首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 754 毫秒
1.
美国联邦最高法院从1957年开始掀起审查色情案件的高潮,形成了一系列先例,确立了"硬核色情物品"和"儿童色情物品"不受宪法第一修正案保护的原则.但是美国社会,尤其是联邦最高法院的大法官们对色情物品的危害、淫秽物品的标准以及色情物品受不受宪法第一修正案的保护等问题一直争论不休,导致色情物品泛滥成灾.  相似文献   

2.
The Criminal Justice and Immigration Act 2008 criminalizes the possession of extreme pornography, namely, images of bestiality, necrophilia, and life-threatening or serious violence, and is the immediate context for this article which seeks to present a pragmatic liberal humanist critique of pornography regulation. Such a critique, derived in particular from the writings of Nussbaum and Rorty, presents an alternative case for regulation, eschewing the visceral competing fundamentalisms which characterized the 'porn wars' of the 1980s and 1990s. Whilst moral and epistemological philosophers squabble with radical feminists and radical libertarians, extreme pornography can nurture real injustice and ruin real lives. A pragmatic liberal humanism demands a pragmatic response to extreme pornography. The first part of this article will revisit the longer history of the 'porn wars'; the second describes the parameters of a pragmatic liberal humanist critique; the third examines the shorter history of pornography regulation written into the provisions now enacted in the 2008 Act.  相似文献   

3.
The meaning of “ownership” under the Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) is not as straightforward as most people believe. Although liability under section 107(a)(1) is imposed upon a current “owner” or operator of a facility, CERCLA provides little guidance because it defines “owner” as “any person owning” a facility. In most cases, the issue of who owns the property or a facility is readily apparent and not controversial; however, this article discusses cases in which courts have been compelled to critically examine the specific facts of the case and state law to determine whether a particular party is an “owner” for purposes of establishing liability under CERCLA.  相似文献   

4.
On April 20, 2010, an explosion occurred on the Deepwater Horizon offshore drilling unit resulting in the death of eleven workers, and subsequently a continuous and uncontrolled release of crude oil and natural gas from the wellhead for a total of eighty-six days. The Oil Pollution Act of 1990 (OPA) provides a comprehensive liability and compensation scheme by creating strict liability for the responsible party of a vessel or facility from which the oil was released subject to statutory limitations, and very limited applicable defenses. The owner of the Deepwater Horizon and the operator of the Macondo well were designated responsible parties under OPA subjecting them to liability for removal costs and damages. In addition, the Clean Water Act imposes civil and administrative fines on a per-day-per-barrel basis without limitation. Other federal statutes which are used to impose criminal liability are the Migratory Bird Treaty Act, the Endangered Species Act, and the River and Harbors Act of 1899.  相似文献   

5.
网络民意介入刑事司法的合理性值得质疑。网络民意和刑事司法在刑事个案中的博弈时有发生。网络民意的主观性、非理性和不确定性同刑事司法的客观性、专业性和可预期性相抵触。网络民意介入刑事司法有违无罪推定原则和罪刑法定原则。最后,网络民意作为行使言论自由的一种方式,不得触及司法正义的底线。  相似文献   

6.
秦总根 《政法学刊》2007,24(5):115-119
网络在为人们提供方便和便捷的同时,也给网络犯罪提供了一个低成本、高效率的作案平台,利用网络实施的网络犯罪已涉及绝大部分社会犯罪现象,给互联网安全和社会稳定带来了很大冲击,成为了一个不容忽视的社会问题。应该弄清当前网络犯罪的特点、原因,公安机关提高侦查、打击网络犯罪的能力,以有效遏制网络犯罪,使互联网能更好的服务大众、服务社会发展。  相似文献   

7.
Wilson  Glen 《Trusts & Trustees》2008,14(1):8-11
The months of April and May 2007 have seen the enactment oftwo new pieces of legislation and one set of regulations. InJune 2007 the Regulations governing the Trust (Amendment) Act2007 and the International Financial Services Commission (Amendment)Act 2007 were passed. ‘The Trust and Company Services Providers (Best Practices)Regulations 2007’ were published in the Belize Gazetteon 7 April and came into force on 16 April. ‘The Trusts (Amendment) Act 2007’ and ‘TheInternational Financial Services Commission (Amendment) Act2007’ were signed on 30 May and were both published inthe Belize Gazette on 2 June. The regulations for these two, ‘The International TrustsRegulations 2007’ and ‘International Financial ServicesCommission (Licensing) Regulations 2007’ were enactedon  相似文献   

8.
Abstract

Cyber technology, both explicitly and implicitly, impacts every facet of local, state, national and international criminal justice operations. Unfortunately, technological changes, including cyber technologies, are rarely well thought out and may have unintended negative consequences. Additionally technology, and particularly cyber technology, evolves at a much faster pace than our understanding of the ethics, laws and policies involved. Consequently, citizens, criminals and justice professionals often rely on technology without the benefit of legal protections or explicit agency policy. This paper will examine how technology, both historically (non cyber) and contemporarily (cyber), has positively and negatively affected one aspect of the Criminal Justice enterprise – law enforcement.  相似文献   

9.
The present legal framework in India fails to keep in pace with the inexorable advancement of the online world. Technological advancement is inevitably faster in comparison to the response of the legal framework, but the latter needs to continuously review and adapt itself in order to provide a suitable regulatory regime. In India, the Information Technology Act 2000 is the product of such review and seeks to provide a modernized regulatory framework for e-commerce with necessary safeguards. However, there are certain loose ends that have not been adequately dealt with by the Act. The contention is that, in the present era of information and communications technology, domain names have become valuable business assets and a Trade mark in the internet world. Despite the amendment to the Information Technology Act 2000, these changes have been silent on the issue of cyber-squatting. The Judiciary has been trying to tackle this issue in the light of the Trade marks Act 1999 but this approach fails to address certain issues. This paper will highlight the issues that need attention at this time and the further legislative action that is required.  相似文献   

10.
Under the authority granted to the National Coordinator for Health Information Technology by section 3001(c)(5) of the Public Health Service Act (PHSA) as added by the Health Information Technology for Economic and Clinical Health (HITECH) Act, this final rule establishes a process for addressing instances where the ONC-Approved Accreditor (ONC-AA) engages in improper conduct or does not perform its responsibilities under the permanent certification program. This rule also addresses the status of ONC-Authorized Certification Bodies (ONC-ACBs) in instances where there may be a change in the accreditation organization serving as the ONC-AA and clarifies the responsibilities of the new ONC-AA.  相似文献   

11.
The lack of a First Amendment prohibition against administrative interference with the student press leaves a private university open to legal liability from the content of student publications through the doctrine of vicarious liability. To insulate a private university from such a lawsuit, commentators have encouraged the adoption of formal policy statements that give student journalists the right to make all content decisions. But given the trend in vicarious liability law, such policy statements are unlikely to protect a private university from liability for torts committed by its dependent student press. Instead, decisions of the Supreme Court of the United States suggest, and this article argues, that the adoption of policies and procedures designed to prevent and correct foreseeable misconduct associated with the dissemination of student-produced content will help protect a private university from vicarious liability arising from the operation of its student press.  相似文献   

12.
In the last decade, law enforcement personnel have increasingly been tasked to police the internet in an effort to staunch the production and distribution of child pornography and to investigate computer-facilitated child exploitation. These investigative personnel have encountered a range of assignment-specific challenges and strains as a result of their involvement in this taxing and novel investigative activity. In some cases, the cumulative effects of these strains, together with repeated exposure to highly disturbing images of abused children, have resulted in stress reactions that have commanded the attention of police managers and police psychologists alike. The present article is intended to provide an overview of the stresses unique to child exploitation and pornography investigations, common reactions to these stressors, procedural safeguards to mitigate the impact of this high-risk assignment, and two model programs designed to meet the needs of the current generation of “cyber cops”.
Meredith KrauseEmail:
  相似文献   

13.
论网络侵权中的通知规则   总被引:2,自引:0,他引:2  
网络侵权是发生在互联网这一特殊平台上的新型侵权形态,其具有侵权主体匿名性、传播快捷性、影响广泛性和不可逆转性、造成后果严重性等特征。网络侵权通常都涉及直接侵权人和网络服务提供者,而网络服务提供者与侵权行为实施者在主观心态、损害预防能力和效果上都存在重大差异,网络侵权责任承担区别于一般侵权。通知规则作为网络侵权中的一般规则决定了网络服务提供者承担责任的界限,明确通知规则的产生、发展与责任特征以及与此相关的反通知规则及其效力,对于理解网络服务提供者违反通知规则的责任具有重要意义。  相似文献   

14.
股权出资问题研究   总被引:7,自引:0,他引:7  
周友苏  沈柯 《现代法学》2005,27(1):51-56
《公司法修改草案》将股权纳入出资形式当中,这一做法是值得商榷的。在公司法上,可以作为出资标的物应当符合两项标准:具有确定的价值和可以自由转让。股权作为一项综合性的权利,在不同的公司类型中体现出不同的特征。只有上市公司的流通股和非上市公司的社会公众股能够作为出资标的,而有限责任公司和发起设立的股份有限公司的股权则不宜作为出资标的。并且,《公司法》在承认部分股权可以作为出资的同时,也应当增设相应的救济措施,以弥补股权出资所可能带来的负面影响。  相似文献   

15.
The Riot (Damages) Act 1886 imposes a no‐fault obligation on police forces to compensate owners of property damaged in rioting. Following the riots across England in 2011 an independent Home Office review, the Kinghan Report, concluded that the fundamental principle of the Act should be retained, while the machinery should be modernised. The Report conceives of the Act as a useful, if highly unusual, compensation scheme that may ease socio‐economic problems in riot‐prone areas. This article questions that position. Strict liability offers potential advantages in contentious claims against public authorities, providing an incentive for the police to perform their duty to keep the peace while averting the questioning of police decision‐making that claims in negligence would inevitably require. The best alternative to negligence liability might not be ‘no liability’ (the general position now at common law), or liability based on ‘serious fault’ (as the Law Commission proposed in 2008), but liability without fault.  相似文献   

16.
Cyber attackers are rarely held accountable for their criminal actions. One explanation for the lack of successful prosecutions of cyber intruders is the dependence on digital evidence. Digital evidence is different from evidence created, stored, transferred and reproduced from a non-digital format. It is ephemeral in nature and susceptible to manipulation. These characteristics of digital evidence raise issues as to its reliability. Network-based evidence – ie digital evidence on networks – poses additional problems because it is volatile, has a short life span, and is frequently located in foreign countries. Investigators face the twin obstacles of identifying the author of a cyber attack and proving that the author has “guilty knowledge.” Even more is at stake when the cyber attacker is a trusted insider who has intimate knowledge of the computer security system of the organisation. As courts become more familiar with the vulnerabilities of digital evidence, they will scrutinise the reliability of computer systems and processes. It is likely that defence counsel will increasingly challenge both the admissibility and the weight of digital evidence. The law enforcement community will need to improve competencies in handling digital evidence if it is to meet this trend.  相似文献   

17.
In 2008, the Victorian Parliament enacted the Abortion Law Reform Act 2008 (Vic) and amended the Crimes Act 1958 (Vic) to decriminalise terminations of pregnancy while making it a criminal offence for unqualified persons to carry out such procedures. The reform legislation has imposed a civil regulatory regime on the management of abortions, and has stipulated particular statutory duties of care for registered qualified health care practitioners who have conscientious objections to terminations of pregnancy. The background to, and the structure of, this novel statutory regime is examined, with a focus on conscientious objection clauses and liability in the tort of negligence and the tort of breach of statutory duty.  相似文献   

18.
Cyber attacks continue to increase in frequency and variety, making cyber malfeasance a rising area of study and a major policy issue. Categorizing cyber attackers aids targeted organizations in efficiently directing resources to enhance security. However, extant hacker typologies do not fully account for the multifaceted nature of cyber malfeasance, including the rise in socially and ideologically motivated hacking (e.g. crowdsourcing, hacktivism). I clarify the current state of the field by uniting recent case studies on hackers with existing categorization techniques. Previous researchers have employed circumplex models—visualizations which depict relationships and boundaries between groups—as a way to organize hacker types. I propose an updated model—a weighted arc circumplex model—that is designed to represent the multidimensional nature of contemporary hacker types by offering a means of visually representing multiple motivations simultaneously. Finally, I demonstrate how archetypical circumplex models can be wed with sociograms to depict social and technical relationships between hacker groups.  相似文献   

19.
China??s Internet development has experienced an explosive growth in the last two decades. As China became the largest Internet user in the world, cyber crimes presented a new challenge. In its efforts to combat cyber crimes, the Chinese government singled out online pornography and labeled it ??online narcotics.?? Using the reports of online pornography found in the People??s Daily, a leading national newspaper, this study examines the extent and nature of online pornography in China??s unique context and how the Chinese government has worked to counter such crimes. The analyses of the official reports indicate that the number of China??s porn users has reached millions and continues to grow. To combat such behavior, the Chinese government has adopted a number of countermeasures such as increased law-making, strengthened law enforcement, and the use of new technology. While these countermeasures parallel those of other nations, China??s regulation also presents a number of unique features, such as its broad and sweeping control of online pornographic and unhealthy material for both adults and juveniles, its campaign-style policing, and its emphasis on building consensus with little dissenting opinion. China??s overreaching and proactive approach indicates substantial differences in national standards, value systems, and legal practices between China and many other nations.  相似文献   

20.
The advent of new technologies allowing people to communicate via the Internet has opened many windows to social interaction. At the same time, it has shifted the focus of child harassment from the playground to the computer. Instead of face‐to‐face bullying, children are now being bullied on the Internet, in a phenomenon known as “cyberbullying.” Cyberbullying is widespread, affecting generally twenty‐five percent of the child population in the United States. It is also more dangerous, as a child can be bullied at any time in the supposed comfort of his/her own home. To combat this behavior, many states have passed measures to ban or criminalize cyberbullying in school‐related settings. Nevertheless, children and adolescents continue to cyberbully their peers. Furthermore, most of these statutes do not address cyberbullying that occurs outside school or from a child's own home. Thus, this Note proposes that cyberbullying can be better combated by placing responsibility on parents to reasonably control their children in cases of cyberbullying. Based on the recently enacted ‘Cyber‐safety Act” from the Canadian Province of Nova Scotia and Restatement of Torts § 316, this Note proposes (1) placing tort responsibility on parents who know that their child is a cyberbully and do nothing about it and (2) allowing parents to avoid liability when their child truly cannot be controlled.
    Key Points for the Family Court Community
  • Cyberbullying is a major problem that must be addressed beyond the schoolyard.
  • The law may provide recourse for the parents of a cyberbullying victim and can hold the parents of a cyberbully responsible.
  • The Nova Scotia Cyber‐safety Act is a good model for holding parents liable for their child's acts because it balances the desire to end cyberbullying and the understanding that some minors are uncontrollable.
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号