SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Special Meeting on
Procedures for Information
Exchange

        November 2, 2004
            Geneva

         Anne Meininger
          United States
     WTO TBT Enquiry Point
U.S.
WTO TBT Enquiry Point
    National Center for Standards and


    Certification Information (NCSCI)
    National Institute of Standards and


    Technology (NIST)
    U.S. Department of Commerce


    (DOC)

                                          2
Prior to Notification
     in the U.S.

  U.S. Regulations


 U.S. Federal Register

 Electronic Tools




                            3
U.S. Regulations

  Federal regulatory agencies


 Interested parties

 Administrative Procedures Act




                                  4
“Notice and Comment”
  Notice


 Comment

 Regulation (Final Rule)




                            5
“Notice and Comment”
1. A notice is issued.
      Definitions
  


      Cost to benefit analysis
  


      Risk assessment
  


      Impact statements
  


      Contacts
  


                                 6
“Notice and Comment”
2. Comments are accepted.
      No restrictions
  

      Domestic and foreign
  

      Equal consideration
  

      Full consideration to substantive
  

      comments.
      Impact the final regulation
  




                                          7
“Notice and Comment”
3. A Final Rule is issued.
      Comments are addressed
  


      Basis and purpose
  


      Justification
  


      Time
  


      Codification into law
  


                               8
U.S. Federal Register
    One source for “Notice and


    Comment”
      Legal text
    

     Newspaper format

     Published every business day

     Paper, microfiche, electronic

      formats                         9
10
11
12
13
Electronic Tools

    RegAlert


        Regulations in 50 U.S.
    

        states


                                 14
Thank you.
U.S. WTO TBT Enquiry Point
National Center for Standards and
  Certification Information (NCSCI)
     100 Bureau Drive
     Gaithersburg, MD 20899-2160
     E-mail: ncsci@nist.gov
     Telephone: 301-975-4040
                                      15

Mais conteúdo relacionado

Destaque

W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?
W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?
W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?Wojciech Walczak
 
Interactive Data Works Smarter, Not Harder with Intelligent Agents Presentation
Interactive Data Works Smarter, Not Harder with Intelligent Agents PresentationInteractive Data Works Smarter, Not Harder with Intelligent Agents Presentation
Interactive Data Works Smarter, Not Harder with Intelligent Agents Presentationg s
 
life at google
life at googlelife at google
life at googleg s
 
Jerusalem-edited
Jerusalem-editedJerusalem-edited
Jerusalem-editedCEBowen94
 
Shahzad Resume
Shahzad ResumeShahzad Resume
Shahzad Resumeshahzadhk
 
Winning with Big Data: Secrets of the Successful Data Scientist
Winning with Big Data: Secrets of the Successful Data ScientistWinning with Big Data: Secrets of the Successful Data Scientist
Winning with Big Data: Secrets of the Successful Data ScientistDataspora
 
Winning With Big Data: Secrets of the Successful Data Scientist
Winning With Big Data:  Secrets of the Successful Data ScientistWinning With Big Data:  Secrets of the Successful Data Scientist
Winning With Big Data: Secrets of the Successful Data ScientistDataspora
 
Driscoll bi sig_15_jun2010
Driscoll bi sig_15_jun2010Driscoll bi sig_15_jun2010
Driscoll bi sig_15_jun2010Dataspora
 
A Survey Of R Graphics
A Survey Of R GraphicsA Survey Of R Graphics
A Survey Of R GraphicsDataspora
 
Fotos de Minnie Mouse
Fotos de Minnie MouseFotos de Minnie Mouse
Fotos de Minnie Mousealii91
 
Animations
AnimationsAnimations
Animationsg s
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Aviva Spectrum™
 
Revenue Recognition Webinar-May 19th, 2015
Revenue Recognition Webinar-May 19th, 2015Revenue Recognition Webinar-May 19th, 2015
Revenue Recognition Webinar-May 19th, 2015Aviva Spectrum™
 
Social Network Analysis for Telecoms
Social Network Analysis for TelecomsSocial Network Analysis for Telecoms
Social Network Analysis for TelecomsDataspora
 
An Interactive Introduction To R (Programming Language For Statistics)
An Interactive Introduction To R (Programming Language For Statistics)An Interactive Introduction To R (Programming Language For Statistics)
An Interactive Introduction To R (Programming Language For Statistics)Dataspora
 

Destaque (16)

W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?
W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?
W sieci społecznej nic się nie ukryje. Jak wypełniać luki w danych z Facebooka?
 
Interactive Data Works Smarter, Not Harder with Intelligent Agents Presentation
Interactive Data Works Smarter, Not Harder with Intelligent Agents PresentationInteractive Data Works Smarter, Not Harder with Intelligent Agents Presentation
Interactive Data Works Smarter, Not Harder with Intelligent Agents Presentation
 
life at google
life at googlelife at google
life at google
 
Jerusalem-edited
Jerusalem-editedJerusalem-edited
Jerusalem-edited
 
Shahzad Resume
Shahzad ResumeShahzad Resume
Shahzad Resume
 
Alda Paula Cv
Alda Paula CvAlda Paula Cv
Alda Paula Cv
 
Winning with Big Data: Secrets of the Successful Data Scientist
Winning with Big Data: Secrets of the Successful Data ScientistWinning with Big Data: Secrets of the Successful Data Scientist
Winning with Big Data: Secrets of the Successful Data Scientist
 
Winning With Big Data: Secrets of the Successful Data Scientist
Winning With Big Data:  Secrets of the Successful Data ScientistWinning With Big Data:  Secrets of the Successful Data Scientist
Winning With Big Data: Secrets of the Successful Data Scientist
 
Driscoll bi sig_15_jun2010
Driscoll bi sig_15_jun2010Driscoll bi sig_15_jun2010
Driscoll bi sig_15_jun2010
 
A Survey Of R Graphics
A Survey Of R GraphicsA Survey Of R Graphics
A Survey Of R Graphics
 
Fotos de Minnie Mouse
Fotos de Minnie MouseFotos de Minnie Mouse
Fotos de Minnie Mouse
 
Animations
AnimationsAnimations
Animations
 
Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach Cyber Security: User Access Pitfalls, A Case Study Approach
Cyber Security: User Access Pitfalls, A Case Study Approach
 
Revenue Recognition Webinar-May 19th, 2015
Revenue Recognition Webinar-May 19th, 2015Revenue Recognition Webinar-May 19th, 2015
Revenue Recognition Webinar-May 19th, 2015
 
Social Network Analysis for Telecoms
Social Network Analysis for TelecomsSocial Network Analysis for Telecoms
Social Network Analysis for Telecoms
 
An Interactive Introduction To R (Programming Language For Statistics)
An Interactive Introduction To R (Programming Language For Statistics)An Interactive Introduction To R (Programming Language For Statistics)
An Interactive Introduction To R (Programming Language For Statistics)
 

Semelhante a Anne Meininger Usa

Semelhante a Anne Meininger Usa (20)

Anne Meininger Usa
Anne Meininger UsaAnne Meininger Usa
Anne Meininger Usa
 
Media Lenguaje %20 Educ Media 0 [1]
Media Lenguaje %20 Educ Media 0 [1]Media Lenguaje %20 Educ Media 0 [1]
Media Lenguaje %20 Educ Media 0 [1]
 
Avispa
AvispaAvispa
Avispa
 
Offshoring von Softwareprojekten
Offshoring von SoftwareprojektenOffshoring von Softwareprojekten
Offshoring von Softwareprojekten
 
Octogon
OctogonOctogon
Octogon
 
Gato
GatoGato
Gato
 
Medeia Informatica Version5 0 [1]
Medeia Informatica Version5 0 [1]Medeia Informatica Version5 0 [1]
Medeia Informatica Version5 0 [1]
 
YDreams Life Presentation
YDreams Life PresentationYDreams Life Presentation
YDreams Life Presentation
 
3cabezas
3cabezas3cabezas
3cabezas
 
Circuitos 2009
Circuitos 2009Circuitos 2009
Circuitos 2009
 
12 Areas de Innovacion al 2025
12 Areas de Innovacion al 202512 Areas de Innovacion al 2025
12 Areas de Innovacion al 2025
 
Animations
AnimationsAnimations
Animations
 
Anne Meininger Usa
Anne Meininger UsaAnne Meininger Usa
Anne Meininger Usa
 
ssds
ssdsssds
ssds
 
Anne Meininger Usa
Anne Meininger UsaAnne Meininger Usa
Anne Meininger Usa
 
Anne
AnneAnne
Anne
 
D:\Testing Files\Anne Meininger Usa
D:\Testing Files\Anne Meininger UsaD:\Testing Files\Anne Meininger Usa
D:\Testing Files\Anne Meininger Usa
 
aaa
aaaaaa
aaa
 
aa
aaaa
aa
 
Anne Meininger Usa
Anne Meininger UsaAnne Meininger Usa
Anne Meininger Usa
 

Último

ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 

Último (20)

ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 

Anne Meininger Usa

  • 1. Special Meeting on Procedures for Information Exchange November 2, 2004 Geneva Anne Meininger United States WTO TBT Enquiry Point
  • 2. U.S. WTO TBT Enquiry Point National Center for Standards and  Certification Information (NCSCI) National Institute of Standards and  Technology (NIST) U.S. Department of Commerce  (DOC) 2
  • 3. Prior to Notification in the U.S. U.S. Regulations   U.S. Federal Register  Electronic Tools 3
  • 4. U.S. Regulations Federal regulatory agencies   Interested parties  Administrative Procedures Act 4
  • 5. “Notice and Comment” Notice   Comment  Regulation (Final Rule) 5
  • 6. “Notice and Comment” 1. A notice is issued. Definitions  Cost to benefit analysis  Risk assessment  Impact statements  Contacts  6
  • 7. “Notice and Comment” 2. Comments are accepted. No restrictions  Domestic and foreign  Equal consideration  Full consideration to substantive  comments. Impact the final regulation  7
  • 8. “Notice and Comment” 3. A Final Rule is issued. Comments are addressed  Basis and purpose  Justification  Time  Codification into law  8
  • 9. U.S. Federal Register One source for “Notice and  Comment” Legal text   Newspaper format  Published every business day  Paper, microfiche, electronic formats 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. Electronic Tools RegAlert  Regulations in 50 U.S.  states 14
  • 15. Thank you. U.S. WTO TBT Enquiry Point National Center for Standards and Certification Information (NCSCI) 100 Bureau Drive Gaithersburg, MD 20899-2160 E-mail: ncsci@nist.gov Telephone: 301-975-4040 15