The documents contained in this dataset reflect NASA's comprehensive IT policy in compliance with Federal Government laws and regulations.
CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
License information was derived automatically
This data is a sub set of a dump from ROARMAP [http://roarmap.eprints.org/] taken on 24th August 2014.
ROARMAP is the Registry of Open Access Repository Mandates and Policies, a searchable international registry charting the growth of open access mandates and policies adopted by universities, research institutions and research funders that require or request their researchers to provide open access to their peer-reviewed research article output by depositing it in an open access repository.
Number of Open Access policies and a ranking is shown for each country.
The data is being used for a series of data visualisations [http://pasteur4oa-dataviz.okfn.org/] for the PATEUR4OA Project [http://pasteur4oa.eu/].
PASTEUR4OA (Open Access Policy Alignment Strategies for European Union Research) aims to support the European Commission’s Recommendation to Member States of July 2012 that they develop and implement policies to ensure Open Access to all outputs from publicly-funded research.
PASTEUR4OA will help develop and/or reinforce open access strategies and policies at the national level and facilitate their coordination among all Member States. It will build a network of centres of expertise in Member States that will develop a coordinated and collaborative programme of activities in support of policymaking at the national level under the direction of project partners.
Attribution-NonCommercial 4.0 (CC BY-NC 4.0)https://creativecommons.org/licenses/by-nc/4.0/
License information was derived automatically
The Climate Policy Database collects information on currently adopted policies related to climate change mitigation from countries worldwide. The objective of the website is to provide an open, collaborative platform for information access, policy analysis and good-practice sharing. All data can be downloaded via the policies page.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Sensitive Regulated Data: Permitted and Restricted UsesPurposeScope and AuthorityStandardViolation of the Standard - Misuse of InformationDefinitionsReferencesAppendix A: Personally Identifiable Information (PII)Appendix B: Security of Personally Owned Devices that Access or Maintain Sensitive Restricted DataAppendix C: Sensitive Security Information (SSI)
https://www.icpsr.umich.edu/web/ICPSR/studies/38908/termshttps://www.icpsr.umich.edu/web/ICPSR/studies/38908/terms
The Child Care and Development Fund (CCDF) provides federal money to states and territories to provide assistance to low-income families, to obtain quality child care so they can work, attend training, or receive education. Within the broad federal parameters, States and Territories set the detailed policies. Those details determine whether a particular family will or will not be eligible for subsidies, how much the family will have to pay for the care, how families apply for and retain subsidies, the maximum amounts that child care providers will be reimbursed, and the administrative procedures that providers must follow. Thus, while CCDF is a single program from the perspective of federal law, it is in practice a different program in every state and territory. The CCDF Policies Database project is a comprehensive, up-to-date database of CCDF policy information that supports the needs of a variety of audiences through (1) analytic data files, (2) a project website and search tool, and (3) an annual report (Book of Tables). These resources are made available to researchers, administrators, and policymakers with the goal of addressing important questions concerning the effects of child care subsidy policies and practices on the children and families served. A description of the data files, project website and search tool, and Book of Tables is provided below: 1. Detailed, longitudinal analytic data files provide CCDF policy information for all 50 states, the District of Columbia, and the United States territories and outlying areas that capture the policies actually in effect at a point in time, rather than proposals or legislation. They capture changes throughout each year, allowing users to access the policies in place at any point in time between October 2009 and the most recent data release. The data are organized into 32 categories with each category of variables separated into its own dataset. The categories span five general areas of policy including: Eligibility Requirements for Families and Children (Datasets 1-5) Family Application, Terms of Authorization, and Redetermination (Datasets 6-13) Family Payments (Datasets 14-18) Policies for Providers, Including Maximum Reimbursement Rates (Datasets 19-27) Overall Administrative and Quality Information Plans (Datasets 28-32) The information in the data files is based primarily on the documents that caseworkers use as they work with families and providers (often termed "caseworker manuals"). The caseworker manuals generally provide much more detailed information on eligibility, family payments, and provider-related policies than the CCDF Plans submitted by states and territories to the federal government. The caseworker manuals also provide ongoing detail for periods in between CCDF Plan dates. Each dataset contains a series of variables designed to capture the intricacies of the rules covered in the category. The variables include a mix of categorical, numeric, and text variables. Most variables have a corresponding notes field to capture additional details related to that particular variable. In addition, each category has an additional notes field to capture any information regarding the rules that is not already outlined in the category's variables. Beginning with the 2020 files, the analytic data files are supplemented by four additional data files containing select policy information featured in the annual reports (prior to 2020, the full detail of the annual reports was reproduced as data files). The supplemental data files are available as 4 datasets (Datasets 33-36) and present key aspects of the differences in CCDF-funded programs across all states and territories as of October 1 of each year (2009-2022). The files include variables that are calculated using several variables from the analytic data files (Datasets 1-32) (such as copayment amounts for example family situations) and information that is part of the annual project reports (the annual Book of Tables) but not stored in the full database (such as summary market rate survey information from the CCDF plans). 2. The project website and search tool provide access to a point-and-click user interface. Users can select from the full set of public data to create custom tables. The website also provides access to the full range of reports and products released under the CCDF Policies Data
U.S. Government Workshttps://www.usa.gov/government-works
License information was derived automatically
The specifications and guidelines in this Data Management Plan will improve data consistency and availability of information. It will ensure that all levels of government and the public have access to the most up-to-date information; reduce or eliminate overlapping data requests and redundant data maintenance; ensure metadata is consistently created; and ensure that data services can be displayed by the consumer with the output of its choice.
NIST collects and reports numerous metrics semiannually to the White House Office of Science and Technology Policy to demonstrate implementation of the NIST Plan for Public Access. These metrics include: the number of NIST data management plans (internal and external); the number of datasets listed on data.gov and made public on NIST's website; datasets accessed through NIST's data discovery tool; publications available through PubMed Central (PMC) and govinfo; and publications accessed through PMC. NISTIR 8084, which summarizes NIST's plan for providing public access is accessible via http://dx.doi.org/10.6028/NIST.IR.8084.
Attribution-NonCommercial-NoDerivs 4.0 (CC BY-NC-ND 4.0)https://creativecommons.org/licenses/by-nc-nd/4.0/
License information was derived automatically
A list of journals across several subject areas was developed from which to collect article citation data. Citation information and cited reference counts of all the articles published in 2006 and 2009 for these journals were obtained.
CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
License information was derived automatically
The MOAP Horizon 2020 database was created under the auspices of the Study “Monitoring the Open Access Policy of Horizon 2020” (SPECIFIC CONTRACT No RTD/2019/SC/021 implementing Framework contract No 2018/RTD/A2/OP/PP-07001-2018) For the purposes of the study, we created a relational database comprised of three schemata: 1. moap_org which contains mainly the data from OpenAIRE,3 2. moap_ec which contains mainly the data coming from the European Commission, and 3. moap_final which tables of indicators that lead to the analysis by different facets of interest.
https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy
The global data access governance market size was valued at USD XX billion in 2023 and is projected to reach USD XX billion by 2032, growing at a compound annual growth rate (CAGR) of XX% during the forecast period. This impressive growth is driven by several factors, including increasing regulatory requirements, the proliferation of data breaches, and the growing need for enterprises to safeguard sensitive information.
One of the primary growth factors of the data access governance market is the stringent regulatory landscape. Governments and regulatory bodies across the world are enforcing stricter data protection laws, such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States. These regulations mandate organizations to maintain stringent controls over their data access policies and ensure that only authorized personnel can access sensitive information. As a result, businesses are increasingly adopting data access governance solutions to comply with these regulations and avoid hefty fines and reputational damage.
Another compelling growth driver is the alarming rise in data breaches and cyber threats. With the increasing digitalization of business operations, cybercriminals are finding new ways to infiltrate organizational networks and steal sensitive data. High-profile data breaches have underscored the importance of robust data access governance strategies to prevent unauthorized access and mitigate risks. Companies are now prioritizing investments in advanced data access governance technologies to safeguard their data assets and maintain customer trust.
The growing volume of data generated by businesses is also fueling the demand for data access governance solutions. As organizations collect and store vast amounts of data, managing and securing this information becomes more complex. Data access governance tools help businesses effectively manage and control access to their data, ensuring that it is only available to authorized users. This not only enhances data security but also improves operational efficiency by minimizing the risks associated with data misuse and ensuring compliance with data protection standards.
From a regional perspective, North America is expected to dominate the data access governance market during the forecast period, owing to the presence of major technology companies and stringent data protection regulations. Asia Pacific is anticipated to exhibit the highest growth rate, driven by the rapid digital transformation of businesses and increasing awareness about data security. Europe is also a significant market, given its comprehensive regulatory framework and strong focus on data protection. Other regions like Latin America and the Middle East & Africa are gradually catching up, with businesses increasingly adopting data access governance solutions to enhance their data security posture.
The data access governance market is segmented into software and services by component. The software segment encompasses various tools and solutions designed to manage and secure data access within an organization. This includes access control software, identity management solutions, and data loss prevention tools. The increasing adoption of these software solutions is driven by the need to automate data access governance processes and enhance the efficiency of data management tasks. Additionally, the integration of artificial intelligence and machine learning technologies in these solutions is further boosting their effectiveness in identifying and mitigating potential security threats.
The services segment in the data access governance market includes a range of professional and managed services aimed at helping organizations implement and maintain robust data access governance frameworks. Professional services encompass consulting, system integration, and training services, which are essential for the successful deployment and optimization of data access governance solutions. Managed services, on the other hand, involve ongoing monitoring and management of data access governance tools by third-party service providers. The growing complexity of data access management and the lack of in-house expertise are driving the demand for these services, as businesses seek external support to ensure effective data governance.
Within the software segment, access control solutions are particularly crucial for organizations to enforce strict data access policies. These solutions enable bus
The announcement of Plan S in September 2018 brought the issue of implementation to the forefront of discussions of open access (OA). One issue addressed in the Plan and in a number of responses to it is that of compliance: many funding bodies in North America and Europe have OA mandates, but to what extent are researchers complying with them?
CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
License information was derived automatically
In practice, there is a government policy/strategy to increase citizen access to the Web. A 100 score is earned where the government has a multiyear plan to increase citizens access to the Web, which includes all the following elements: 1) enabling access points in schools and public places (libraries, post offices, etc.), and 2) improving infrastructure for broadband and mobile connectivity. A 50 score is earned where the government has a multiyear plan to increase citizens access to the Web, but it only includes one of the two conditions described in 100 or the plan is outdated (for ex. the plan covered the period 2000-2012). A 0 score is earned where the government doesn't have a multiyear plan to increase citizens access to the Web. For variable descriptions, please refer to: https://www.africaintegrityindicators.org/data. For the methodology, please refer to: https://static1.squarespace.com/static/5e971d408be44753edfb976c/t/60a55f343d36117866628867/1621450563745/AII10+-+Methodology.docx+%281%29.pdf.
The 2013 Office of Science and Technology Policy (OSTP) Memo on federally-funded research directed agencies with research and development budgets above $100 million to develop and release plans to increase and broaden access to research results, both published literature and data. The agency responses have generated discussion and interest but are yet to be analyzed and compared. This data accompanies a paper in which we analyze 19 federal agencies responded to the Holdren memo on issues of scientific data and the extent of their compliance to the directives outlined in the memo.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
This dataset, which was created by merging data from CrossRef, CORE, and Mendeley, contains metadata for over 800 thousand publications published between 2013 and 2018. The dataset was used to study how much time does it take for authors to deposit their articles in Open Access repositories in relation to when these articles were published. The source codes of our analysis are available at https://github.com/oacore/jcdl_2019.
https://www.gesis.org/en/institute/data-usage-termshttps://www.gesis.org/en/institute/data-usage-terms
The International Reproduction Policy Database (IRPD) provides a novel approach to measure policies that directly regulate human reproduction. Reproduction policy is an often neglected domain of state intervention in comparative research, and a comprehensive quantitative database has so far been lacking. IRPD contains multiple indicators in each of five regulatory fields: abortion, contraception, medically assisted reproduction, pregnancy care and sex education. We measure national-level formal regulations for each year between 1980-2020. The database allows to address a wide-range of research questions across various social science disciplines.
This dataset accompanies the report "Monitoring and evaluation of UKRI's Open Access Policy: Exploring the use of open data sources to inform baseline values", which is available via Zenodo.It provides record-level data of UKRI-funded and UK-affiliated research output (limited to journal articles with Crossref DOIs) published between 2012 and 2022 - including bibliographic metadata as well as data on open access availability, publisher, national and international collaborations, citations, views and downloads, altmetrics and subjects (fields). All variables are documented in the data dictionary included in this Zenodo record. The code used to generate the dataset from open data sources is available on GitHub. The following data sources were used: Gateway to Research (records downloaded between 2023-11-05 and 2023-11-13) Crossref (Metadata Plus snaphot 2023-10-31, Crossref member route API 2024-01-23) OpenAlex (data snapshot 2023-10-18) Unpaywall (data snapshot 2023-11-27) IRUS UK (2024-04-03) Crossref Event Data (2023-04-01) The project made use of Curtin Open Knowledge Initiative (COKI) infrastructure, which is documented on GitHub: https://github.com/The-Academic-Observatory. This study has been funded by UK Research and Innovation (UKRI).
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
The data collected represents an environmental survey of academic law journal open access publishing policies. Journal selection is based on publishing practices among law faculty members from six research universities across Canada. Publication data is based on records from Web of Science (WoS) and OpenAlex, open access policy data was primarily collected manually from publisher websites.
https://www.icpsr.umich.edu/web/ICPSR/studies/38852/termshttps://www.icpsr.umich.edu/web/ICPSR/studies/38852/terms
The IPUMS Contextual Determinants of Health (CDOH) data series includes measures of disparities, policies, and counts, by state or county, for historically marginalized populations in the United States including Black, Asian, Hispanic/Latina/o/e/x, and LGBTQ+ persons, and women. The IPUMS CDOH data are made available through ICPSR/DSDR for merging with the National Couples' Health and Time Study (NCHAT), United States, 2020-2021 (ICPSR 38417) by approved restricted data researchers. All other researchers can access the IPUMS CDOH data via the IPUMS CDOH website. Unlike other IPUMS products, the CDOH data are organized into multiple categories related to Race and Ethnicity, Sexual and Gender Minority, Gender, and Politics. The CDOH measures were created from a wide variety of data sources (e.g., IPUMS NHGIS, the Census Bureau, the Bureau of Labor Statistics, the Movement Advancement Project, and Myers Abortion Facility Database). Measures are currently available for states or counties from approximately 2015 to 2020. The Gender measures in this release include state-level abortion access, which reports the proportion of a state's females aged 15-44 who reside in counties with an abortion provider by year and month from 2009-2022. To work with the IPUMS CDOH data, researchers will need to first merge the NCHAT data to DS1 (MATCH ID and State FIPS Data). This merged file can then be linked to the IPUMS CDOH datafile (DS2) using the STATEFIPS variable.
https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy
The global cloud-based security policy enforcement points market is projected to reach USD 12 billion by 2032, with a CAGR of 18% from 2024 to 2032. The growth of this market is driven by the increasing need for robust security solutions in the face of rising cyber threats and the rapid adoption of cloud services by enterprises of all sizes.
The expansion of the cloud-based security policy enforcement points market can be attributed to several growth factors. First and foremost, the escalating incidences of cyber threats and data breaches have necessitated the adoption of advanced security measures. Organizations are increasingly migrating their operations to the cloud, making it imperative to implement stringent security protocols to protect sensitive data. The growing awareness about the potential risks associated with cloud computing and the need to comply with stringent regulatory requirements are significant drivers of this market.
Moreover, the proliferation of remote work arrangements due to the COVID-19 pandemic has further accelerated the demand for cloud-based security solutions. As employees access corporate resources from various locations, ensuring secure access and data integrity has become a top priority for organizations. The shift towards hybrid work models is expected to persist, thereby sustaining the demand for robust security policy enforcement points. Additionally, advancements in technologies such as artificial intelligence and machine learning are enhancing the capabilities of cloud-based security solutions, enabling real-time threat detection and response.
Another critical growth factor is the increasing investment in cloud infrastructure by enterprises of all sizes. Small and medium-sized enterprises (SMEs) are particularly recognizing the cost-efficiency and scalability offered by cloud solutions, leading to a surge in the adoption of cloud-based security policy enforcement points. Larger enterprises, on the other hand, are focused on integrating advanced security measures to protect their extensive cloud deployments. The need for comprehensive security solutions that can seamlessly integrate with existing cloud infrastructure is a key driver of market growth.
From a regional perspective, North America is expected to dominate the cloud-based security policy enforcement points market. The presence of major technology players, coupled with high adoption rates of cloud services and stringent regulatory frameworks, positions this region as a market leader. Additionally, Asia Pacific is anticipated to witness substantial growth due to the increasing digital transformation initiatives across various industries and the rising awareness about cybersecurity risks. Europe, Latin America, and the Middle East & Africa are also poised to contribute to the market's growth, albeit at a comparatively moderate pace.
The cloud-based security policy enforcement points market is segmented into software, hardware, and services. The software segment is expected to hold the largest market share, driven by the growing demand for advanced security solutions that can efficiently manage and enforce security policies across diverse cloud environments. Software solutions offer flexibility and scalability, making them highly suitable for organizations with dynamic security requirements. The integration of artificial intelligence and machine learning in security software is further enhancing its efficacy in threat detection and response.
Hardware solutions, although a smaller segment compared to software, play a crucial role in the overall security framework. Hardware-based security solutions provide an additional layer of protection by safeguarding critical infrastructure and ensuring the integrity of data transmission. With the increasing complexity of cyber threats, organizations are investing in hardware solutions to complement their existing security measures. The demand for hardware solutions is particularly high in sectors such as BFSI and government, where data security is of paramount importance.
The services segment encompasses a wide range of offerings, including consulting, implementation, and managed services. As organizations strive to enhance their security posture, the demand for expert guidance and support is on the rise. Consulting services help organizations assess their security needs and develop customized strategies, while implementation services ensure the seamless deployment of security solutions. Managed services,
How do the policy recommendations released by the European RECODE Project compare to similar Canadian efforts?
The documents contained in this dataset reflect NASA's comprehensive IT policy in compliance with Federal Government laws and regulations.