首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This article considers the much‐criticized ‘right to be forgotten’ in the context of the European Court of Justice's judgment in the Google Spain case. It defends the ‘right to be forgotten’ as a metaphor that can provide us with a better understanding of the particular privacy concerns of the search‐engine age and their interaction with the freedom to access information, and draws on Goffman's idea of ‘information games’ and Nissenbaum's theory of ‘contextual integrity’. While supporting the principles that underpin the judgment, the article rejects the Court's binary approach of ‘forgetting’ versus ‘remembering’ personal information. Instead, it argues that the EU legislator should introduce more nuanced means of addressing modern privacy concerns. By establishing two remedies – ‘delisting’ or ‘reordering’, depending on the nature of the information – online information flows can be adjusted to preserve both the right to privacy and the freedom to access information in more contextually appropriate ways.  相似文献   

2.
3.
The right to privacy has been developed through judicial practice and has evolved from “the protection of the right to reputation” to “privacy interest” then to “privacy right.” The Civil Code of the People’s Republic of China (2020) clarifies the right to information privacy and the right to personal information as two independent personality rights and establishes a privacy priority protection mechanism for private information in civil law. The comparative efficiency of the right to personal information may mean that the protection of the right to information privacy is weakened or even replaced by the right to personal information. The uncertainty and fragmentation of private information also creates a wide gray space for judicial decisions. The development from traditional privacy right to information privacy right and personal information right is generally positive and shows the active legal response to the protection of private information in multiple ways. However, clarifications and systematization are required to increase the effectiveness of such protections.  相似文献   

4.
On 16 July 2020, the Grand Chamber of the European Court of Justice rendered its landmark judgment in Case C-311/18 Data Protection Commissioner v. Facebook Ireland Ltd and Maximillian Schrems (“Schrems II”). The Grand Chamber invalidated the Commission decision on the adequacy of the data protection provided by the EU-US Privacy Shield. It however considered that the decision of the Commission on standard contractual clauses (“SCCs”) issued by the Commission for the transfer of personal data to processors established in third states was legally valid.The legal effects of the judgment should first be clarified. In addition, it has far-reaching implications for companies which transfer personal data from the EU to the US. The judgment of the Grand Chamber has also far-reaching implications for transfers of personal data from the EU to other third states. Last, it has far-reaching implications for the UK in the context of Brexit.© 2020 Published by Elsevier Ltd. All rights reserved.  相似文献   

5.
This article examines the two major international data transfer schemes in existence today – the European Union (EU) model which at present is effectively the General Data Protection Regulation (GDPR), and the Asia-Pacific Economic Cooperation (APEC) Cross Border Privacy Rules system (CBPR), in the context of the Internet of Things (IoT).While IoT data ostensibly relates to things i.e. products and services, it impacts individuals and their data protection and privacy rights, and raises compliance issues for corporations especially in relation to international data flows. The GDPR regulates the processing of personal data of individuals who are EU data subjects including cross border data transfers. As an EU Regulation, the GDPR applies directly as law to EU member nations. The GDPR also has extensive extraterritorial provisions that apply to processing of personal data outside the EU regardless of place of incorporation and geographical area of operation of the data controller/ processor. There are a number of ways that the GDPR enables lawful international transfer of personal data including schemes that are broadly similar to APEC CBPR.APEC CBPR is the other major regional framework regulating transfer of personal data between APEC member nations. It is essentially a voluntary accountability scheme that initially requires acceptance at country level, followed by independent certification by an accountability agent of the organization wishing to join the scheme. APEC CBPR is viewed by many in the United States of America (US) as preferable to the EU approach because CBPR is considered more conducive to business than its counterpart schemes under the GDPR, and therefore is regarded as the scheme most likely to prevail.While there are broad areas of similarity between the EU and APEC approaches to data protection in the context of cross border data transfer, there are also substantial differences. This paper considers the similarities and major differences, and the overall suitability of the two models for the era of the Internet of Things (IoT) in which large amounts of personal data are processed on an on-going basis from connected devices around the world. This is the first time the APEC and GDPR cross-border data schemes have been compared in this way. The paper concludes with the author expressing a view as to which scheme is likely to set the global standard.  相似文献   

6.
This article constitutes a re-examination of the financial failure of the first income tax in Britain, introduced in 1799 in order to address the rising cost of the French revolutionary wars. In accounting for this failure, the existing literature has focused largely on failings in the administration of the tax, often blaming, for example, its emphasis on local responsibility for tax collection, and its reliance on the honesty of its contributors. This article furthers these interpretations by highlighting that such issues were particularly problematic in their application to the commercial sector of society. It argues that the preferential treatment of commercial interests in the substance of the tax, on account of their privileged position in the political sphere, led to the establishment of a culture of commercial evasion. The evidence for this is examined at length, through both detailed analysis of the yield of the tax, as well as the attitudes of contemporaries evident in the literature at the time. This analysis ultimately leads to the conclusion that commercial evasion of the first tax played a pivotal, and hitherto underplayed, role in the financial underperformance of the tax.  相似文献   

7.

This paper investigates whether convergence or divergence of robot densities in the manufacturing industries of 24 EU countries occurred over the period from 1995 to 2015. An answer to this question permits immediate conclusions with regard to the success of convergence of labour productivities within the manufacturing industries of the EU, since it is expected that the use of robots will contribute to the growth of labour productivity. The empirical analysis is based on the robot data of the International Federation of Robotics and uses the convergence testing approach proposed by Rodrik (Q J Econ 128(1):165–204, 2013). Taking all results together, empirical evidence points to non-convergence of robot densities for a first period from 1995 to 2005, while there is relatively fast conditional as well as unconditional convergence for the second period from 2005 to 2015.

  相似文献   

8.
9.
10.
The success in compiling China's Civil Code benefits from factors such as China's complete system of civil law statutes, the methodology of the Pandekten System, and the private-law attributes of civil laws, etc. To construct the framework of China's environmental code, it is necessary to reference that success for theoretical and structural innovations. In addition, the fundamental features and inherent issues of China's existing environmental law system, such as its breadth, the extensiveness of origins of environmental law, the multiple implication of environmental legal relations, and the compound nature of the environmental legal liability system, should be taken into account. The layout structure of General—Specifics should be adopted for compiling China's environmental code, while moderate codification and extraction of the common factor (vor die Klammer zu ziehen) for connection with applicable rules of specific laws should serve as construction principles and methods for compiling the framework of China's environmental code. The environmental code should have five parts: General ; Pollution Prevention and Control ; Nature Conservation ; Green and Low-Carbon Development ; and Ecological and Environmental Responsibility.  相似文献   

11.
The United Nations Framework Convention on Climate Change (UNFCCC) is struggling in its attempts to address the threat of anthropogenic climate change and create an effective international climate agreement. A substantial part of the problem is consensus decision-making within the Convention. Majority voting is a potential alternative which is already being discussed within the UNFCCC. A comparative analysis of consensus and majority voting suggests that majority voting is superior in terms of both efficiency and effectiveness by allowing for quicker decision-making and semi-global approaches to a climate agreement (termed here as “Critical Mass Governance”). This paper aims to investigate how majority voting could be implemented in the UNFCCC and to consider politically feasible and effective approaches to voting arrangements for the Convention. There is a legal opportunity to introduce voting through adoption of the draft Rules of Procedure, but this faces political opposition. A type of Layered Majority Voting with larger majorities for financial and substantial matters is considered to be the optimal approach in balancing political feasibility and effectiveness. For now, voting is not politically feasible for the UNFCCC, but could be introduced into future bodies or treaties under the Convention.  相似文献   

12.
The nature of command responsibility is still open to debatein international criminal law: is a superior to be held criminallyresponsible for the crimes committed by his subordinates ‘asan accomplice’, for having participated in the commissionof the crime by omission, or as a perpetrator of a separateoffence of dereliction of duty? This article surveys the post-WW2case law and the first international instruments on this point,and then analyses the jurisprudence of the International CriminalTribunal for the former Yugoslavia (ICTY). The judges appearto have recently adopted a new approach to Article 7(3) ICTYSt.in that the superior is held responsible ‘for failureto prevent or punish with regard to the crimes of the subordinate’and no longer ‘for the crimes of his subordinates’.It is a responsibility ‘sui generis’ indeed, wherethe crime of the subordinate plays a central role in the attributionof responsibility to the superior. It is, therefore, necessaryto carefully consider the relationship between the superior'sfailure to act and the subordinate's crime, both with regardto objective and subjective elements. The same question finallyarises in relation to Article 28 of the Rome Statute, the literalinterpretation of which implies that a superior shall be punishedfor the same crime committed by his subordinates. In order toavoid the risk of holding a person guilty of an offence committedby others in violation of the principle of personal and culpablecriminal responsibility, it is crucial to consider separatelythe different cases of command responsibility, which are basedon distinct objective and subjective requirements.  相似文献   

13.
14.
Female genital mutilation (FGM)--previously known as female circumcision--was criminalised in many countries in the 1990s. This occurred mainly in Western nations and responded to the perception that FGM was intended to subjugate women and was an abuse of human rights. However, other female genital surgical procedures have a totally different intent and are designed to restore the integrity of the hymen, correct deformity or simply enhance the appearance of the female genitalia. Such procedures, unlike FGM, are performed on women who have reached the age of consent and who request the surgery themselves. Restoring the integrity of the hymen (so-called "hymenoplasty") can erase evidence of the sexual history of a woman. "Revirgination" may have particular importance to women contemplating marriage in cultures where a high value is placed on virginity Some commentators have equated hymenoplasty with corrective surgery intended to restore the condition of female circumcision--techniques which are prohibited by most Australian criminal statutes. However, the medical, ethical and human rights arguments against FGM are not easily extended to revirgination and other cosmetic genital surgery. This article examines whether revirgination surgery has effectively been criminalised in Australia and whether this is appropriate from a medical and ethical perspective.  相似文献   

15.
16.
We propose that scientists use patents/invention disclosures as signals to gain reputation than financial benefits. Based on a newly created dataset on the commercial activities among 2,500 scientists affiliated with 67 institutes of the German Max Planck Society, we explore the relation between the expectations of scientists concerning the outcomes of commercial activities and the likelihood of their patenting and disclosure behaviors. We find that expectation of gaining financial benefits are not related with the patenting activities of scientists without industrial cooperation. Instead, their expectation to gain/increase reputation through commercial activities is correlated with their patenting and disclosures activities. This may in turn also increase the possibility to gain academic promotion, financial benefits through industrial collaboration etc., rather than the immediate personal financial gains.  相似文献   

17.
18.
Recently, the debate as to whether ethics should be a compulsory requirement of a law degree was refuelled when the English and Welsh Legal Education Training Review (LETR) recommended that professional ethics should be primarily addressed in vocational Legal Services and Education Training programmes and that learning outcomes in the academic curriculum should include reference to morality and the law, the values supporting the legal system and their connection to the role of lawyers. This debate is also occurring in other jurisdictions. In Australia the debate is focused on the proposal that ethics be removed as a compulsory subject in the law degree. This proposal has raised a concern that law students will be denied the opportunity to develop as ethically competent lawyers. This paper argues for the continuation of ethics as a core component of a law degree and evidences the model used for the teaching of ethics in the law degree at the University of Technology Sydney in support of our argument. The background to the model is examined to highlight the significance of student feedback and ongoing curriculum review, including the alignment of parallel pedagogical factors. This model serves as an example of not only why ethics should be core to a law degree but, in order to provide graduates who are ethical and reflective practitioners, why ethics should be pervasively taught throughout the degree and supported by an introductory and capstone presence.  相似文献   

19.
20.
Two autopsy cases of an elderly couple who died on the same day will be used to underline the importance of immunohistochemistry in forensic practice. At first unexplainable injection marks on the upper arms of the corpses and the possibility of a closely related physician injecting insulin and certifying a natural death made it important, considering suspect insulin concentrations in the blood, to exclude insulin injections in these marks. Further, the statement that morphine had been injected for the analgesia of tumour pains, was reinforced by immunohistochemistry.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号