Data Privacy During Pandemics: a Scorecard Approach for Evaluating

Total Page:16

File Type:pdf, Size:1020Kb

Data Privacy During Pandemics: a Scorecard Approach for Evaluating C O R P O R A T I O N BENJAMIN BOUDREAUX, MATTHEW A. DENARDO, SARAH W. DENTON, RICARDO SANCHEZ, KATIE FEISTEL, HARDIKA DAYALANI Data Privacy During Pandemics A Scorecard Approach for Evaluating the Privacy Implications of COVID-19 Mobile Phone Surveillance Programs rr-a365_cover.indd All Pages 7/23/20 3:11 PM For more information on this publication, visit www.rand.org/t/RRA365-1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0563-0 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2020 RAND Corporation R® is a registered trademark. Cover: Photo illustration by Dori Gordon Walker/RAND Corporation Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface Public health officials worldwide are struggling to manage coronavirus disease 2019 (COVID-19), a highly infectious and lethal disease that still is only beginning to be understood. As part of the response, governments have leveraged new data- collection and data-analysis capabilities through mobile phones. COVID-19 mobile surveillance programs have been used to augment traditional public health interventions, includ- ing the tracking of COVID-19 symptoms, mapping population movement, tracing contacts of infected persons, enforcing quarantine orders, and authorizing movement. Although these mobile surveillance programs enable key public health interventions to mitigate the pandemic, they also raise concerns that the privacy of users will be violated. In this report, we consider whether two potentially competing goals can be achieved concurrently: (1) the use of mobile phones as public health surveillance tools that help to manage COVID-19 and future public health crises, and (2) the protection of privacy and civil liberties. We first analyze the pandemic response opportunities available through mobile phone technologies and categorize them according to their public health objectives. We then identify a set of privacy criteria that provide the foun- dation for developing a “privacy scorecard.” The privacy scorecard is intended as a con- cise, transparent, and standardized model for evaluating the privacy of mobile phone– based health surveillance programs that have been employed in the United States and around the world. We use the privacy scorecard to evaluate 40 distinct public health mobile surveillance programs across 20 countries. We conclude by offering recommen- dations for U.S. federal, state, and local officials on how to protect privacy while using public health mobile surveillance programs, and for mobile phone users so they might proceed with greater understanding of short-term and potentially long-term privacy implications. Funding Funding for this research was made possible by the independent research and devel- opment provisions of the RAND Corporation’s contracts for the operation of its U.S. Department of Defense federally funded research and development centers. iii Contents Preface ................................................................................................. iii Figures .................................................................................................vii Tables .................................................................................................. ix Summary .............................................................................................. xi Acknowledgments ................................................................................. xvii Abbreviations ........................................................................................ xix CHAPTER ONE Introduction ........................................................................................... 1 Research Objective and Scope ........................................................................ 3 Research Approach ..................................................................................... 4 Outline .................................................................................................. 6 CHAPTER TWO Mobile Surveillance Programs in COVID-19 Response ...................................... 7 Symptom Tracking ....................................................................................11 Movement and Population Density Maps .........................................................14 Contact Tracing .......................................................................................17 Quarantine Enforcement .............................................................................21 Health and Immunity Passes ....................................................................... 23 CHAPTER THREE Privacy Scoring for Mobile Surveillance Programs .......................................... 27 Overview of the Right to Privacy ................................................................. 27 Privacy Scorecards ....................................................................................31 Conclusion ........................................................................................... 44 CHAPTER FOUR Recommendations ...................................................................................45 Federal Government ..................................................................................45 State and Local Government ....................................................................... 50 Mobile Phone Users ...................................................................................51 v vi Data Privacy During Pandemics APPENDIXES A. Privacy Scoring Methodology .................................................................53 B. Mobile Phone Data Surveillance Program Scorecards ....................................63 References ........................................................................................... 121 Figures 2.1. Examples of Mobile Surveillance Programs Worldwide ............................. 9 3.1. Overview of Mobile Phone Program Privacy Scores ................................41 3.2. Overall Scoring of the Privacy Criteria ............................................... 43 vii Tables S.1. Public Health Objectives and Pre-COVID-19 Examples ...........................xii S.2. Program Tools, Examples, and Usability Considerations ..........................xiii S.3. Key Privacy Criteria and Questions ...................................................xv S.4. Summary of Recommendations ...................................................... xvi 2.1. Mobile Surveillance Program Objectives, Definitions, and Pre-COVID-19 Examples .................................................................................. 8 2.2. Summary of Mobile Surveillance Objectives and Examples .......................11 3.1. Privacy Scorecard Criteria and Questions ........................................... 34 3.2. Scored Programs by Category and Country ......................................... 40 4.1. Summary of Recommendations ...................................................... 46 A.1. Privacy Scoring Overview ............................................................. 54 B.1. Programs with the Most Fully and Most Not Satisfied Criteria ...................63 B.2. Privacy Criteria with Most Satisfied and Not Satisfied Scores .................... 64 B.3. Iran: AC19 COVID Detection App ...................................................65 B.4. Brazil: Coronavírus—SUS App ....................................................... 66 B.5. Mexico: COVID-19MX App ..........................................................67 B.6. United States: Apple COVID-19 Screening Tool ................................... 68 B.7. United States: Project Baseline COVID-19 Testing Program by Verily ...........69 B.8. United States: COVID Near You App ................................................70 B.9. United States: Facebook Data for Good App ........................................72 B.10. United States: K-Health Telemedicine App ..........................................74 B.11. United States: Kinsa App and U.S. Health Weather Map ..........................76 B.12. United Kingdom: COVID Symptom Tracker App .................................78 B.13. Taiwan: LINE Chatbot .................................................................79 B.14. Latin America: Coronavirus Impact Dashboard .....................................81 B.15. United States: Apple Mobility Trends Reports .......................................82 B.16. United States: Carnegie Mellon University COVIDcast .......................... 84 B.17.
Recommended publications
  • T H E N E T D E L U S Io N E V G E N Y M O R O Zo V
    2/C PMS (BLACK + 809) SOFT-TOUCH MATTE LAMINATION + SPOT GLOSS THE NET DELUSION EVGENY MOROZOV POLITICS/TECHNOLOGY $27.95/$35.50 CAN “ Evgeny Morozov is wonderfully knowledgeable about the Internet—he seems “THE REVOLUTION WILL BE TWITTERED!” to have studied every use of it, or every political use, in every country in the declared journalist Andrew Sullivan after world (and to have read all the posts). And he is wonderfully sophisticated and protests erupted in Iran in June 2009. Yet for tough-minded about politics. This is a rare combination, and it makes for a all the talk about the democratizing power powerful argument against the latest versions of technological romanticism. of the Internet, regimes in Iran and China His book should be required reading for every political activist who hopes to are as stable and repressive as ever. In fact, ALEXANDER KRSTEVSKI ALEXANDER change the world on the Internet.” —MICHAEL WALZER, Institute for authoritarian governments are effectively Advanced Study, Princeton using the Internet to suppress free speech, EVGENY MOROZOV hone their surveillance techniques, dissem- is a contributing editor to Foreign Policy “ Evgeny Morozov has produced a rich survey of recent history that reminds us inate cutting-edge propaganda, and pacify and Boston Review and a Schwartz Fellow that everybody wants connectivity but also varying degrees of control over their populations with digital entertain- at the New American Foundation. Morozov content, and that connectivity on its own is a very poor predictor of political ment. Could the recent Western obsession is currently also a visiting scholar at Stan- pluralism...
    [Show full text]
  • Identity Theft Literature Review
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Privacy on the Internet: the Vole Ving Legal Landscape Debra A
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara High Technology Law Journal Volume 16 | Issue 2 Article 10 January 2000 Privacy on the Internet: The volE ving Legal Landscape Debra A. Valentine Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Debra A. Valentine, Privacy on the Internet: The Evolving Legal Landscape , 16 Santa Clara High Tech. L.J. 401 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol16/iss2/10 This Symposium is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. PRIVACY ON THE INTERNET: THE EVOLVING LEGAL LANDSCAPE Prepared Remarks of Debra A. Valentinet TABLE OF CONTENTS I. Introduction ................................................................................ 401 II. Privacy on the Internet-The Evolving Legal Landscape ............. 403 A. Federal Trade Commission Act and Informational Privacy ........... 404 B. Other Federal Statutes and Informational Privacy ......................... 408 C. Federal Intemet-Law ................................................................... 410 III. Current Federal Policy on Internet Privacy .................................. 412 IV. The U.S. Approach
    [Show full text]
  • Data, AI Governance, and COVID -19: Medium and Long-Term Perspectives for Asia
    September, 2020 Data, AI Governance, and COVID -19: Medium and Long-Term Perspectives for Asia CHINA Yi Zeng Kang Sun Enmeng Lu Chinese Academy of Sciences Chinese Academy of Sciences Chinese Academy of Sciences SOUTH KOREA Sangchul Park Yong Lim Seoul National University Seoul National University SINGAPORE Mark Findlay Singapore Management University JAPAN Arisa Ema The University of Tokyo Table of Contents Foreword 03 CHINA 06 Ethics and Governance Perspectives to Fight Against Catastrophic Risks: From COVID-19 to Long-term Safety Issues of Artificial General Intelligence 1. AI Ethics, Governance and Practices in Fighting Against COVID-19 06 2. The use of AI to Fight Against COVID-19: Technical advancements, Ethical Risks, and Governance 06 2-1 Overview of AI usage to COVID-19 06 2-2 Health code system 08 2-3 Social, Ethical, and Legal concerns, and responses to Data Governance 09 2-4 Privacy Protection for Public Health Management 10 3. Yet Another Potential Catastrophic Risk: Long-term Safety Issues of Artificial General Intelligence 11 SOUTH KOREA 14 Harnessing technology to tackle COVID-19: Lessons from Korea 1. Korea Responds to COVID-19 14 2. The Role of Technology in Korea’s Response to COVID-19 14 2-1 GPS Tracking for Quarantine Measures 14 2-2 Automated Contact Tracing 15 2-3 Public Disclosure of the Routes of Confirmed Cases 17 3. Tech Governance Issues in the COVID-19 Era 17 3-1 Technology Enabled Centralized Contact Tracing 17 3-2 Public Disclosure of the Route of Confirmed Cases 19 4. Looking Ahead 21 01 Table of Contents SINGPORE 23 Singapore and COVID-19 control – a tale of 2 cities? 1.
    [Show full text]
  • Identity Theft Harms Millions of Americans Every Year. Breaches of Personally Identifiable Information (PII) Across the Governme
    Safeguarding & Handling PI1 Each DOE employee and contractor needs to be aware of their responsibility to- b Encrypt personal information sent via email b protect personal information, b Label Privacy Act protected records "OFFICIAL USE ONLY - PRIVACY ACT b avoid unauthorized disclosures, DATA" b ensure that no records are maintained without Identity theft harms millions of Americans every b Do not collect personal information without proper public notice in the Federal Register, and year. Breaches of personally identifiable information proper authority, and only the minimum (PII) across the government have been well b report immediately, whether confirmed or necessary for carrying out the mission of DOE publicized and costly for individuals and Federal suspected, any breach or misuse of PII. agencies. These breaches have prompted the b Do not place Privacy Act protected data on Administration and Congress to take action to unrestricted shared drives, intranets, or the improve the protection of personal information. Internet For more information on Privacy and protecting PII, refer to DOE Order 206. I, Department of Energy b Report any loss or unauthorized disclosure of As Department of Energy employees and Privacy Program, located on the DOE Directives personal data immediately to your supervisor, contractors, you have a responsibility to protect all website: http://directives.doe.gov/ PII. DOE Order 206. I, Department of Energy Privacy program manager, Information System Security Program, defines PI1 as "any information collected or Manager, or Privacy Act Officer Questions should be referred to your supervisor, your local Privacy Act Officer, or the Privacy Office maintained by the Department about an individual, b Lock your computer whenever you leave your including but not limited to, education, financial at (202) 586-5955.
    [Show full text]
  • Bcpct]Ttsbc^Prc U^A Dq[XRV^^S
    6 < %()(=#%% 53%7==,>3='$()6(=#%% (#-'>3='$()6(=#%% $'()"*$+&,- %( !"# $$%& 2(*3-% (566)(37)% 3 0 4 $5 3 $1 2 0 .8 9 8 ++0 0 .:; . !" . / 01 $ %'( $) '# *' it for the last eight to nine notable achievements to its months, “where is the UN in name in the 75 years of its aking a strong case for a this joint fight. Where is the experience, including the pre- Msignificant role for India effective response.” vention of a third world war, in the United Nations, Prime Focussing on a more “we can’t deny terrorist attacks 0 Minister Narendra Modi on prominent role for India in the shook the world”. Saturday stressed the need for UN and fight against corona, “We have successfully ne of the oldest partners changes in the international the Prime Minister avoided avoided a third world war but Oof the BJP — the body and questioned its posi- making any reference to ongo- we cannot deny many wars Shiromani Akali Dal — which tion in fighting the coron- ing tension at the Line of happened, many civil wars has been with it through thick avirus pandemic. Actual Control (LAC) and happened. Terrorist attack and thin for decades, finally He also assured the global frosty ties with Pakistan in his shook the world. Blood was quit the National Democratic Q community that India will pro- 20-minute speech. He also did spilled. Those were killed were Alliance (NDA) on Saturday, vide corona vaccine to the not respond to Pakistan Prime like you and me. Children left signaling a complete political world as it is the world’s biggest Minister Imran Khan’s remarks the world prematurely,” he said.
    [Show full text]
  • The Critical Importance of Expert Statistical Input
    Sent to the Department of the Prime Minister and Cabinet 18 August 2020 A proposal to enhance Australia’s capability to manage epidemics The critical importance of expert statistical input 1 2 Nicholas Fisher and Dennis Trewin Executive summary Given the high level of global mobility, pandemics are likely to be more frequent, and with potentially devastating consequences for the Australian community and its way of life. Whilst parts of Australia are experiencing a second wave of COVID-19, the country is in relatively better shape than most others. The number of people who have died or been seriously ill as a consequence of the virus, whilst tragically high, is nonetheless comparable with most of the best-performing countries. That said, we believe there is a critical need for strategic statistical oversight of the whole process of anticipating, managing and learning from the current pandemic to improve the quantitative information and advice provided to policy makers. This proposal outlines quantitative aspects of a plan to enable Australia to deal more efficiently and effectively with future such events, thus enhancing both the social and the economic welfare of its people. Indeed, expeditious action may well assist materially in managing possible future waves of the current pandemic, and its aftermath. A dispassionate assessment of Australia’s health and economic response to the pandemic over the last six months reveals some very significant inadequacies in the data, statistical analysis and interpretation used to guide Australia’s preparations and actions. Data to answer some of the most basic of questions about prevalence in population have not been available and remain unavailable.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Crime Fiction
    └ Index CRIME FICTION Please note that a fund for the promotion of Icelandic literature operates under the auspices of the Icelandic Ministry Forlagid of Education and Culture and subsidizes translations of literature. Rights For further information please write to: Icelandic Literature Center Hverfisgata 54 | 101 Reykjavik Agency Iceland Phone +354 552 8500 [email protected] | www.islit.is crime fiction · 1 · CRIME FICTION crime fiction UA MATTHIASDOTTIR [email protected] VALGERDUR BENEDIKTSDOTTIR [email protected] · 3 · CRIME FICTION crime Arnaldur Indridason Arni Thorarinsson fiction Oskar Hrafn Thorvaldsson Ottar M. Nordfjord Solveig Palsdottir Stella Blomkvist Viktor A. Ingolfsson rights-agency · 3 · └ Index CRIME FICTION ARNALDUR INDRIDASON (b.1961) has the rare distinction of having won the Nordic Crime Novel Prize two years running. He is also the winner of the highly respected and world famous CWA Gold Dagger Award for the top crime novel of the year in the English language, Silence of the Grave. Indridason’s novels have sold over ten million copies worldwide, in 40 languages. Oblivion Kamp Knox, crime novel, 2014 On the Reykjanes peninsula in 1979, a body is “One of the most compelling found floating in a lagoon created by a geother- detectives anyone has mal power station. The deceased seems to be linked with the nearby American military base, written anywhere.” but authorities there have little interest in work- CRIME TIME, UK ing with the Icelandic police. While Erlendur and Marion Briem pursue their leads, Erlendur has his mind on something else as well: a young girl Sold to: who disappeared without a trace around one of UK/Australia/New Zealand/South Africa (Random House/Harvill Secker); USA/Philippines Reykjavik’s most notorious neighbourhoods, a (St.
    [Show full text]
  • Overview of Aarogya Setu Application Shweta Devidas Kedare1
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 06 | June 2020 www.irjet.net p-ISSN: 2395-0072 Overview of Aarogya Setu Application Shweta Devidas Kedare1 1Shweta Devidas Kedare, Department of Master of Computer Application, ASM IMCOST, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The app - Aarogya Setu, which means "bridge to health" in Sanskrit -It is an Indian app which was launched on April 2nd 2020, by Indian government. It is designed as a Coronavirus, or COVID-19 contact tracing app that uses the Bluetooth and location technology in phones to note when you are near another user who also uses the Aarogya Setu app. In case someone you have come in close proximity to is confirmed infected, you are alerted. The app alerts are produced by instructions on how to self-isolate and what to do in case you develop symptoms. Basically this app gives basic information about Covid-19, including hygiene and social distancing protocols. It also has details of how one could donate to the prime minister’s coronavirus-specific relief fund, PM-Cares. India has made it mandatory for government and private sector employees to download it But users and experts in India and around the world say the app raises huge data security concerns. KeyWords: security, data, private, information, COVID-19, technology, location, bluetooth, proximity, etc. 1. INTRODUCTION Since the risk of COVID-19 started increasing in India so, The government of India decided to launch the application, name Aarogya Setu, which was intended to monitor the ratio of COVID-19 patients in India .This app is an updated version of an earlier app called Corona Kavach (now discontinued) which was released earlier by the Government of India.
    [Show full text]
  • Enlisting Big Data in the Fight Against Coronavirus
    Enlisting Big Data in the Fight Against Coronavirus Testimony of Graham Dufault Senior Director for Public Policy ACT | The App Association Before the U.S. Senate Committee on Commerce, Science, and Transportation 1401 K Street NW Suite 501 202.331.2130 @ACTonline Washington, DC 20005 www. ACTonline.org /ACTonline.org I. I n t r o d u c t i o n We thank the Senate Committee on Commerce, Science, and Transportation for holding this paper hearing on how governments, the private sector, and other stakeholders are leveraging big data to combat the novel coronavirus, which causes COVID-19. ACT | The App Association is the voice of small business tech entrepreneurs, and we appreciate the Committee welcoming us to share the experiences and perspectives of our member companies in combating and slowing the spread of this deadly disease. As of the time we submitted this written testimony, global deaths due to COVID-19 reached 76,507 with 1.37 million global confirmed cases.1 And these numbers are sure to rise in the subsequent hours and days. The rapidly evolving threat to human life COVID-19 presents demands swift and effective responses by stakeholders across the globe, including the use of big data tactics. The App Association is a trade group representing about 5,000 small to mid-sized software and connected device companies across the globe. In the United States, our member companies are part of a $1.7 trillion industry, supporting about 5.9 million jobs. They are on the front lines in the fight against COVID-19.
    [Show full text]
  • Monica Ros School Back to School Plan
    Monica Ros School Back to School Plan We can’t wait to be back together again on campus with our students! Please find a description of protocols, procedures, and policies that will be in place for the 2020-21 School Year to help guide all of us through the reopening of school. We will continually be implementing new practices designed to keep everyone as safe as possible. Our goal is to return to school safely, stay in small groups, and have in place remote learning plans for our school-age students who are sick, isolating, or in quarantine. Please make sure you and your student(s) understand and are willing to follow these safety protocols. Changes may occur if we receive additional guidance from federal, state and local authorities. UPDATE: Friday, July 17, 2020: Per the California Department of Public Health, and as ​ ​ communicated via California Governor Gavin Newsom, schools may only open for in-person instruction if they are located in a county that has not been on the state's "watchlist" within the prior 14 days. Ventura County is one of the California counties that are on the state's COVID watchlist currently. Monica Ros School is watching Ventura County's status and exploring the feasibility of a waiver which can be issued to an elementary school by a local health officer when certain criteria are met. Local community epidemiological data for Ojai is unique from other municipalities in Ventura County, and Monica Ros School has demonstrated our ability to meet all guidelines presented by Cal OSHA and CDPH for schools.
    [Show full text]