首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Veni, vidi, wiki     
‘Veni, vidi, vici!’ (‘I came, I saw, I conquered’),Julius Caesar's memorable soundbite from the Battle of Zelain 47 BC, has been for nearly two millennia a byword for thetriumph of the new order over the old. Substitute the homophone‘wiki’ for ‘vici’ and the symbolismremains apt. While the rise of the personal computer, the developmentof the internet and the advent of mobile telephony have eachbeen hailed as the greatest transformative feature  相似文献   

2.
The judgment of the Federal Court of Australia (‘the Court’)in Universal Music is the first judicial pronouncement in Australiaon the legality of website operators who provide hyperlinksto remote websites to allow ‘internauts’ (web users)to download MP3 music files and the liability of internet serviceproviders (ISPs) and their employees for authorizing that infringementunder Australian copyright law.  相似文献   

3.
Some words occur to us in pairs, often to the extent that wefind it difficult to hear the one without recalling the other.Thus ‘Romeo’ suggests ‘Juliet’; ‘Anthony’invokes ‘Cleopatra’; ‘Héloïse’follows ‘Abélard’ and so on. Many furtherexamples exist, particularly in the case of lovers. In intellectual property circles the concepts of ‘author’and ‘royalties’ are also closely linked—buttheir relationship is strained. While the author's love forroyalties is sincere and undiminished  相似文献   

4.
The Australian Government takes the position that it does notowe protection obligations to an asylum seeker who could havesought protection elsewhere. In taking this position it is purportingto invoke the so-called ‘safe third country’ principlewhich has developed out of international practice. This articleexamines Australia's purported applications of the ‘safethird country’ principle and concludes that in some instancesthey represent an attempt to extend that principle beyond whatthe international community presently considers acceptable orever should consider acceptable.  相似文献   

5.
A California federal district court ruled that a video-sharingwebsite was not liable for copyright infringement because itfell within a Digital Millennium Copyright Act (‘DMCA’)safe harbour.  相似文献   

6.
7.
8.
In legal academia it is highly controversial how to ‘beoriginal’ in legal research. This article will try tomaintain an attitude of tolerance in not promoting or discreditingone particular methodology. Instead, it will identify four differentways of ‘being original’. Perhaps the most commonapproach is to deal with ‘micro-legal questions’.Many legal academics also pursue research in ‘macro-legalquestions’. Less common but growing is the importanceof ‘scientific legal research’ and research in ‘non-legaltopics’.  相似文献   

9.
This article describes the author’s plans for and designof his research project upon the Personal Work Contracts inEuropean Comparative Law; it seeks consultation with the readershipabout those plans and that design; and it develops two linkedaspects of the theoretical infrastructure for that project,namely the analysis of the ‘family of personal work contracts’and the analysis of the ‘personal work nexus’. Theanalysis in terms of the ‘family of personal work contracts’asserts the validity and utility of the wide and inclusive notionof the ‘personal work contract’ as a central organisingcategory for individual employment law and of a multi-dimensionalway of viewing and understanding this category as a family ofcontracts within which the contract of employment is of courseimportant but is not an over-dominant paradigm. The analysisin terms of the ‘personal work nexus’ argues thatthe contracts within this ‘family of personal work contracts’may be better understood if they are placed in the explanatoryframework of the ‘personal work nexus’, which isa concept of a yet looser and more comprehensive set of legallinks or connections within which personal work relations maybe cast. Ways are suggested in which these analyses may contributeto the better meeting of the regulatory needs of personal workrelations and in which those analyses might be refined and testedby means of a European comparative methodology.  相似文献   

10.
On 14 October 2005, The Hague District Court sentenced two Afghanasylum seekers for their role and participation in the tortureof civilians during the Afghan War of 1978–1992. The Courtheld in both cases that it had ‘universal jurisdiction’over violations of Common Article 3 of the Geneva Conventionsand that the accused were guilty of ‘torment’ (‘foltering’)and torture as a war crime (‘marteling’). The jurisdictionalbasis relied upon by the Court and the Court's legal reasoningin both cases is open to criticism.  相似文献   

11.
Since the terrorist attacks of 11 September 2001, U.S. immigrationand refugee policy has developed based on narrow and evolvingtheories of ‘national security’. Immigration reformlegislation, federal regulations, and administrative policychanges have been justified in terms of the nation's safety.On 1 March 2003, the U.S. Immigration and Naturalization Service(INS) was folded into the massive new U.S. Department of HomelandSecurity (DHS), formally making immigration a homeland defenseconcern. Counterterror and immigration experts increasingly agree onwhat constitute effective and appropriate immigration policyreforms in light of the terrorist threat. Unfortunately, manyof the post-September 11 policy changes do little to advancepublic safety and violate the rights of refugees and asylumseekers. These include reductions in refugee admissions, thecriminal prosecution of asylum seekers, the blanket detentionof Haitians, and a safe third-country asylum agreement betweenthe United States and Canada. Other measures offend basic rightsand may undermine counterterror efforts. These include ‘preventive’arrests, closed deportation proceedings, and ‘call-in’registration programs. This article reviews post-September 11 U.S. policy developmentsbased on their impact on migrant rights and their efficacy ascounterterror measures. It argues for a more nuanced and rigoroussense of ‘national security’ in crafting refugeeand immigration policy.  相似文献   

12.
13.
This article argues that the peculiarly ‘common law tradition’separation of common law and equity had at its origins a principledbasis in the concept of ‘conscience’. But ‘conscience’here did not mean primarily either the modern lay idea, or the‘conscience’ of Christopher St German's exposition.Rather, it referred to the judge's, and the defendant's, privateknowledge of facts which could not be proved at common law becauseof medieval common law conceptions of documentary evidence andof trial by jury. The concept of a jurisdiction peculiarly concernedwith this issue allowed the ‘English bill’ procedureto be held back to a limited subject area rather than—asin Scotland and the Netherlands—overwhelming the old legalsystem. By the later 17th century, however, the concept of consciencehad lost its specific content, leaving behind the problem, stillwith us, of justifying the separation of ‘equity’.  相似文献   

14.
This paper intends to explore the impact of Information technology(IT) development on the legal concept of ‘signatures’.To what extent and in which way does it impact on the legalconcept of ‘signatures’? This paper attempts toexamine this issue from an international and comparative perspective.It was found that IT development has different levels of impacton the legal concept of ‘signatures’ in differentjurisdictions. In the Common Law system such as the UK and theUS, it does not change the legal concept of ‘signatures’.However, it does put the legal concept on such an importantposition. On the contrary, IT development changes the legalconcept of ‘signatures’ in the Civil Law systemsuch as Germany and China.  相似文献   

15.
The principle of non-refoulement contains a paradox. While stateshave committed to respecting the principle by joining the 1951Refugee Convention and key human rights conventions, its contentis not established in international law. In other words, stateshave committed to a principle the content of which is indeterminate.Since no common definition exists, in practice, national andinternational bodies have extensive powers of discretion togive content to the terms ‘persecution’, ‘torture’,‘degrading’ or ‘cruel’ treatment. Thepurpose of this article is to explore non-refoulement as anopen and ambiguous concept. Acknowledgement of the indeterminacyis important, as open concepts never remain such in practicebut are always issued with content or interpreted. This approachcalls for a further question: how do interpretations come aboutand what kind of factors influence them? The conclusion of thearticle is that different national and international actorspromote their own ‘correct’ interpretations of thiskeystone of refugee protection.  相似文献   

16.
The Myth of 'Rebalancing' Retaliation in WTO Dispute Settlement Practice   总被引:1,自引:0,他引:1  
It is generally assumed that trade retaliation under the WTOperforms some kind of ‘rebalancing’ by allowingthe injured Member to suspend ‘concessions and obligations’vis-à-vis the violating Member of a level equivalentto the level of ‘nullification and impairment’ sufferedby the injured Member. This article argues that this perceptionis misguided. The article first questions if a sensible comparatorexists with which equivalence for purposes of ‘rebalancing’could be evaluated. It then argues that WTO arbitration decisionsdo not even succeed in their limited goal of providing for retaliationthat will affect trade in the same amount as the WTO-inconsistentmeasure at issue. One reason is the use of an asymmetric andunderspecified trade effects comparator. The other reason isvery significant miscalculation of the trade effects of theviolation, as shown by detailed legal-economic analysis of allrelevant arbitration decisions. The decisions concerning countermeasuresagainst prohibited export subsidies do not make any attemptat ‘rebalancing’ in the first place. The articleconsiders political explanations of arbitration decisions. Itconcludes with some suggestions for improvement.  相似文献   

17.
Law's Legitimacy and 'Democracy-Plus'   总被引:2,自引:0,他引:2  
Is it the case that the law, in order to be fully legitimate,must not only be adopted in a procedurally correct way but mustalso comply with certain substantive values? In the first partof the article I prepare the ground for the discussion of legitimacyof democratic laws by considering the relationship between law’slegitimacy, its justification and the obligation to obey thelaw. If legitimacy of law is seen as based on the law beingjustified (as in Raz’s ‘service conception’),our duty to obey it does not follow automatically: it must bebased on some additional arguments. Raz’s conception oflegitimate authority does not presuppose, as many critics claim,any unduly deferential attitude towards authorities. Disconnectionof the law’s legitimacy from the absolute duty to obeyit leads to the second part of the article which consists ina critical scrutiny of the claim that the democratically adoptedlaw is legitimate only insofar as it expresses the right moralvalues. This claim is shown to be, under one interpretation(‘motivational’), nearly meaningless or, under anotherinterpretation (‘constitutional’), too strong tosurvive the pressure from moral pluralism. While we cannot hopefor a design of ‘pure procedural democracy’ (byanalogy to Rawlsian ‘pure procedural justice’),democratic procedures express the values which animate the adoptionof a democratic system in the first place.  相似文献   

18.
This article examines the threat to privacy posed by the transferof personal information from one jurisdiction to another. Despiteinternational trends towards greater protection of personalinformation, significant challenges to personal privacy arisein this context. These include the use of outsourcing by businesses,the encroachment of security laws and the potential ‘spill-over’of technologies developed for combating terrorism into the privatesector. Also significant are technologies enabling the ‘profiling’of individuals and ‘data mining’ across borders.Against this backdrop, the article considers existing jurisdictionalresponses towards regulating personal information flows acrossborders. It considers various actual or proposed solutions including‘safe-harbours’, contractual mechanisms and extra-territorialapplications. The article concludes that many of the existingapproaches to regulating trans-border information flows areto some extent deficient and suggests the need for a new ‘fourthgeneration’ set of data protection protocols. In formulatingthe latter, analogies are drawn from other relevant areas ofthe law in order to furnish creative solutions to the problem.  相似文献   

19.
20.
Wilson  Glen 《Trusts & Trustees》2008,14(1):8-11
The months of April and May 2007 have seen the enactment oftwo new pieces of legislation and one set of regulations. InJune 2007 the Regulations governing the Trust (Amendment) Act2007 and the International Financial Services Commission (Amendment)Act 2007 were passed. ‘The Trust and Company Services Providers (Best Practices)Regulations 2007’ were published in the Belize Gazetteon 7 April and came into force on 16 April. ‘The Trusts (Amendment) Act 2007’ and ‘TheInternational Financial Services Commission (Amendment) Act2007’ were signed on 30 May and were both published inthe Belize Gazette on 2 June. The regulations for these two, ‘The International TrustsRegulations 2007’ and ‘International Financial ServicesCommission (Licensing) Regulations 2007’ were enactedon  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号