be used, and, to the extent necessary for those purposes, should be accurate, complete, and up-to-date.
We will protect personal information / data by reasonable security safeguards against loss or theft, as well as unauthorized access, disclosure, copying, use or modification.
We will make readily available to customers information about our policies and practices relating to the management of personal information/ data.
Domestic helpers may be required to conduct interviews in video format as part of the application. Interview videos are provided in order to generate reports. Interview videos and related reports are disclosed to employers and agencies in our Channels.
Users reserve the right to request access to or correction of all personal data collected including personal information submitted to Search4maid and interview video and reports. To access personal data, please send a request in accordance with the Personal Data (Privacy) Ordinance (Cap. 486) to [email protected] .
We are committed to conducting our business in accordance with these principles in order to ensure that the confidentiality of personal information is protected and maintained.
Purpose of collecting and keeping information and/ or data
Search4maid may collect and use Users personal information for the following purposes:
- To improve customer service: Information you provide helps us respond to your customer service requests and support needs more efficiently.
- To personalize user experience: We may use information in the aggregate to understand how our Users as a group use the services and resources provided on our Channels.
- To process payments: We may use the information Users provide about themselves when placing an order only to provide service to that order. We do not share this information with outside parties except to the extent necessary to provide the service.
- To run a promotion, contest, survey or other Site and or our Channels feature
- To send Users information they agreed to receive about topics we think will be of interest to them.
6. To send periodic emails: We may use the email address to send them invoices, information and updates pertaining to their order. If User decides to opt-in to our mailing list, they will receive emails that may include invoices, company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email.
How we protect your information and data
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Channels.
Sensitive and private data exchange between our Channels and related third parties and its Users take place over a SSL secured communication channel and is encrypted and protected with digital signatures. Our Channels are also in compliance with PCI vulnerability standards in order to create a secure environment.
Sharing your personal information and data
By agreement to the applicable terms of service, a user will give full permission allowing Search4maid to expose the information and/or data listed on the resume or job post, including personal details and mobile phone numbers, Facebook accounts, interview video and its content and its scoring etc. Search4maid will bear no responsibility for any consequences or matters that may be caused by any exposure of the said personal information or data. Search4maid will never publicly disclose or expose a user’s address on our Channels. The address will be used for communication by mailing or promotional material ONLY.
All users are prohibited in using screen scraping, data mining, robots or similar data gathering and extraction tools on our Channels for establishing, maintaining, advancing or reproducing any information or data contained on our Channels on your own website or in any other publication, except with Search4maid’s prior written consent.
The purpose for which a user’s personal data are used include:
1. Internal assessment and potential candidate matching;
2. To market job openings and potential candidates to attract correct employers and applicants;
3. To conduct research on the domestic worker industry;
4. For direct marketing of our products and services to inform users of events and to deliver news, reports, market analyses, promotions, and other information relating to the helper industry.
Web browser cookies
Third party websites
Users may find advertising or other content on our Channels that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. Search4maid does not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Channels. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other websites, including websites which have a link to our Channels, is subject to that website’s own terms and policies.
Google Adsense
Changes to this Policy Statement
Search4maid has the discretion to update this Policy Statement at any time. When we do, we will post a notification on the main page of our Channels and send you an email. We encourage Users to frequently check this page for any changes to stay informed about how we are helping to protect the personal information we collect. You acknowledge and agree that it is your responsibility to review this Policy Statement periodically and become aware of modifications.
Your acceptance of the terms and conditions of this Policy Statement
Direct Marketing Activities
Search4Maid may use personal data to promote and market products and services to you through direct marketing. The promotion may include products and services from Search4Maid or our business partners. We will always comply with the Hong Kong Personal Data (Privacy) Ordinance (Cap. 486), and any other applicable law.
If you prefer for your personal data not to be used for the purposes of direct marketing activities, please send an email, along with your name to our Data Protection Officer at [email protected] notifying us that you do not wish your personal data to be used for such purposes. | https://search4maid.hk/en/page/privacy-policy |
How can users give consent, if there are information asymmetries between their understanding of a service and those who design the service? For example, a service may know exactly which jurisdiction and under what conditions user data is stored, as well as how that data is secured. However, a user may neither easily find this information of data storage and retention, nor have a framework of understanding how digital information moves online. Therefore, there is information asymmetry.
Data collection is fairly abstract for many users, especially as it relates to companies as well as the third party companies they partner with. If a designer is mindful not taking advantage of what users don’t understand, what might an informed approach to interaction with a service look like?
Borrowing from digital security training and educational approaches, these actions would take place within the context of onboarding (when someone visits a service like a company website for the first time) and on a clearly-labeled privacy settings page. Information about the type, location and choice for managing data could appear just-in-time. This means as the user moves through the natural uses of the service, permissions are requested when needed, in the context of the use.
Figure 1: On the left (Point 1), a user at their computer. This would be labeled with something in the vein of “You” or “Your data” or “Your device”, and include a list below of types of data collected during a session and over time. An arrow points from the user at their computer to a router (Point 2), to a tower (Point 3) representing the Internet, and a cluster of server boxes representing intermediary networked computers (Point 4). An arrow points to the right with the intended website/service, labeled “Our service,” or “Our website,” or “Our app” (Point 5). “Finally, that server points to another server as the final endpoint (Point 6), which can represent shared data agreements with other companies, labeled “Our partners”.
This interactive diagram (Figure 1) illustrates how users can better understand and interact with their data. The diagram begins at the left (point 1) with the user at their computer, followed to the right by an intermediary set of connecting devices (point 2) router, (point 3) tower, (point 4) multiple servers, and at the right-most point (point 5), the website at the endpoint computer. Finally, the website-hosted computer connects to an extension of other servers that will receive this information (point 6) additional servers within the company, third parties advertisers. At each point of this diagram, a user can interact with the diagram to see what kind of data is collected.
Figure 2: On the right, the types of data a user might see at various points, such as Location, IP address, username, message history, searches, shopping history, friends, phones and connected devices, and so on.
Figure 3: Toggles for various types of data, where the default is switched “off”.
Finally, at the last two points (point 5 and 6, the website service and the shared data agreements with other companies) of the interactive diagram, the user can learn more and interact with what they consent to share. This can include, but is not limited to, their interests, location, friend connections, search history, and so on. For example, the user can click on the last point—the website server and the third party computers receiving this data—and further learn what information is received by the company, as well as what information is shared beyond the original company. I have represented toggles for each of the types of data that a user might be interested in withholding from sharing, with the default sharing setting configured to “off”.
Service providers can also include relevant information on that page, such as a summary of what measures are taken to protect that data (e.g. links to more information on the types of encryption used, links to relevant sections in their privacy policies and transparency reports, further details on the length of retention of data, and so on).
Just as designers will test workflows for usability, I propose that the designers should also aim to user test these interactive privacy settings for user’s comprehension.
The user is someone who is sight-impaired and needs graphics and text to be large and to meet web accessibility color contrast standards.
This user did not have formal schooling beyond middle school but has familiarity with using a smartphone. They may be intimidated by legal language, but still, want an at-a-glance summary, and are conscientious of privacy and data collection. Thus, the wording would ideally be written at a fifth-grade reading level and with limited additional distracting stimuli.
The user is someone who may not be aware of machine-readable opt-out solutions, such as standards in the spirit of Do Not Track.
A user is coming to a social media service for the first time and is looking through public-facing comments shared by other users. In this imagined scenario, they decide that they want to sign up but are unsure if they want to participate in the service. In the onboarding flow, they would encounter this diagram of what information they are sharing. After selecting their data sharing preferences, they can proceed to use the service.
Figure 4: On the right, an image that shows a phone with a minimizable window that says “How we are using your data.
If the user changes their mind about their preferences at any point, they should be able to find this page easily. The user would have a way to find information about their data settings, such as in a clearly-communicated, large and easy-to-navigate section on the page as “site preferences,” or “my privacy, my data”, or “how we are using your data”: this would be large enough that can be easily tapped by someone with imprecise navigation, and large enough to be seen as a distinct piece of the site. | https://privacy.shorensteincenter.org/visualizing-internet |
This Privacy Notice (“Notice”) governs the manner in which Andrell Education Ltd (“Andrell”, “We”, “Us”, or “Our”) collects, uses, maintains and discloses information collected from users (“User”, “You”) of the Andrell websites (“Sites”) and products and services (“Services”).
In relation to purchasing Services, subscriptions to Sites, or products: payment details, delivery and invoice address, contact name and contact details, a record of the Services purchased.
This information will only be collected with the appropriate permission and legal basis as noted in the Legal Basis section.
Andrell collects and uses Users’ personal information to provide and promote Our Sites and Services, to meet our legal obligations, to maintain appropriate business records, to ensure the security of our Sites and Services and to monitor and improve our Sites and Services.
There are Services that We provide which require Your personal information. You are within Your rights to refuse but We are then unable to provide You with the Service.
We will only retain information for as long as reasonably necessary for the stated purposes of collection or in order to meet Our legal obligations. We will delete Your data if a request for removal is received and accepted.
You may request further information on the categories of information that We collect, how it is processed, and the third party partners that We use.
To fulfil a contract at Your request which can include but is not limited to: completing a Services or Sites order, providing technical support for a purchased Site or Service, providing You with updates regarding Services or Sites that You are currently using, maintaining our business records, and meeting any legal obligations.
To pursue Our legitimate interests which can include but is not limited to: maintaining Our business records, meeting any legal obligations, keeping records of data related requests, providing access to Sites and Services as requested by You, analysing the usage of Our Sites and Services in order to improve them, analysing the effectiveness of Our marketing, sending You information about Our Sites and Services, and keeping Our Sites and Services secure.
We act as data controller for information that We collect from You and then process in respect of the legal basis set out for collection. This information is necessary to complete the stated task. This Notice and Our Legal Notice sets out the terms of Our actions as data controller.
We may also use third party suppliers where their services help Us to provide services to You. In this case, they are data processors on Our behalf. The third parties have their own contracts in place with Us to ensure compliance.
We act as data processor for information added to Our Sites and Services. Users have agreed to this Notice and the Legal Notice before accessing the Sites and Services and agree that We must hold and process the information in order to offer the agreed service.
We do not view this information without express permission from You.
Where Your consent is required, We are fulfilling a contract or We are pursuing Our legitimate interests, We will ask for consent at the point the data is collected and make this Notice and the Legal Notice available.
You have the right to withdraw your consent at any time. You have the right to request the data We hold on You, ask how the data is used, request a digital copy of the data, request amendments to the data, and request the removal of the data. Where We hold data for legitimate purposes or to fulfil a contract, You may request that the data is no longer processed but We reserve the right to keep the data for record keeping purposes and to ensure ongoing compliance of Your request.
You have the right to lodge a complaint regarding Our processing of data to the appropriate authority.
We adopt appropriate privacy by design practices around data collection, storage and processing and security measures to protect against unauthorised access, alteration, disclosure or destruction of Your personal information stored on our Sites and internal office servers.
This includes but is not limited to: SSL certificates, strong passwords, encryption of User passwords, controlled, IP address restricted access to admin areas, hardware firewalls, access logs, server monitoring.
In the event of a data breach which includes personal information, We will make the appropriate authority aware within 72 hours of discovery. In the event that the breach poses a material risk to You, We will inform You within 30 days.
The personal information that We hold is stored within the EU. Our third party service providers have relevant documentation and agreements stating that they will not move the data outside of the EU. Our Sites are hosted with a UK company that hosts data within the UK only. Our internal office servers are based in the UK and can only be accessed from within the office or through a secure virtual private network with the appropriate permissions.
We use Your personal information within Andrell in order to carry out required processing in line with the stated purpose and legal basis for collection.
We use third party service providers that support Us in providing You with requested Sites and Services. These providers do not have direct access to Your data.
We do not sell, trade, or rent personal information to others. We may share, but never sell, generic aggregated, demographic information not linked to any personal information regarding visitors and users with our business partners, trusted affiliates and advertisers for the purposes outlined above.
We will share Your information with government or legal officials if it is required by law.
Users may find content on our Sites that links to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from Our Sites. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to Our Sites, is subject to that website’s own terms and policies.
Andrell may update this Notice at any time. When We do, We will revise the updated date. We encourage Users to frequently check for any changes to stay informed about how We are helping to protect the personal information We collect. You acknowledge and agree that it is Your responsibility to review this Notice periodically and become aware of modifications.
We will always gain permission to use personal data when the data is collected as set out in this Notice. This will be before You first use the Sites or Services. By using these Sites and Services, You signify Your continuing acceptance of this Notice and the Legal Notice. If You do not agree to this Notice, please do not use Our Sites and Services. Your continued use of the Sites and Services following the posting of changes to this Notice will be deemed Your acceptance of those changes.
If You have any questions about this Privacy Notice, the practices of the Sites and Services, or Your dealings with Us, please contact Us at: [email protected] or call us on 01924 229380. | http://www.andrelleducation.com/privacy-notice/ |
via our website and not to information collected offline.
By accessing or using the Site in any manner, including, but not limited to, visiting or browsing the Site or contributing content or other materials to the Site, you agree to be bound by these conditions.
Personal identification information
We may collect personal identification information from Users in a variety of ways, including,
but not limited to, when Users visit our site, register on the site, place an order, subscribe to the newsletter,
respond to a survey, fill out a form and in connection with other activities, services, features or resources
we make available on our Site. Users may be asked for, as appropriate, name, email address, mailing address,
phone number, credit card information. Users may, however, visit our Site anonymously. We will collect personal
identification information from Users only if they voluntarily submit such information to us. Users can always
refuse to supply personal identification information, except that it may prevent them from engaging in certain Site related activities.
Non-personal identification information
We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification
information may include the browser name, the type of computer and technical information about Users means of
connection to our Site, such as the operating system and the Internet service providers utilized and other similar information.
Web browser cookies
Our Site may use "cookies" to enhance User experience.
User's web browser places cookies on their hard drive for record-keeping purposes and sometimes to track
are being sent. If they do so, note that some parts of the Site may not function properly.
How we use collected information
Distribution Voltimage Inc. collects and uses Users personal information for the following purposes:
- To personalize user experience
We may use information in the aggregate to understand how our Users as a group use the services and resources provided on our Site.
- To improve customer service
Your information helps us to more effectively respond to your customer service requests and support needs.
- To improve our Site
We continually strive to improve our website offerings based on the information and feedback we receive from you.
- To process transactions
We may use the information Users provide about themselves when placing an order only to provide service to that order. We do not share this information with outside parties except to the extent necessary to provide the service.
- To send periodic emails
The email address Users provide for order processing, will only be used to send them information and updates pertaining to their order. It may also be used to respond to their inquiries, and/or other requests or questions. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email or User may contact us via our Site.
How we protect your information
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.
Sensitive and private data exchange between the Site and its Users happens over a SSL secured communication channel
and is encrypted and protected with digital signatures. We are committed to maintaining
a high degree of confidentiality by incorporating the latest technological innovations
to ensure the confidentiality of your transactions. However, since no mechanism offers maximum security,
there is always a risk involved when using the Internet to transmit personal information.
Sharing your personal information
We do not sell, trade or otherwise transfer your information personally
identifiable to third parties. This does not include trusted third parties that help
to operate our Website, conduct our business or assist you. Know that
the third parties involved are bound by a strict confidentiality protocol.
However, we may disclose your information when we think it is appropriate
to respect the law, to enforce the rules of our site or to protect
the rights, property or safety of our partners or third parties.
That said, non-personally identifiable visitor information may be
provided to other parties for marketing, advertising, etc.
Third party websites
Users can find advertising or other content on our Site that link to the sites and services of our partners,
suppliers and other third parties. These third party sites and services have
privacy policies that are distinct and independent. We therefore have no responsibility for the content /
the activities of these linked sites. In addition, such sites or services, including their content and links,
can change constantly. Nevertheless, we seek to protect the integrity of our site and to receive your comments on these sites.
Distribution Voltimage Inc. has the discretion to update this
at the bottom of this page. We encourage Users to frequently check this
page for any changes to stay informed about how we are helping to
protect the personal information we collect. You acknowledge and agree
periodically and become aware of modifications.
Your acceptance of these terms
terms of service. If you do not agree to this policy, please do not use our Site.
Your continued use of the Site following the posting of changes to this
policy will be deemed your acceptance of those changes.
Contacting us
or your dealings with this site, please contact us :
Email : [email protected]
Address : 574 Max Gros-Louis street, Wendake, Qc, G0A 4V0
Phone : 418-838-3711
This document was last updated on April 19th 2020. | https://voltimage.com/privacy |
Orbitel Comunicaciones Latinoamericanas S.A.U. and Cinco Telecom Corp., affiliated companies of UNE EPM Telecomunicaciones S.A. ESP, hereon known as ORBITEL, have a policy of data collection, management and protection. Personal data that USERS register on websites of any of these companies for any purpose, are directly collected, managed and controlled in accordance with appropriate laws and privacy and data protection policies established by ORBITEL, which are detailed below pursuant to such laws.
Henceforth, for all purposes of this document, the term USER will refer to any individual or legal person who uses services provided through ORBITEL websites.
ORBITEL commits to protect the privacy of personal data that it collects from USERS from any of the websites of any of its three companies in United States and Spain, the last one in accordance with Organic Law 15/1999, of Protection of Personal Data and its implementation regulations and therefore uses technical, physical and administrative safeguard policies to protect the use and collection of such confidential information.
How is the information provided by the USER to ORBITEL protected?
Personal information that is provided and which enables the identification of a specific person (such as name, address or email address) or any other information that could compromise the privacy of the USER will be used by ORBITEL strictly for purposes that enable USERS to be recognized as registered USERS at ORBITEL websites, where USERS have registered such data on order to use the services of this site, to facilitate navigation on this website and to promote its products or services. In Spain, such information will be incorporated into a file owned by ORBITEL duly registered with the Spanish Agency for Data Protection.
In no case will personal data provided be transferred to a third party, and in the case that a transfer of data might take place, express, informed and unequivocal consent shall be requested from USERS.
Notwithstanding the foregoing, in accordance with Article 12 of the Organic Law 15/1999 of Protection of Personal Data, personal information provided may be disclosed to third parties that directly or indirectly serve ORBITEL or access to it by such third parties, if it is required to process or lead to the execution of transactions performed by the user on an ORBITEL site.
In addition ORBITEL shall share a user's personal information with its affiliated companies: 1) for the purpose of enabling them to recognize those who are registered USERS on their websites so that they can use all services provided at each site as well as to facilitate navigation, and 2) so that these subsidiaries can include registered USERS within their website's marketing and advertising activities for products and telecommunications and electronic communications services offered by them, on condition the USER has given authorization.
In order to prevent unauthorized access or disclosure and therefore to ensure appropriate use of information, ORBITEL provides a Secure Sockets Layer (SSL) session using encryption when collecting or transferring information that the USER has entered.
What are the responsibilities of the USER?
When entering their data onto any ORBITEL website, USERS make a commitment to provide true and accurate personal information as well as to update their data whenever it is required, in accordance with the procedures for data updating published on these sites. When accessing the consultation services of a specific website (if it has them), registration and identification of USERS by their USERNAME and PASSWORD will be required. Registration data must be kept by the USER, who will assume full responsibility for its management. In the event that the USER forgets his/her password, ORBITEL will provide a new temporary password via email, enabling the USER to regain access to services and data. The USER is responsible for changing the temporary password for a new one which he/she must choose as soon as possible.
In any event, USERS may at any given time exercise their right to access, rectify, cancel and oppose the personal information provided using the Online Store and Customer Service Line.
What other information can the USER access?
ORBITEL websites provide a link to third party websites which are not directly handled by ORBITEL in order to consolidate some of the USER´s transactions and / or to provide additional services under ORBITEL's trade policies. When USERS access these links, they are leaving the ORBITEL website and therefore ORBITEL can not guarantee nor be held responsible for information, security and privacy information policies, and in general, for any content or transaction made in these pages.
What use can ORBITEL give to the information provided by the USER?
ORBITEL utilizes personal information provided by the USERS in order to understand their needs and provide better services. It also uses this information to help the USER realize transactions, as well as to keep in touch with them and keep them informed of products, services and offers, and to customize its websites. However, when sending commercial or advertising emails, the USER will always retain the power to delete himself/herself from the mailing lists according to the procedure outlined in the respective site.
How ORBITEL handles USERS' information in relation to third parties?
ORBITEL guarantees USERS that all data contained in its database, is completely private and will not be disclosed under any circumstances. ORBITEL will not sell, share, rent, or pass a USER´s personal information to any third party unless it previously has the USER´s consent or when it is requested to do so by a competent authority.
In relation to USER'S personal information, and notwithstanding the foregoing, ORBITEL may share this information, or permit third parties which directly or indirectly serve ORBITEL to access it, whenever it is required in order to process or execute transactions performed by the USER on an ORBITEL website. In accordance with Article 12 of the Organic Law related to Data Protection, processing of information by third parties must be regulated by means of a contract established between the data controller (ORBITEL) and the processor (the third party providing the service).
Data collected online by ORBITEL may also be combined with other information provided by the USER as a customer of ORBITEL's products or services.
How does ORBITEL protect information from children under 13 years of age?
ORBITEL services are not intended for children under 13 years of age. ORBITEL does not allow registration of under age children and when known that a child is under age, cannot collect their personal information without parental consent.
How does ORBITEL protect a USER´s CPNI?
CPNI means Customer Proprietary Network Information. ORBITEL uses CPNI only for the purpose of payment processing, or to provide information related to USER´s balance or calls made and in general to provide the service the USER may need. Currently ORBITEL does not use CPNI for marketing or advertising purposes, but if in the future it decides to do so, it will only be used for services ranking in the same category as those rendered by ORBITEL (international telecommunications services), and the USER also has the right to reject reception of advertising information. ORBITEL will also take every precaution necessary to protect and discover unauthorized access to USER's CPNI, as well as to verify USERS' identity before disclosing any information related to USER´s calls.
For services such as CALLING CARDS, ORBITEL RECHARGEABLE, NUMBER OF YOUR COUNTRY and MOBILE ORBITEL which are sold directly on its website, USERS are verified by means of their user ID and password before they may access any CPNI. All CPNI exchanged between the USERS and the ORBITEL website is sent and received encrypted. In addition, ORBITEL may only disclose CPNI when the person who has called is the USER, and when he/she provides correct information that permits himself/herself to be clearly identified, otherwise ORBITEL will forward the information requested directly to the registered USER´s email address.
How can USERS cancel their registration?
As mentioned above, USERS may at any given time exercise their right to access, rectify, cancel and oppose the personal information provided using the Online Store and Customer Service Line.
ORBITEL clarifies that it is not undertaking any contest where the USERS are required to make mass purchases of a product or to deposit money in exchange for awards: avoid deception. DO NOT PROVIDE PERSONAL INFORMATION AND DO NOT MAKE PAYMENTS IN LIEU OF AWARDS.
This situation arises when swindlers contact USERS with a call or text message, posing as employees of ORBITEL, announcing that they are the lucky winners of prizes such as top-range cars. Criminals take advantage of the confusion created, to ask for large sums of money in exchange for prizes or request information from the victim, family or friends, in order to perform the same criminal act with those close to the affected party.
To learn about contests, current promotions and privacy recommendations kindly visit www.orbitel.com or call the Customer Service Line.
These are data containing small amounts of information, which are stored in the user's web browser when a website is accessed. Cookies serve several purposes: for identification purposes on a web site, to personalize its appearance according to user preferences, to improve services being offered, etc.
What kind of cookies do we use at Orbitel.com?
Technical cookies. These allow the user to navigate a web page, platform or application and to use a variety of options or services, including, for example, controlling data traffic and communications, session identification, accessing parts of restricted access, remembering elements of an order, purchasing orders, making requests for registration to an event, using security features while browsing, storing contents for video or sound broadcasting or sharing content via social networks.
Analysis cookies: This kind of cookie gathers information about how visitors use a website, i.e. most visited pages or if users receive error messages from web pages. These cookies do not collect information related to the identification of a visitor. All information collected by these cookies is merged, and is therefore anonymous. This information is only used to improve the functioning of a website.
__utma, __utmb , __utmc _utmz Google These cookies enable the operation of Google Analytics Software. This helps Orbitel to analyze information from visitors, such as the usage of the browser, the number of visitors and the length of their stay.
Data stored in these cookies can be viewed only by Google and Orbitel and exclude any personal information.
Advertising cookies.Sometimes a user's preferences are used on the web to show personalized advertising.
The so called "Session cookies"are automatically deleted when you close your browser.
Disabling cookies. At any time, users can accept or reject the installation of cookies, or decline the installation of a specific type of cookie. In addition, after each session you can delete all or some of the stored cookies.
In addition, users can turn on private browsing, by which your browser lets you save your browsing history, passwords, web sites, cookies and other information related to the pages you visit, or the "not trace" function, by which the browser asks the web sites you visit not to track your browsing habits, in order, for example, to provide personalized ads on the sites you visit. You can also look up in your browser's help tool for information about the various options on how to manage cookies. | https://www.orbitel.com/en/privacy-us |
Our policy may be summarized as follows:
We do not collect Personal Information on our web sites without your knowledge and your voluntary action of providing the requested information while online.
We will use the Personal Information you provide on our web sites to:
Create your user profile at your request and customize your online experience according to your chosen interests and preferences.
Process and record your requested online transactions, such as:
Placing an order for products.
Signing up to receive catalogs.
Contacting us with your questions or comments.
We my send you by e-mail, news, special offers and promotions regarding products and services offered by us, as part of your user profile, if you request to receive such information.
Occasionally solicit your opinion through online surveys.
We will not share, transfer or sell Personal Information you provide on our web sites outside of our organization without your consent, unless legally required, as part of a business transfer or if done on an anonymous, aggregated basis for statistical purposes.
You may view, correct or remove Personal Information associated with your user profile (including changing your election to receive e-mail communications).
We will take commercially reasonable steps to protect the security of Personal Information collected on our web sites.
As used in this policy, the term “we,” “us,” and “our” refers to Nuri & Ash.
By visiting our web site, you are accepting the practices described in this policy. Your visit to our web site and any dispute over privacy is subject to this policy and our Terms and Conditions (“conditions”), including limitations on damages and application of the law of the United States Virgin Islands. Just as our business changes constantly, this policy and the conditions may also change. As our policy is dated, please check our web site frequently to see recent changes. If you have any questions or concerns about privacy on our web sites, please send us a detailed e-mail to [email protected].
The preceding language summarizes Internet data collection procedures on our web sites. Additional detail about our policy is also available because we want you to make an informed decision about the extent of your use of our web site and the Personal Information you choose to provide while online. The remainder of the policy describes in detail our practices regarding the handling of Personal Information on our web site.
Legal/Privacy Statement
We want you to get the most out of this site and to trust that we make every effort to protect your confidentiality. Personal information is either requested or required on many areas of this site, to verify your identity and ensure that you qualify to use particular sections of the site. The amount and type of information received depends on how you use this site. The information may be stored and used in order to enhance your experience. Please take a few minutes to read our complete privacy statement so you can understand how information is used and the specific measures we take to protect your Personal Information. This page describes the policies of our company regarding any information we receive about you, while visiting this site.
Privacy Statement Revisions
A revised privacy statement will only apply to data collected subsequent to its effective date on this version of the web site. Any revisions will be posted at least 7 days prior to its effective date. New versions of this web site may have a new privacy statement effective with its launch.
Normal Website Usage. The only data we collect and store during normal website usage is typical web server log data. Examples of this type of data are: the name of your Internet service provider, the site that referred you to us, any pages you request, and the time and date of those requests etc. We use this information to generate statistics and measure site activity to benefit users of this site. This same information may be shared with third parties in order to provide these services or to analyze, store, or aggregate the information. It may also be shared with other third parties, working with us to improve our services or this website.
Collection of Personally Identifiable Information
There are instances where we request personally identifiable information to provide site visitors with a service. This information, such as name, mailing/shipping address, email address, payment related information and type of request, is collected and stored in a manner appropriate to the nature of the request to fulfill your needs. This information may also be provided to our agencies for use on our behalf in accordance with our proscribed privacy statement. However, it is never provided or sold to any other company for that company’s independent use. During the course of your visit, you may move to other websites, including the sites designed specifically intended to provide more information about other products and services. In addition, this site may provide links to third party sites not controlled by Nuri & Ash. It is recommended that you check the specific privacy statements of any site before providing any personally identifiable information.
To use our Digital catalog, we also require a certain amount of personally identifying information. That information may be in the form of a name, shipping/billing address, payment information or other personally identifiable information. We use this information to verify that you are an authorized purchaser for whom this site was constructed or meet the criteria required to process your request. We may also use this information to enhance our understanding of you and improve our services.
Electronic Mail Containing Personal Information
Website users may decide to send personally identifying information via email. We will use this information for the purpose identified in the email message and to enhance our understanding of you in order to improve our services to you.
Copyrite Notice
All rights reserved. All text, images, graphics, animation, videos, music, sounds, and other materials on this website (“site”) are subject to the copyrights and other intellectual property rights of Nuri & Ash. Nuri & Ash either owns or has been granted permission to the copyrights in the selection, coordination, and arrangement of the materials on this site. These materials may not be copied for commercial use or distribution, nor may these materials be modified or re-posted to other sites. | https://nuriandash.com/pages/terms |
PLEASE READ THIS PRIVACY STATEMENT CAREFULLY BEFORE USING ANY OF THIRDWAVE'S SERVICES DESCRIBED BELOW. BY USING ANY SUCH SERVICES YOU ARE ACKNOWLEDGING THAT YOU HAVE READ AND UNDERSTAND THIS POLICY AND THAT YOU AGREE TO BE BOUND BY ITS TERMS. IF YOU DO NOT AGREE TO BE BOUND BY THE TERMS OF THIS PRIVACY STATEMENT, SIMPLY EXIT THIS PAGE WITHOUT ACCESSING OR USING ANY OF OUR SERVICES.
Thirdwave is the sole owner of the information collected on the Website. We will not sell, share or rent this information to others in ways different from what is disclosed in this statement, without first obtaining your consent. Information collected is used to register the user for certain selected services (e.g. financial information) and to contact the user about such services (e.g. e-mail address).
Every computer connected to the Internet is given an IP address.We use IP addresses to analyze trends, administer the Website, track users' movement and gather broad demographic information for aggregate use. IP addresses are not linked to personally identifiable information, and our web servers do not record the e-mail addresses of our visitors.
As a general rule, except as described in this privacy statement, we will not disclose any of your personally identifiable information except when we have your permission or under special circumstances (such as when we believe the law requires it). We may disclose or share aggregated demographic information with certain partners, affiliates and advertisers, however, except as described above, this is not linked to any personal information that can identify any individual person. In addition, Thirdwave may disclose account or other personal information when we have reason to believe that disclosing this information is necessary to identify, contact or bring legal action against someone who may be causing injury to or interference with Thirdwave's rights or property, other Website users or anyone else that could be harmed by such activities.
This Website may contain links to other websites. Please be aware that we are not responsible for the privacy practices of such other websites, as this privacy statement applies solely to the Website. We encourage our users to remain vigilant when they leave our Website and to read the privacy statements of each and every website that collects personally identifiable information.
This Website takes numerous precautions to protect our users' information. When users submit sensitive information via the Website (e.g. credit card information), such information is protected both on- and offline. We encrypt certain sensitive information using Secure Socket Layer (SSL) technology to ensure that our visitors' information is safe as it is sent over the Internet to our server. SSL works by using a private key to encrypt data that is transferred over the SSL connection. In addition, all of our users' sensitive information is restricted in our offices. While Thirdwave employs commercially reasonable security measures to protect our data and seeks to partner with companies which do the same, we cannot absolutely guarantee the security of any data transmission over the Internet or any wireless network. Unfortunately, no data transmission over the Internet or any wireless network can be guaranteed to be 100% secure, and we therefore are not responsible for any breach of security or for any actions of any third parties that may receive any such information.
If your personally identifiable information changes at any time, please send an e-mail to [email protected].
Our users are given the opportunity to "opt-out" of receiving communications from Thirdwave by sending us an e-mail at [email protected].
If we decide to change our privacy statement, we will post those changes under the appropriate link on the "home page" of our Website so our users are always aware of what information we collect, how we use it and under what circumstances, if any, we disclose it. The new terms shall be effective 10 days after they are initially posted on the Website. It is the responsibility of each user to review the latest terms from time to time, and if any user does not agree with any updates to the privacy statement, such user should immediately cease use of the Website and purchased services. | https://www.thirdwavellc.com/privacy/ |
Privacy Officer
Iredeem
Email: __________________________
Iredeem is committed to providing its Members and other users of our website with an Internet experience that respects and protects their personal privacy. Our privacy policies and practices are detailed below, and we ask that you read them thoroughly. In order to provide services to our Members,we are required to collect, use and disclose some of our Members’ Personal Information. Our policy is based on the following three pledges we make to our Members:
(a) We pledge that we will not release personal information about you without your permission, except as needed to provide you the services you have expressly requested, as explained in greater detail in the section on"Third Party relationships" below.
(b) We pledge that we will provide you with the means to communicate with us to enable you to manage and control the information that you have voluntarily provided to us.
(c) We pledge that we will provide the mechanisms for you to communicate your privacy questions and concerns to us and that we will respond to them thoughtfully and thoroughly.
02 Coverage
03 Helpful Definitions
(a) Personal information is identifiable information about you, such asy our name, address, telephone number, e-mail address, credit card information, date of birth, and the nature, frequency and type of services used by you. The amount and nature of the Personal information that you may provide us will depend on the type of products or services you request.
(b) Anonymous information is not personal information. Anonymous information is information about people that cannot be used to identify individuals. Anonymous information includes information about how our site is used, such as places visited, searches performed, the domain names and/or IP addresses (as explained in greater detail below) of browsers that visit our Site, time of day the Site was visited, and other non-personal information. Anonymous information is information that is not tied to any individual, but helps identify characteristics of Iredeem Members as a group (for example, the average stay on the site and average number of visits in a given period).
04 Collections and Use of Personal Information
We want to assure visitors that they can visit our Site without telling us who they are or revealing any personal information about themselves to us. It is only upon becoming a Member of Iredeem that personal information is collected from you.
We collect, and use personal information of Members only as required to provide our Services or with the consent (and at the option) of the Member if it is not required. We store and retain all information including personal information for as long as is required to provide the Services or as may be required by applicable laws. We are located in Alberta and store all of the information we collect in Alberta,so we are governed by the AlbertaPersonal Information Protection Act. If you reside outside of Alberta, please be aware that the law in your area does not apply.
05 Sharing Personal Information with Third Parties
Iredeem shares only the personal information provided by Members in accordance with the policies described in the section on Third Party relationships below. PLEASE NOTE: In certain special cases, we may disclose your personal information when we have reason to believe that disclosing this information is necessary to identify, contact, or bring legal action against someone who may be causing injury to you, or otherwise injuring or interfering with Iredeem’s rights, property or operation, other Iredeem Members, or anyone else who could be harmed by such activities. We may also disclose your personal information when we believe the law permits or require sit, or in response to any demand by law enforcement authorities in connection with a criminal investigation, or civil or administrative investigation.
06 Anonymous Information
07 Cookies: How They Are Used and Opting-Out
A "cookie" is a small piece of datum that is sent to your browser from a web server and stored on your computer's hard drive. Cookies do not damage your system or impair functioningin any way. Our Site only uses session cookies, which are cookies that are stored in temporary memory and are not retained after your browser is closed.Session cookies do not collect information from the user's computer and typically store information in the form of a session identification that does not personally identify the user.
08 Special Categories of Information
Iredeem will not collect, use or disclose any personal information about our Members that is of a highly sensitive nature and that is obviously not needed for the Services, such as personal information of a medical, financial (other than payment information that is provided for the Services), or sexual nature. When we collect payment information, such as credit card information, we use it only for the purposes of processing the transaction and such financial information shall be deleted immediately afterwards.
09 Uses of IP Addresses
(1) An Internet Protocol (IP) address is a set of numbers that is automatically assigned to your computer whenever you log on to your Internet service company or through your company's local area network (LAN) or wide area network (WAN).Web servers automatically identify your computer by the IP address assigned to it during your session online.
(2) Iredeem may collect IP addresses for purposes of system administration, to report anonymous user information to our advertisers and Third Party partners, and to audit the use of our Site. We do not ordinarily link a user's IP address to personal information of that user, which means each user's session will be logged, but the user remains anonymous to us. However, we can and will use IP addresses to identify Members of our Site when we feel it is necessary to enforce compliance with our Site's terms and conditions of use or terms of service, or to protect our service, or other Members.
PLEASE NOTE: Under certain circumstances, IP addresses and/or domain names may be linked to personal information, when said information is stored in databases managed by Internet registries. We do not collect, use or disclose that information.
10 Third Party Relationships
(1) Iredeem works with partner businesses (the "Third Parties") to provide its Members with high quality and tailored shopping and entertainment experiences at a wide and growing number of venues. As part of its Service, Iredeem shares the minimum necessary personal information with these Third Parties. Some of these Third Parties have their own privacy policies and we encourage Members to make every effort to read the privacy policies provided by or in association with Third Parties to make an informed decision whether or not to continue using the Third Parties’ services based on the privacy policies posted on these related Websites or Third Party partners. However, we will make every effort to ensure that you have the ability to opt-out of the sharing of such data with Third Party partners. You may e-mail us directly at ___________ and we will forward your request to the appropriate company, and help you follow up to ensure that your concerns are adequately handled.
11 Securities
1) Iredeem operates a secure data network protected by industry standard fire wall and password protection. Iredeem has security measures in place to protect against the loss, misuse and alteration of your user data under our control.
(2) Only authorized employees have access to information you provide us. For example, we impose strict rules on Iredeem employees who have access either to the databases that store user information or to the servers that host our services. While we cannot guarantee that loss,misuse or alteration to data will not occur, we make every effort (such as the use of employee passwords and non-disclosure agreements) to prevent such occurrences.
12 Contacting Us
Privacy Officer
Iredeem
Email:
(2) You can send an e-mail to _________________. | http://partner.iredeem.com/PrivacyPolicy.aspx |
This privacy statement’s intention is to inform the users of this website about the nature, scope and purpose of the collection and use of personal data by the website owner. The website owner takes your data protection very seriously and treats your personal data confidentially and according to the legal regulations. Since the new technologies and the constant further development of this website may result in changes to this privacy statement, we recommend that you read the privacy statement at regular intervals. Definitions of the terms used (e.g.: "personal data" or "processing") can be found in Art. 4 GDPR.
Responsible authority
care4you products GmbH located at Hans Olden Str. 12, 3134 Franzhausen, Austria is responsible for all personal information collected and processed by this website.
Personal data and the use thereof
You need an account to be able to purchase from us. Such an account contains personal data such as the name, address or the e-mail address, but no payment data whatsoever. The data will be stored in our database for later processing upon your login.
This data is collected for processing of the concluded contractual relationship (purchase contract), so that your ordered goods ordered can be delivered.
Forwarding of your data takes place only to the minimum necessary extent as it is necessary for the contract, on a legal basis or if a justified interest in the business of involved (third parties) exists. Recipients can be: Forwarding companies, transport companies, post offices, post office partners, tax offices and other authorities, tax consultants and legal representatives (in the enforcement of rights or defence of claims or within the framework of official proceedings) and companies which are commissioned within the framework of the support of our internal IT infrastructure (software, hardware).
Your payment data
Your payment data shall not be saved in your account. You can choose a payment method during each ordering process. All digital payment methods (credit card, PayPal and direct transfer) are processed by the corresponding third parties.
Kindly take notice of the privacy statement of: Paypal and the Sofort AG.
How save is my personal information?
While developing our systems and devices, we take your security and privacy into account.
- To protect the security of your information during data transfer, we use the Secure Sockets Layer (SSL) software. This software encrypts the information you transfer.
- Our devices provide security features to protect against unauthorised access and data loss.
- It is important for you to protect yourself against unauthorised access to your password, computers, devices and apps. If you share your computer with others, make sure to log out after each session.
Usage data
Information that care4you products GmbH (or third party services that care4you products GmbH uses) automatically collects, e.g.: the IP addresses or domain names of the computers of users who use care4you products GmbH, the URI addresses (Uniform Resource Identifier), the time of the request, the method used to send the request to the server, the size of the received response file, the numerical code indicating the status of the server response (successful result, error, etc.), the country of origin, the functions of the browser and operating system used by the user, the various times per call (e.g.: how much time was spent on each page of the application) and information about the path followed within an application, in particular the order of visited pages, and other information about the operating system of the device and/or the IT environment of the user.
Google Services
Google-Analytics
Based on our legitimate interests, this website uses the following data to optimise and analyse our online offers within the meaning of Art. 6 Para. 1 lit. f. GDPR uses the service "Google Analytics", which is provided by Google Inc. (1600 Amphitheatre Parkway Mountain View, CA 94043, USA). The service (Google Analytics) uses "cookies" - text files which are stored on your terminal device. The information collected by the cookies is usually sent to a Google server in the USA and stored there.
Google LLC complies with the European data protection laws and is certified under the Privacy-Shield Agreement: https://www.privacyshield.gov/participant?id=a2zt000000001L5AAI&status=Active
This website uses IP-anonymisation. The IP address of the users is shortened within the member states of the EU and the European Economic Area and in the other contracting states of the agreement. Only in individual cases is the IP address initially transmitted unabbreviated to a Google server in the USA and then shortened there. The personal reference of your IP address is omitted during the shortening process. The IP address of the user forwarded by the browser is not combined with other data stored by Google. Under the terms of the order data agreement, which we have concluded with Google Inc. as the website owner, Google Inc. uses the information collected to compile an analysis of the website usage and website activity and to provide services relating to the internet usage.
The data collected by Google on our behalf is used to evaluate the use of our online services by individuals, e.g.: to create reports on website activity in order to improve our online services. You have the option of preventing cookies from being stored on your device by undertaking the appropriate settings in your browser. It is not guaranteed that you can access all functions of this website without restrictions if your browser does not allow cookies. You can also use a browser plug-in to prevent the information collected by cookies (including your IP address) from being sent to Google Inc. and used by Google Inc.
The following link will take you to the appropriate plug-in: https://tools.google.com/dlpage/gaoptout?hl=de. Alternatively, by clicking on this link deactivate Google Analytics, you can prevent Google Analytics from collecting data concerning you within this website. Click on the link above to download an “opt-out cookie”. Therefore, your browser must always allow the storage of cookies for this purpose. If you delete your cookies on a regular basis, you will need to click the link again each time you visit this website.
YouTube
YouTube plug-ins are included on our pages. The provider is YouTube, LLC, 901 Cherry Ave, San Bruno, CA 94066, USA; the operator is Google.
If you enable playback of a YouTube video embedded in our website and are logged into your YouTube account, YouTube's server will be notified which of our pages you have visited. YouTube associates this information about your browsing behaviour with your user profile. If you do not wish this, kindly log out of your YouTube account.
Here you will find further information on the data usage by Google Inc:
https://policies.google.com/privacy/partners?hl=de (data collected by Google partners) https://adssettings.google.de/authenticated (settings concerning advertisements shown to you) https://policies.google.com/technologies/ads?hl=de (using cookies in the advertisements)
Cookies
Of course, you can visit our pages without cookies enabled. If you do not wish us to recognise your computer, you can disable storing cookies on your hard drive by selecting "Do not accept cookies" in your browser settings. You can find out how this works for your browser by consulting the instructions provided by your browser publisher. However, if you do not accept cookies, this may lead to functional limitations of our offers.
You can prevent the installation of cookies by undertaking the appropriate settings in your Internet user program (browser). To do this, you must deactivate the storage of cookies in your browser. For more information, please refer to the user instructions of your browser.
Session-Cookie
The so-called session cookie for the login status and shopping cart is an exception. You should not delete this one, as in such cases we cannot guarantee the complete functionality of our online shop. The session cookie is automatically deleted after the browser is explicitly closed (Note: If you only close the current window (tab), it will not be deleted).
Right to information and revocation
You can view the information about your person in the "My Account" section of our website. This information includes your name, address, profile information and your past orders.
You will receive information about your personal data stored by us free of charge at any time without giving reasons. You can block, correct or delete your data at any time. You can also revoke your consent to data collection and use at any time without giving reasons by deleting your customer account.
Storage periods
The data will be kept in our systems until you delete your account or until the legal retention periods apply or limitation periods for potential legal claims have expired.
If you believe that the processing of your data violates the data protection law or your data protection claims have been violated in any way, you are free to file a complaint with the data protection authority.
Changes to the privacy statement
The responsible authority reserves the right to make changes to this privacy statement at any time by informing the users on this page. Therefore, the users are advised to visit this page regularly and check the date of the last change indicated at the bottom of the page. If a user does not recognise a change to this privacy statement, they are no longer able to use the services of care4you products GmbH any more and can request the responsible authority to delete their personal data. Unless stated otherwise, the current privacy statement applies to all personal data stored by the responsible authority about a user. | https://coverhair.com/Privacy |
Last updated: June 24, 2014
Please read these Terms of Service ("Terms", "Terms of Service") carefully before using the http://www.jolrecruiting.com website (the "Service") operated by JOL Recruiting ("us", "we", or "our").
Your access to and use of the Service is conditioned on your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who access or use the Service.
By accessing or using the Service you agree to be bound by these Terms. If you disagree with any part of the terms then you may not access the Service.
Links To Other Web Sites
Our Service may contain links to third-party web sites or services that are not owned or controlled by JOL Recruiting.
JOL Recruiting has no control over, and assumes no responsibility for, the content, privacy policies, or practices of any third party web sites or services. You further acknowledge and agree that JOL Recruiting shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such web sites or services.
We strongly advise you to read the terms and conditions and privacy policies of any third-party web sites or services that you visit.
Termination
We may terminate or suspend access to our Service immediately, without prior notice or liability, for any reason whatsoever, including without limitation if you breach the Terms.
All provisions of the Terms which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity and limitations of liability.
Governing Law
These Terms shall be governed and construed in accordance with the laws of Texas, United States, without regard to its conflict of law provisions and excluding the United Nations Convention on Contracts for the International Sale of Goods (CISG).
Our failure to enforce any right or provision of these Terms will not be considered a waiver of those rights. If any provision of these Terms is held to be invalid or unenforceable by a court, the remaining provisions of these Terms will remain in effect. These Terms constitute the entire agreement between us regarding our Service, and supersede and replace any prior agreements we might have between us regarding the Service.
Changes
We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a revision is material we will try to provide at least 30 days notice prior to any new terms taking effect. What constitutes a material change will be determined at our sole discretion.
By continuing to access or use our Service after those revisions become effective, you agree to be bound by the revised terms. If you do not agree to the new terms, please stop using the Service.
Generated with permission from TermsFeed
Contact Us
If you have any questions about these Terms, please contact us.
Personal identification information
We may collect personal identification information from Users in a variety of ways, including, but not limited to, when Users visit our site, register on the site, place an order, subscribe to the newsletter, respond to a survey, fill out a form, and in connection with other activities, services, features or resources we make available on our Site. Users may be asked for, as appropriate, name, email address, phone number, social security number. Users may, however, visit our Site anonymously. We will collect personal identification information from Users only if they voluntarily submit such information to us. Users can always refuse to supply personally identification information, except that it may prevent them from engaging in certain Site related activities.
Non-personal identification information
We may collect non-personal identification information about Users whenever they interact with our Site. Non-personal identification information may include the browser name, the type of computer and technical information about Users means of connection to our Site, such as the operating system and the Internet service providers utilized and other similar information.
Web browser cookies
How we use collected information
JOL Recruiting may collect and use Users personal information for the following purposes:
- To improve customer service
Information you provide helps us respond to your customer service requests and support needs more efficiently.- To personalize user experience
We may use information in the aggregate to understand how our Users as a group use the services and resources provided on our Site.- To improve our Site
We may use feedback you provide to improve our products and services.- To process payments
We may use the information Users provide about themselves when placing an order only to provide service to that order. We do not share this information with outside parties except to the extent necessary to provide the service.- To run a promotion, contest, survey or other Site feature
To send Users information they agreed to receive about topics we think will be of interest to them.- To send periodic emails
We may use the email address to send User information and updates pertaining to their order. It may also be used to respond to their inquiries, questions, and/or other requests. If User decides to opt-in to our mailing list, they will receive emails that may include company news, updates, related product or service information, etc. If at any time the User would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email or User may contact us via our Site. How we protect your information
We adopt appropriate data collection, storage and processing practices and security measures to protect against unauthorized access, alteration, disclosure or destruction of your personal information, username, password, transaction information and data stored on our Site.
Our Site is in compliance with PCI vulnerability standards in order to create as secure of an environment as possible for Users.
Sharing your personal information
We do not sell, trade, or rent Users personal identification information to others. We may share generic aggregated demographic information not linked to any personal identification information regarding visitors and users with our business partners, trusted affiliates and advertisers for the purposes outlined above.We may use third party service providers to help us operate our business and the Site or administer activities on our behalf, such as sending out newsletters or surveys. We may share your information with these third parties for those limited purposes provided that you have given us your permission.
Third party websites
Users may find advertising or other content on our Site that link to the sites and services of our partners, suppliers, advertisers, sponsors, licensors and other third parties. We do not control the content or links that appear on these sites and are not responsible for the practices employed by websites linked to or from our Site. In addition, these sites or services, including their content and links, may be constantly changing. These sites and services may have their own privacy policies and customer service policies. Browsing and interaction on any other website, including websites which have a link to our Site, is subject to that website's own terms and policies.
Advertising
Compliance with children's online privacy protection act
Protecting the privacy of the very young is especially important. For that reason, we never collect or maintain information at our Site from those we actually know are under 13, and no part of our website is structured to attract anyone under 13.
Your acceptance of these terms
By using this Site, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our Site. Your continued use of the Site following the posting of changes to this policy will be deemed your acceptance of those changes.
Contacting us
JOL Recruiting
jolrecruiting.com
PO Box 110788 Carrollton, TX 75011
[email protected]
This document was last updated on June 19, 2014
Copyright © 2020 JOL RECRUITING. All Rights Reserved. | http://jolrecruiting.com/privacy-policyterms-of-service |
Your Privacy
Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used. You agree to agree to these policies by virtue of using our website in a way that leads to you providing us with personal information.
State Law & Accompanying Rights
Please understand that you may have additional rights originating from State laws based on where you live. These State-based rights may augment, strengthen, or otherwise somehow compliment any privacy rights you have inherently or under Federal law. Our policy is to comply fully with the privacy policies of every jurisdiction in which we operate. Accordingly, you are free to use our Contact information to reach us at any time to assert any State rights.
Our Commitment To Children’s Privacy
Protecting the privacy of the very young is especially important. For that reason, our website will never collect or maintain information at our website from those we actually know are under 18, and no part of our website is structured to attract anyone under 18.
Under our Terms of Service and Conditions of Use, children under 18 are not allowed to use our website and access our services. It is not our intention to offer products or services to minors.
Collection of Personal Information
When visiting our website, the IP address used to access our website may be logged along with the dates and times of access. This information is purely used to analyze trends, administer our website, track users’ movement, and gather broad demographic information for internal use such as statistical assessments and website improvement. Most important, any recorded IP addresses are not linked to personally identifiable information.
Other information may be collected as well, which is typical of most websites. For instance, the source that referred you to our website is generally known. Likewise, your duration on our website and your destination when you leave our website can also be tracked. Other common data collected includes the type of operating system the computer you are using to access our website has. Similarly, the type of web browser is often noted. Again, this is common data collection and helps ultimately produce a better end-user experience.
Handling of Personal Information
Note that any personal information you provide to others apart from us or our vendors is wholly optional. As an example, you might disclose something in a blog post comment. That “private” information is now “public,” and we have no control over that. In like fashion, you sharing information with any other third party not functioning as a service provider to us puts that information beyond our control and becomes subject to the policy that party has in place.
Our primary intention for collecting personal and private information from you is simply to conduct our business. We can use this internally to better serve you. Accordingly, we see no reason to share your personal information with other parties and outside interests unless you have authorized us to do so. Of course, there are instances where your information is stored with third party service providers, such as email service providers, as they provide services that are industry-leading in quality and security and are far more beneficial to our end user than attempting such services “in-house.” However, you are never required to deal with any such third party directly; they are limited in how they use your information, and they cannot sell or transfer it to others in any way.
However, of course, your information does comprise part of an overall whole. This aggregate of information, by contrast, may be used to understand our overall user base. Further, we may share this information about our website visitors as a whole, not individually, with third parties for various purposes, in our sole discretion.
While we are staunch privacy advocates, there are times when even we may be forced to abandon these ideals. Just as major search engines face ongoing compulsion to provide data against their will, so too may the same occur with our website. Illegal activity or other serious acts or allegations could create legal liability for our website. In those cases, we reserve the right to share your information, or else may simply be compelled to do so by law. On the other hand, there may be times when we would need to share your private information in order to protect our own interests. For instance, in cases of suspected or alleged copyright infringement or other intellectual property violations, it may be necessary to share personal information.
Links to Third Party Websites
We have included links on this website for your use and reference. We are not responsible for the privacy policies on these websites. You should be aware that the privacy policies of these websites may differ from our own.
CHANGE NOTICE: As with any of our administrative and legal notice pages, the contents of this page can and will change over time. Accordingly, this page could read differently as of your very next visit. These changes are necessitated, and carried out, in order to protect you and our website. If this page is important to you, you should check back frequently as no other notice of changed content will be provided either before or after the change takes effect.
COPYRIGHT WARNING: The legal notices and administrative pages on this website, including this one, have been diligently drafted by an attorney. We have paid to license the use of these legal notices and administrative pages for your protection and ours. This material may not be used in any way for any reason and unauthorized use is policed via Copyscape to detect violators.
QUESTIONS/COMMENTS/CONCERNS: If you have any questions about the contents of this page, or simply wish to reach us for any other reason, you may do so by using our Contact information.
Terms Of Service & Conditions Of Use
The following describes the Terms of Service Conditions of Use for our website.
PLEASE READ THIS DOCUMENT CAREFULLY BEFORE ACCESSING OR USING OUR WEBSITE. BY ACCESSING OR USING OUR WEBSITE, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS SET FORTH BELOW. IF YOU DO NOT WISH TO BE BOUND BY THESE TERMS AND CONDITIONS, YOU MAY NOT ACCESS OR USE OUR WEBSITE. IF YOU DO NOT UNDERSTAND THESE TERMS AND CONDITIONS, DO NOT USE OUR WEBSITE. WE MAY MODIFY THIS AGREEMENT AT ANY TIME WITHOUT INDIVIDUAL, SPECIFIC NOTICE TO YOU, AND SUCH MODIFICATIONS SHALL BE EFFECTIVE IMMEDIATELY UPON POSTING OF THE MODIFIED AGREEMENT ON OUR WEBSITE. YOU AGREE TO REVIEW THE AGREEMENT PERIODICALLY TO BE AWARE OF SUCH MODIFICATIONS AND YOUR CONTINUED ACCESS OR USE OF OUR WEBSITE AFTER SUCH NOTICE SHALL BE DEEMED YOUR CONCLUSIVE ACCEPTANCE OF THE MODIFIED AGREEMENT, INCLUDING ANY AND ALL MODIFICATIONS, ADDITIONS, DELETIONS, OR OTHER CHANGES.
OUR WEBSITE AND CONTENT ARE PROVIDED ON AN ‘AS IS’ BASIS WITHOUT ANY WARRANTIES OF ANY KIND. OUR WEBSITE AND ITS SUPPLIERS, TO THE FULLEST EXTENT PERMITTED BY LAW, DISCLAIM ALL WARRANTIES, INCLUDING (BUT NOT LIMITED TO) THE WARRANTY OF MERCHANTABILITY, NON-INFRINGEMENT OF THIRD PARTIES RIGHTS, AND THE WARRANTY OF FITNESS FOR PARTICULAR PURPOSE. OUR WEBSITE AND ITS SUPPLIERS MAKE NO WARRANTIES ABOUT THE ACCURACY, RELIABILITY, COMPLETENESS, OR TIMELINESS OF THE CONTENT, SERVICES, SOFTWARE TEXT, GRAPHICS, AND LINKS.
By using this website, you agree to obey these Terms of Service and Conditions of Use. Please read them carefully.
You agree to obey all applicable laws and regulations regarding your use of our website and the content and materials provided in it. | https://southsidecoalition.org/privacy-policy/ |
Soutron Ltd ("us", "we", or "our"Limited (Soutron) operates a number of web-based database applications (the "application"Applications) these applications Applications are primarily managed and controlled by organisations we partner with (the “organisation"Soutron’s clients and its users (Users). This page informs you of details our policies policy regarding the collection, use and disclosure of personal information (Personal Information we receive ) received from users of our applications.
We use your Personal Information only for providing and improving the Site. By using the Site, you agree to the collection and use of information in accordance with this policy.
Information Collection And Use
While using our application, we or the organisation using our application may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited;
a) Users of Soutron’s Applications, services and visitors to its Website.
2. What type of Information do we collect?
We collect and store information provided to us by Users. For example, when setting up new users on the Application, Personal Information is required to set up, identify, validate and communicate with the User.
Personal Information may include but is not limited to;
a) Personal contact data, such as your name, email address, physical address and telephone numbers;
b) Account login details, such as your user ID, e-mail username and password. This is necessary to create a personal user account on one of our applicationswithin the Applications;
c) Communications with us A record of communications, which may include details of our conversations via chat, email, telephone and support portal;
d) Browser history , such as pages accessed, date of access, location when accessed, and IP address;
Your personal data may be collected so Soutron and/or the organisation can provide you Personal Information is collected so that Users can be provided with the best online experience when using our applications the Applications and to provide you with a high improve the quality of customer service. In particular, we services. Soutron may collect, hold, use and disclose your personal data Personal Information for the following purposesreasons:
a) To process and answer your enquiries and requests, and assess and handle any complaints;
b) To deliver, develop and improve our products, services, communication methods and the functionality of our applicationsApplications;
c) To communicate information to you Users and to manage your registration registrations and/or subscription to our newsletter Soutron newsletters or other communications;
d) To authenticate the identity of individuals contacting us Soutron by telephone, electronic means or otherwise;
e) To understand and assess the interests, wants, requirements and changing needs of customers, Users in order to improving our website, our current products and services, and/or developing new improve the Applications, the Soutron website and current and future products and services;
f) To provide personalized products and communications as well as product recommendations to you a customer;
Log Data
Like many site operators, we collect information that your browser sends whenever you visit our Site , services and communications. To investigate and prevent fraudulent activities, unauthorised access to the Applications and other illegal activities; and
g) For any other purposes about which Soutron notifies Users.
3. Log Data
Soutron may collect information sent from browsers whenever a User visits Soutron’s Website ("Log Data").
This Log Data may include information such as your the computer's Internet Protocol ("IP") address, browser type, browser version, the pages of our Site that you visitthe Soutron website that are visited, the time and date of your the visit, the time time spent on those pages each page and other statistics.
In addition, we Soutron may use third-party services such as Google Analytics that collect, monitor and analyse this data to allow us to improve improvement in the performance and delivery of our services. We Soutron may also use email service providers to deliver email on behalf of the organisation to deliver a function within our service which the organisation use.
Communications
Organisations using our service may use your Personal Information they have collected to contact you its behalf.
4. Communications
Personal Information collected may be used to contact Users with service updates, newsletters, marketing or promotional materials and other information. If you do not wish to receive such information, please contact the organisation responsible for the Soutron application you are using.
Third parties
Your personal data Users can Opt-Out at any time.
5. Third parties & sub Processors
Personal Information will not be shared, sold, rented or disclosed other than as described in this Privacy Statement. We Soutron may, however, share your data when required by law and/or with government authorities.
When we Where Soutron does need to share your personal data with other organizations, we make sure we only do so with organizations that safeguard and protect your personal data Personal Information with third parties, in order to deliver service such as web hosting and email delivery, Soutron will ensure that these third parties safeguard and protect Personal Information and comply with applicable privacy laws in the same or similar way that we do and only where it is necessary to deliver our service to you (i.e. web hosting and email delivery).
Your personal data will may be shared with the following third parties for the purposes described:
Third Party Name
Data type:
Access to data
Purposes:
Data Location
iCloudHostingAmito Ltd
All data
None
Hosting service for the Soutron application
UK / Germany
CeeJay CrashPlanMicrosoft Azure
All data
None
Provide data backup services
EUUK
SendGrid
Email address
Email address
Provide email delivery service
USA
|MailChimp||Name, Email address||Name, Email address||Provides marketing & Newsletter serviceUSA||USA|
6. Cookies
7. Security
We understand Soutron understands that the security of your personal data is important. We make our best efforts to protect your personal data Personal Information is important and appropriate technical, organisational and administrative security measures are used to protect any Personal Information held in its records from misuse, interference, loss, unauthorized unauthorised access, modification or disclosure. We have implemented a number of security measures to help protect your personal data. For example, we implement access controls, use firewalls and secure servers, and we encrypt passwords.
Your acceptance of these terms
By using this Site, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our application. Your continued use of the application following the posting of changes to this policy will be deemed your acceptance of those changes.
Contact Us
If you have User accounts are also protected by a password for privacy and security.
8. User Rights
Users can opt not to disclose information within Soutron Applications but this may affect delivery of services and/or Applications. If Personal Information has been stored in a Soutron Application and a User wished to discuss their privacy rights, initially please contact the Application administrator/controller.
9. Your acceptance of these terms
10. Contact Us
Please address any questions, comments or complaints regarding this Privacy Statement or the processing of your personal data , please contact us via to [email protected]. | https://documentation.soutron.net/pages/diffpagesbyversion.action?pageId=41910282&originalVersion=4&revisedVersion=12 |
In this post, we expose how vulnerable most businesses are to cyberattacks and what company management can do about it. Consider this; in the first half of 2019, data breaches exposed 4.1 billion records, and yet many companies mistakenly believe they’re impervious to a data breach.
This mindset is problematic as cybercriminals are becoming significantly more sophisticated, targeting all sized businesses with multi-tiered attacks. The threat of experiencing a data breach is massive. It’s a setback that could stall your fast-growing company for months. What’s worse, a data breach could bottleneck your progress indefinitely or cause you to shutter. Here’s how to protect your company from a harmful data breach.
What’s a Data Breach?
According to the US Department of Justice, a breach is:
“The loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where (1) a person other than an authorized user accesses or potentially accesses personally identifiable information (PII) or (2) an authorized user accesses or potentially accesses PII for an other than authorized purpose. It includes both intrusions (from outside the organization) and misuse (from within the organization).”
In short, a data breach occurs when a cybercriminal gains unauthorized access to private or personal files. In the past decade, cybercriminals have compromised over 100,000 digital files. Some of the most at-risk industries include Healthcare, SaaS, and Fintech, to name a few.
Unfortunately, the threat of data breaches has increased significantly since 2005, when companies moved from paper to digital. It’s safe to say that cybercriminals have come a long way since the 1970s computer virus, “the Creeper.”
Large-scale cyber attacks are no small worry for executives nowadays. In fact, among the top five risks to global stability include cyberattacks — but there’s room for improvement.
6 Ways to Protect Against a Data Breach
Here are a few practical ways a rapidly-evolving business can protect itself against these disruptive crimes.
1. Establish Identity Management
Ideas and practices flow from the head down, which means that cybersecurity starts with management. To begin with, company leaders must establish and enforce reliable identity management processes.
This cautious approach means:
- Handling access credentials properly
- Monitoring privileged account security policies
- Maintaining adequate IT support
- Keeping a password policy
- Require security awareness training
As mentioned, it’s not uncommon for company leaders to belong to an “it won’t happen to us” school of thought. Unfortunately, many victims of cyberattacks believed the same thing and became lax with their identity management.
Remember, the first line of defense against damaging threats is to safeguard the identity of your staff. This pragmatic approach will help to protect your business from a data breach.
2. Support Security Awareness
The four main strategies cybercriminals use to steal information include:
- Malware – malicious software that harmfully probes systems
- Ransomware – software that gains access to and then restricts access to vital information
- Phishing – scams where hackers gain access to confidential information
- Denial of Service (DoS) – attacks where the cybercriminal disrupts network resources
In the mid-90s, AOL was the first victim of the “phishing” strategy in As you might have guessed, rumbles of this stealthy strategy haven’t subsided since the AOL ploy.
Business must be equally as vigilant to battle the secretive master plans of cybercriminals. No longer can leaders depend solely on their IT staff to protect vital data. Instead, companies must train employees to spot cyber threats and handle the company’s data correctly, including:
- No hard-coding or embedding passwords
- Deactivating unused credentials
- Managing identity controls
Additionally, fast-growing businesses can’t slack on software updates. These updates are essential to ongoing development. Another layer of protection is to implement two-factor authentication for logins. Although increased security awareness takes more time and diligence, the results are well worth it.
3. Avoid Security Flaws
According to an IDC Spending Guide, companies in 2019 spent over $103 billion on security-related hardware, software, and services. Industry experts expect that price tag to increase to $134 billion in the next couple of years. And yet, businesses are still experiencing data breaches at lightning speed.
A significant holdup to securing adequate cybersecurity is known as the “silver bullet” solution. In other words, most companies depend on their IT staff and security-related services to protect them 100% of the time.
Cybersecurity is a company-wide issue involving the business’s entire workforce. Relying only on security technology is a lot like building one-layer walls when you honestly need ten layers. Each layer contributes to the overall protection plan, but one layer of technology or even an IT team won’t cut it any longer. Instead, rely on multiple layers to protect your business from a data breach.
4. Practice Resiliency
Some cyberattacks, such as phishing and malware, steal vital data with the intent of profiting from its use. Other attacks, such as ransomware and DoS, disrupt business operations as opposed to taking data outright.
Additionally, consider what would happen to your business if a natural disaster occurs. Suppose a fire, flood, or tornado tore through your office over the weekend. Does your company have a business continuity plan? What about a disaster recovery plan? Do you have other copies of your company’s vital data so business operations can carry on?
Having professional resilience typically means being prepared for the worst-case scenario while hoping for the best. That said, resiliency is critical in terms of handling disruptive risk and can help to protect from a data breach.
To sum up, prepare for business disruptions by storing several copies of your vital data elsewhere. And have a recovery plan in place, so you aren’t scrambling when the time comes.
5. Manage Supplier Risk
Many professionals forget that third-party supplies experience data breaches, too. And these attacks can be as devastating for your business as a direct hit. Third-party vendors usually have some access to a company’s vital data.
That said, nearly 60% of businesses have experienced a third-party data breach at some point. Surprisingly, a large portion of companies don’t honestly know if a third-party data breach has impacted them — but the risk is still there.
An excellent approach to mitigating this issue is acknowledging the vulnerabilities your company faces in its ongoing third-party relationships. For example, assess the vendors’ data security risk during the onboarding process. Plus, it’s vital to establish contractual procedures for handling a third-party data breach.
6. Invest in Cyber Insurance
Lastly, when all else fails, cyber insurance offers the protection you need from costly and complicated lawsuits. The average data breach has a $4 million price tag, after all. Not only can the legal fees rack up from third parties quickly, but you might also face fines and penalties from regulators.
Data restoration can cost your company thousands upon thousands of dollars. Many businesses never make it to the other side of a data breach, unfortunately. However, cyber insurance works to cover the excruciating cost of restoring data after it’s been compromised.
Additionally, many cyber insurance policies can cover income lost and payroll spent during your business’s downtime when it is not operational. This type of coverage provides a crisis management partner at a time when you need it most.
Understanding the details of what coverage your company needs can be a confusing process. Founder Shield specializes in knowing the risks your industry faces to make sure you have adequate protection. Feel free to reach out to us, and we’ll walk you through the process of finding the right policy for you.
Want to know more about cyber insurance? Talk to us! You can contact us at [email protected] or create an account here to get started on a quote. | https://foundershield.com/blog/protect-from-data-breach/ |
Just how bad can data privacy negligence by healthcare professionals be?
Data privacy in the healthcare industry remains a constant struggle today. While the industry has always implemented new technologies to help healthcare professionals deal with patients, most health professionals are still unsure about handling patient data.
Today, most hospitals have doctors using tablets to get access to patient data and write reports. AI-based scanners and IoT sensors are also used to help provide patient diagnostics as well, especially for some medical cases.
When the COVID-19 pandemic reached its peak, hospitals were having to deal with a massive amount of patients. The amount of data generated was crucial in providing insights on how they can cater to patients, as well as in providing the best treatment for them.
Healthcare institutes and hospitals soon began embracing health data management platforms to manage the high volume of data. Governments continue to mandate and support healthcare IT solutions, especially in the use of big data analytics. The global population health management market is expected to reach US$46.7 billion by 2026 as well.
However, with high amounts of data being circulated, the hospital soon became a target for cybercriminals. According to the Ponemon Institute and Verizon Data Breach Investigations Report, the health industry experiences more data breaches than any other sector.
Higher demand for healthcare data
Today, Personal Health Information is more valuable on the black market than credit card credentials or regular Personally Identifiable Information. With higher demand for such data, cybercriminals are targeting medical databases.
According to the Health Insurance Portability and Accountability Act (HIPAA) Journal, between 2009 and 2020, 3,705 healthcare data breaches of 500 or more records have been reported. Those breaches have resulted in the loss, theft, exposure, or impermissible disclosure of 268,189,693 healthcare records. That equates to more than 81.72% of the population of the United States,
In Southeast Asia, Singapore experienced its worst healthcare breach in 2018 when hackers stole the personal information of 1.5 million patients. The hackers infiltrated the computers of SingHealth, Singapore’s largest healthcare institution group. Cybercriminals had accessed non-medical personal data, including names, addresses, gender, race, and dates of birth.
Statistics also show that East Asia saw a 137% increase in healthcare cyberattacks in the first half of 2021 alone. The healthcare cybersecurity market is also witnessing an uptick in IoT medical devices that are now connected to the network to help doctors, nurses, and support teams provide critical care services for patients.
With the increased use of technology in healthcare, the industry is expected to see cybersecurity spending reach US$125 billion by 2025. But is this enough to protect healthcare data from cybercriminals?
Ransomware, email compromise, unsecured databases continue to be the main culprits of the breaches in healthcare. However, breaches in healthcare also occur from third-party breaches or managed service providers. An analysis from cybersecurity provider Tenable showed that third-party breaches accounted for over a quarter of the breaches tracked and accounted for nearly 12 million records exposed.
Be it breaches by ransomware or third-party, healthcare data is very much at risk. While large healthcare institutions and hospitals may improve their cybersecurity protection, smaller hospitals, clinics, and such are still very much exposed and can serve as entry points for cybercriminals.
Understanding data privacy
According to Sriram Narayanan, Principal Consultant for Security at Thoughtworks SEA, “medical professionals are trained to treat patients. Their training does not involve how to deal with data privacy and such. In the past, medical records were kept in cabinets. Today, most of these data are stored in the cloud. The risks are greater but most medical practitioners are not aware of this.”
A lack of awareness on the importance of patient data and data privacy is still lacking among healthcare professionals. In many cases, negligence in handling data in healthcare, like leaving patient data exposed, unsecured transfer of data between departments, and such are the contributing reasons to data breaches in healthcare.
“We need to educate the medical profession on what privacy and confidentiality are and what it represents in the world of online reports. It does not matter if it’s a government or private healthcare facility, without understanding the importance of patient data, the likeliness of a facility being hacked is higher,” said Sriram.
Taking privacy likely would also mean exposing patient data to other vulnerabilities as well. For example, some of these data may contain sensitive information that may not be comfortable is seen by others. Accessibility of medical reports that are not monitored may also lead to patient data being accessed by those with bad intentions.
Sriram pointed out that privacy and resiliency should be a priority in healthcare today. CIOs and CTOs in healthcare institutions should make the right decisions in cybersecurity resiliency. They should not wait for a reactive solution but be more proactive. They need to be aware of the regulations in place, especially when it comes to data privacy.
“Will they pay attention to it in the future? That’s a question we will have to wait and see. Life as of 2019 may not come back in the next 20 years, but everyone will strive for it. With more variants and such from the pandemic, we may strive towards new normal. My apprehension is, will privacy then take another pass?” commented Sriram when asked about the state of cybersecurity post-pandemic.
As Sriram puts it, as the healthcare industry continues to add more cybersecurity measures, it is vital for medical practitioners to also take patient data privacy seriously as it could lead to more repercussions. | https://techwireasia.com/2021/08/just-how-bad-can-data-privacy-negligence-by-healthcare-professionals-be/ |
2021 has progressed with even more challenges and promises to deliver even more changes to the pace of a fast technological environment, risk professionals need to look back and consider the lessons learned from 2020.
Have we returned to where we were, or have we moved on to a new norm?
What does the COVID-19 pandemic market data tell us that will help us to prepare for future global crises?
2020 was a rollercoaster for the financial markets. At the beginning of the year, the economy was enjoying the longest continuous growth stretch on record.
The stock market was constantly hitting new highs. The Federal Reserve was starting to bring Treasury yields back up for the first time since the Great Recession. And, then came March.…
Given that framework, the first question we want to answer is: “As risk professionals, how prepared were we for these types of market swings?”
In the insurance industry, companies rely on economic scenario generators (ESGs) to produce a wide range of plausible, cohesive futures for the variables that drive their results — for example, corporate bond and equity returns, as well as Treasury yields.
These models are not predicting specific events, like a pandemic or a war; instead, they simply attempt to estimate the likelihood of a 20% drop in the equity market over the next year.
So, to answer the question posed above, we need to test how well the ESGs that we use we’re able to predict the financial market movements we have seen in 2020.
If our models covered these types of results, then we can take comfort that we were well prepared; if not, then we have to think about how to adjust our framework to be better prepared for the next calamity.
So, where does this leave an Insurance Chief Risk Officer?
First, we should take a critical look at how well our key economic models performed at anticipating these types of extreme market movements. If our models weren’t up to the task, then we need to rethink how those models are calibrated, as this is likely to lead us to either take on too much risk or the wrong types of risks.
We also want to make sure we perform this review on both the good times and the bad times since we are using these models for much more than just risk measurement.
This now brings us to one of the widest subjects in technology today; Cyber Risk insurance, which has become very popular over the last five years with larger corporations as a means to potentially cover the unexpected cost relating to data breaches and ransomware attacks.
This is not surprising taking into consideration that Global ransomware damage costs are predicted to reach $20 Billion (USD) by 2021 according to the latest report by Cyber Security Ventures.
According to the report, this is a 57X increase in the last five years. Ransomware is expected to attack a company every 11 seconds according to the report.
Ransomware poses the biggest threat as a business is adversely impacted to a point where business is shut down. In 2019 alone, the average business downtime was over nine days. According to Bitdefender, downtime costs due to ransomware on average were 50 times more than the ransom requested from Cyber Criminals.
According to the latest IBM Security Ponemon report on the cost of data breaches, the average for data breaches in the US was $3.8 million (USD) for less than 100,000 records. The average time to identify and contain a breach is 280 days. In breaches of 1 million to 10 million data records breached, the average cost was $50 million (USD), more than 25 times the average of the cost of breaches for less than 100,000 data records.
Looking at the following top Cyber threats to companies for 2021, according to Security Boulevard, the cyber attack surface is increasing as companies accelerate digital transformation and remote work, leaving the company at higher risk for Cyberattacks.
• Cloud-based threats. As more companies move to cloud services and adopt more cloud-based tools from 3rd party vendors, this also increases the security footprint the company needs to look at protecting. It is no longer just the internal systems of the company that poses a risk.
• Insider threats. This involves internal actors (employees, contractors, vendors) with valid credentials to key business systems colluding with cybercriminals to provide them access to data that can lead to data breaches and ransom attacks.
• Remote worker end-point security using unsecured network services leading backdoors open for cybercriminals to gain access to company data and infrastructure.
• Phishing attacks employing social engineering to gain access to access credentials.
• Deep Fakes. A growing threat where artificial intelligence is used to manipulate videos that falsely represent a person to commit more advanced phishing attacks. This could generate synthetic identities to gain access to systems.
• IoT devices. Unless properly secured within the overall part of the business, the introduction of IoT devices increases the complexity and attack surface for cybercriminals to exploit. The recent Verkada cyberattack exposing video footage of over 150,000 cameras of various companies such as Amazon, Tesla demonstrated this risk.
• Malvertising where malicious advertisements including technical support scams are used to spread malware.
• Sophisticated and targeted ransomware attacks. This includes a key risk around personal staff safety.
• Social Media attacks where cyber criminals use social media platforms posing as the legitimate company in order to spread malware.
Taking into consideration that the average cost of Cyber Insurance in 2020 in the US, according to AdvisorSmith was $1,485 per year covering the liability of up to $1 million.
There are a number of factors such as company revenues, and the number of sensitive data records, to name a few, that impacts Cyber Insurance premiums.
Looking at the averages for Cyber insurance and the explosive growth in the cost of data breaches, most companies are grossly under-insured to cover the costs of potential data breaches or ransomware attacks.
Cyber-insurance may be a good option for covering some of the liability and cost in the event of a breach, however, it falls way short in minimizing the actual liability in the cost of a data breach or ransom attack to the company.
How should companies and the Board balance the cost to cover the liabilities due to cyber risk in the company?
Spend more money on insurance with higher premiums vs. more investment to implement risk management across the organization and supply chain through policies, incidence response preparedness, cyber training, and Cyber Security systems?
The latter part of the equation can be quite daunting, and the “easy” way out seems to be to rather take out the insurance, and deal with it when a breach happens.
What shall companies look at in order to solve an increasingly complex cyber governance problem when looking at the cost, and where to most effectively spend the money to mitigate the risk?
The typical cost for a cyber attack when that happens can be broken down into the following elements:
• Forensic analysis for identifying the attack source
• Unplanned IT spend to recover data, remove malware, recover from downtime, implementation of new systems to prevent similar attacks, 3rd party vendor or supply chain systems updates, other
• Public relations services
• Notification of clients, shareholders, and regulators
• Credit monitoring services (if financial data was stolen of customers)
• Loss of income
• Regulatory penalties depending on the breach
The best strategy is to as much as possible, avoid the additional cost through better governance and incidence reporting and planning and implementation of automation of security as reasonably possible.
Worldwide spending on information security and risk management technology and services continued to grow through 2020, although at a slower rate than previously forecast, according to Gartner, Inc.
Information security spending grew 2.4% to reach $123.8 billion in 2020. This is down from the 8.7% growth Gartner projected in its December 2019 forecast update. The coronavirus pandemic is driving short-term demand in areas such as cloud adoption, remote worker technologies, and cost-saving measures.
“Like other segments of IT, we expect security will be negatively impacted by the COVID-19 crisis,” said Lawrence Pingree, managing vice president at Gartner. “Overall we expect a pause and a reduction of growth in both security software and services during 2020.”
Gartner’s survey showed the top 10 categories of expenditures as follows:
1. Application Security
2. Cloud Security
3. Data Security
4. Identity Access Management
5. Infrastructure Protection
6. Integrated Risk Management
7. Network Security Equipment
8. Other Information Security Software
9. Security Services
10. Consumer Security Software
How big is your cybersecurity budget? Probably not big enough. Organisations need to invest more in their security.
Over the years, spending on cybersecurity has changed substantially. In 2019, worldwide spending for security products and services is estimated to be more than $124 billion, an increase in growth of 8.7% from last year.
Companies around the world are no longer considering cybersecurity a minor part of their spending budget, but rather a priority. One of the main reasons for this is the large security breaches that have occurred in the past few years, putting business and personal data at a higher risk than ever before.
According to IBM’s report, companies with fully deployed security automation saw a cost-saving of $3.58 million (USD) on the cost of a data breach vs. companies with no security automation.
Companies with incident response preparedness so an impact of $2 million (USD) savings on average on the total cost of a data breach.
Boards and companies should have clear plans and strategies around the following four cost centers. Where cost centers are missing, these need to be taken into consideration. Start with assessments of the status of the activities within these four key pillars for cyber governance and make these a strategic part of all budget spend and activities across the whole company, as well as 3rd party supply chain of the company.
Detection and escalation. Activities that enable a company to reasonably detect the breach.
• Forensic and investigative activities
• Assessment and audit services, including Incident Response
• Crisis management
• Communications to executives and boards
Lost business. Activities that attempt to minimize the loss of customers, business disruption, and revenue losses.
• Business disruption and revenue losses from system downtime
• Cost of lost customers and acquiring new customers
• Reputation losses and diminished goodwill
Notification. Activities that enable the company to notify data subjects, data protection regulators, and other third parties.
• Emails, letters, outbound calls, or general notice to data subjects
• Determination of regulatory requirements
• Communication with regulators
• Engagement of outside experts
Ex-post response. Activities to help victims of a breach communicate with the company and redress activities to victims and regulators.
• Help desk and inbound communications
• Credit monitoring and identity protection services
• Issuing new accounts or credit cards
• Legal expenditures
• Product discounts
• Regulatory fines
(Cost center model per IBM in the Cost of Data Breach Report)
Digital technologies are ushering in a new era and driving transformative changes in every industry, as organizations adopt these technologies to redefine how they create, deliver, and capture value.
Identifying, understanding, and addressing new risks associated with digital transformation will help businesses derive more value from their efforts in the future. What’s more, understanding how digital transformation can be applied to risk management will enable organizations to take a more balanced view of digital technologies as both a source of risk and a way to manage risk.
As your organization embarks on its digital journey, we invite you to learn more about the evolving risk landscape and new opportunities to better manage risk.
Misalignment between an organization’s goals for digital transformation and employee values and behavior creates new culture risks.
The final topic we would like to address is digital ethics, being more in tune with digital ethics and having plans and processes in place will also help organisations respond more effectively when an incident does occur.
Firms not only need processes in place to ensure that they are ready to respond quickly to address problems but also to fulfill their regulatory obligations by promptly disclosing any breach to the regulator as well as any impacted customers.
As part of their digital transformation efforts, organizations need to act responsibly and promote ethical use of technology.
They also need to have pre-established influencer relationships that they can leverage to counter any hysteria or misinformation which might arise that could interfere with their business or impact their brand.
Organisations that have a culture that takes digital ethics seriously, will behave in ways that will minimise the risk of incidents and will act in ways that help build stakeholders’ trust. Those that don’t take digital ethics as seriously will not only be at higher risk of impact but will struggle to establish such trust.
Making data ethics a key corporate value can have a significant potential upside. Implementing data privacy policies and updating crisis management plans to address data breach scenarios will minimise any downside.
At the very least, engaging with Influencers or Cyber professionals/experts early can help you be better prepared to respond to calamities, our definition of influencers is quantified as Cybersecurity specialists who play a key role in securing information systems.
By monitoring, detecting, investigating, analyzing, and responding to security events, cybersecurity specialists protect systems from cybersecurity risks, threats, and vulnerabilities.
While taking their advice or using them to independently assess or benchmark your data privacy policies and crisis management plans can be used to demonstrate best practice in these areas, which in turn can mitigate potential fines or legal exposure in the event of a calamity.
Your customers want you to take a stand on data security and privacy, and be transparent about it – seeing it as more important than either your diversity or sustainability efforts.
Each and every company, regardless of its industry, has weaknesses that hackers exploit for their own gain. Just because a business is small or not in a vertical often associated with valuable data (such as healthcare or financial services) doesn’t mean it won’t make an enticing target for an opportunistic cybercriminal.
In fact, there are a number of reasons why start-ups and small businesses are sometimes more likely than even big businesses to be targeted.
- Customer Information: Even the smallest start-ups often store or handle customer data such as financial information, Social Security numbers, and transaction history.
- Proprietary Data: Start-ups often carry innovative and creative ideas for products and services, as well as internal research data that could be valuable to outside parties.
- Third-Party Vulnerabilities: Hackers also target small businesses and start-ups because they sometimes do business with larger companies as third-party vendors and can provide entry points into those more valuable networks. Target’s infamous 2013 credit card breach, for instance, happened because of vulnerabilities in a third-party vendor’s system.
- Multiple Interfaces: Another reason for increased attacks is the growing use of Internet of Things (IoT) devices that increase the attack surface of networks. Small businesses are turning to IoT devices more often due to their lower costs and growing capabilities. Unfortunately, hackers often exploit poorly secured devices as a backdoor to access broader, more sensitive networks.
- Lack of Finances: Since small businesses and start-ups are working on a tight budget, they don’t always place cybersecurity is not at the top of their priorities list and often neglect the latest patches and updates.
The power of digital technologies to enable new sources of revenue can be significant. Due to the proliferation of digital technologies and the particular ethical challenges they present, organizations are increasingly expected to consider ethical obligations, social responsibilities, and organizational values as guides to which digital opportunities to pursue and how to pursue them.
As discussed in the “Managing data risks for value creation” trend, responsible and unbiased collection, handling, use, and privacy are top areas for concern when it comes to data. Also, there are increasing calls for digital services that are fair and equitably accessible, promote physically and mentally healthful uses, encourage inclusion, and are geared toward socially beneficial uses.
Digital adopters want technologies that aren’t harmful or abusive and are safe and error-free. There’s an opportunity to do well by doing good—pursuing digitally responsible growth strategies that build stakeholder trust.
Finally, organizations are conscious that digital transformation involves more than technology adoption. It requires concerted efforts to define how enterprises organize, operate, and behave by aligning strategy, structures, processes, people, and technology to build a unique digital DNA.
Organizations can sidestep unnecessary risks and harness risk to power performance by adopting a risk lens and a holistic approach as part of their efforts. Below are a few guiding principles.
Conclusion; Boards can harness risk to power performance in a digital world, but only with a responsible Digital DNA and hopefully with the Digital Services Act (DSA) that will bring digital reform.
As Tom Golway, Chief Technologist in the Advanced R&D organization of Hewlett Packard Enterprise once said:
“The deeper, philosophical question is does the 1st Amendment apply to AI algorithms. Resolving this is an immediate challenge that needs open dialogue that includes a broad set of disciplines, not just technologists”
This article is the expressed opinions and collaboration between two senior-level industry board professionals on their views and perceptions on the subject matter:
MARIA PIENAAR CTIO, Corporate Innovation, Digital Transformation, Investor Private Company Board Director & Advisor Maria propels growth by speeding up discovery for companies whose leaders are frustrated by the slow pace of innovation.
Being a master networker, she extracts strategic value through tapping latent creativity of teams and customers and catalyzes partnerships with highly innovative organizations. Her diverse leadership roles in global 100 and startup companies enable her to see the end-to-end picture and plot the most effective course for designing, launching and scaling new products and services for companies, driving customer growth. Maria co-founded Blue Label Ventures, a Corporate VC focussing on investments in Digital Health, IOT, Cyber Security, Fintech (incl. InsurTech).
Prior she was CIO at Cell C, a challenger mobile carrier, and prior held various leadership roles in Business Development, Go-to-Market Strategy, Strategic Partner Management and Product Marketing for Lucent, Nokia, Vodafone, Globalstar and various startups. Maria holds a BSC in engineering.
LinkedIn: Profile
Geoff Hudson-Searle is an independent non-executive director across regulation, technology and internet security, C-Suite executive on private and listed companies, and serial business advisor for growth-phase tech companies.
With more than 30 years’ experience in international business and management. He is the author of five books and lectures at business forums, conferences and universities. He has been the focus of TEDx and RT Europe’s business documentary across various thought leadership topics and his authorisms.
Geoff is a member and fellow of the Institute of Directors; associate of The International Business Institute of Management; a co-founder and board member of the Neustar International Security Council (NISC); and a distinguished member of the Advisory Council for The Global Cyber Academy.
He holds a master’s degree in business administration. Rated by Agilience as a Top 250 Harvard Business School thought leader authority covering blogs and writing across; ‘Strategic Management’ and ‘Management Consulting’, Geoff has worked on strategic growth, strategy, operations, finance, international development, growth and scale-up advisory programmes for the British Government, Citibank, Kaspersky, BT and Barclays among others. | https://freedomafterthesharks.com/2021/04/19/moving-from-a-cyber-risk-insurance-to-cyber-risk-management-strategy/ |
May 02, 2022
An organization’s reputation can be one of its most valuable assets. According to a 2021 survey from PwC, companies with high consumer trust are more likely to have customer loyalty, a growing customer base, revenue growth, and access to financing. Shred-it's 2021 Data Protection Report similarly found that 4 out of 5 consumers surveyed decide which company to do business with based on its reputation for data security. On top of that, according to Zendesk about half of consumers will switch brands after one bad experience.
These findings highlight that information security can play a huge role in consumer behaviors. Despite these trends, 2021 was one of the worst years for data breaches in history. According to RBS, there were 4,145 publicly disclosed breaches in the U.S. in 2021, which exposed more than 22 billion records. Shred-it's Data Protection Report found that nearly 70% of consumers surveyed had been impacted by a data breach in 2021, up from 53% the previous year.
The increase in data breaches is costly and inefficient, and it can damage and even destroy a company’s reputation. To help mitigate these risks and build trust with customers, leaders should understand the basics of protecting confidential information in the era of data breaches.
The term “confidential data”, as used here, generally refers to any nonpublic information. This can include confidential business information, such as proprietary information or pricing, or personal information, such as an individual's name, address, email address, IP address, social security number, and/or telephone number.
Depending on the industry, certain confidential information may be regulated. Healthcare providers, for example, are responsible for restricting the disclosure of protected health information per the Health Insurance Portability and Accountability Act (HIPAA). This includes individually identifiable health information that relates to, for example, an individual's past, present, or future physical or mental health condition. Additionally, certain financial organizations are required to protect sensitive personal finance information, such as account numbers and balances, loan applications, and credit card or debit card applications.
The businesses surveyed in Shred-it's 2021 Data Protection Report identified four major sources of a data breach: malicious outsiders, malicious insiders, partners and suppliers, and employee error. The report found that 53% of all data breaches involved malicious insiders: employees inside an organization who share confidential information with outside sources. This contradicts the belief that only hackers and cybercriminals are responsible for data breaches.
While not the largest source of data breaches, breaches involving employee error accounted for 22% of all data breaches reported in the survey. Organizations can help mitigate this type of data breach by implementing policies that outline information security and privacy guidelines and provide ongoing data security training—on both digital and physical risks.
The 2021 Data Protection Report found that organizations surveyed in the insurance (75%), real estate (69%), and healthcare (56%) sectors are the most likely to have experienced a data breach. However, any organization that stores large amounts of confidential data, including financial and professional services firms, is at risk of a data breach.
The report also found that nearly three-quarters of large businesses surveyed have experienced a data breach, up from 43% in 2020. However, while data breaches at large companies often get the most attention, data breaches at small and medium-sized businesses are also on the rise. In 2021, 61% of small and medium-sized businesses (defined in the survey as having less than 499 employees) reported a data breach, a significant jump from 12% in 2020. This highlights that any organization, large or small, can fall victim to a data breach.
Some experts attribute a rise in data breach risks to the COVID-19 pandemic, which contributed to many employees working from home. As a result, businesses’ physical confidential information was spread out across home workspaces instead of the one centralized location—the office. Employees may have also disposed of confidential documents in their home trash rather than through a secure document destruction process. Further, digital confidential information is potentially at risk due to the use of home Wi-Fi networks that may have fewer security controls compared to an office network. This decentralization invites more opportunities for data breaches and malicious actors.
As many businesses continue to use remote and hybrid work models, it is important that they consider the data security risks of at-home settings and put policies in place to help address them.
Companies can employ a wide range of strategies to help reduce their chances of experiencing a data breach. Some of these actions include:
Learn more about how secure data destruction with Shred-it can help prevent data breaches. | https://www.shredit.com/en-us/blog/protecting-confidential-information-in-the-data-breach-era |
The Equifax data breach of mid 2017 is one of the worst known data breaches—so far. Data breaches get a lot of attention lately and perhaps eventually countries will take the issue seriously enough to start addressing them effectively and comprehensively. It should be considered that these breaches were happening long before they were so frequently in the news, and the industry of cybercrime and identity theft is mature and efficient.
How did this breach happen and what lessons can be learned from it? There are many ways for cybercriminals to attack an organization and steal the data it stores. It is ineffective to merely react to the threats described in the latest headlines; a proper cybersecurity program needs to evaluate all of the risks and then address them in a prioritized fashion. That said, the Equifax data breach has lessons for everyone.
Equifax had a weakness in their website where consumers would dispute portions of their credit records. This was the place where consumers could dispute inaccuracies and provide information and documents which were then stored in a database which was connected to other databases containing consumer data. When Equifax built this platform, the computer programmers followed the custom of incorporating pre-written portions of code borrowed from open-source resources.
An open-source computer code means that it is freely available for inspection and download. The “source code” is provided, each line of code is visible and can be modified to suit the need. These source code components can be integrated with the rest of the code, and then the entirety of the source code is “compiled” into a format that computers can run, known as “machine code.” In contrast, there is proprietary code (the software available for purchase) where it is already compiled and we are unable to see individual lines of code.
Programmers use open-source components to avoid reinventing the wheel and rewriting portions of code that have already been written, used and tested. Computer programming requires the assembly of prewritten portions of code, making sure they fit and work together, and ensuring the program interacts with the users and databases properly. For the Equifax site, they used Apache Struts, a suite of open-source components for accepting user input into web forms and transferring that information to underlying databases. Apache Struts is maintained by the Apache Foundation and is available for download, inspection and modification by programmers.
What software developers do is similar to how contractors build a house. They do not make the lumber, plywood, bricks, drywall, windows or doors, but purchase those components and assemble them. Though building supplies are costly, open-source software is free and reusable, but “free” needs to be qualified. Just as with free puppies and kittens, it will require considerable expense and effort required to care for it.
To build their consumer-facing website, Equifax did what was perfectly acceptable and incorporated open-source software components. However, they failed to keep track of what components were used, the vulnerabilities discovered and correct them. All software is prone to bugs and security vulnerabilities, including open-source software. On the first day code is released, programmers hope it is perfect, but bugs will be discovered that need fixing, and security vulnerabilities will be found that need patching. Change comes rapidly, operating systems and web browsers are updated, which means other programs may need to be updated. Thus, open-source components get fixed—patched—to address the vulnerability or bug, and then a new version of the code is released. Anyone still using the older version is at risk.
On March 7, 2017, the Apache Struts community learned of a vulnerability that could allow an attacker to break through the software components and access confidential data. The attacker could enter special input into the web form to trick the database into executing a command and granting special access. Apache Struts issued an update to repair this issue, the community was notified to discontinue use of old versions and incorporate the updated version into their software.
Ideally, companies have an inventory of their software and what is in it, including the specific version of the components used. In practice, many companies do not, but the recommended practice of regular vulnerability assessments and penetration tests can still detect these weaknesses.
A defective lock helps us visualize the security vulnerability, but understates the complexity of the patch for Apache Struts. Locks are easily changed, but software components are not—it is not like pressing the “update” button on a smartphone when prompted. Think of the Chinese drywall debacle of 2004–2005, where Hurricane Katrina and other storms caused significant destruction followed by massive rebuilding, which led to a shortage of U.S. manufactured drywall (gypsum board). This led to increased imports of Chinese drywall, which were then used in building projects all around the U.S., but especially in the southeast. It was soon realized that this drywall was toxic, unsafe for the occupants and could even degrade building components such as electrical wiring. When homeowners learned they were living with the dangerous Chinese drywall, it was difficult and costly to replace. Essentially, the interior of the home had to be dismantled and rebuilt—all drywall removed, new drywall installed, taped, spackled, trimmed and painted.
Sometimes, when a vulnerability is identified, companies do not allocate sufficient resources to fix it. Some landlords might feel it is unnecessary to change locks or replace drywall because it is unlikely that a burglar will try to break in, and unlikely the drywall gasses would injure a tenant or damage the building. In hindsight, it seems clear that Equifax’s risk analysis and response was flawed. They should have rebuilt their website code, incorporating updated versions of Apache Struts. During the days, weeks or months while they built, tested and implemented the new website, they should have implemented temporary compensating controls by adding a filter (or parser) to prevent attacks on the Apache Struts vulnerability. The vulnerability allowed a user to enter malicious input into the web form that could cause the website to grant control and access to the attacker. A compensating control would review the input and remove harmful text before it reached the vulnerable Apache Struts code.
That is the hole that hackers exploited to breach Equifax and steal the personal information of 150 million victims, which Equifax learned about on July 29, 2017, and disclosed to the public on September 7. This appears to be one of the biggest breaches in history, spawning lawsuits, regulatory actions, legislation and a prosecution for insider trading.
Individuals can protect themselves, their families, and better advise their clients and customers if they know the steps that should be taken in response to the repeating cycle of data breaches. It is not known who committed this data breach, but it is known that they now have a comprehensive dataset of personal identifying information, which can be sold and used for identity theft or other mischief.
Some criminals will try to exploit the fears based on this breach. They will conduct phishing attacks or other fraud schemes designed to make individuals think they are a victim of identity theft in order to trick them into providing personal information or performing an action that exposes their computer or cloud data.
Businesses will also try to exploit this fear to sell products. Companies, including Equifax and others, sell credit-related products and services. Data breaches are good for their business. Advertising and fear tactics may convince consumers to pay a monthly fee in exchange for a feeling of safety. Credit-reporting agencies have a business model that allows them to make money on multiple fronts, through selling access to consumer data, selling services after a data breach, and having consumers pay to protect their data and identities.
Based on facts released in connection with an insider-trading case stemming from this breach, the public knows how Equifax views data breaches. After the breach, some Equifax employees were told that there was an urgent data breach “opportunity” for the company, but they were not told that Equifax was the breached entity. One employee figured it out and allegedly sold his Equifax stock quickly, anticipating a future decline in share price once word of the breach became public, and was charged with insider trading (conversely, several very high-level Equifax employees sold their stock days after the breach, but were exonerated by Equifax’s internal investigation which found they had no knowledge about the breach when they sold their shares). Thus, Equifax makes money from data breaches, and being breached is bad for company valuation.
From a consumer’s perspective, individuals should encourage government to increase regulation to improve privacy rights and to alter the rules of how businesses store, use and sell consumer data. They could call upon government to properly address cybercrime, not by simply telling companies to be more secure, or by simply treating it as a law enforcement issue, but by addressing this international epidemic holistically.
On the law enforcement side, more can be done to address the scourge of identity theft and cybercrime. Identity thieves often rely upon data stolen through Equifax-style data breaches, but identity theft cases are difficult for prosecutors to build, take months of painstaking work, cross jurisdictions and need the assistance of businesses and financial institutions. When District Attorney Robert Morgenthau created his Identity Theft Unit—one of the first in the country—he recognized the importance of fighting this crime. Resulting cases soon demonstrated the connection between identity thieves and cybercriminals. Prosecutors who lack resources or look for quick cases that garner press attention will not be able to bring the type of cases needed to fight this crime.
Fortunately, certain rights can be exercised for free. A free credit report can be conducted, each year, from each of the following credit-reporting agencies: Equifax, Experian and TransUnion. This can be completed through www.annualcreditreport.com. Do not be tricked by other sites that charge for this service. If any credit information is inaccurate, it can be disputed and corrected. Ironically, it was Equifax’s dispute reporting website that was breached, so consumers who disputed their credit records, and submitted copies of identification documents and supporting documents were victimized the most from the breach. Nevertheless, correcting credit history is a right that should be exercised if needed.
These three credit-reporting agencies also have the ability to “freeze” credit, which will prevent credit history from being offered to others and prevent new accounts from being opened. Not surprisingly, agencies used to charge a fee for this, but thanks to a new law this is now available for free. Agencies also offer credit “lock” services, which may come bundled with other paid services, but consumer groups were recommending the “freeze” rather than the “lock” even before freezes were free by law.
Financial institutions and businesses need to recognize risks relating to identity theft and cybercrime across their platforms. The Federal Trade Commission Red Flags Rule requires such an identity theft prevention program, and organizations should strive to exceed minimal compliance.
One risk is that the company is a conduit for such crime, that a fraudster assumes the identity of a victim while interacting with the business. With a fresh batch of stolen personal identifying information potentially on the marketplace, this fraud may increase. With online accounts, consider that cybercriminals and identity thieves are well-suited to defeat online verification tools during the enrollment process. Personal information is easy for them to purchase in criminal marketplaces, and providing false information such as name, birthdate and social security number is an easy task. Even accounts opened on-site are subject to this fraud—identity thieves are well-practiced at appearing in person with forged identification documents.
Financial institutions and businesses should take a more aggressive approach toward identity-theft-related frauds. The relationship between cybercrime’s data breaches and the resulting use of this information to commit identity theft is evident. Data breaches are profitable because identity theft is profitable. Financial institutions and businesses are subjected to hundreds and thousands of fraud attempts, all of which provide valuable information to build criminal cases.
Private sector fraud and anti-money laundering investigations are essential for reducing cybercrime and identity theft. Yet there are businesses and financial institutions that tolerate identity theft occurring on their platforms, viewing it simply as a business expense, and treating fraud investigation as an added cost rather than an essential component of good corporate citizenship. Of course, there are many dedicated professionals investigating these frauds, but they sometimes are without sufficient resources or support.
Information security is essential, since financial institutions and businesses are collecting and storing considerable data about customers and employees, and many breaches result from failure to perform the basics of security. Every employee is a potential breach point, and lack of knowledge or awareness creates significant risks. Companies need a thoughtful incident response plan which senior management is trained on. Equifax’s response was lacking and communication was poor, which further damaged their reputation and was a disservice to consumers.
Proper risk analysis starts by evaluating the potential threats, harms and costs, followed by remediation in a prioritized fashion. If Equifax had properly done this, they would have devoted resources to address this issue. Companies need a strong cybersecurity and anti-fraud program, which requires continual improvement and focus to make it part of culture. Responsibility for cybersecurity cannot be delegated to lower level employees (for later scapegoating) but should rest with the highest levels of management. Prevention is cheaper than the cure, and a strong posture against cybercrime and fraud can be good for business.
Consumers can protect themselves by obtaining free annual credit reports from the three credit-reporting agencies, freezing their credit, improving their own cybersecurity posture, patronizing organizations that are committed to security and privacy, and encouraging government to address these issues more comprehensively.
Financial institutions and businesses must do their part to improve the security of the data they keep and prevent it from getting into the hands of cybercriminals. They also need to devote resources to investigating cybercriminals and identity thieves and reducing their illicit profits.
Finally, government needs to do more to keep residents safe from crime. Where victims have little control over threats, and where attackers reside outside national borders, the public relies upon government even more.
For information on how you can identify where your organization is most vulnerable to a cyber-attack, please visit: http://www.acams.org/cyber-enabled-crime-training/. | https://www.acamstoday.org/after-the-equifax-data-breach-cybersecurity-and-identity-theft-protection-for-financial-institutions-and-their-customers/ |
October 30, 2020//Tori TaylorLast Updated: December 21, 2021
Third-party vendors have been causing quite the stir when it came to their involvement in data breaches. This involvement means that a hacker can infiltrate a larger network (like a large enterprise) through the access that’s given to an external vendor who remotely connects. And, sadly, things haven’t really changed since we wrote the article the first time around. Holes in third-party vendor security continue to lead to major data breaches, ransomware continues to surge (especially with Coronavirus shifting a lot of people to work from home), and companies continue to use insecure methods to allowing third-party access on their network (yes, we’re talking to you if you’re currently using a VPN or desktop sharing tool).
If a hacker targets one of your third-party vendors, it could impact your entire IT infrastructure and put all the sensitive data on your network at risk. Hackers tend to attack smaller, third-party vendors because they generally have fewer security controls than their bigger business partners. And, a lot of the time, you might not even know that you’re as vulnerable as you are if you don’t have the right tools in place. But, you’re not alone. Over 50% of all data breaches can be attributed back to a third party (or vendor, or contractor) access to a larger network.
Risks associated with third-party vendor security are never going to be zero. There’s risk in everything we do, but, there are ways to keep your company and your data as safe as possible. So, what steps (and actions!) can you take to improve third-party vendor security and reduce third-party vendor risks?
Even if you only had one vendor that connects to your network, that’s all it takes. If they’re using an insecure access method (like VPNs, desktop sharing tools), it doesn’t matter how amazing and secure a vendor is– their access isn’t going to keep you safe from a data breach.
The first step in managing third-party vendor risk is being selective about which vendors you choose, and then tightening those endpoints to reduce your security risks with strong access control measures. Start by creating an inventory of all vendors and determine what data they have access to. If they’re using an insecure access method, chances are they have too much access to your network. Though they might be trustworthy and won’t jump from one part of your network to another part, a hacker sees this and can thrive. Next, make sure your third-party vendors’ internal assessments and controls are in line with your organization’s. Have they been breached before? What security protocols do they have in place? Lastly, ensure your vendors have third-party vendor management policies and procedures in place to ensure your company is in compliance with the latest regulatory requirements.
Once you’ve deemed that the vendors you’re working with are secure and trustworthy enough to have a relationship with, it’s also important to have regular security audits and reports for your own internal use, as well as for external auditors. Regular auditing and reporting will allow you to gain visibility into all actions taken by vendors. Monitoring the what, when, and how of third-party access will enable you to identify and address any vulnerabilities immediately. This might sound complex, but flexible automation of these processes will help save you time and money and improve your workflow while keeping your organization secure. The easiest way to accomplish this is to have an access management platform that automates it all and allows for secure remote access and support.
Once you have a better understanding of your vendors’ security position – such as having a disaster recovery plan – you can ensure their access controls align with your company’s requirements. You’ll want to take full control over the varying degrees of access you offer to third-parties – and what data each individual can see on your network. Lack of oversight into what suppliers and outside parties can see on your network increases your third-party vendor risk. But, taking control of your vendor access will help improve third-party vendor security.
Just one weak link in your network could lead to a potential security disaster. A third-party data breach could cause your organization financial loss, regulatory issues, and damage to your reputation. To learn more about the importance of a vendor access management platform, download our eBook to see how you can manage third-party vendor access and ensure you have a well-rounded cybersecurity strategy. | https://www.securelink.com/blog/3-steps-to-manage-third-party-vendor-risk/ |
The first of this spring's two Listening and Learning Sessions was held June 3.
Farmington Public Schools held its first "Listening and Learning" session June 3 at Farmington Community School, drawing 20-some residents and FPS staff.
The sessions are part of Superintendent George Heitsch's plan to gather community feedback about the school district.
What's celebrated in the schools, what areas need attention, what residents "dream that Farmington Public Schools will be known for in 10-15 years" and the top three priorities Heitsch should address are topics of discussion.
At last Wednesday's session, residents talked about the need to challenge students at all levels, have motivated teachers, increase parent participation in school and support STEM (science, technology, engineering, math) education. A "passive administration" that sometimes doesn't resolve bullying issues was another issue raised.
Some desires for the future include partnerships with colleges, financial stability, new buildings and technology, and "digital citizenship."
Another Listening and Learning Session will be held June 8 at the Maxfield Education Center, formerly known as the Ten Mile Building. It's located at 32789 W. Ten Mile Road, just east of Farmington Road in Farmington. It will run 6:30-8 p.m.
Plans call for continuing the sessions in the fall. According to district officials, the goal is "to align the school district's work with the desires of families and the community. All of this input, along with the recommendations of the Building and Site Utilization Committee, will help to transform Farmington Public Schools to meet the needs and desires of the community."
FPS says the feedback from the sessions will be "synthesized" with the results from the Cobalt Survey offered earlier this year to "help move the district forward." | https://www.hometownlife.com/story/news/local/farmington/2015/06/05/farmington-schools-education-parent-concerns/28533959/ |
Create a Website Account - Manage notification subscriptions, save form progress and more.
Reservations are required to maintain social distancing.
Seniors are invited to take a virtual tour of the proposed design for redevelopment of the Bob Gilmore Senior Center. In-person viewing opportunities are scheduled at Killeen Community Center Room W200 on the following dates and times:
Friday, June 12 11 a.m., 12:30 p.m., 2 p.m. and 3:30 p.m.Saturday, June 13 8:30 a.m. and 10 a.m.Monday, June 15 11 a.m., 12:30 p.m., 2 p.m. and 3:30 p.m.Tuesday, June 16 11 a.m. and 12:30 p.m.
To assure the safety of participants, each session is limited to 10 people, and spaces must be reserved in advance by calling 254-501-6399. Social distancing measures will be in place and touched surfaces will be disinfected between sessions.
The Bob Gilmore Senior Center was permanently closed in February 2019 due to structural concerns that made it unsafe for continued use and unfeasible for repair.
The City has engaged Randall Scott Architects to design a facility that meets the needs of a new north side senior center. A visioning session was hosted in February to gather public input on specific needs and desires for facilities, amenities and programs. That feedback shaped the architect’s design and the virtual concept now being presented.
Seniors choosing to avoid public gatherings but wishing to view plans and offer comments will be provided an alternative by calling the senior center at 254-501-6399.
Killeen senior centers remain closed to the public in response to the COVID-19 situation. Reopening plans will be announced when determined.
More information about Killeen senior centers is available at KilleenTexas.gov/Seniors. | https://www.killeentexas.gov/CivicAlerts.aspx?AID=657&ARC=804 |
In a demonstration of true bipartisanship, Dunkirk’s Mayor Willie Rosas, together with Senator Catharine Young (R,C,I-57th District) and Assemblyman Andy Goodell (R, 150 District) worked hard to secure a $750,000 State and Municipal (SAM) Facilities grant to fund an expansion and renovations to the Dunkirk Senior Center. Senator Young was joined by state, county and city officials in making the announcement, which was held at the center.
Speaking of the needed improvements at the center, Rosas said, “We sat down and realized that there was more than what we could do here; more was needed…Anytime that we reach out to our senator and our assemblyman, they answer those calls. I can tell you that I’m a Democrat, but in office, I work with whoever is in office. And this particular project, I’m very happy to tell you, both state elected officials have been very helpful.”
Senator Young applauded the work the senior center has already done and shared her enthusiasm for its continued success.
“Our seniors are integral to the vitality of our communities. They are an active and generous presence in many local organizations, where they volunteer their time to help others, and they are caring neighbors, friends and family members to all of us,” said Senator Young. “Ensuring they have the resources they need to live as fully, healthfully and independently as possible has always been a top priority.”
“That is why securing a $750,000 grant to support a critical expansion and renovation of the Dunkirk Senior Center was a key goal for me this year. The city of Dunkirk and the Chautauqua County Office for the Aging worked together to develop an innovative, exciting plan to not only expand the building’s footprint, but the scope of its services,” Senator Young said.
“The addition will enhance the functionality of the center and also accommodate medical offices offering routine health care as well as adult day services. This wider mission will further enhance the center’s value to our seniors and community, and help keep pace with the growing needs of our older population.”
First established in 1976, the Dunkirk Senior Center offers seniors a place to gather in the comfort of their peers, allowing them to socialize and support each other. There are also a variety of offerings that enhance the quality of life for area seniors, including trips, meals, information seminars, health, fitness and wellness classes; arts and crafts and a variety of leisure activities. The center currently has about 650 members and serves another 1,500 through an onsite OFA office.
With many repairs and updates to the aging building needed, leaders from the city and the county used the opportunity to rethink the center’s existing role and imagine a more expansive model of services and programs.
They conceived of transforming the center into a community hub where health care services and adult day services could co-exist under one roof with existing social, educational and wellness programming and events. Implementing such a model at the Dunkirk Senior Center would essentially create a NORC (Naturally Occurring Retirement Community) where everything people need to age in place is in the neighborhood. That model formed the basis for the grant application and resulting award.
Over the winter, input will be solicited from Dunkirk seniors and the community on needed/desired features of a renovated Center and taken into consideration in the development of the final architectural plan. The final plan will be all-encompassing, representing a facility that can grow with the community in the decades to come.
Renovations will be carried out in phases, in conjunction with available funding. This first grant award will finance the largest component of the project: an addition of approximately 2200 square feet that will include an activities area; two bathrooms with showers; two doctor’s offices and clerical offices.
Assemblyman Andy Goodell said, “What you’re seeing right now is what happens when everyone is focused with moving a project forward in a bipartisan manner. It didn’t matter that the mayor is a Democrat. It didn’t matter that Cathy and I, as a team, are Republicans. We’re focused on one mission: How can we improve this area for everyone?”
“I am very thrilled about this project and grateful to Senator Young for her work on behalf of seniors. The Dunkirk Senior Center, like much of Western New York’s housing stock, is very outdated in its design and how the physical space functions. This grant will not only transform the space, but bring in new partners and programs so we can offer more services that meet the needs and desires of older adults today, and into the future,” said Dr. Mary Ann Spanos, Director of Chautauqua County’s Office for the Aging.
“I want to thank New York State for all of the support and attention the City of Dunkirk has been receiving. I also want to thank Senator Young for her assistance in obtaining this generous grant of $750,000 towards expansion and upgrades to our Senior Center and our continued collaborative efforts to improve the quality of life for all our residents in the City of Dunkirk. I also want to thank my staff and the Chautauqua County Office of the Aging for their partnership role in writing this grant. These funds will go towards expansion and upgrades at our Senior Center in order to increase the services provided for our seniors in the City of Dunkirk. Expanding services at this site is very important to me and I am very proud to be improving quality of life for our senior citizens,” said Dunkirk Mayor Willie Rosas.
Spanos told the OBSERVER that work on the project will likely begin spring 2019, and is looking forward to the planning process this winter. “The best day is going to be the day that we cut the ribbon on this new and improved facility,” Young stated. | http://www.observertoday.com/news/page-one/2018/10/bipartisanship-at-its-best/ |
Parks and Recreation Department to Host Community Input Meeting
The Town of Jonesborough’s Parks and Recreation Department requests residents to provide feedback on existing department services and help plan for future growth. On Tuesday, July 20 at 7 p.m. the department will host a community input meeting at the Historic Jonesborough Visitors Center, located at 117 Boone Street.
The Town is working to gather information from the community that will serve as planning and strategy for an overall Master Plan for the Parks and Recreation Department. As the Town continues to grow and more people are moving to Jonesborough, it’s more important to ensure a strategic plan is in place so the department is serving the needs of the community.
Please take a couple minutes to fill out our Community Input Survey about Jonesborough’s Parks and Athletics Programming
here: https://forms.gle/ZBePjLK8FVaheEtg8. | https://www.jonesboroughtn.org/announcement/parks-and-recreation-department-to-host-community-input-meeting/ |
Special Community Survey Your Help is Needed
Normanview Residents Group, “your” Community Association is seeking your input to help us better understand and respond to the needs and wants of community residents.
To help us accomplish that, the association is conducting a community survey to gather your input. We ask that you provide your thoughts and ideas to assist your association in providing programming and activities that meet your needs and those of the community.
Your input is valued! Thanks for taking the time to complete the survey – it’s the gift of feedback!
At the end of the survey, you will have an opportunity to enter your name for a “special” draw for some very unique patio furniture and other incentive gifts.
About NRGI
NRGI is the Normanview Residents Group, a community association in North West Regina.
The community association’s boundaries are the CNR right of way on the south, 9th Avenue North on the north, between McIntosh Street (even-numbered residences) on the east, and McCarthy Boulevard (odd-numbered residences) on the west. | https://nrgi.ca/survey/ |
The following information was provided to us by Sonia based on an announcement she received. Forums have been scheduled to provide the public with opportunities to give Fairfax County input related to human service needs. If you are aware of an unmet human service need in the county or have suggestions for improved service provision, you can make your voice heard.
“As you may be aware, Fairfax County has been undertaking an extensive engagement initiative to gather public input related to human service needs. The 2015 Human Services Needs Assessment will help us identify human service needs and potential solutions in communities throughout Fairfax County. As part of this initiative, four community forums will be held to gather public feedback on a variety of topics. The dates and locations are as follows:
· Thursday, July 30, 2015 (6:30 – 8:30 p.m.) – Reston Community Center (2310 Colts Neck Road, Reston, VA 20191)
· Monday, August 3 (6 – 8 p.m.) – Annandale United Methodist Church (6935 Columbia Pike, Annandale, VA 22003)
· Thursday, August 6 (6 – 8 p.m.) – Gum Springs Community Center (8100 Fordson Road, Alexandria, VA 22306)
· Monday, August 10 (6 – 8 p.m.) – Epiphany Episcopal Church (3301 Hidden Meadow Drive, Oak Hill, VA 20171)
You may find additional information online at http://www.fairfaxcounty.gov/living/healthhuman/needs-assessment/ including a printable flyer. | https://fairoaksparkinsons.com/2015/07/27/public-forums-for-input-on-human-services-needs-in-fairfax-county/ |
Learning institutions who desire to gain insight into the value and impact of existing approaches, identify areas of challenge and explore short and long-term ways to shift those challenges toward better practices.
Sessions are uniquely designed based on your needs with the ability to explore challenges and learn about your community's thoughts, perceptions, and desires for engaging issues through prompts, movement, and emergent dialogue.
Here are a few focus points
Gather feedback from rarely heard members of your school, center, or community space
Learn what works and what doesn’t work, yet
Develop a resource map with information about the strengths of the community around identified issues
Introduce the broad goals for the project and get community feedback for action steps to meet those goals
COMMUNITY
Deschooling: Issa Thing Meetup
1:1 Chat Sessions
Racial Equity Training for Schools
Developing A Disruptor's Ear Workbook
Supporting Parents Webinar Series
I.O.T.A. (It's Okay To Ask)
CONNECTION
BackStory
Media
Sustainability
Connect
Collaborators
AWARENESS
Raising Free People Network
Growing Minds
(S. Africa)
Philly Children's Movement
ASDE
Connect
COPYRIGHT -
2015-2020 Eclectic Learning Network ALL RIGHTS RESERVED.
Use of any information from this site is expressly prohibited without the sole permission of owner. | https://www.eclecticlearningnetwork.com/listening-sessions.html |
The Pride Center for Sexual Orientation & Gender Diversity exists to build a just, equitable world through community building and the pursuit of change. We work to create a world where people of all genders and sexualities are able to thrive as their full, authentic selves.
Our lounge is located in the University Center, room C212. All are welcome to gather and study, socialize, play games, watch movies, & engage in discussions! The space is also available for groups to reserve for meetings during normal business hours - email [email protected] to inquire about availability.
The Pride Center is committed to making each and every one of our programs and initiatives accessible and inclusive. If you are planning to attend a program and have any accessibility needs or desires, please contact Mel Kitchen at [email protected] in advance of the program for coordination. | https://diversityandinclusion.lehigh.edu/pride-center |
Samuel Mahelona Memorial Hospital (SMMH) is updating their master plan to incorporate:
Community needs and desires for the area, and
Greater integration of the adjacent State parcels – from the boardwalk to Kapa‘a Elementary and High School (refer to the map below).
Click map for a full size version.
In 2019, Hawai‘i Health Systems Corporation (HHSC) embarked on a master planning process to envision the future potential for SMMH and 34-acre campus to serve the Kaua‘i Community into the future. The purpose of the project was to assess the current state of the hospital and determine improvements needed to address current and future health service needs and to determine options for better use of the State property to provide needed affordable housing, community services, and other uses, including those with revenue-generating potential. The resulting
SMMH Conceptual Master Plan
was completed by G70 in 2020.
Although the SMMH Conceptual Master Plan was recently completed, HHSC is updating the master plan to consider greater integration of adjacent State lands and community needs and is seeking broader community input on achieving the vision for a wellness village concept that is integrated in transit-oriented development (TOD).
HHSC has hired the planning, design, and landscape architecture firm,
PBR HAWAII & ASSOCIATES, INC
. (PBR), to assist in developing the updated master plan that incorporates the community’s needs and desires for the area as well as the unique characteristics of the campus and surrounding area. Over the course of the project, the team will be seeking community input and feedback. Scroll down to find the latest opportunities to get involved and share your ideas!
To learn more about the hospital and the project area, visit the
ABOUT
page.
To sign up for project updates via email, enter your email in the form below and hit the button when done:
*
Indicates required field
Name
*
First
Last
Email
*
enter your email here
SIGN-UP FOR UPDATES
Get Involved!
THE MASTER PLAN DESIGN ALTERNATIVES ARE OUT!
Check out the three Master Plan Design Alternatives below.
You may also check out the Community Meeting #2 presentation and recording of the meeting where the Design Alternatives were discussed for more detail.
VIEW COMMUNITY MEETING DETAILS
Option A:
Main Street with Village Green
Compact hospital campus with pedestrian-oriented “main street” along Kawaihau Road
Network of walkways connecting the boardwalk, village green, and bluff park.
Library and triangular park at Iwaena Road
Teacher/healthcare workers’ and DHHL housing, residential psych and Easter Seals facility along Nunu Road
Option B:
Duo Village Greens
Dual village greens at opposite ends of a loop road and senior assisted living overlooking a large bluff park
Community retail and medical uses along Kawaihau Road
Kapa`a Police Substation and other housing uses along Nunu Road
Option C:
The Bluff
Compact hospital campus with village green, retail, library, teacher/healthcare workers’ housing along Kawaihau Road
Senior assisted living and senior center at the large bluff park with amphitheater
Kapa`a Police Substation, DHHL housing, new residential psych and new Easter Seals facility along Nunu Road
Click on the Design Alternatives to view larger.
Other Comments or Questions?
If you’d prefer to type in your comments or have a question, please use the comment box below and hit submit when done. | https://www.planmahelona.com/index.html |
Four Regulations That Increase Housing Costs
Housing is becoming increasingly expensive in major American cities, and this is partly due to land-use regulations that don't receive enough attention from policymakers or voters. In a new research paper, Sandy Ikeda and I review the economics literature on the relationship between land-use regulations and housing costs. We find that a significant majority of studies show that stricter zoning rules increase the cost of housing. These higher prices hurt low-income people, reduce income mobility, and even limit national economic growth.
The cities with the most prohibitive housing costs — the San Francisco Bay Area, New York, Boston, and Washington, D.C. — all have very restrictive zoning rules. These regulations make cities inaccessible to young people and renters who would otherwise take advantage of the education, jobs, and other amenities on offer.
Here's a breakdown of the most important types of zoning rules that increase housing costs:
1. Lot Size and Density Restrictions
Minimum-lot-size rules — which state that a lot must take up a certain amount of space for each family that will occupy it — are perhaps the best-known rules that suburbs use to keep lower-income residents from moving in. By only allowing only single-family homes to be built on many lots, even rather large ones, these rules can dramatically increase the cost of housing. In one study we surveyed, minimum lot sizes were found to be the type of regulation most responsible for increasing housing costs in the Boston area.
Like minimum-lot-size rules, maximum-density rules limit the amount of housing that can be built in a specified area. Maximum-density rules often take the form of limits on floor-area ratio, or FAR — the ratio of total floor area (with each story of the building counted separately) to the area of the plot. For example, the maximum allowed FAR for office buildings in downtown San Francisco is 9:1, meaning that if a building took up an entire plot, it could have a maximum of nine floors. (If it took up half the plot, it could have 18 floors, and so on.) Washington, D.C.'s Height Act is another example of a maximum-density rule; it effectively prevents the city's tallest buildings from exceeding 160 feet.
Maximum-density rules are often a binding constraint in urban areas, as evidenced by developers' tendency to take advantage of every square inch of floor area permissible under local laws. In a 2003 paper, economists Edward Glaeser, Joseph Gyourko, and Raven Saks find that restrictions on building supply account for up to 40 percent of the housing costs in some of the nation's most expensive cities.
2. Parking Requirements
While driving through a typical American shopping center, most shoppers probably think that stores provide huge expanses of parking lots for their customers' convenience. However, in his extensive research on parking policy, Donald Shoup finds that gigantic parking lots are often built simply to comply with arbitrarily determined parking requirements.
These rules are intended to make life easier for drivers, and to keep businesses' customers from parking on the streets of nearby neighborhoods, but they also have the effect of devoting land to parking lots that could be better used as housing or commercial developments. In a study of parking requirements in Los Angeles, Shoup finds that required parking at apartment buildings contributes $104,000 to the cost of an apartment. This isn't to say that all Los Angeles apartments would be devoid of parking without the rules requiring it. However, in a freer market, some developers would very likely cater to apartment dwellers without cars, who could save money by not paying for land dedicated to other residents' parking spaces.
3. Urban Growth Boundaries
An urban growth boundary (UGB) is a greenbelt preserved around a city for open space or farmland. Commercial and residential development is permitted only inside the boundary. UGBs are a type of "smart growth" regulation. In reaction to some of the negative effects of traditional land use rules such as minimum lot sizes, maximum-density rules, and parking requirements, smart growth emerged as an alternative framework of regulation. The objectives of smart growth include reducing sprawl and creating more walkable cities.
Portland has the most famous UGB, which has been in place since the 1970s. Studies have found that UGBs increase the price of land inside the boundary, in turn increasing housing costs. While some of smart growth's objectives are to counter the effects of traditional zoning rules, the two have this in common.
4. Historic Preservation
Historic-preservation rules reduce potential housing supply by preventing old buildings from being replaced with denser housing. Additionally, historic preservation limits "filtering" in the housing market. Typically, we expect to see a city's wealthiest residents living in new construction. As these new buildings age, high-income people move to newer buildings, leaving older buildings available for middle-income people, and leaving even older construction available for low-income people. When new construction is prevented, wealthy residents stay in older buildings that may have plenty of charm, but lack the conveniences of newer construction. These preserved buildings remain unaffordable to low-income tenants, who are then shut out of a neighborhood or city entirely. In Manhattan, people who live in historic districts are 74 percent wealthier than those who do not, indicating that the filtering effect is stifled for some of the country's most desirable neighborhoods.
All of these rules may have some beneficial effects, such as facilitating the development of leafy suburbs, making car transportation easy, or preserving architecture. And rules that increase housing costs are very popular with homeowners, for obvious reasons. However, they come at the expense of people who may not be able to live in an expensive city, and these costs are hard to see.
The burden of land-use regulations largely falls on renters. Renters tend to have lower incomes and are on average younger than homeowners. Land-use regulations have effects similar to those of a sales tax in that they raise the cost of all rental housing in a city. Because lower-income people tend to spend a higher proportion of their income on housing, they bear an unfair share of the costs of these land-use rules, while established, high-income households reap an unfair advantage at their expense.
Aside from these regressive effects, land-use regulations have broader implications for the economy. Research from economists Chang-Tai Hsieh and Enrico Moretti finds that land-use regulations not only harm low-income people and reduce income mobility, but also reduce economic growth. Because the cities with the most restrictive land-use rules are also some of the most productive places in the country, the rules prevent people from living where they can contribute the most to economic growth. Hsieh and Moretti find that reducing land-use regulations in New York, San Francisco, and San Jose to the level of regulation in the median American city could increase GDP by an astonishing 9.5 percent.
These striking findings demonstrate the importance of reforming land-use regulations. However, homeowners are a powerful political force who benefit from the current policy environment. In our paper, Sandy and I summarize some of the proposals for liberalizing zoning rules, including municipal commitments to permit a given amount of development and proposals to allow homeowners to benefit financially from the increase in the tax base that new development can provide. Others have proposed state limits on municipalities' ability to restrict development. Liberalizing land-use regulations is crucial to increasing income mobility and economic growth.
— Emily Washington is a policy research manager for the State and Local Policy Project with the Mercatus Center at George Mason University. She is coauthor, with Sanford Ikeda, of new research on "The Regressive Effects of Land Use Regulations," published by the Mercatus Center. | https://www.realclearpolicy.com/blog/2015/11/05/four_regulations_that_increase_housing_costs_1460-2.html |
Congress was in recess last week for the Memorial Day holiday, but while lawmakers were out of town, the administration was at work on a number of initiatives that impact cultural resources.
- Restoring Tribal Power on Water. The EPA has proposed tighter water regulations that would shift power back to the states and Native American tribes to block energy projects like natural gas pipelines that could potentially pollute rivers and streams, reversing a Trump administration move. The Clean Water Act allows states and tribes to review what effect pipelines, dams and some other federally regulated projects might have on water quality within their borders. The Trump administration sought to streamline fossil fuel development and made it harder for local officials to block projects. The final rule would likely go into effect by spring 2023, following a public commenting period.
The EPA also announced it will renew the Tribal Infrastructure Task Force (ITF) to improve coordination between federal agencies on water, wastewater and sanitation projects in Indian Country. The agency also announced $154 million for Tribes and Alaska Native Villages through the 2021 bipartisan infrastructure bill and an additional $2.6 million under the agency’s Small, Underserved, and Disadvantaged Communities (SUDC) Grant program.
- Modernizing Corps 106 Procedures. The U.S. Army Corps of Engineers announced Friday that it is launching an effort to modernize its civil works program, possibly including updating its implementing regulations for the National Historic Preservation Act.
Acknowledging that there has been “longstanding disagreement” between the Corps and the Advisory Council on Historic Preservation over differences between the Corps’ Regulatory Program Appendix C and the Council’s Section 106 regulations, which has led to “inconsistency and confusion among the regulated public, State and Tribal Historic Preservation Offices, Tribes, and others,” the Corps stated that “rulemaking on Appendix C is a priority policy initiative which will serve to modernize the Regulatory Program.”
The Corps is seeking public input into its regulations through a comment period that runs until August 2, and through a number of public virtual meetings in July.
- Added Capacity at BLM for Renewables. The Interior Department announced last week that the Bureau of Land Management will open five Renewable Energy Coordination Offices in order to speed the processing of wind, solar and geothermal development. According to Interior, “The BLM is actively partnering with key federal agencies to fund dedicated positions to prioritize robust environmental compliance coordination for renewable energy proposals. The coordination offices include a national office at the BLM’s headquarters, within state offices in Arizona, California and Nevada; and a regional office led by BLM Utah. The BLM is also actively hiring project managers in other states, such as Idaho and Colorado, to support renewable permitting work in those states.” Interior also said that the Renewable Energy Coordination Offices will support increased engagement between the Departments of the Interior, Agriculture, Energy and Defense and the EPA.
The announcement came as the Department said that it plans to cut rents and fees for solar and wind projects on public lands by about 50 percent in an effort to increase the production of renewable energy.
- Bristol Bay. The EPA has proposed restrictions that would block copper and gold mining in Alaska’s Bristol Bay. The EPA’s proposal would prohibit the release of dredged or fill material into the U.S. waters within the proposed footprint of the mining site. If finalized, the EPA said that its determination under the Clean Water Act would help protect the Bristol Bay watershed’s rivers, streams, and wetlands that support the world’s largest sockeye salmon fishery and a subsistence-based way of life that has sustained Alaska Native communities for millennia.
As Congress returns to Washington for a busy few months of legislating, a number of issues that impact CRM will be on the agenda, including funding for the Historic Preservation Fund. Stay tuned to ACRASphere for more updates. | https://acra-crm.org/your-congress-in-action-june-6-2022/ |
Beginning February 1, Gulf Islands National Seashore will begin enforcing maximum Recreational Vehicle (RV)/trailer length and height limits for all campsites in the Fort Pickens Campground in Florida and the Davis Bayou Campground in Mississippi.
While campsite length limits have been in place for a long time, a new height restriction of 12-feet for the Fort Pickens Campground Loop A has been instituted due to tree growth over the roadway. The maximum lengths at each campsite vary depending on the size of the parking pavement. Visitors can verify the campsite length on recreation.gov (Recreation.gov – Camping, Cabins, RVs, Permits, Passes & More). Reservations for vehicles exceeding the campsite size limits will be canceled by campground staff on-site.
“The current limits in place will be enforced for the safety and protection of the park, and visitor property,” said Darrell Echols, Gulf Islands superintendent. “In 2021, Gulf Islands National Seashore saw an increase in incidents resulting in damage to park resources and visitor’s property. The enforcement of these restrictions is expected to reduce these incidents. Visitors are encouraged to review the published limits for campsites when making their reservations on recreation.gov”
Two vehicles are permitted at each a campsite, this includes RVs/trailers, due to the limited pavement available for parking and turning around. All vehicles are required to back into the site with all four tires parked on the pavement. Vehicles are not permitted to park sideways or in the grass at campsites. If a vehicle cannot be backed into the site, it will be required to be moved to one of several campground overflow parking lots.
The National Park Service is entrusted with caring and preserving unique natural and cultural treasures for future generations. This change will improve the balance between continued access to the campground for overnight visitors and preservation of the park’s natural and cultural resources. | https://ssrnews.com/national-seashore-to-enforce-campground-size-limits-in-2022/ |
It appears there will be changes made to zoning regulations of wind energy turbines, and those changes could come as soon as August. The Harvey County Commission will review some recommendations which came out of a meeting of the county planning and zoning board last week which was dedicated to reviewing current conditional use permit requirements for wind turbines.
The County Commission will be presented with an overview of a comparison of Harvey County’s Commercial Renewable Energy Regulations to other Kansas counties. Additionally, staff will present changes the Planning Commission will consider making to the Commercial Renewable Energy Regulations. Also, a map is included showing the surrounding counties who have banned wind energy, or have moratoriums on wind energy.
The resolution, 2019-19, creates a moratorium for turbines being placed in a flood plain, and, a limit that “No Renewable Energy Equipment shall be located closer than 2,000 feet from an active residential building.”
As previously reported by the Newton Kansan, local cartographer, historical researcher and author Brian Stucky created a map showing where turbines could be constructed – and the space is limited.
“It is overwhelmingly cluttered and clogged,” Stucky said. “Where would you put towers? Up in Marion county, they have 20 to 30 wind turbines per township. There is no way you can put 10 to 30 wind towers [here]. Maybe two or three.”
During the July 12 meeting of the planning and zoning board, members reported requests from county residents to ban commercial wind farms in Harvey County. There are bans in surrounding counties – Sedgwick and McPherson counties have a total moratorium while portions of Reno, Butler and Marion counties have partial bans.
Those were considered, along with other regulations in surrounding counties.
The Harvey County Historical Society came before the planning commission to ask for changes. The society is seeking the preservation of historic sites, with the proposed language:
“The CUP shall avoid cultural, historical and archaeological sites. Thus, Applicant shall take measures to ensure the protection of Said sites. Prior to submitting the Conditional Use application for a CREP, the Applicant shall supply to the Zoning Administrator a letter from the Kansas Historical Society (KHS) attesting to the fact that no cultural, historical or archaeological site or resource shall be negatively affected by the construction and operation of said wind farm. Cultural, historical and archaeological resources and sites are those as designated by the State Historic Preservation Office and include both pending and approved nominations to the National Register of Historic Places, the Register of Historic Kansas Places and the Kansas Historic Resources Inventory.”
The planning and zoning commission will consider changes to the the ordinance in August, including:
1. Create a Sand Hills District Overlay from NW 12th north to Dutch Ave and East to West from Woodberry to Golden Prairie.
2. They would like to add a 2000\u2019 setback for Parks and Recreational areas, City Limits, Schools and Churches.
3. They also felt they needed to increase the property line setback from a minimum of 550′ to 1000′. Non-participating property owners would be able to sign a waiver if they were in agreement to locate them closer but no closer than 550′ or height of the tower plus 50′.
4. They would like to see requirements for an Acoustic Study, Shadow Flicker Study,Road Impact Study and Ice Throw Study. The Road Impact Study would be done by Road and Bridge’s retained engineer and the other studies by a third party paid by the applicant.
5. Add a limit on Shadow Flicker of 30 hours or less per year.
6. Receive a copy of signed lease agreements. Planning and zoning staff is currently crafting a new set of regulations for review of the Harvey County Planning and Zoning Board and the Harvey County Commission.
This article is the work of the source indicated. Any opinions expressed in it are not necessarily those of National Wind Watch.
The copyright of this article resides with the author or publisher indicated. As part of its noncommercial effort to present the environmental, social, scientific, and economic issues of large-scale wind power development to a global audience seeking such information, National Wind Watch endeavors to observe “fair use” as provided for in section 107 of U.S. Copyright Law and similar “fair dealing” provisions of the copyright laws of other nations. Send requests to excerpt, general inquiries, and comments via e-mail.
|Wind Watch relies entirely
|
on User Funding
Share: | https://www.wind-watch.org/news/2022/07/19/county-review-of-wind-farm-regulations-continues/ |
After months of negotiations, a proposal for new rural development restrictions is making its way through the hearing process.
Rural residents are about to get their first chance to go on record about stricter planning and zoning regulations that Douglas County officials may trade for water meters.
After a public hearing at 6:35 p.m. Wednesday, the Lawrence-Douglas County Planning Commission will consider amendments to rural subdivision regulations. The amended regulations would satisfy Lawrence officials' concerns about unplanned development in areas likely to be annexed into the city.
The hearing will be in the Lawrence City Commission chambers.
Douglas County Commissioner Mark Buhler, who helped negotiate the proposed amendments with city officials, acknowledged that rural residents might balk.
``It's the appearance of additional regulation on our lives,'' Buhler said. ``However, the importance of this is that it gives us an opportunity to have a public hearing during the planning process and allows us, hopefully, to do some planning in terms of dedication of right of way and where residential densities ought to occur in rural areas of the county.''
The new regulations governing the Primary Urban Growth Area immediately outside the Lawrence city limits would no longer exempt properties containing at least five acres from planning requirements that apply to smaller lots. Platting would be required anytime the owner of an agricultural property in the PUGA changed its use to residential, commercial or industrial.
The five-acre exemption would still exist in other areas of unincorporated Douglas County.
City officials have refused to let rural water districts keep up with the demand for water meters until the planning regulations are tightened. They control the number of meters that can be issued in water districts that buy water treatment services from the city.
City officials say the new restrictions would help make sure that streets and utilities in the PUGA would be compatible with the city's infrastructure after annexation.
Within the PUGA, the amendments would require sidewalks and dedicated rights of way in platted subdivisions, ban new septic systems and impose standards for water lines.
During their meeting on Nov. 15, planning commissioners will discuss a proposal to enlarge the size of the PUGA. Its southern boundary, the Wakarusa River, would move south to include both sides of Wells Overlook Road.
Phil Bradley, the planning commission chairman, said the water meter negotiations will not be a topic of discussion at either meeting.
``We're not going to talk about water meters or who was promised what,'' he said. ``We're only going to talk about planning issues.''
Copyright 2018 The Lawrence Journal-World. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. We strive to uphold our values for every story published. | http://www2.ljworld.com/news/1995/oct/23/public_gets_say_on/ |
The Digital Initiatives Librarian and Assistant Professor will collaborate to envision an expanded digital initiatives program for the University of Mississippi Libraries. Under the direction of the Head of the Metadata & Digital Initiatives, the incumbent will work collaboratively in a team environment to assess and implement initiatives related to digital content in the library, participate in outreach to the campus on the library’s digital and open access projects and services, assist with the development and implementation of digital preservation strategies and policies, and identify infrastructure or technologies to complement existing digital library initiatives. The University’s institutional repository and digital publications platform (http://egrove.olemiss.edu) are among the Libraries’ digital initiatives. The incumbent will also fulfill requirements of faculty status in the areas of librarianship, scholarly activities, and service.
The successful candidate will have experience in digital collection processing of analog and born digital materials (digitization and digital curation), familiarity with digital project management and online exhibition tools, familiarity with library metadata standards and data manipulation tools, and strong communication skills.
Minimum salary is $43,000 and includes a competitive benefits package. Applicants will be asked to include a letter of application, vita, and the names, addresses, phone numbers and email addresses of three current professional references. Review of applications will begin immediately and continue until the position is filled.
The University of Mississippi is located in historic Oxford, a thriving community offering a wide range of literary, musical, and cultural activities. | https://jobs.code4lib.org/jobs/33694-digital-initiatives-librarian-and-assistant-professor |
The Flemish government has spent €194 million to help keep businesses in the cultural sector afloat as they battled Covid-related shutdowns and mandated infrastructure changes to remain open.
During the pandemic, Belgium’s culture industry has been subjected to regulations that have seen dramatic drops in business. Flemish member of Parliament Cathy Coudyser (N-VA) compiled the aid tally from several aid programs, Belga News Agency reports.
“These figures show that the government has made substantial commitments to provide for the various needs of the sector and enable it to weather the crisis,” Coudyser said.
Coudyser added that financial aid distributions were made via the Flemish Agency for Innovation and Enterprise (VLAIO), the Department of Culture, and the value of corona premiums paid to workers in the culture industry.
Closing culture industry regrets
Coudyser’s release comes days after Flemish Minister-President Jan Jambon said that shuttering the culture industry just before Christmas was “not the best decision the authorities ever made.” Jambon is also the Flemish Culture Minister.
Related Posts
In December, large crowds gathered in Brussels protesting the shuttering of cinemas, theatres, bowling alleys, and other indoor gatherings. Such venues are now permitted to operate, but with several restrictions, including capacity limits and mask requirements for all attendees. | https://www.brusselstimes.com/news-contents/entertaiment/202659/flemish-culture-industry-received-e194-million-in-covid-aid/ |
Land development commonly involves compliance with varying regulations and the submission of different reviews along the way. These requirements often expand when the planned projects take place in certain protected areas.
Designated areas of critical environmental concern typically fall subject to increased oversight and standards. Therefore, land developers should understand the reviews that they will have to submit when building in ACECs.
Land preservation and restoration
According to the Massachusetts Department of Conservation and Recreation, areas of critical environmental concern include lands granted special recognition based on several qualifying factors. These include the significance, uniqueness and quality of the land’s natural and cultural resources.
By designating such areas and making them subject to enhanced oversight, the Areas of Critical Environmental Concern program aims to enhance, preserve and restore vital resources and resource areas. Through these heightened regulations, the program works to help land developers become stewards of these essential ecological areas.
Regulated activities for ACEC projects
According to the Massachusetts Office of Coastal Management, the state regulates certain project activities in areas of critical environmental concern. For example, these include those activities that may have substantial impacts, such as altering wildlife habitats. Land developers often must show how the proposed project will or will not affect the surrounding environment, as well as disclose their plans for the preservation of the land resources.
When it comes to projects in ACECs, preserving the environment often carries as much importance as developing the land. Knowing what the state requires of them, as well as what activities it may restrict, may help keep some projects on budget and on time. | https://www.gilmac.com/blog/2022/07/building-in-areas-of-critical-environmental-concern-an-overview/ |
NOTE: This index is in formation and is not yet complete. Check back for updates. For information regarding County, State and Federal laws, please reference the respective websites.
A proposed Florida-Friendly Landscaping™ ordinance includes revisions and criteria which encourages nationally-recognized Florida-Friendly Landscaping™ (FFL) and sustainable principles as language to be incorporated into the City of Fort Lauderdale Code of Ordinances, Chapter 47 Unified Land Development Regulations (ULDR), ARTICLE III. - DEVELOPMENT REQUIREMENTS Section 47-21. LANDSCAPE AND TREE PRESERVATION REQUIREMENTS.
Code of Ordinances - Ch. 28, ARTICLE 1, Sec. 28-1A. - Water shortage—Declaration of emergency; emergency restrictions.
Code of Ordinances - Ch. 28, ARTICLE 1, Sec. 28-1B. - Water conservation.
Code of Ordinances - Ch. 28, ARTICLE 1, Sec. 28-1C. - Enforcement of emergency and conservation restrictions of water usage and penalties.
Code of Ordinances - Ch. 28, ARTICLE 1, Sec. 28-1. - Water restrictions and conservation.
Code of Ordinances - Ch. 9, ARTICLE 1 - Sec. 9-1. - Florida Building Code adopted; enforcement.
Code of Ordinances - Ch. 25, ARTICLE V. - STREETS & SIDEWALKS, TREES, SHRUBS, ETC.
Code of Ordinances - Ch. 28, ARTICLE 1, Sec. 28-4. - Standards for Florida-Friendly Fertilizer Use on Urban Landscapes.
Code of Ordinances - Ch. 6, ARTICLE I, Sec. 6-12. - Beekeeping restrictions.
Code of Ordinances - Ch. 6, ARTICLE I. Sec. 6-13. - Keeping of wild animals.
Code of Ordinances - Ch. 6,. ARTICLE I, Sec. 6-15. - Feeding of wild animals prohibited.
Code of Ordinances - Ch. 8, ARTICLE V, Division 1 - Sec. 8-152. - Garbage and waste disposal.
Code of Ordinances - Ch. 8, ARTICLE V, Division 1 -Sec. 8-156. - Marine sanitation systems.
Code of Ordinances - Ch. 8, ARTICLE V, Division 1 - Sec. 8-166. - Speed limits in waterways. | https://gyr.fortlauderdale.gov/greener-government/gyr-ordinances-code |
FIMBank plc has partnered with Public Broadcasting Services Ltd (PBS) in an initiative which has seen the broadcast of a series of 30-second video-spots, focusing on Malta’s linguistic heritage. The series of 100 videos, the production of which was also sponsored by the Bank, traces the meaning of specific words in the Maltese language. The words selected for this series, which is entitled ‘Kelma Kuljum’ (or ‘A Word Everyday’), include both those used every-day, as well as others the use of which has become less frequent.
Commenting on this initiative, FIMBank Chairman Dr John C. Grech stated that “As a Malta-based institution we feel we owe it to the people of Malta to help raise awareness of the Islands’ rich cultural heritage. This consideration has always been a mainstay of our Corporate Social Responsibility programme. The Maltese language is recognised as being an essential part of the Maltese DNA. Its uniqueness, derived from its eclectic mix of Semitic and Romance influences, is appreciated by linguists worldwide. It is also a reflection of Malta’s long and chequered history, and the Islands’ strategic location at the centre of the Mediterranean. We are proud to be in a position to highlight the beauty of this language.”
Maltese is descended from Siculo-Arabic, the Arabic dialect that developed in Sicily and later in Malta, between the end of the ninth century and the end of the twelfth century. Maltese itself is therefore linguistically classified as a unique branch of Arabic that has evolved independently of its source into a standardized language over the past 800 years in a gradual process of Latinisation.
About half of the vocabulary is derived from standard Italian and Sicilian; English words make up between 6% and 20% of the Maltese vocabulary, according to different estimates. The original Semitic base (Siculo-Arabic) comprises around one-third of the Maltese vocabulary, and typically includes words that denote basic ideas and the function words. Maltese has always been written in the Latin script, the earliest surviving example dating from the late Middle Ages. It remains the only Semitic language written in the Latin script in its standard form.
Jason Zammit, FIMBank’s Head of Marketing & Administration, said that the video spots, which are being broadcast five times daily on national TV station TVM, have proven to be very popular with Maltese viewers. He also said that “very positive and encouraging feedback was received after the spots were posted on Facebook and Youtube, where they have been shared extensively by users”. Zammit thanked all those who have collaborated in the project, including PBS as the main partners, as well as Dr Michael Spagnol who acted as the linguistic consultant for the series. | https://www.fimbank.com/en/news-details/fimbank-csr-focuses-on-the-beauty-of-the-maltese-language- |
Neo-Mandaic is the only surviving dialect of Aramaic to be recognized as a direct descendant of any of the classical dialects of Late Antiquity. The Mandaeans who speak it are adherents of a pre-Islamic Gnostic sect, the only such sect to survive to the present day. As such, Mandaic may be considered as both a living language of the modern Middle East and also the vehicle of one of the great religious traditions of that region, along with Hebrew, Arabic, and Persian. Unfortunately, Neo-Mandaic is severely endangered, and all signs indicate that the current generation of speakers is likely to be the last. As a description of an endangered language, this work addresses one of the chief concerns of linguists in the 21st century, namely the impending loss of the majority of the world’s languages and the immense threat to both linguistic and cultural diversity that it represents. This grammar is the fi rst account of a previously undocumented dialect of Neo-Mandaic, and most thorough description of any Neo-Mandaic dialect. In addition to a description of its phonology, inflectional paradigms, and morphosyntax, it includes a collection of ten texts, transcribed and translated, as well as a concise lexicon of the vocabulary found within these texts.
Für dieses Produkt wurde noch keine Rezension verfasst. Bewerten Sie dieses Produkt jetzt als Erster! | http://m.beck-shop.de/item/353334313437 |
Chat botAnd deepAnd big data, etc. How can these concepts be expressed in French?
To answer this question, DataFranca has published a glossary 101 Words of Artificial Intelligence: A Short Guide to Basic Data Science and AI Vocabulary. In addition to translating key terms in the field, this book generalizes concepts for easier understanding.
This project was directed, for the science component, by Patrick Drouin, Professor of Translation in the College of Arts and Sciences at the University of Montreal, and Claude Colomb, a Physics and Computer Science graduate from UdeM.
Fits the vocabulary of artificial intelligence in French
Realizing that terms related to artificial intelligence, machine learning, and deep learning were scarce at the French nonprofit DataFranca’s wiki has collected more than 5,500 terms related to these fields of activity. The worldwide francophone community of many scholars, terminologists, and translators has written thousands of encyclopedic records that have been submitted for peer review. Contributors to this project, supported by the Fonds de recherche du Québec and the Office québécois de la langue française, include Joshua Bengio, from Mila – the Quebec Institute for Artificial Intelligence – and Hugo Larochelle, from Google.
Lexicon 101 words of artificial intelligence represents the core of this work. It consists of 101 entries in French and English, presenting the most frequently used terms such as deep learning, decision tree or layer of neurons.
Claude Colomb and Patrick Drouin worked in pairs on this lexicon: the first devoted himself to the technical side, and the second took charge of the generalization and linguistic side. “Claude discussed the concepts, and then I modified them into understandable explanations,” says Patrick Drouin.
required working speed
“It’s important, quickness of reaction, flexibility, because if we don’t go fast enough, the English idiom will prevail, and then it will be very difficult to go back and undo the habits,” says Claude Colombe.
We think of many English computer terms used in French, for example data set. Today’s linguists have difficulty implementing the “dataset” equivalent.
Create new terms in French
Some words have been translated almost verbatim as chatbot, provided by “chatbot”, or deep Translated as “deepfake”.
In some cases, metaphors, such as those of expression, were retained mining data, which translates to “data mining”.
In other cases, the researchers chose to make the terminology clearer: the name Transformation It became “autonomic neural network” or “self-awakening network”, which refers to “a high-performance, serial-to-sequence deep neural network architecture. It uses the attention mechanism, more precisely the self-attention, to replace both iterations and convolutions. Moreover, it comes Using interest in machine translation from the groundbreaking work of MILA”, we read in the glossary.
Well developed vocabulary
This vocabulary is subject to change. big data Until now, it was translated as “big data”. Now, when we know that prefix Mega It comes from the Greek meaning “million” and today we are talking about information that is no longer stored in megabytes but exceeded a terabyte a petabyte it no longer makes sense to talk about it big data. So we should talk instead big datasays Patrick Drouin. | https://www.awanireview.com/basic-vocabulary-for-artificial-intelligence/ |
Antoine Duris began as a missionary in China (Guizhou) in 1934 and joined the mission in Hualien (Taiwan) in 1957. On June 5, 1958, he arrived as parish priest in the parish of Fuyuan, among the people of the Bunun ethnic group, who welcomed him with a joyful parade.
For almost 40 years, Fr. Duris has worked to make the Bunun culture better known, as shown by his French-Bunun Vocabulary, published in 1988. This lexicon contains thousands of words, extremely rich in details of daily life. For example, the word “cry” gives proper translations for the “ordinary cry of the monkey” and the “cry of the monkey in danger”, that of the “angry boar”, different from the “attacking boar”. As often, the data collected by missionaries, in contact with local populations over a long period of time, “exceeds those collected by linguists and anthropologists “.
This archive is particularly interesting, first of all because it is annotated on all sides, showing the uninterrupted work of correction of its author. Furthermore, it bears on its title page a suggestive mention in the hand of Fr. Duris: “For my successor, if he refuses to collaborate in the ethnocide”.
Fr. Duris and his MEP confreres, “by using the aboriginal languages for the purpose of evangelization, by providing these languages with an alphabetical script, were at the time in opposition to the government policy of promoting Chinese“. His note shows his concern that his successor will not follow exactly the same line of valuing the Bununs.
Nowadays, the work of Fr. Duris has become “a valuable resource for attempts to revitalize the native languages of the aboriginal villages, which have suffered greatly from the policy of imposing Mandarin Chinese “.
LIU Pi-chen, « Brève histoire des Missions étrangères de Paris et de l’évangélisation des Aborigènes à Taïwan », in Les ecclésiastiques français de la côte est de Taïwan, Taipei : National Museum of Natural Science, 2019, p. 79
Ibid.
Ibid. | https://irfa.paris/en/fr-antoine-duris-defending-the-bunun-language/ |
By Michael Sokoloff
The second one variation of Carl Brockelmann's Lexicon Syriacum, released in 1928, is rightly thought of to be the easiest dictionary of Syriac ever written. notwithstanding, its Latin language and the ordering of phrases in response to triliteral Semitic roots make tough to exploit for many scholars and students. additionally, the dictionary used to be composed in a very concise demeanour, which intended that references got with no bringing up any of the textual content. This usually makes the glosses very unlikely even for somebody who understands Latin.
In the eighty one years that experience handed because the book's e-book, there were nice advances in either Aramaic and Semitic reviews. in addition, Syriac studies—especially the ebook of the serious texts of classical authors, equivalent to Ephrem—have significantly more suitable our wisdom of Syriac and feature made the book of a brand new and up to date dictionary relevant. in spite of the fact that, simply because a brand new dictionary venture doesn't but exist and might take a long time to accomplish, this variation of Brockelmann's paintings has been undertaken to make Syriac vocabulary extra obtainable to either students and scholars. Following are the alterations brought into the Syriac Lexicon during this revision:
- The meanings are given in English, no longer Latin.
- The vocabulary is ordered alphabetically.
- All textual content citations were proven through consulting the unique courses, and the place new serious variations have seemed (for instance, these of E. Beck for the works of Ephrem), references were replaced to indicate to the recent editions.
- textual content citations with partial or whole translations have now been provided.
- the entire etymologies were completely revised.
- digital indexes (English-Syriac and textual content References) were prepared.
This dictionary is a necessary device for somebody operating in Syriac stories, Semitic linguistics, and biblical studies.
You can obtain the corrections within the moment printing the following: http://www.eisenbrauns.com/assets/errata/Sokoloff_Lexicon_Corrections_for_2nd_printing.pdf. The version orthographies additions can be found right here: http://www.eisenbrauns.com/assets/errata/Sokoloff_Variant_Orthographies.pdf.
Read Online or Download A Syriac Lexicon: A Translation from the Latin, Correction, Expansion, and Update of C. Brockelmann's Lexicon Syriacum PDF
Similar foreign language dictionaries & thesauruses books
The Adventures of Huckleberry Finn (Webster's French Thesaurus Edition)
This version is written in English. even though, there's a operating French glossary on the backside of every web page for the tougher English phrases highlighted within the textual content. there are lots of variations of The Adventures of Huckleberry Finn. This version will be
Webster's English to German Crossword Puzzles: Level 9
No matter if you don't like crossword puzzles, you'll prove loving those. Designed for mother-tongue or thoroughly fluent audio system of German desirous to enhance their English talents, the puzzles can also be wonderful to English audio system. they're formatted in order that each one puzzle will be solved in 15 to half-hour.
Colloquial Albanian: The Complete Course for Beginners
"Colloquial Albanian" offers a creation to a little-known language, including history info at the Albanian humans and their tradition. No past wisdom of the language is important, and the path has been designed for self-study. every one lesson comprises conversations and texts in keeping with daily occasions, and the vocabulary is equipped up progressively from this fabric.
- Les 500 Exercices de Grammaire A1 Combined Textbook and Answer Key
- A Frequency Dictionary of Turkish
- The ancient Egyptian coffin texts/ 3, Spells 788-1185 & indexes
- Essentials of Swedish Grammar: A Practical Guide to the Mastery of Swedish
- Colloquial Arabic
- Jewish Inscriptions of Graeco-Roman Egypt
Extra info for A Syriac Lexicon: A Translation from the Latin, Correction, Expansion, and Update of C. Brockelmann's Lexicon Syriacum
Sample text
J. , Leiden 1911-13 Levy, TM W J. , Leipzig 1867 LexAdl Ms. G. Adler [ r ^ - ^ ; v. PSm2, Intr XII] LG M. A. Kitchen & M. F Parmentier, The xl Book o f Steps, The Syriac Liber Graduum, Kalamazoo 2004 LibPar Book of Paradise (* —■A^ ^ re' cm . [ )ך\> ן־דcited in BBah; v. BBah3, p. XXI] LIPP D. N. MacKenzie, Wicbadcn 2005 LitOr E. , Paris 1716 Littm Sem lnscr E. Littmann, Semitic Inscrip tions, New York 1904 LJLA Late Jewish Literary Aramaic LMA Late Mesopotamian Aramaic l n v M. Mor es het , לקס יק ו ן הפועל שנתחדש בלשון ( התנאיםA Lexicon o f the New Verbs in Tannaitic Hebrew), Ramat Gan 1980 Lobab J.
Series graeca, Paris 1889—> Ming A. B. , Paris 1899-1910 [Syriac text in vol. 4] M IT E. Yamauchi, Mandate Incantation Texts, New Haven 1967 Mk Mark MO Le Monde oriental Moberg, Term M. Moberg, Zur Terminologie, in BStr, pp. 1*-119* ModSv Modern Syriac Mong Mongolian Mos v. ) MosAgh 1. Guidi, ‘Mosè di Aghel e Simeone Abbate’, Rendlincei 1886, pp. 397-416; 546-557 Moses O. Braun, Moses bar Kepha und sein Buch von der Seele, Freiberg 1891 Moss C. Moss, Catalogue o f Syriac Printed Books and Related Literature in the British Museum, London 1962 MP Middle Persian M P J.
Berlin 1908-1913 [reprinted G. Olms, Hildesheim 1961] GW George Warda GIV A. Deutsch, Edition dreier syrischen Lieder, nach einer Handschrift der könig liehen Bibliothek in Berlin, Berlin 1895 [of George Warda] GWG Idem, Ausgewahlte Nestorianische Kirch enlieder über das Martyrium des heiligen Georg von Giwargis Warda, Kirchhain 1896 GWH H. Hilgcnfeld, Ausgewahlte Gesänge des Giwargis Warda von Arbel, Leipzig 1904 GW V George Warda, in B. H. Petermann, Thesaurus s. , Leipzig 1867 H(eb) Hebrew HahnSieffertChrest A. | http://jachty.eurostyle.pl/library/a-syriac-lexicon-a-translation-from-the-latin-correction-expansion-and |
Speech and language processing have advanced enormously in the last decade, with successful applications like machine translation, voice-activated search, and even language-enabled personal assistants. Yet these systems typically still rely on learning from very large quantities of human-annotated data. These resource-intensive methods mean that effective technology is available for only a tiny fraction of the world’s 7000 or so languages, mainly those spoken in large rich countries.
This talk describes our recent work on developing *unsupervised* speech technology, where transcripts and pronunciation dictionaries are not used. The work is inspired by considering both how young infants may begin to acquire the sounds and words of their language, and how we might develop systems to help linguists analyze and document endangered languages. I will first present work on learning from speech audio alone, where the system must learn to segment the speech stream into word tokens and cluster repeated instances of the same word together to learn a lexicon of vocabulary items. The approach combines Bayesian and neural network methods to address learning at the word and sub-word levels. Time permitting, I will also discuss some preliminary work on learning from speech together with text translations (as in a language documentation scenario). | http://nodalida2017.se/goldwater |
Abstract Children are facile at acquiring the structure and meaning of their native tongues. The ease with which they become language experts belies the complexity of the underlying task -- learning from a raging sea of information. Computational approaches to learning aspects of language typically reduce the problem to learning syntax alone, learning a lexicon alone, or learning semantics alone. These simplifications have led to disconnected solutions and some unreasonable assumptions about inputs to their algorithms.This dissertation addresses the language learning problem for an embodied robot embedded in a rich environment. We present a pair of theoretical contributions and realize them through a suite of algorithmic contributions. Our first theory posits that language learning systems that rely exclusively on syntax can exploit semantics to improve their success. Similarly, systems that learn semantics can exploit syntax to improve their success. We demonstrate this approach through a life-long learning system, and prove a series of theoretical results identifying a class of learnable context-free languages.When learning syntax, most algorithms expect complete knowledge about the language's alphabet (or lexicon). When learning a lexicon, most algorithms never consider the usage of the lexical items when acquiring the lexicon. We relax this assumption and utilize this new information, respectively, in our second theoretical contribution: bootstrapping learning tasks. We introduce a bootstrapped approach to learning a lexicon and a grammar for a class of regular languages. Using phonetic transcriptions of natural language, we report on experimental results for this bootstrap. We also extend our approach to learning both syntax and semantics through bootstrapping the two, using limited knowledge about semantics to infer additional knowledge about syntax, and limited knowledge about syntax to infer additional knowledge about semantics. Finally, the ultimate goal of this research is to ground all learning in real-valued sensor data. We present a set of algorithms that point toward new approaches to incorporating real-valued data into our bootstrap learning systems. | http://contentdm.ad.umbc.edu/cdm/ref/collection/ETD/id/292/ |
+text and to maintain order information between elements and text.
+
+In this example we use mixed content model to describe text with
+embedded links in the form:
+
+ This paragraph talks about <a href="uri">time</a>.
+
+The example transforms such text into plain text with references in
+the form:
+
+ This paragraph talks about time[uri].
+
+It also saves the modified text back to XML in order to verify the
+element and text order.
+
+The example consists of the following files:
+
+text.xsd
+ XML Schema which describes "text with links" instance documents.
+
+text.xml
+ Sample XML instance document.
+
+text.hxx
+text.cxx
+ C++ types that represent the given vocabulary as well as a set of
+ parsing and serialization functions. These are generated by XSD
+ from text.xsd. Note that the --ordered-type-mixed option is used
+ to indicate to the XSD compiler that all types with mixed content
+ should be automatically treated as ordered.
+
+driver.cxx
+ Driver for the example. It first calls one of the parsing functions
+ that constructs the object model from the input XML file. It then
+ iterates over the text and elements in the content order to convert
+ the document to its plain text representation. The driver then adds
+ another paragraph of text and a link to the object model while showing
+ how to maintain the content order. Finally, it saves the modified
+ text back to XML to verify that the content order is preserved in
+ the output document.
+
+To run the example on the sample XML instance document simply execute: | https://git.codesynthesis.com/cgit/xsd/xsd/commit/xsd-examples/cxx/tree/order/mixed/README?id=5e527213a2430bb3018e5eebd909aef294edf9b5 |
Eating a healthy diet that includes foods high in omega-3 fatty acids, quitting smoking, reducing high blood pressure, maintaining a healthy weight and having regular eye exams may decrease the risk of macular degeneration, explains Mayo Clinic. Early detection and treatment reduce the loss of vision caused by wet macular degeneration, but the condition itself is an age-related chronic disease, and its onset can't be predicted.Continue Reading
The two types of macular degeneration are wet and dry, and wet macular degeneration, which is more serious, usually follows the dry type, states Mayo Clinic. Abnormal blood vessels can leak into the macula, the area in the center of the retina, and cause blurred vision. Alternatively, fluid can build up in the back of the eye and cause a bump or a blister under the macula. | https://www.reference.com/health/can-wet-macular-degeneration-prevented-8d5bfa7f633f8df2 |
BRUDY MACULA has been conceived to supplement daily requirements in essential fatty acids of the Omega-3 family and of the included group of vitamins, minerals and carotenoids, such as lutein and zeaxanthin. Docosahexaenoic acid (DHA) is a polyunsaturated omega-3 fatty acid which is necessary for normal brain and visual function. This benefit is achieved with the daily intake of 250 mg DHA. Eicosapentaenoic acid (EPA) and docosahexaenoic acid contribute to normal heart function. The beneficial effect is obtained with a daily intake of 250 mg of EPA and DHA. Lutein and zeaxanthin are deposited in the retina, where they act as a biological filter for light. Zinc contributes to normal sight maintenance. Vitamins C and E, and minerals such as zinc and copper, help to protect cells from oxidative damage.
A food supplement whose ingredients included in the formulations of some clinical studies (AREDS1, AREDS-22, and LAST3 Studies), have shown that they help slow the progression of incipient Age-Related Macular Degeneration (AMD).
BIBLIOGRAPHIC REFERENCES: | https://brudylab.net/publica/en/productos/brudymacula/ |
Except where otherwise noted, data are given for materials in their standard state (at 25 °C [77 °F], 100 kPa).
|verify (what is ?)|
|Infobox references|
Lutein (/ˈluːtiː.ᵻn/ or /ˈluːtiːn/ ; from Latin luteus meaning "yellow") is a xanthophyll and one of 600 known naturally occurring carotenoids. Lutein is synthesized only by plants and like other xanthophylls is found in high quantities in green leafy vegetables such as spinach, kale and yellow carrots. In green plants, xanthophylls act to modulate light energy and serve as non-photochemical quenching agents to deal with triplet chlorophyll (an excited form of chlorophyll), which is overproduced at very high light levels, during photosynthesis. See xanthophyll cycle for this topic.
Lutein is obtained by animals directly or indirectly, from plants. Lutein is apparentlyemployed by animals as an antioxidant and for blue light absorption. Lutein is found in egg yolks and animal fats. In addition to coloring yolks, lutein causes the yellow color of chicken skin and fat, and is used in chicken feed for this purpose. The human retina accumulates lutein and zeaxanthin. The latter predominates at the macula lutea while lutein predominates elsewhere in the retina. There, it may serve as a photoprotectant for the retina from the damaging effects of free radicals produced by blue light. Lutein is isomeric with zeaxanthin, differing only in the placement of one double bond.
The principal natural stereoisomer of lutein is (3R,3′R,6′R)-beta,epsilon-carotene-3,3′-diol. Lutein is a lipophilic molecule and is generally insoluble in water. The presence of the long chromophore of conjugated double bonds (polyene chain) provides the distinctive light-absorbing properties. The polyene chain is susceptible to oxidative degradation by light or heat and is chemically unstable in acids.
Lutein is present in plants as fatty-acid esters, with one or two fatty acids bound to the two hydroxyl-groups. For this reason, saponification (de-esterfication) of lutein esters to yield free lutein may yield lutein in any ratio from 1:1 to 1:2 molar ratio with the saponifying fatty acid.
Contents
As a pigment
This xanthophyll, like its sister compound zeaxanthin, has primarily been used[clarification needed] as a natural colorant due to its orange-red color. Lutein absorbs blue light and therefore appears yellow at low concentrations and orange-red at high concentrations.
Lutein is also anti angiogenic. It inhibits vascular endothelial growth factor (VEGF).
Lutein was traditionally used in chicken feed to improve the color of broiler chicken skin. Polled consumers viewed yellow chicken skin more favorably than white chicken skin. Such lutein fortification also results in a darker yellow egg yolk. Today the coloring of the egg yolk has become the primary reason for feed fortification. Lutein is not used as a colorant in other foods due to its limited stability, especially in the presence of other dyes.
Role in human eyes
Lutein was found to be concentrated in the macula, a small area of the retina responsible for central vision. The hypothesis for the natural concentration is that lutein helps keep the eyes safe from oxidative stress and the high-energy photons of blue light. Various research studies have shown that a direct relationship exists between lutein intake and pigmentation in the eye.
Lutein may play a role in Haidinger's brush, an entoptic phenomenon that allows humans to detect polarized light.
Macular degeneration
Several studies show that an increase in macula pigmentation decreases the risk for eye diseases such as age-related macular degeneration(AMD). The only randomized clinical trial to demonstrate a benefit for lutein in macular degeneration was a small study, in which the authors concluded that visual function is improved with lutein alone or lutein together with other nutrients and also that more study was needed.
There is epidemiological evidence of a relationship between low plasma concentrations of lutein and zeaxanthin, and an increased risk of developing age-related macular degeneration (AMD). Some studies support the view that supplemental lutein and/or zeaxanthin help protect against AMD.
In 2007, in a six-year study, John Paul SanGiovanni of the National Eye Institute, Maryland, found that lutein and zeaxanthin protect against blindness(macular degeneration), affecting 1.2 million Americans, mostly after age 65. Lutein and zeaxanthin reduce the risk of AMD.
In 2013, findings of the Age-related Eye Disease Study 2 were reported in JAMA; AREDS2 was a five-year study designed to test whether the original AREDS formulation that was shown to reduce progression of age-related macular degeneration by 25 percent would be improved by adding omega-3 fatty acids; adding lutein and zeaxanthin; removing beta-carotene; or reducing zinc. In AREDS2, participants took one of four AREDS formulations: the original AREDS formulation, AREDS formulation with no beta-carotene, AREDS with low zinc, AREDS with no beta-carotene and low zinc. In addition, they took one of four additional supplement or combinations including lutein and zeaxanthin (10 mg and 2 mg), omega-3 fatty acids (1,000 mg), lutein/zeaxanthin and omega-3 fatty acids, or placebo. The study reported that there was no overall additional benefit from adding omega-3 fatty acids or lutein and zeaxanthin to the formulation. However, the study did find benefits in two subgroups of participants: those not given beta-carotene, and those who had very little lutein and zeaxanthin in their diets. Removing beta-carotene did not curb the formulation's protective effect against developing advanced AMD, which was important given that high doses of beta-carotene had been linked to higher risk of lung cancers in smokers. It was recommended to replace beta-carotene with lutein and zeaxanthin in future formulations for these reasons.
Cataracts
There is also epidemiological evidence that increasing lutein and zeaxanthin intake lowers the risk of cataract development. Consumption of more than 2.4 mg of lutein/zeaxanthin daily from foods and supplements was significantly correlated with reduced incidence of nuclear lens opacities, as revealed from data collected during a 13- to 15-year period in the Nutrition and Vision Project (NVP).
Photophobia (abnormal human optical light sensitivity)
A study by Stringham and Hammond, published in the January/February 2010 issue of Journal of Food Science, discusses the improvement in visual performance and decrease in light sensitivity (glare) in subjects taking 10 mg lutein and 2 mg zeaxanthin per day.
In nutrition
Lutein is a natural part of human diet when fruits and vegetables are consumed. For individuals lacking sufficient lutein intake, lutein-fortified foods are available, or in the case of elderly people with a poorly absorbing digestive system, a sublingual spray is available. As early as 1996, lutein has been incorporated into dietary supplements. While no recommended daily allowance currently exists for lutein as for other nutrients, positive effects have been seen at dietary intake levels of 6–10 mg/day. The only definitive side effect of excess lutein consumption is bronzing of the skin (carotenodermia).
The functional difference between lutein (free form) and lutein esters is not entirely known. It is suggested that the bioavailability is lower for lutein esters, but much debate continues.
As a food additive, lutein has the E number E161b (INS number 161b) and is extracted from the petals of marigold (Tagetes erecta). It is approved for use in the EU and Australia and New Zealand but is banned in the USA.
Some foods are considered good sources of the nutrients:
|Product||Lutein/zeaxanthin (micrograms per hundred grams)|
|nasturtium (yellow flowers, lutein levels only)||45,000 |
|kale (raw)||39,550|
|kale (cooked)||18,246|
|dandelion leaves (raw)||13,610|
|nasturtium (leaves, lutein levels only)||13,600 |
|turnip greens (raw)||12,825|
|spinach (raw)||12,198|
|spinach (cooked)||11,308|
|swiss chard (raw or cooked)||11,000|
|turnip greens (cooked)||8440|
|collard greens (cooked)||7694|
|watercress (raw)||5767|
|garden peas (raw)||2593|
|romaine lettuce||2312|
|zucchini||2125|
|brussels sprouts||1590|
|pistachio nuts||1205|
|broccoli||1121|
|carrot (cooked)||687|
|Maize/corn||642|
|egg (hard boiled)||353|
|avocado (raw)||271|
|carrot (raw)||256|
|kiwifruit||122|
Safety
In humans, the Observed Safe Level (OSL) for lutein is 20 mg/day. Although much higher levels have been tested without adverse effects and may also be safe, the data for intakes above the OSL are not sufficient for a confident conclusion of long-term safety.
In mice, the LD50 exceeded the highest tested dose of 10 g/kg of body weight, and the no-observed-adverse-effect level (NOAEL) was determined as 1 g/kg/day, also the highest dose tested.
Commercial value
The lutein market is segmented into pharmaceutical, nutraceutical, food, pet foods, and animal and fish feed.
- The pharmaceutical market is estimated to be about US$190 million, nutraceutical and food is estimated to be about US$110 million.
- Pet foods and other applications are estimated at US$175 million annually.
Apart from the customary age-related macular degeneration applications, newer applications are emerging in cosmetics, skin care area as an antioxidant. It is one of the fastest growing areas of the US$2 billion carotenoid market.
See also
References
- ^ MSDS at Carl Roth (Lutein Rotichrom, German).
- ^ "lutein", Random House Webster's Unabridged Dictionary.
- ^ Malinow MR, Feeney-Burns L, Peterson LH, Klein ML, Neuringer M (August 1980). "Diet-related macular anomalies in monkeys". Invest. Ophthalmol. Vis. Sci. 19 (8): 857–63. PMID 7409981.
- ^ Johnson EJ, Hammond BR, Yeum KJ (June 2000). "Relation among serum and tissue concentrations of lutein and zeaxanthin and macular pigment density". Am. J. Clin. Nutr. 71 (6): 1555–62. PMID 10837298.
- ^ Landrum, J., et al. Serum and macular pigment response to 2.4 mg dosage of lutein. in ARVO. 2000.
- ^ Berendschot TT, Goldbohm RA, Klöpping WA, van de Kraats J, van Norel J, van Norren D (October 2000). "Influence of lutein supplementation on macular pigment, assessed with two objective techniques". Invest. Ophthalmol. Vis. Sci. 41 (11): 3322–6. PMID 11006220.
- ^ Aleman TS, Duncan JL, Bieber ML (July 2001). "Macular pigment and lutein supplementation in retinitis pigmentosa and Usher syndrome". Invest. Ophthalmol. Vis. Sci. 42 (8): 1873–81. PMID 11431456.
- ^ Duncan JL, Aleman TS, Gardner LM (March 2002). "Macular pigment and lutein supplementation in choroideremia". Exp. Eye Res. 74 (3): 371–81. doi:10.1006/exer.2001.1126. PMID 12014918.
- ^ Johnson EJ, Neuringer M, Russell RM, Schalch W, Snodderly DM (February 2005). "Nutritional manipulation of primate retinas, III: Effects of lutein or zeaxanthin supplementation on adipose tissue and retina of xanthophyll-free monkeys". Invest. Ophthalmol. Vis. Sci. 46 (2): 692–702. doi:10.1167/iovs.02-1192. PMID 15671301.
- ^ Richer S (January 1999). "ARMD—pilot (case series) environmental intervention data". J Am Optom Assoc. 70 (1): 24–36. PMID 10457679.
- ^ ab Richer S, Stiles W, Statkute L (April 2004). "Double-masked, placebo-controlled, randomized trial of lutein and antioxidant supplementation in the intervention of atrophic age-related macular degeneration: the Veterans LAST study (Lutein Antioxidant Supplementation Trial)". Optometry. 75 (4): 216–30. doi:10.1016/s1529-1839(04)70049-4. PMID 15117055.
- ^ Age-Related Eye Disease Study Research Group (October 2001). "A randomized, placebo-controlled, clinical trial of high-dose supplementation with vitamins C and E, beta carotene, and zinc for age-related macular degeneration and vision loss: AREDS report no. 8". Arch. Ophthalmol. 119(10): 1417–36. doi:10.1001/archopht.119.10.1417. PMC 1462955. PMID 11594942.
- ^ ab c d SanGiovanni JP, Chew EY, Clemons TE (September 2007). "The relationship of dietary carotenoid and vitamin A, E, and C intake with age-related macular degeneration in a case-control study: AREDS Report No. 22". Arch. Ophthalmol. 125 (9): 1225–32. doi:10.1001/archopht.125.9.1225. PMID 17846363.
- ^ ab c d e f g http://www.nei.nih.gov/news/pressreleases/050513.asp
- ^ "Associations between age-related nuclear cataract and lutein and zeaxanthin in the diet and serum in the Carotenoids in the Age-Related Eye Disease Study, an Ancillary Study of the Women's Health Initiative.".
- ^ Barker Fm, 2nd (2010). "Dietary supplementation: effects on visual performance and occurrence of AMD and cataracts.". Current medical research and opinion. 26 (8): 2011–23. doi:10.1185/03007995.2010.494549. PMID 20590393.
- ^ Stringham, James M.; et al. (January–February 2010). "The Influence of Dietary Lutein and Zeaxanthin on Visual Performance". Journal of Food Science. 75 (1): R24–R29. doi:10.1111/j.1750-3841.2009.01447.x. PMID 20492192. Retrieved January 15, 2013.
- ^ Seddon JM, Ajani UA, Sperduto RD (November 1994). "Dietary carotenoids, vitamins A, C, and E, and advanced age-related macular degeneration. Eye Disease Case-Control Study Group". JAMA. 272 (18): 1413–20. doi:10.1001/jama.272.18.1413. PMID 7933422.
- ^ Bowen PE, Herbst-Espinosa SM, Hussain EA, Stacewicz-Sapuntzakis M (2002). "Esterification does not impair lutein bioavailability in humans". J Nutr. 132 (12): 3668–73. PMID 12468605.
- ^ WHO/FAO Codex Alimentarius General Standard for Food Additives
- ^ UK Food Standards Agency: "Current EU approved additives and their E Numbers". Retrieved 2011-10-27.
- ^ Australia New Zealand Food Standards Code"Standard 1.2.4 - Labelling of ingredients". Retrieved 2011-10-27.
- ^ Reuters, Study finds spinach, eggs ward off cause of blindness
- ^ USDA National Nutrient Database for Standard Reference, Release 23 (2010)
- ^ ab c Niizu, P.Y.; Delia B. Rodriguez-Amaya (2005). "Flowers and Leaves of Tropaeolum majus L. as Rich Sources of Lutein". Journal of Food Science. 70 (9): S605–S609. doi:10.1111/j.1365-2621.2005.tb08336.x. ISSN 1750-3841.
- ^ ab Shao A, Hathcock JN (2006). "Risk assessment for the carotenoids lutein and lycopene". Regulatory Toxicology and Pharmacology : RTP. 45(3): 289–98. doi:10.1016/j.yrtph.2006.05.007. PMID 16814439. Retrieved 2016-07-17.
The OSL risk assessment method indicates that the evidence of safety is strong at intakes up to 20mg/d for lutein, and 75 mg/d for lycopene, and these levels are identified as the respective OSL. Although much higher levels have been tested without adverse effects and may be safe, the data for intakes above these levels are not sufficient for a confident conclusion of long-term safety.
-
^ Nidhi B, Baskaran V (2013). "Acute and subacute toxicity assessment of lutein in lutein-deficient mice" (PDF). Journal of Food Science. 78 (10): T1636–42. doi:10.1111/1750-3841.12256. PMID 24024482. Retrieved 2016-07-18.
Preliminary acute toxicity study revealed that the LD50 exceeded the highest dose of 10000 mg/kg BW. In a subacute study, male mice were gavaged with 0, 100, 1000 mg/kg BW/day for a period of 4 wk. Plasma lutein levels increased dose dependently (P < 0.01) after acute and subacute feeding of lutein in LD mice. Compared to the control (peanut oil without lutein) group, no treatment-related toxicologically significant effects of lutein were prominent in clinical observation, ophthalmic examinations, body, and organ weights. Further, no toxicologically significant findings were eminent in hematological, histopathological, and other clinical chemistry parameters. In the oral subacute toxicity study, the no-observed-adverse-effect level (NOAEL) for lutein in LD mice was determined as 1000 mg/kg/day, the highest dose tested. | http://all-in-one-nutrition.com/products/prodigy5/5-product-highlights/vitamins/lutein |
CHICAGO(Jan. 24, 2012)–We’ve all heard the expression “eating with your eyes,” but many people may not be aware of the benefits of eating for your eyes. In addition to promoting overall health, a diet rich with sight-saving beta carotene, lutein, zeaxanthin, zinc, omega-3 fatty acids and certain vitamins can also help guard against vision loss from eye disease, such as age-related macular degeneration (AMD).
AMD diminishes central vision and currently affects the vision of more than 2 million Americans, ages 50 and older and is a leading cause of blindness. AMD is a progressive disease that if left untreated, can result in severe vision loss and even blindness. The exact cause of AMD is unknown, but risk factors for the disease include age, race, smoking, family history as well as those with cardiovascular disease and hypertension.
A wide variety of foods including lentils, grapes, carrots, bell peppers, broccoli, spinach, sweet potatoes, kale, certain kinds of fish, turkey and some kinds of nuts, have been shown to aid eye health. Although there are a variety of available over-the-counter supplements designed for vision and eye health, a doctor should always be consulted before use.
Foods that contain refined starches and are high in sugar can be damaging to vision. A study by Tufts University showed that high-glycemic foods cause a dramatic rise in blood sugar, which over time, may damage the retina and capillaries in the eye by promoting oxidative stress and inflammation. Soda and sugary drinks, candy, baked goods, some cereals, white rice, foods made with white flour, such as white bread and pasta, should be avoided.
According to the University of Illinois Eye and Ear Infirmary, more than one serving per week of beef, pork, or lamb as a main dish is associated with a 35 percent increased risk of macular degeneration as compared with less than three servings per month. Additionally, one serving per day of high-fat dairy food, such as whole milk, ice cream, hard cheese, or butter, also increases the risk of macular degeneration progression.
“We all know that watching what we eat can lead to overall health benefits such as lower cholesterol and a reduction of calories, but maintaining a healthy diet, day after day, can be very challenging,” said Hugh R. Parry, president and CEO of Prevent Blindness America. “Prevent Blindness America hopes to encourage the public to remember that everything we put in our mouths can affect our eyes!”
Other healthy habits can lead to healthy vision. The risk of eye disease and vision loss can be lowered by:
- Avoiding trans fats
- Quitting smoking
- Controlling blood pressure and cholesterol
- Exercising regularly
- Visiting an eye care professional on a regular basis
In conjunction with February as Age-related Macular Degeneration Awareness Month, Prevent Blindness America offers a dedicated online resource for
patients and caretakers to learn more about the disease. The website, preventblindness.org/amd, offers a variety of tools and information on everything from risk factors, treatment options, and even a downloadable Amsler Grid, (a tool that can help identify vision abnormalities linked to AMD).
For more information on AMD and other eye disease, please contact Prevent Blindness America at (800) 331-2020 or visit preventblindness.org/AMD.
Download the AMD and nutrition press release. | https://preventblindness.org/a-healthy-diet-can-help-protect-vision-2/ |
Wet Age-Related Macular Degeneration – Publications
1. Georgiou T, et al. The use of high dose Omega-3 fatty acids in patients with macular oedema due to wet age related macular degeneration and diabetic retinopathy. 9th Euretina winter meeting. Prague 2019.
2. Georgiou T, et al. Role of Omega-3 fatty acids for eye health. Hedge MV, et al. Omega-3 fatty acids, Switzerland: Springer;2016; 251-261
3. Leung H.H. et al. Increase in omega-6 and decrease in omega-3 polyunsaturated fatty acid oxidation elevates the risk of exudative AMD development in adults with Chinese diet. Free Radical Biology&Medicine (2019), doi:
https://doi.org/10.1016/j.freeradbiomed.2019.10.007.
View research paper
5. Merle BM, et al. Circulating omega-3 fatty acids and neovascular age-related macular degeneration. IOVS. 2014 Mar 1;55(3):2010–2019.
6. Rezende FA, et al. Omega-3 Supplementation Combined With Anti–Vascular Endothelial Growth Factor Lowers Vitreal Levels of Vascular Endothelial Growth Factor in Wet Age-Related Macular Degeneration. Am. J. of Ophthalmol. 2014 Nov 1;158(5): 1071–1078.
7. Yanai R, et al. Cytochrome P450-generated metabolites derived from Omega-3 fatty acids attenuate neovascularization. Proc. of the National Acad. of Sci. 2014 Jun 12;111(26):9603-8. | https://eyetas.com/ru/wet-age-related-macular-degeneration-publications/ |
Omega-3 fatty acids have been in the news lately, after a new study raises concern about the association of omega-3s and an increased risk of prostate cancer. Omega-3s are a popular supplement used by many Americans. In fact, according to the 2007 National Health Interview Survey, which included a comprehensive survey on the use of complementary health practices by Americans, fish oil/omega-3/DHA supplements are the natural product (excluding vitamins and minerals) most commonly taken by adults, and the second most commonly taken by children.
Moderate evidence has emerged about the health benefits of consuming seafood, but the health benefits of omega-3s in supplement form are less clear. For example, the findings of individual studies on omega-3 supplements and heart disease have been inconsistent, and in 2012, two combined analyses of the results of these studies did not find convincing evidence that omega-3s protect against heart disease.
There is some evidence that omega-3s are modestly helpful in relieving symptoms in rheumatoid arthritis. Omega-3s may also be helpful for age-related macular degeneration (AMD; an eye disease that can cause loss of vision in older people). For most other conditions for which omega-3s are being studied, definitive conclusions cannot yet be reached. This issue of the digest provides information on what the science says about omega-3’s effectiveness and safety for several conditions for which there is the most evidence, including heart disease, rheumatoid arthritis, infant development, and diseases of the eye and brain. | https://nccih.nih.gov/health/providers/digest/omega3s |
New Evidence for Eye-Protective Effects of Omega-3-Rich Fish, Shellfish
ScienceDaily (Dec. 1, 2010) — Researchers at Wilmer Eye Institute, Johns Hopkins School of Medicine, wanted to know how the risk of age-related macular degeneration (AMD) would be affected in a population of older people who regularly ate fish and seafood, since some varieties are good sources of omega-3 fatty acids. A diet rich in omega-3s probably protects against advanced AMD, the leading cause of blindness in whites in the United States, according to the Age-Related Eye Disease Study (AREDS) and other recent studies. High concentrations of omega-3s have been found in the eye’s retina, and evidence is mounting that the nutrient may be essential to eye health.
The new research, led by Sheila K. West, PhD, was part of the Salisbury Eye Evaluation (SEE) study.
Food intake information with details on fish and shellfish consumed was collected over one year using a validated questionnaire for 2,391 participants aged 65 to 84 years who lived along Maryland’s Eastern Shore. After dietary assessment was complete, participants were evaluated for AMD. Those with no AMD were classified as controls (1,942 persons), 227 had early AMD, 153 had intermediate-stage disease, and 68 had advanced AMD. In the advanced AMD group, the macular area of the retina exhibited either neovascularization (abnormal blood vessel growth and bleeding) or a condition called geographic atrophy. Both conditions can result in blindness or severe vision loss.
“Our study corroborates earlier findings that eating omega-3-rich fish and shellfish may protect against advanced AMD.” Dr. West said. “While participants in all groups, including controls, averaged at least one serving of fish or shellfish per week, those who had advanced AMD were significantly less likely to consume high omega-3 fish and seafood,” she said.
The study also looked at whether dietary zinc from crab and oyster consumption impacted advanced AMD risk, but no significant relationship was found. Zinc is also considered protective against AMD and is included in an AMD-vitamin/nutrient supplement developed from the AREDS study. Dr. West speculated that her study found no effect because the levels of zinc obtained from seafood/fish were low compared to supplement levels.
A side note: fish and shellfish were part of the normal diet of the study population, rather than added with the intention of improving health. The links between fish consumption, omega-3s and healthy lifestyles were not widely known in the early 1990s when the dietary survey was conducted. In fact, some of the study participants who consumed the most seafood were also smokers and/or overweight, two factors usually associated with AMD and other health risks. | https://www.yournaturalhealth.com/natural_health_news/2010/12/new-evidence-for-eye-protective-effects-of-omega-3-rich-fish/ |
Sight is among the five senses gifted to us. We can see things because the light reflected from objects enters the eyes, and electrical signals coming from the retina through the optic nerve reach the brain. Impairment of vision can happen due to eye disorders and certain medical conditions. Blindness can be partial or complete. Timely medical treatment, surgery, or medication can restore the vision, depending on the causes of blindness.
Our eyes have tremendous abilities and work in sync with the brain for instantly collecting information. Losing vision can severely impact one’s life, affecting the ability to perform daily tasks. In case of sudden vision loss, one should not delay in getting medical attention.
The National Programme for Control of Blindness (NPCB&VI) & Visual Impairment is a government scheme, launched in 1976, that undertakes various initiatives for reducing the prevalence of blindness. It aims to achieve a prevalence of blindness target of 0.3% by 2020. According to NPCB&VI, cataract, glaucoma, macular degeneration, refractive error, and diabetic retinopathy are among the major causes of chronic blindness.
Glaucoma
Glaucoma is among the leading causes of blindness that can be irreversible. It is an eye disease caused due to progressive damage to the optic nerve that is a network of a million individual nerve fibres and sends visual signals to the brain. It occurs when there is abnormally high pressure in the eye.
If the condition worsens, there could be a permanent vision loss. Among the vision problems, a person may also have night blindness. Glaucoma can be hereditary, too, say health experts. Other causes include blocked blood vessels inside the eye, inflammatory conditions, severe eye infections, etc.
Age-related Macular Degeneration
It is a disease that affects the eyes and can result in permanent vision loss in people over 60. The condition develops when the macula - central portion of the retina – wears off. Vision loss does not occur in the early stages. Vision loss can happen in later stages. Regular examination and proper treatment can slow the progress of this condition.
Diabetic Retinopathy
This condition, known as Diabetic Retinopathy, is a complication of type-1 or type-2 diabetes. When there is excess blood sugar in the body, there is a risk of lack of blood supply to the retina, owing to damage to the blood vessels. The symptoms include blurred vision. A person may also have an inability to see at night, which is among the symptoms for night blindness. The condition can also cause total loss of vision. However, in the early stages, blindness is preventable.
>>Check: Eye Care for People with Diabetes
Cataracts
Cataract is also among the leading causes of blindness and low vision problems across the world. In this condition, there is a clouding of eye lens owing to the building up of a protein mass. There are some risk factors for cataract. However, it is common in senior citizens. The treatment involves surgery for cataract removal. Lack of proper treatment owing to the expensive cost of cataract surgery or sometimes, a lack of awareness for medical care results in blindness in some cataract patients.
>>Read: Looking for Cataract Surgery? Read How Much Does it Cost in India
Eye Injury
Besides the conditions mentioned above, blindness can also occur due to traumatic injuries, which can happen unexpectedly. For instance, loss of blood flow to the retina or optic nerve can lead to a condition known as an eye stroke. It can result in temporary vision loss or permanent vision loss in severe cases or when no proper care is given.
How to Prevent Vision Loss?
Our eyes are precious, and keeping them healthy should be a vital part of our health goals. It is possible to maintain healthy eyes and prevent vision loss.
Some essential things to do for preventing vision loss, as prescribed by the Centers for Disease Control and Prevention (CDC), are given below.
- Go for a comprehensive dilated eye test
- Control diabetes by keeping blood sugar under check
- Understand your family’s medical history, including any eye disorders
- Have a nutritious diet including dark leafy greens and foods rich in omega-3 fatty acids
- Maintain an ideal body weight to prevent diseases like diabetes and hypertension
- Safeguard the eyes using protective eyewear, especially during sports and other activities, to prevent injuries
- Quit smoking as it is harmful to eye health, increasing the risk of age-related macular degeneration
- Protect the eyes from ultraviolet rays of the sun
Further, it is also essential to give sufficient rest for the eyes. Nowadays, increased use of mobile phones and computers has taken a toll on our eye health, causing dry eyes and vision problems. It is essential to follow some eye exercises for rejuvenation.
>>Also Read: 5 Nutrients That Will Protect Your Eyes
Treatment for critical illnesses is usually long-term, and the expenses can be high. Opting for a critical illness insurance plan is the ideal way to stay within easy reach of quality medical care and prevent a financial burden. Choose a Critical Mediclaim policy by Care Health Insurance (formerly Religare health insurance) that offers coverage for 32 major critical illnesses, including blindness. | https://www.careinsurance.com/blog/health-insurance-articles/prevent-vision-loss-5-medical-conditions-that-can-be-causes-of-blindness |
Dry macular degeneration is a chronic eye disease that causes vision loss in the center of your field of vision. Dry macular degeneration is marked by deterioration of the macula , which is in the center of the retina — the layer of tissue on the inside back wall of your eyeball.
Dry macular degeneration is one of two types of age-related macular degeneration. The other type — wet macular degeneration — is characterized by swelling caused by leaky blood vessels in the back of the eye. Dry macular degeneration isn’t associated with swelling and is the more-common form of the disease.
Dry macular degeneration doesn’t cause total blindness, but it worsens your quality of life by blurring or causing a blind spot in your central vision. Clear central vision is necessary for reading, driving and recognizing faces.
Dry macular degeneration may affect one eye or both eyes. If only one eye is affected, you may not notice any or much change in your vision because your good eye compensates for the weak one.
The exact cause of dry macular degeneration is unknown, but the condition develops as the eye ages. Dry macular degeneration affects the macula — a small area at the center of your retina that is responsible for clear vision, particularly in your direct line of sight. Over time the cells that make up your macula break down.
At any time, dry macular degeneration can progress to a more severe form of the disease called wet macular degeneration, which causes rapid vision loss. There’s no accurate way to predict who will eventually develop wet macular degeneration and who won’t.
During a complete eye exam, your eye doctor may use a test called the Amsler grid to test for defects in the center of your vision. If you have macular degeneration, when you look at the grid some of the straight lines may seem faded, broken or distorted.
Your eye doctor will examine the back of your eye to look for a mottled appearance that’s caused by drusen — yellow deposits that form in people with macular degeneration. To examine the back of your eye, your eye doctor will dilate your eyes using eyedrops and then use a special magnifying lens.
During an angiogram of your eye, a colored dye is injected into a vein in your arm. The dye travels to the blood vessels in your eye. A special camera is used to take pictures of your eye. The pictures show the dye highlighting the blood vessels in your eye. Your eye doctor uses the information from the angiogram images to determine whether the back of your eye shows blood vessel or retinal abnormalities, such as those that might be associated with wet macular degeneration.
This noninvasive imaging test helps identify and display areas of retinal thickening or thinning. Such changes are associated with macular degeneration. It’s often used to help monitor the response of the retina to macular degeneration treatments.
• Early stage. Several small drusen or a few medium – sized drusen are detected on the macula in one or both eyes. Generally, there’s no vision loss in the earliest stage.
• Intermediate stage. Many medium-sized drusen or one or more large drusen are detected in one or both eyes. At this stage, your central vision may start to blur and you may need extra light for reading or doing detail work.
• Advanced stage. Several large drusen, as well as extensive breakdown of light-sensitive cells in the macula, are detected. This causes a well-defined spot of blurring in your central vision. The blurred area may become larger and more opaque over time.
• Increasing age. Your risk of macular degeneration increases as you age. Macular degeneration is most common in people over age 60.
• Having a family history of macular degeneration. If someone in your family had macular degeneration, your odds of developing macular degeneration are higher.
• Being white. Macular degeneration is more common in whites than it is in other races, especially after age 75.
• Being female. Women are more likely than are men to develop macular degeneration.
• Smoking cigarettes. Smoking cigarettes increases your risk of macular degeneration.
• Being obese . Being severely overweight increases the chance that early or intermediate macular degeneration will progress to the more severe form of the disease.
• Eating few fruits and vegetables. A diet that includes few fruits and vegetables may increase the risk of macular degeneration.
• Having high blood pressure. Diseases that affect the circulatory system, such as high blood pressure, may increase the risk of macular degeneration.
• Having high cholesterol . An elevated cholesterol level in your blood is associated with an increased risk of macular degeneration.
• Include a variety of colorful fruits and vegetables in your diet . The antioxidant vitamins in the fruits and vegetables contribute to eye health. Eating a variety of colors ensures that you’re getting a variety of vitamins.
• Choose whole grains over refined grains . Choose whole grains, such as whole-wheat bread, over refined grains, such as white bread.
• Have routine eye exams. Ask your eye doctor how often you should undergo routine eye exams. A dilated eye exam can identify macular degeneration.
• Manage your other diseases . For example, if you have cardiovascular disease or high blood pressure , take your medication and follow your doctor’s instructions for controlling the condition.
• Stop smoking . Smokers are more likely to develop macular degeneration than are nonsmokers . Ask your doctor for help to stop smoking.
• Maintain a healthy weight. If you need to lose weight, reduce the number of calories you eat and increase the amount of exercise you get each day. If you have a healthy weight, work to maintain your weight by exercising most days of the week.
• Choose a diet rich in fruits and vegetables. Choose a healthy diet that’s full of a variety of fruits and vegetables. These foods contain antioxidant vitamins that reduce your risk of developing dry macular degeneration.
• Include fish in your diet . Omega – 3 fatty acids , which are found in fish , may reduce the risk of dry macular degeneration. Nuts, such as walnuts, also contain omega-3 fatty acids. | http://www.vedapanchakarma.com/?page_id=280 |
What is Macular Degeneration?
Age-related macular degeneration (ARMD) is an ageing process in the eye. The macula is a part of the retina (a layer of tissue on the back of the eye) which is responsible for central vision.
Layers of the retina can thicken or thin and waste material (which is usually removed by the body naturally) can form deposits, which distort the retina. This distortion can then cause damage to the other layers of the retina.
In some cases new blood vessels can grow into the macula from beneath. These newly formed vessels are fragile, and often leak blood into the retina, where it causes scar tissue to form or haemorrhages. This scarring, blocks out central vision and can cause blindness.
Types of Macular Degeneration:
There are two different types of macular degeneration.
- The dry version of macular degeneration.
- The wet version of macular degeneration -In the absence of treatment, wet macular degeneration can result in severe central vision loss, which will affect everyday things such as driving, shopping, using the phone and reading. Both near-vision and distance-vision activities can be affected.
- A missed form
Preventing macular degeneration:
Certain studies have shown that particular dietary food groups and vitamins can help protect and prevent the macula from effects of aging. These foods can include:
- Vegetables that are high in Zeaxanthine and Lutein
- Nuts rich in Antioxidants
- Oily Fish high in Omega 3 fatty acids
- Vitamin A C and E
Patients can monitor their own vision changes with an Amsler Grid. This is a regular grid like graph paper. Patients with changes in their vision due to ARMD may report that sections or lines of the grid are distorted. | http://www.visioncentre.com.au/macular.php |
The Earth is not finite in resources, the Earth has infinite resources available for Man’s kind.
Every thought, every Concept-Ion, even when asleep and dreaming, is a unit of Energy Created from One’s consciousness. Energy cannot be destroyed, it can only change Form, so every thought adds physical Mass to the Earth. The greater the population, the greater the number of thoughts, the more Energy is being Created by [Mother] Earth’s consciousness. This is how the Earth Will always maintain balance, as it only Creates as much Mass (You know, like in Church when as King of God for some thing) as consciousness is as King for.
There is a secondary example that proves the Earth is continually expanding – the Sun. The Sun shines on Earth consistently, providing new Energy to the Earth which MUST be transformed into some other Form of Energy.
So there You go. Bill Gates tries to tell You there are too many People on the planet, tell him to be the change he Wishes to see and jump off a cliff.
Love and Blessings, | https://vondehnvisuals.com/2020/09/13/volume-cxxix-the-super-natural-son-day-edition-random-concept-ions-from-the-kings-keep/ |
Energy is a very important concept that is heavily used in everyday life. Everything around us, including ourselves, needs energy to function. For example, electricity provides home appliances with the energy they require, food gives us energy to survive, and the sun provides earth with the energy needed for the existence of life! Experiments show that energy is a scalar quantity related to the state of an object. Energy may exist in various forms: mechanical, chemical, gravitational, electromagnetic, nuclear, and thermal. Furthermore, energy cannot be created or destroyed; it can only be transformed from one form to another. In other words, if energy were to be exchanged between objects inside a system, then the total amount of energy (the sum of all forms of energy) in the system will remain constant. | https://research.kaust.edu.sa/en/publications/work-and-energy |
I am reading a book called I am a Strange Loop by Douglas Hofstader that explores the concept of "I" or the self. What does it mean to say "I", where does "I" come from and so on. Fascinating and highly readable.
In the book, Hofstader quotes another scientist Roger Sperry as having written in an essay titled Mind, Brain and Humanist Values the following passage:
In the brain model proposed here, the causal potency of an idea, or an ideal, becomes just as real as that of a molecule, a cell, or a nerve impulse. Ideas cause ideas and help evolve new ideas. They interact with each other and with other mental forces in the same brain [and] in [other] brains. And they also interact with the external surroundings to produce [...] a burstwise advance in evolution.
Now, this reminded me of a thought I had a couple of weeks ago: does information obey the first law of thermodynamics? The first law of thermodynamics states that "energy can be transformed, i.e. changed from one form to another, but cannot be created or destroyed". Does this apply to ideas too? If so, does this mean that every idea that has ever been or shall ever be already exists in some form? Does that then mean that "new" ideas are simply the discovery of existing ideas and/or the uncovering of ideas via logical extensions of already recognised ideas? For that matter, is information the same as energy?
On the other hand, while the notion of extending existing ideas to generate new idea may be true for purely "algorithmic" reasoning, how could we then explain seemingly blue-sky creativity? Also, if we take it as a given that ideas aren't merely invented abstractions with no physical basis, aren't "massless" and arise from biochemistry, then what is the literal fuel for a new idea? Is there an equation that is the equivalent of or an extension of E=MC2 which incorporates a variable representing information?
I'm sure none of these questions are new, so enlightenment, or at least a discussion, would be appreciated! My trawls through Wikipedia uncovered useful-looking articles like Entropy in thermodynamics and information theory, but my knowledge of even high-school level physics is shaky at best and deeply suspect at worst. :-) Landauer's Principle might be what I'm looking for if I could just decipher it. | https://www.murli.net/greekcomplexity/2012/01/where-do-ideas-come-from.html |
This book represents a restructuring and a shorter version of the material contained already in my book “God’s False Mirror – A critical analyses of Genesis chapters 1-11”. For whoever wishes to read the longer version “God’s False Mirror”, it is still available for sale. Nevertheless, you can find in either of the titles the arguments which demonstrate beyond reasonable doubt the existence of countless contradictions in the first 11 chapters of the book of Genesis. For me, as a Christian, it is now clear that the first 11 chapters of the Bible don’t explain credibly how the universe and humankind came into existence. If someone has another opinion he or she has to be able to demonstrate, with real and honest arguments, that he or she is right, after reading my argumentation. I have considered with maximum attention and responsibility all arguments which plead for the reliability of the biblical texts and unfortunately, most of them, I didn’t find convincing.
In this study, the first 11 chapters of the book of Genesis are read carefully with a critical eye and not at all dogmatically and also with added attention to the consistency of each story and of the narratives of creation as a whole. The details of each biblical account are compared one with the other and all contradictions are underlined.
The stories of the book of Genesis must have a superior meaning if they are inspired by God. They also should have a general coherence which gives their unity, allowing them to be a valid general account of the origins of the universe and humankind. Where coherence is lacking and absurd conclusions are generated by the texts, following their logical consequences, their divine inspiration is in doubt. This is a proof that it wasn’t a superior intelligence that inspired the first 11 chapters of the book of Genesis, but they are the product of ancient human beings striving to make light in a complicated world.
The present analysis tries to answer to a fundamental question. What kind of modifications, if any, happen in the content of a personal Christian faith when one has to admit by the force of evidence, that the first 11 chapters of the book of Genesis are neither factual nor inspired by God? The conclusion that Adam and Eve haven’t been real historical personages but only legendary heroes cannot leave the doctrinal and dogmatic fundaments of the classical theism unscathed but it bears important theological consequences.
- 1 -
What these consequences are is an issue of concern for me and I am sure for many others also. In my opinion, the answer to this question can be obtained by comparing the lack of arguments for the factuality of the first 11 chapters of the book of Genesis with the most cardinal doctrines of the Christian faith which are based on those alleged facts. This lack of arguments is associated with many contradictions and absurdities found in the first 11 chapters of the book of Genesis.
To be sure, I didn’t start my work from a preconception, meaning that I didn’t aim to find contradictions in the Bible with any cost, as if I wished to do such thing in purpose. I didn’t like that the Bible is filled with contradictions because this reality undermines in a way my personal faith in God, subverts that part which is related to how He is described by the Bible. Years after years, I have accepted, for the sake of conformism that the Bible is the word of God which cannot err. Moreover, I preached this principle, which is fundamental for the majority of Christian denominations, as a Christian evangelist, teaching people the Gospel of Jesus based also on the book of Genesis. I have considered the Bible to be the infallible word of God because it seemed to me as being important that every believer should have a strong textual basis for his or her faith.
In the same time, in the process of studying attentively the Bible, I noticed that some of its allegations are categorically in contradiction with others and some propositions are utterly absurd. It wasn’t easy for me to admit the reality of these findings and for this reason I have tried to identify serious documentation to contradict them and to uphold the validity of the biblical texts under scrutiny. The explications given by the defenders of the accuracy of the Bible didn’t look convincing to me; some explanations seem to be naïve, others insincere and still others trying to cheat the good faith of the readers. The very few explanations which apparently were more rational were greatly contradicted by the findings of modern sciences and they are in reality false constructions. Many of these explications can be found in the present work.
Loosing trust in some of the biblical texts, I didn’t reject the faith in God because this is based on a personal experience with Him and not on the validity of some texts written over 2,000.00 years ago, such as the first 11 chapters of the book of Genesis. Nevertheless, knowing the truth is more important than anything, and knowing the truth about God is an important area of knowledge.
How God really is? The character of the One in whom so many people invest their trust is an essential problem. The O.T. says that God would have killed through the Flood 99, 99% from the population of the earth at that moment, millions of human beings including innocent children, because of their wickedness, even if, after that imaginary event, the world was worse than before. This image is in a flagrant contradiction with what Jesus said about His Father who is perfect and who loves His enemy. (Matthew 5; 48) Something is wrong with the Bible. If the Flood would have done the world better we may doubt the means, used to attain this purpose, but the Bible says that the world became worse, for example, the story of Sodom and Gomorrah happen after the Flood. Why would God have killed so many humans and animals, through the waters of the Flood, if instead of the world becoming better it became much worse? There is an explanation. The Flood is a myth and not a reality, therefore, God didn’t generate in practices that genocide. The Bible doesn’t give us a fact but a legend in this case and in others. These kinds of absurdities prevent the Bible to be considered the infallible word of God. Many people don’t believe in God because He is described incorrectly by the religious institutions which interpret the Bible.
It is very important to cease maintaining that the Bible is the inspired word of God, in all its texts, because if we continue to promote this false presupposition we persist to feed a wrong image of Him. God is not as He is presented by the majority of Christian doctrines and dogmas which are based on a literal interpretation of the Bible, but He is how He presents Himself in our consciousness and He is a Father who helps us become better human beings. God doesn’t dwell in buildings made by man but in the minds of the believers (Acts 7; 48) God’s temples are the individual human beings and not a religious organization with their institutional settings. (1 Corinthians 3; 16) Religious institutions have their role to play but nothing can replace the personal relation and direct experience of an individual with God. Only this type of personal relationship with God can give us enough support against so many contradictions in the Bible and against the biblical absurdity.
I was hoping that the Bible would be a strong argument for my faith but unfortunately, it is not the case. I think that the world cannot be saved with lies, with legends or any kind of mythology.
- 2 -
|➤||
|
|
|
In Wesley’s view the fish and fowl were indeed produced out of the waters, and the beasts and man out of the earth. At the same time, the earth and those waters were made out of nothing. A question still remains. If the earth and waters were made out of nothing, why was “something” needed as a “substrata” for the creation of the fish, fowl, beasts, and man? It is just another inconsistency, like many others. God either created all His creatures out of nothing or He needed a raw material for some of His creation.
Creation out of nothing is not thought by the Bible. If God created the universe, He created it out of Himself, out of His own resources, energies or powers, which have generated something else. Nothing comes out of nothing, and God can be seen as the most original source of existence.
Theophilus of Antioch was the first Christian writer to give explicit arguments in favor of the doctrine of creatio ex nihilo which van Bavel usefully summarises as follows:
“1) If not only God but matter also were uncreated, as held by the Platonists, God would no longer be the creator of everything and the only Lord; 2) If matter were uncreated and unchanging, it would be equal to the immutable God;
- 103 -
3) If God had created the world out of pre-existing matter, that would be nothing special; for human beings also can produce something new out of existent matter.”
Such arguments were seen to be persuasive and the later Christian thinkers accepted the doctrine of creatio ex nihilo which remained the established Christian teaching on creation. As Rowan Williams said, this doctrine is at the heart of St. Augustine’s accounts of creation, because it has the merit of combining a simultaneous defence of God’s transcendence of the material world but at the same time His connection with it.
Augustine gave to the doctrine of creatio ex nihilo a larger extent and his analysis was very profound in many details. Creation from nothing for Augustine was, as a matter of fact, a creation made from formless matter which had been created from nothing.
“First there was made confused and formless matter so that out of it there might be made all the things that God distinguished and formed. He goes on to say that ‘therefore, we correctly believe that God made all things from nothing. For, though all formed things were made from this matter, this matter itself was still made from absolutely nothing’....”
Augustine’s views on nothingness are very interesting. Nothingness isn’t anything at all but is a negative principle which explains the human penchant towards negativity. The created beings are good because they are created by God but they have also a dark side because this creation had been made from nothing and this is the principle of evil. Being and non-being are the two sides of reality, and whilst being is good, non-being has an opposite qualification. Thus, the ‘nihil’, far from being literally nothing, about which nothing meaningful may be said, actually plays a crucial and indispensable role in Augustine’s account of the world, its being, its creation and its relationship to God. It is that which accounts for the world’s corruptibility and tendency toward nothingness, and it continues to make its haunting ‘presence’ or ‘absence’ felt in the undoubted ‘presence’ of evil in the world, a ‘presence’ which is itself an ‘absence’.
- 104 -
The idea of creation from nothing has a very strong theological connection with many other theological commonly agreed issues, but, in my opinion doesn’t have any metaphysical or scientific support. In my opinion, the principle of creation from nothing, developed by the Christian thinkers, is not what the first 2 chapters of the book of Genesis try to tell us. God, in the biblical context, must be seen as the cause of all things, and not only a catalytic or transformative Force of “nothing” in “something”. He causes things from His own Reality, generating them as an effect of His powers.
The created world is generated by words, which can transform, in a rational or ordered way, energies in deeds. By what mechanisms has this transformation been produced? We don’t know. An agnostic attitude is probably the most rational one in this regard. Nevertheless, “nothing” is not able to receive any command; it is one of its characteristics. “Nothing” cannot react because there isn’t anything to react in it.
God is a cause, generating effects from that cause. The universe was caused by God as a seed causes the growth of a flower. The universe had its potentiality in God therefore the world had existed in its seed in Him before becoming an actual reality. All elements needed for the existence of the universe had to be present in God, before its creation.
Everything which exists has a cause in another existent thing, not in absolute nothingness. Saying that God had created all that is from nothing doesn’t mean anything because it doesn’t establish any causal relationship between nothing and what it is. According to the Greek philosopher Aristotle, there are four types of causes – material causes, formal causes, efficient causes, and final causes. Absolute nothingness cannot account for any of these types of cause. If God is at the same time the material cause, formal cause, efficient cause, and final cause of the entire existence, nothingness doesn’t play any function in creation.
- 105 -
Energy can transform itself in matter and matter in energy as Einstein has shown in his formula, E=mc2.
“Einstein theorized that matter and energy are interchangeable. Matter takes up space, has mass and composes most of the visible universe around us. Energy, on the other side, takes multiple forms and is essentially the force that causes things to happen in the universe. Yet both matter and energy are variations of the same thing. Each can convert into the other. According to Einstein and to the first law of thermodynamics, a fixed quantity of energy and matter exist in the universe.”
Can energy by transformed in matter? The answer is yes and is given in the following quotation:
“So yes, humans can manufacture matter. We can turn light into subatomic particles, but even the best scientists can’t create something out of nothing.”
If not energy, what else can convert into matter? One thing can be said for sure. Absolute nothingness, no particles, no fields, no space, no laws, no nothing cannot be transformed into anything because there absolutely isn’t anything in it. Absolute nothingness is only a concept which can never be instantiated in reality. For this reason, creation from absolute nothing by God is only an absurdity which doesn’t do any good to the Christian faith.
What are spoken words and how can they become matter? They are only sounds with a certain meaning or significance. They are symbols, communicated messages. Can words generate matter by transforming themselves into it? Not to the common knowledge. God didn’t transform words into matter, but He had materialised ideas based on His rationality, for this process, using matter and energy. Did God create matter and energy from absolute nothingness?
- 106 -
He surely didn’t because absolute nothingness cannot exist. How God would have created energy and matter, we don’t exactly know, but before their existence there was something in His Reality which could have been transformed into energy and matter. If not, the direct chain of causality between Him and the created world would be broken. If God is a pure spiritual Reality and spirituality is the opposite of matter, it is hard to imagine how matter can be produced by pure spirituality. Are matter and spirituality interchangeable in a similar way to the manner in which matter and energy are interchangeable? Before humankind can demonstrate this kind of interchangeability, creation from nothing is only a speculation.
God asked the earth to bring forth vegetation. But earth which is matter without consciousness doesn’t hear and is not able to interpret symbols. Probably it is more rational if we understand that God prepared earth for the process of growing vegetation by endowing it with all needed ingredients for the process. The book of Genesis is far from explaining how the universe came in place.
The concept of the creation from nothing, existent in both religion and science, demonstrates a limit of human comprehension. It is hard to imagine an infinite existence with no beginning or end. This existence may or may not have its own Consciousness; the answer will depend on the person engaged in the spiritual experience with that Consciousness.
At the same time, creation from nothing is a principle no less confusing than the principle of the eternity of all existence. Nevertheless, Thomas Aquinas, a very important theologian of the thirteenth century, considered that all things must have a beginning, there cannot be an infinite regress of causation, and consequently a Prime Mover is a necessary concept. In the natural finite human logic, this seems to be right, but in point of fact, presuming the Prime Mover is a way of transferring the need for causation to a transcendental Reality. If all things have a cause, the Prime Mover has to have a cause also. The idea that the Prime Mover doesn’t need to have a cause cannot be in any way demonstrated other than by rejecting the impossibility of an infinite regress of causalities. At the same time, it is very difficult to sort out problems at the level of the infinite dimension of reality using only a logic based on the finite human dimension.
- 107 -
If there is one exception to the principle of causality that of the Prime Mover there can be others, and also the entirety of existence, the existence per se can be such an exception. Dividing reality into necessary existence and contingent existence doesn’t sort out the problem because God as a necessary existence needs His creation in order to be the Creator. God cannot be the Creator without His creation and being Creator is one of His most important attributes.
The creation from nothing is a principle loosely exemplified in the Bible and about which science has already pronounced itself by the laws of thermodynamics. The first law of thermodynamics specifies that the total amount of energy in a closed system cannot be created or destroyed (though it can be changed from one form to another). Matter, instead, can be both created and destroyed by transforming it into energy. Mass became another form of energy that has to be included in a thorough thermodynamic treatment of a system. At the level of the universe, it is important to define what meaning a closed and an open system has and which better describes our cosmos.
Is the universe a closed system? How about the entirety of existence as an infinite reality, can it be considered a closed system? The universe is a closed system if it isn’t influenced by anything outside it.
If there are a plurality of universes, before knowing what the relation between them is, it is difficult to describe our universe as closed or open. On the other side, when we talk about the entirety of existence or the existence per se there isn’t anything outside it, it is an infinite system therefore the notions of closed and of infinite must both be integrated by the same equation.
God didn’t do things from “nothing”, as Theophilus of Antioch understood “nothing”, because never was there such a non-reality as absolute nothingness. Probably, all material existence comes from an infinite and constant energetic source. If God exists and if He is eternal there isn’t such thing as absolute nothingness because He doesn’t equate with absolute nothingness.
Is energy in space or outside space? Does energy have mass? I tried to find an answer to these questions in the scientific literature but I got mixed opinions.
- 108 -
Most answers are related to the photons, a form of energy; consequently if photons occupy space, energy must be said to occupy space also, and if photons have mass, energy has mass. One thing can be said; where there isn’t any space, light cannot travel and cannot be there for the simple reason that in this case there isn’t any “there”.
God firstly needed space in order to create something and space is the condition of all creation. Space cannot be created from outside space or from a state of no space at all because for its physical existence every reality needs space. The idea that God could have created space from outside space is absurd but is the necessary consequence of the affirmation that first of all He would have created space, and the entire creation started with His creation of space. If God was outside space He couldn’t have existed as an objective existence.
Space being already out there, the creation was done in the context of something and not out of nothing because space is something, not nothing. God couldn’t have created space out of nothing because He is eternal and necessarily He occupies space, therefore space also must be eternal and co-existent with Him. God’s existence completely out of space cannot be a Reality but only a concept in the minds of intelligent beings living in space. God couldn’t have created anything from out of space, from absolute nonexistence, because such a concept can never become real. The assertion that God would have created space in the beginning of His creation is nonsensical as far as He is eternal and He occupies space. Space must be also eternal if God is an eternally existent divinity.
If God wasn’t infinite in space something else must be at the limits of His space, but He doesn’t have any limits. That something cannot be absolute nothingness understood also as inexistence of any space, because space per se, not the space of a certain object, cannot be limited by absolute nothingness. Space per se can be occupied or can be relatively empty but it is infinite in its extension. God eternally occupies an infinite space or He isn’t an infinite Reality.
Creation out of nothing is an absurd proposition as long as any creation would have been realised in a spatial context. Besides the infinite space, there is also the individual space of every object which is linked with time, in the way that was explained by Einstein.
- 109 -
In order to be consistent with the biblical account, one must accept that we don’t need the idea of nothing, in any way, for the explanation of God’s creation. God didn’t need a certain “nothing” in order to create “something” and that “nothing”, no space, no energy, no matter, no fields, and no laws, couldn’t have replaced existence per se.
Roger E. Olson summarises very well the possible visions about the relation between God and His creation:
“Creation out of nothing is the only alternative to four alternative beliefs about creation that are absolutely untenable for Christian thought. One is pantheism or panentheism—belief that God and the world are either identical or interdependent. In either case the world is part of God or so inextricably united with God eternally that God is dependent on it. (Here “world” refer to creation, the universe, finite reality.) Another alternative belief about creation is that God created the world out of some pre-existing matter that he did not himself create. In that view God “created” by organizing an eternal something that was chaotic and stood over against him. Yet another alternative belief is that God created the world out of himself in which case the world is made of “God stuff”—God’s own substance. Finally, a mostly modern, secular view is that some world (or substance, energy) has always existed and God, if he exists at all, has nothing to do with its origin or development.”
It is understood that creation out of nothing is an important element of fundamental Christian beliefs and it sustains other important teachings of Christianity inclusive of the teachings of the gospels. Even if it isn’t taught by the Scriptures one must support the principle of creation out of nothing, if not many Christian teachings would be questioned. One such fundamental thesis in doubt if creation out of nothing is rejected, is that God doesn’t depend on His creation for His actuality. This of course is false because God depends on the existence of His creation in order to be an actual, not only a potential Creator. The affirmation that God doesn’t need anything is absurd as far as He needs to be loved by human beings and displayed tremendous energy and sacrifice to reveal His love to humankind.
- 110 -
To say that God wants us to love Him but He doesn’t really need our love is a deformity which is very present in some Christian movements. God doesn’t endorse the imposition of any religious dogmas or doctrines on people by other people. One should try to understand all possible interpretations of the biblical texts and choose whichever seems to him or to her closer to his or her spiritual experiences. God needs our love as much as we need His love and without humankind Christ couldn’t have been embodied in a human being making visible the Father’s love. God wants to be known by conscious beings able to understand Him.
According to Roger E. Olson, if one doesn’t believe in creation out of nothing he or she casts doubt on the principle of gratuity of grace..
The Bible doesn’t teach creation from nothing, but the creation from chaos, which is symbolised by the primeval sea. The book of Genesis is silent as to the origins of the primeval sea and it is absurd to think that God would have created chaos from within Himself before creating an orderly universe. God being a rational Reality, He wouldn’t have created chaos, so the chaos represented by the primeval sea couldn’t have been created by Him.
Comparing the theory of the Big Bang and the creation of the universe from a primeval sea, the result is a huge difference in the quality of the explanations given by science in comparison with the texts of the Bible. Scientific explanations are by far much better supported and much more credible than the narratives of creation of the universe and of humankind from the book of Genesis.
- 111 -
www.jcrt.org/archives/09.1/Hyman.pdf
www.jcrt.org/archives/09.1/Hyman.pdf
www.jcrt.org/archives/09.1/Hyman.pdf
www.jcrt.org/archives/09.1/Hyman.pdf
science.howstuffworks.com/environmental/earth/.../can-we-manufacture-matter.htm
science.howstuffworks.com/environmental/earth/.../can-we-manufacture-matter.htm
www.physicscentral.com/experiment/askaphysicist/physics-answer.cfm?...
www.physicsforums.com › Physics › General Physics
www.patheos.com/.../why-i-believe-in-creatio-ex-nihilo-creation-out-of-...
www.patheos.com/.../why-i-believe-in-creatio-ex-nihilo-creation-out-of-... | http://www.contradictionsinthebible.org/itemlist/tag/Contradictions%20in%20the%20Bible?limit=2&start=6 |
I wrote recently about several objections to the Kalam Cosmological Argument, but I wasn’t able to cover even the most common objections in one post. Here, I’ll examine a few more objections to the argument, as well as offer critiques and more links to read.
Matter can be neither created nor destroyed
A common objection to the Kalam Cosmological Argument (hereafter KCA or Kalam) is against its principles of causation. The atheist points out the principle of the conservation of energy: that energy can be neither created nor destroyed, but only change forms (it can equally be said that “matter can be neither created nor destroyed…”). Applying this to the Kalam, they argue that because the KCA asserts the universe began and was caused, it cannot be true–matter cannot come into existence.
There are several problems with this objection. First, it assumes a causal principle: that only material causes exist. For it is true that the conservation of energy applies to material causation, but it may not apply to immaterial causation. “Ah,” the atheist may counter, saying, “but why think that there is immaterial causation anyway?” Why? Because that’s exactly what the KCA is made to demonstrate: that the universe was caused by an immaterial entity. The first premise (Everything that begins has a cause) would indeed have to surrender to the conservation of energy… but only if it is assumed that the cause is material. The Kalam is presenting an immaterial cause, creating the universe ex nihilo–out of nothing. For more on this objection, see William Lane Craig’s answer to the question “Must everything have a material cause?”
Second, using the conservation of energy to argue against the beginning of the universe reveals confusion about cosmology to begin with. Scientists can extrapolate back to the beginning of the big bang–which is the moment when both space and time came into existence, along with all of the material world (Craig and Copan, cited below, 222ff). So we know scientifically that there was a moment when there was no matter at all. It was created, not out of other matter, but out of nothing. Here is the key to note: it is once the universe came into existence that the laws of nature came into effect–before the universe, there was nothing.
Third, if it is true that matter has never been created or destroyed, matter and energy would be eternal. But if that is the case, then due to another law of thermodynamics–entropy–the entire universe would have evened out all the energy by now. There would be no stars burning, no people breathing, etc. Thus, it is easy to see scientifically that the universe is not eternal.
Infinite Past is No Problem
The late atheistic philosopher J.L. Mackie objected to the Kalam from a different perspective. He felt that there was a problem with the way William Lane Craig tried to establish a finite past. He argues that “[The Kalam] assumes that, even if past time were infinite, there would still have been a starting-point of time, but one infinitely remote, so that an actual infinity would have had to be traversed to reach the present from there. But to take the hypothesis of infinity seriously would be to suppose that there was no starting-point…” (Mackie, 93, cited below).
William Lane Craig and Paul Copan point out that, “On the contrary, the beginningless character of the series of past events only serves to underscore the difficulty of its formation by successive addition. The fact that there is no beginning at all, not even an infinitely distant one, makes the problem worse, not better” (Craig and Copan, 214, cited below). It’s not that defenders of the Kalam argue that if the past is infinite, one could not count to the present–rather, it’s that if the past is literally infinite, there is no beginning, and one could never reach the present moment by successive addition.
If one finds this line of reasoning unconvincing, however, one must also deal with the empirical problem with an infinite past: entropy. If the universe has existed forever, then all the energy in the universe should have evened out by now. We would simply not observe the universe we do. Thus, both philosophically and scientifically, we can discount the idea of an infinite past.
The Multiverse, Redux
I addressed the multiverse in my previous post on the topic, but it should be noted how much of a difficulty there is for those wishing to use the multiverse to discredit the Kalam. Jeffrey Zweerink points out that according to Arvind Borde, Alexander Vilenkin, and Alan Guth, “any cosmos that expands on average (like an inflationary multiverse) must have a beginning in the finite past” (Zweerink, 32, cited below). The multiverse does not help those trying to avoid a beginning for the universe, it merely pushes the problem up one level.
Conclusion
Again, after subjecting the Kalam Cosmological Argument to multiple objections, it emerges unscathed. It establishes its conclusion: the universe has a cause. What does this mean? That’s a question we should all consider of utmost importance.
Links
An outline of the Kalam Cosmological Argument.
Dawkins and Oppy vs. Theism: Defending the Kalam Cosmological Argument– A survey of some philosophical and popular attacks on the KCA along with rebuttals.
Sources
William Lane Craig and Paul Copan,Creation out of Nothing (Grand Rapids, MI: Baker, 2004).
J.L. Mackie, The Miracle of Theism (New York, NY: Oxford, 1982).
Jeffrey Zweerink, Who’s Afraid of the Multiverse? (Reasons to Believe, 2008).
SDG.
——
The preceding post is the property of J.W. Wartick (apart from citations, which are the property of their respective owners) and should not be reproduced in part or in whole without the expressed consent of the author. All content on this site is the property of J.W. Wartick and is made available for individual and personal usage. If you cite from these documents, whether for personal or professional purposes, please give appropriate citation with both the name of the author (J.W. Wartick) and a link to the original URL. This blog is protected by Creative Commons licensing. By viewing any part of this site, you are agreeing to this usage policy. | https://jwwartick.com/2011/10/03/objecting-to-kalam-2/ |
2.1 Energy and power
One of the most fundamental principles in physics is that of the conservation of energy.
This means that in any process energy cannot be created or destroyed; it can only be transformed from one form into another. The total amount of energy is therefore said to be conserved.
This might or might not be a familiar concept to you, but here are a couple of examples to help explain it.
- Chemical energy stored in food is transformed when you digest what you eat into a form of energy that your body can use as ‘fuel’.
- Solar energy, from the Sun, is used in photosynthesis by plants to create chemical energy that enables the plants to grow and to perhaps produce food for the previous process!
The standard unit that energy is measured in is the joule (J). To get an idea of the size of the joule, look at these examples:
- energy content of a cereal bar: 800,000J
- energy stored in an AA battery: 9000J
- energy required to climb a flight of stairs: 3000J.
These are rough values and may vary a bit in reality, but they can give a general idea. In this course, you’ll be concerned with the transfer of nuclear energy into heat energy and then to electrical energy.
Power is the rate at which energy is transferred. For example, an electric fire transfers energy in the form of heat to its surroundings.
Energy can be related to power and time by the equation:
energy = power × time
power = energy/time
A watt (W) is the unit of power and it corresponds to an energy transfer of 1 joule per second. Many domestic appliances have their power given in thousands of watts, or kilowatts (kW), and electricity power stations normally have their outputs rated in millions of watts, that is, in megawatts (MW). The energy requirement for the UK as a whole is often given in gigawatt (GW). Each gigawatt is 1 billion (1 000 000 000) watts.
Appliances around your home will have power ratings on them which indicate how many joules of energy they transform every second.
For example, an average kettle is rated at 3kW. That means that it uses 3000J every second it takes to heat up and boil water. To make one cup of tea, the amount of water needed takes one minute to boil.
So using:
It takes 180,000J of energy to make a cup of tea. This is equivalent to the energy required to climb 60 flights of stairs!
When you plug in a kettle, this 180,000J is provided by the electrical energy supplied from the National Grid. Modern life requires a great deal of electrical energy to be produced and it is sometimes difficult to get a tangible idea of how much energy this is.
In the next section, you will be asked to estimate the energy requirements of appliances found around the home. | https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=26803§ion=1 |
What is the optimal size of government? This is an issue which has interested political scientists, economists, psychologists, anthropologists and more for many years. For some anarchists the ideal size of government is zero; in contrast, the totalitarian perspective argues for a society where the State controls all . It is argued that anarchists sometimes err in a conflation between government and the state . A contemporary quirk is that most contemporary "anarcho-socialist" perspectives argue for the abolition of the state yet for democratic governance of social property, in contrast to the "anarcho-capitalist" perspective, which argues for the abolition of democratic governance of social property in favour of numerous private states.
Starting from an examination of the need for governments of different scope, the following looks at some of the major theories concerning the optimal size of different types of governance, heavily informed from public economic theory. In doing so, it is hoped to overcome some of the shortcomings of theories of this sort, but also to provide some steps towards resolving what are often well-meaning, but extremely flawed, perspectives in political theory and voluntary association.
The Scope of Governance
One of the successes of modernity and liberalism has been the political assertion of the ontological category of autonomy of the self founded in the individual scope of sensory experience. Kant argued for autonomy as a personal moral right, consisting of "auto" (negative freedom) and "nomos" (moral principles) . Development psychologists, especially Jean Piaget and Lawrence Kohlberg, have examined the neurological and communicative basis from the transition from childhood to adulthood where the sense of autonomous reasoning and post-conventional morality becomes evident . This process is graduated, and with different rights applied at different ages, although with a general orientation towards the mid-late teen-aged years. Individual differences are screened out in favour of the efficiency of procedure.
In general, the principle that adults with adult reasoning govern themselves, with reciprocity (others govern themselves), and with an inter-subjective agreement to actions through informed consent, is widely and increasingly universally accepted. This is perhaps the greatest political success of modern liberalism which has a sound ontological basis - everyone has this same experiential sense of autonomy. Sociologists and anthropologists can and do investigate both the variance and sameness of preferences and even question to what degree supposedly individual choices come from socialisation (far more than individuals believe they do, obviously). But as a political right even self-destructive rights (e.g., voluntary euthanasia) is widely accepted, albeit in a carefully managed fashion and only in limited circumstances.
But even from this sense of individual autonomy, and governance of the self, it can be shown how the assumption of perfectly discrete "self-regarding actions" come into conflict with a reciprocal sense and become "other-regarding actions", to use the categories famously employed by Mill . For example, the medical principle of autonomy states that adults of adult reasoning are entitled to determine whether or not they receive a vaccination - however, if one does not do so, the public is within their defensive rights to limit the contact that the individual has, even against their will. After all, they would be potentially infecting others against their will and the degree of prevention is in proportion to likelihood and seriousness (a person with a common cold probably should stay at home; a person with ebola will be in quarantine). What is important here is the application of governance from outside of the normal body when an act moves from being self-regarding to other-regarding without informed consent.
It might be less comfortable for some, but this truth continues to apply from individuals to groups, to local regions, etc. A society cannot function, for example, if there is not some means of governing access to resources, independent of whether the resource is subject to capitalist, socialist, or any other system of resource management. If a good (e.g., bread) has a production time of P_t, and the time access and deplete the good is the good is T_t, and P_t > T_t, then very quickly, without rules of access, everyone will be consuming a good without producing the good - and production will crash . It is no good to assume that universally virtuous behaviour will apply; indeed, it is a defensive reason to assume that it will not apply. Access rules (sometimes called "property rights") are required. Access rules also imply exchange rules, of which price signals derived from competition are currently considered a relatively efficient means for the distribution of commodities in an economy with scarcity and imperfect information, and importantly, a means of determining the maximum satisfaction of utility of multiple interacting consumers.
However, arguments for a minimal social government elaborate from this principle to cover defence, contracts, law enforcement, and exchange. However such "minarchism", or Night-watchman state ("Nachtwächterstaat", disparagingly coined by Lassalle in 1862), popular among anarcho-capitalists , displays a great level of naivety. Left to its own devices, the minimal state with market relations is still subject to less than optimal matters of market failure. Specifically, the economically damaging effects of imperfect competition, the inability to supply public goods, a lack of mitigation of negative externalities or provision of positive externalities, and the inefficiencies that arise from asymmetric information. These are therefore also candidates for public intervention from an external body, whose provision aids development . Thus "self-governance" (whether individual, local, etc) is limited to the extent that it refers only in proportion. As a whole, each level has autonomy but also as a "bundle of rights", to use the common term in property law .
Raising these issues in no way suggests that the only solution is via an external (e.g., public) industry, but it does suggest the need for additional governance above and beyond the minimal state, and more importantly, a governance above the institution that has most access rights to the resource. This is of course, balanced by concerns of "government failure" , such as the excess growth of bureaucracy, targeted rent-seeking through legislation, and market capture - all leading to aggregate inefficiencies. If a government is to intervene in market failure, the outcome must be better, not worse. Partiality is important here - health and education, for example, provide benefits which are both personal and social. The typical strategy here is minimum social standards with elective choices according to personal desires.
The Scale of Governance
In general, where a good has a relatively low-level of complexity in the production and distribution process efficiencies can be gained with a high level of planning (using tools such as simultaneous equations and an input-output model ). In contrast, where the good has a high-level of complexity, the more efficient means of production and distribution is via price signals. Where a good is relatively discrete in its production and distribution, with a low-level of possibility for market failure, small-scale and decentralised governance (e.g., through private firms, cooperatives, etc) is most appropriate. In contrast, where the good is prone to market failure (e.g., the opportunity for large positive externalities) an additional level of governance is required. Of course, most goods fits within the continuum of these idealised dimensions, and could be expressed in terms of variables if necessary. This sketch provides hints of not only where public interventions are required (high levels of market failure) but also what sort of intervention is required (market or plan).
|Market Failure and Complexity||Low Complexity||High Complexity|
|Low Market Failure||Localised planning||Localised Market|
|High Market Failure||Generalised planning||Generalised Market|
At a high level is the provision of public goods, that is, those goods which have the characteristics of non-excludability and non-rivalry. This is an idealised expression public goods can suffer congestion effects and a degree of exclusion, making most closer to "club goods" instead. The provision of goods with positive externalities (e.g., healthcare, education) is also recognised for its benefits, but less obvious are those where there are opportunities for synergistic effects between different goods, but whose production is limited to satisfy local returns (e.g., the famous example of a neighbouring orchid and a beehive producing suboptimal, local-return, levels).
It is tempting to suggest that, assuming that proposed government interventions have a net positive, that the roles of government could be carried out by a single body across the widest possible jurisdiction. After all, there are clear advantages for economies of scale, there is co-ordination advantages, and there is the normative principle that citizens are deserving of equal rights across a society. However, as mentioned, like markets governments too are prone to failure. An intriguing suggestion of the Tiebout model argues that with decentralised club goods an optimal implementation is evident according to where people move to, or at least want to move to (as transaction costs of getting from A to B still apply), thus suggesting that a decentralised application of public resources (although not necessarily revenue collection) is appropriate in many cases. One may further add suggestions such as Dunbar's Number , which crosses anthropology and social psychology, which would further suggest a cognitive limit to effective community size.
Public Finance
If there is going to be expenditure by a public body for the purposes of welfare and intervening in market failures, then those expenditures have to be paid for. Various models are in use around the world, including various income taxes, company taxes, sales taxes (and other variants), property taxes, and so forth. Public economists are invariably very concerned with the distorting effects on various attempts to raise public finance, mainly because most taxes distort consumer or producer decisions and come with a dead-weight loss on trades, reducing aggregate utility . This is all in addition to any administrative costs.
This is because such taxes are are a cost on activity. A sales tax on a chair will raise the cost of the chair; the producer will attempt to pass the cost on to the consumer with a degree of success depending on elasticity of demand. Assuming anything less than perfectly inelastic demand (which a producer would be already charging a maximum price for), consumers will be less inclined to purchase the good than previously. With a decline in demand less chairs are produced and provided than what would be optimal. The same applies to any other good or service, to wages, etc. Payroll taxes, despite a low administrative overhead, are a particularly onerous example, literally being a tax on jobs.
However, not all goods are produced at optimal levels. Goods that have negative externalities (such as pollution) where the cost is not captured in the price are too cheap (and which the "tragedy of the commons" is a well-known end result). The generally accepted solution to these goods is to a apply a Pigouvian tax of some sort , which raises the cost of the good with revenues being returned to the public body and with general levels of production of the good is declining. Most recent economic research suggests that there is an information problem of exactly what rate such a Pigouvian tax should be applied. A variant alternative is to employ marketable licenses which come with administrative advantages over direct taxes but also lead to an identical income in conditions of certainty.
Further, there are goods that are fixed by nature in production. Such "economic land" has been recognised by economists since Adam Smith onwards as one which public appropriation of rents is not just a right and proper thing to do, but even a necessity. Because unless economic rents are charged private investors seek monopolisation in the most literal sense of speculative "rent seeking". To put bluntly, the economic class of landlords, who contribute nothing to aggregate wealth, must be taxed out of existence. Public economists would prefer to derive public income where there is no change in a consumer's behaviour, and various resource rents fit under this category; supply is unchanged and because the rent is paid to the public rather than private expropriation, consumer behaviour is unchanged because the rental-price is unchanged - all that is removed is the speculative acquisition.
One hypothesis that is logically consistent and with a good level of empirical evidence is "Henry George Theorem" , named after the advocate for public appropriation of economic rents. Investment in public infrastructure increases rental values at the same value that the investments cost. Unlike a system where the benefit is acquired by landlords, if the rents are acquired by a public body which re-invests them into public infrastructure (physical and social) the cycle continues. In other words, the most efficient and just public financing is where there is an abolition of taxes that punish useful productive activity, but where the public receives monies from the rent of economic land, such as through licenses or land tax, etc. Increasingly arguments for a "social dividend" to fund welfare in a manner that is technologically-enhancing also find a voice in the concept of a social collection of economic rents.
Concluding Remarks
The introductory sketch requires significantly further elaboration. Nevertheless, core principles have been identified which provide the means for the highest levels of individual and aggregate liberty, both in the positive and negative sense, utility, and normative justness. To re-iterate these core principles:
* Adults with adult reasoning provide the normative foundation for autonomous choices. The transition from childhood to adulthood occurs with both neurological development for cognitive operations and socialisation for moral reasoning. Particular political rights with equivalent responsibilities are socially granted during young adulthood in a manner for legal expediency which can err due to individual temporal variation.
* Individuals have the right to self-governance and, through reciprocal relations, to establish consensual and informed agreements with others. Where acts do not have the agreement of others and the act is other-regarding, the recipient party can justly call upon an external body for the protection of their moral rights, including prevention where it is not expedient to do otherwise.
* Individuals and organisations have varying production, distribution, exchange, and access rights to goods and services, according to normative and efficiency decisions. In the course of carrying out these rights the possibility of suboptimal and unjust results may arise, which it is inexpedient for the individual or organisation to mitigate. Thus, in cases of such failures proportional and additional governance is required to orientate the activity towards a more optimal result. The possibility is raised that the external governing intervention may also produce additional suboptimal results.
* Goods and services with low levels of market failure are less likely to require external government intervention and are best managed by localised bodies, from individuals to incorporated bodies. Goods with and services with low levels of complexity are candidates for planning rather than market mechanisms. The inverse applies appropriately. Whilst the the collection of resources can be efficiently carried out on a larger scale, the application of such public and club goods is often most effectively carried out by bodies to ensure responsiveness to local needs (large scale infrastructure, the environment etc are exceptional candidates).
* Public finance when applied to production (either directly, or indirectly as a sales tax) comes with an administrative cost and a dead-weight loss with an overall loss of utility. At times (e.g., to goods with negative externalities) this can have a beneficial result, although licenses have administrative advantages. The ideal source of public finance is economics rents, of which land is the most well known example as it is non-distortionary, redirects investment to productive activity and has a high level of normative justness from the perspective of political economy. Resource rents are an excellent source of funds for a universal basic income.
Two major omissions are noted here for future articles. First, an exploration of the optimal manner to elect public representatives, especially in light of median voter theorem, the advocacy of majority rule in May's theorem, and the general challenge to social choice theory expressed by Arrow's Impossibility Theorem. Secondly, an exploration of the most optimal manner to manage localised economic bodies both from an organisational perspective to a socially optimal perspective, looking at capitalist and socialist models as well as partial and variant.
References
1] See for example, Giovanni Gentile, Origins and Doctrine of Fascism, 1929 ("Everything within the state, nothing outside the state, nothing against the state.") or Joseph Stalin, Political Report of the Central Committee to the Sixteenth Congress of the CPSU(B), June 27,1 1930 ("The highest development of state power with the object of preparing the conditions for the withering away of state power)
2] In Against the Class State and for Democratic Government (July, 2012) the following observation is made:
Proudhon makes his famous oft-quoted remarks of what it means for a person to be governed in The General Idea of Revolution, concluding with "That is government; that is its justice; that is its morality". Bukinin in Statism and Anarchy says "[w]e declare ourselves the enemies of every government and every state power, and of governmental organization in general", and Kropotkin defines anarchy as "the name given to a principle or theory of life and conduct under which society is conceived without government" [in Anarchism].
3] Immanual Kant, Grundlegung zur Metaphysik der Sitten, (Groundwork of the Metaphysic of Morals), FP 1785
4] Lawrence Kohlberg, Essays on moral development (2 volumes), Harper-Row, 1985
5] C.L. Ten, Mill on Self Regarding Actions, Philosophy, Vol 43 No 16, pp. 29-37, 1968
6] D. Usher, Theft as a Paradigm for Departures from Efficiency, Oxford Economic Papers New Series, Vol. 39, No. 2, pp. 235-252, 1987
7] Robert Nozick, Anarchy, State, and Utopia, Basic Books, 1974
8] Joseph E. Stiglitz, Markets, Market Failures, and Development, American Economic Review, 79(2), pp. 197–203, 1989
9] Daniel B Klein, John Robinson. Property: A Bundle of Rights? Prologue to the Property Symposium, Econ Journal Watch 8(3): 193-204, Sept 2011
10] Barack Orbach, What Is Government Failure. Yale Journal on Regulation Online, 30, pp. 44-56., 2013
11] W. Paul Cockshott, Allin Cottrel, Towards a New Socialism, Spokesman, 1993
12] Paul W. Rhode, Koleman S. Strumpf, A Historical Test of the Tiebout Hypothesis: Local Heterogeneity from 1850 to 1990. NBER Working Paper No. 7946, 2000
13] R.I.M Dunbar, Neocortex size as a constraint on group size in primates. Journal of Human Evolution. 22 (6): 469–49, 1992
14] James R. Hines, Jr. Three Sides of Harberger Triangles. Journal of Economic Perspectives. 13 (2): 167–188, 1999
15] G. Hardin. "The Tragedy of the Commons" (PDF). Science. 162 (3859): 1243–1248, 1968
16] The alternative Coase theorem - not really a theorem - requires an implausible level of equality of bargaining power, symmetric information, and low transaction costs - does not require further exploration here.
17] Lawrence H Goulder, Ian W.H. Parry , Dallas Burtraw, "Revenue-raising versus other approaches to environmental protection: The critical significance of preexisting tax distortions," The RAND Journal of Economics, 28(4): 708–731, 1997
18] Richard J. Arnott, Joseph E. Stiglitz, Aggregate Land Rents, Expenditure on Public Goods, and Optimal City Size, Quarterly Journal of Economics. 93 (4): 471–500, 1979
Commenting on this Story will be automatically closed on June 19, 2019. | https://isocracy.org/content/ideal-size-governments |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.