首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper critically assesses the compatibility of s3 Digital Economy Act 2010 (DEA) with Article 8 of the European Convention on Human Rights (1950) (ECHR). The analysis draws on Ofcom’s Initial Obligations and two UK cases, namely: British Telecommunications Plc & Anor, R (on the application of) v The Secretary of State for Business, Innovation and Skills,11 British Telecommunications Plc & Anor, R (on the application of) v The Secretary of State for Business, Innovation and Skills [2011] EWHC 1021 (Admin).View all notes and R (British Telecommunications plc and TalkTalk Telecom Group plc) v Secretary of State for Culture, Olympics, Media and Sport and others.22 R (British Telecommunications plc and TalkTalk Telecom Group plc) v Secretary of State for Culture, Olympics, Media and Sport and others [2012] EWCA Civ 232.View all notes It argues that the implementation of this obligation allows directed surveillance of subscribers’ activities without legal authorisation under the Regulation of Investigatory Powers Act 2000 (RIPA). It also analyses compliance with the Strasbourg Court’s three-part, non-cumulative test, to determine whether s3 of the DEA is, firstly, ‘in accordance with the law’; secondly, pursues one or more legitimate aims contained within Article 8(2) of the Convention; and thirdly, is ‘necessary’ and ‘proportionate’. It concludes that unless the implementation of s3 of the DEA required the involvement of State authorities and was specifically targeted at serious, commercial scale online copyright infringement cases it could infringe part one and part three of the ECtHR’s test, thereby violating subscribers’ Article 8 ECHR rights.  相似文献   

2.
In Bilta (UK) Ltd (in liquidation) v Nazir (No 2), the Court of Appeal held that the ex turpi causa defence was inapplicable by refusing to attribute the fraud of the directors and the sole shareholder to the company in connection with the company's claim against them and third party co‐conspirators. It is significant that the court has not only clarified the law in relation to attribution, but it did so by rejecting the majority's reasoning and endorsing the dissenting judgment in the House of Lords decision in Stone & Rolls (in liquidation) v Moore Stephens (a firm). This article evaluates the decision in Bilta by critically examining the fundamental principles and policies that apply to the three distinct circumstances under which corporate attribution should or should not take place.  相似文献   

3.
Through an example of a study utilizing the case-law research method, this paper critically assesses whether taking into account both the findings of Mr La Rue (the United Nations Rapporteur on Human Rights) as well as some Court of Justice of the European Union's (CJEU) case-law, website blocking could be implemented in a way which is compatible with the European Convention on Human Rights (ECHR), in particular, with Article 10. Drawing upon, inter alia, Ofcom site blocking review, sections 17 and 18 of the Digital Economy Act 2010 (DEA), section 97A of the Copyright, Designs and Patents Act 1988 (CDPA), and some independent expert evidence, this paper's major argument is that in view of the CJEU SABAM v Scarlet and SABAM v Netlog, the UK government's decision to repeal the website blocking provisions of the DEA appears appropriate. The paper examines the findings of Fox v BT. It contrasts such findings with the CJEU's case-law and in light of the incompatibility of any website blocking measure with the cumulative three-part test set out in the United Nations Rapporteur on Human Rights discusses a number of implications. It concludes that given that the implementation of content blocking systems, such as Cleanfeed is likely to result in general monitoring being carried out; the UK government could possibly be in breach of EU law, namely, Article 15(1) of Directive 2000/31.  相似文献   

4.
Mohanty  Gautam  Rai  Gaurav 《Liverpool Law Review》2022,43(2):477-500

In England, fraudulent misrepresentation is governed by English common law and damages are provided under the Tort of Deceit whereas negligent and innocent misrepresentation is governed by the Misrepresentation Act, 1967. In India, fraud is governed by s 17 of the Indian Contract Act, 1872 (ICA) and misrepresentation by s 18 of the ICA. Notably, unlike in England where the remedies for fraud and misrepresentation are provided at separate avenues, in India, the relief to the innocent party in both cases is provided under s 19 of the ICA. This article discusses fraudulent misrepresentation & negligent/innocent misrepresentation and the quantification of damages thereof in contracts under the two legal regimes mentioned above. To that extent, the authors attempt to illustrate certain nuanced differences between the two legal regimes while also highlighting the similarities between English law and Indian law. For the purposes of this article, the authors refer to the Misrepresentation Act, 1967 and the seminal judgments of Derry v Peek, Doyle v Olby, East v Maurer and Smith New Court Securities Ltd. v Scrimgeour Vickers and discuss the “date of transaction rule” as enunciated by Lord Steyn while juxtaposing it with the judgments of the High Court of Delhi, and the Supreme Court of India. In the Indian context, the authors highlight the position of law as is apparent from two recent judgments of the Delhi High Court in NHAI v Pune Sholapur Road Development and Daiichi Sankyo v Malvinder Mohan Singh and Ors and also focus on the judgment of the Supreme Court of India in Avitel Post Stuidoz v HSBC Holdings (Mauritius).

  相似文献   

5.
This article contributes to the growing literature on the use of computer-mediated communications to research illicit markets. In it, we conduct an analysis of the British cannabis market using data crowdsourced from a publicly available platform, PriceofWeed.com. Crowd-sourced transaction data present some new insights into the British cannabis market. First, this study has tracked the trafficking flow of cannabis within the UK. Second, it shows the extent to which a quantity discount is granted to consumers. Third, it discusses purchasing habits of cannabis users. Conclusions suggest new areas of application of crowdsourcing to research hard to reach and deviant populations.  相似文献   

6.
Ruscoe v Cryptopia Ltd (in Liquidation) is a landmark decision of the New Zealand High Court that considers for the first time in a comprehensive way whether cryptocurrencies are property at common law and to what extent account holders’ (interests in) cryptocurrencies are protected from the claims of the insolvent crypto‐exchange's creditors. The ruling relies on a body of case law from various common law jurisdictions and, to a significant extent, on the findings of the UK Jurisdiction Taskforce Legal Statement on Cryptoassets and Smart Contracts. In tackling complex areas of legal uncertainty, it provides an authoritative conceptual benchmark for future court decisions and normative initiatives.  相似文献   

7.
Sony Music v. Easyinternetcafe´ 1 Sony Music Entertainment (UK) Ltd, Sony Music Entertainment Inc., Polydor Limited, UMG Recordings Inc. and Virgin Records Limited (claimants) v. Easyinternatcafe Ltd [2003] EWHC 62 (Ch) in the High Court of Justice Chancery Division 28 January 2002. Case No: HC 02 C01798. View all notes has introduced a new facet to the debate concerning the copyright legality of peer-to-peer file transfer. The judgment and subsequent settlement has highlighted that companies offering services that are used to infringe copyright may be held to account in the UK courts. Liability may extend from the private to the public sector and the British Phonographic Industry (BPI)2 The action was supported by the BPI's international sister organization: The International Federation of the Phonographic Industry (IFPI). View all notes has reinforced this theme recently. In March 2003 every university in Britain received a letter pointing out the legal risks of universities acting as copyright infringement facilitators. By allowing students to download copyright material such as software, Mp3s and DVDs, universities and their vice-chancellors may face injunctions, damages, costs and potential criminal sanctions. This paper first, briefly reviews the history and literature concerning peer-to-peer file sharing and secondly provides a preliminary discussion of the heads of peer-to-peer copyright infringement liability with regard to UK universities. Although the law at present gives no clear precedent in regard to the university sector, the area is unlikely to remain static. It is feasible that student copyright infringement liability could be transferred to universities in the future if universities do not show due diligence when dealing with copyright infringement. Thirdly this paper outlines the technological and administrative actions that may be taken to satisfy the British Phonographic Industry (BPI) and other copyright holders that UK universities are showing due diligence in preventing student copyright infringement. It is proposed that the university sector will follow the Internet service providers (ISPs) and will begin to work with the collecting and enforcement societies to prevent copyright infringement, perhaps in a similar way to the operation of the Copyright Licensing Agency (CLA). This article puts forward two main reasons for this: First, to avoid the potential legal costs of a copyright infringement action and secondly as the majority of downloading of copyrighted Mp3s, DVDs and computer software does not constitute an academic pastime or fulfil any worthwhile university endorsed learning aims it should be actively discouraged.3 Certain limited peer-to-peer use may fulfil legitimate educational goals: This area in the UK is governed by the Copyright, Design and Patents Act of 1998 in sections 28–44. View all notes  相似文献   

8.
《Digital Investigation》2014,11(4):349-362
This paper presents a unified social graph based text mining framework to identify digital evidences from chat logs data. It considers both users' conversation and interaction data in group-chats to discover overlapping users' interests and their social ties. The proposed framework applies n-gram technique in association with a self-customized hyperlink-induced topic search (HITS) algorithm to identify key-terms representing users' interests, key-users, and key-sessions. We propose a social graph generation technique to model users' interactions, where ties (edges) between a pair of users (nodes) are established only if they participate in at least one common group-chat session, and weights are assigned to the ties based on the degree of overlap in users' interests and interactions. Finally, we present three possible cyber-crime investigation scenarios and a user-group identification method for each of them. We present our experimental results on a data set comprising 1100 chat logs of 11,143 chat sessions continued over a period of 29 months from January 2010 to May 2012. Experimental results suggest that the proposed framework is able to identify key-terms, key-users, key-sessions, and user-groups from chat logs data, all of which are crucial for cyber-crime investigation. Though the chat logs are recovered from a single computer, it is very likely that the logs are collected from multiple computers in real scenario. In this case, logs collected from multiple computers can be combined together to generate more enriched social graph. However, our experiments show that the objectives can be achieved even with logs recovered from a single computer by using group-chats data to draw relationships between every pair of users.  相似文献   

9.
If any video-sharing websites, without authorization, directly upload film and television works to a server to be shared by subscribers, and do editing and verification in advance on the infringing videos uploaded by subscribers, it is regarded as “direct infringement.” However, the overwhelming majority of video-sharing websites provide information platforms for subscribers to automatically upload videos, and in such case, how to determine the tort liability of those websites remains ambiguous. The Regulations on Protection of the Right of Communication through Information Network of China impose harsh liabilities on video-sharing websites by incomplete reference to the US “vicarious liability,” consequently hampering the development of normal business. It shall be reasonably identified whether the operator of a website “should have known” there exist infringing videos uploaded by subscribers according to the “Red Flag Test,” in reference to the columns set by the video-sharing website. In condition that a mature and effective filtering technology has been accepted by the market, it shall be taken as the subjective fault for a video-sharing website to refuse shielding the uploading of infringing videos with such technology.  相似文献   

10.
In Animal Defenders International v United Kingdom a majority of the Grand Chamber of the European Court of Human Rights held that the UK's statutory broadcasting ban on political advertisements under the Communications Act 2003 did not breach the right to freedom of expression under Article 10 of the European Convention on Human Rights. The judgment departs from the Court's established case law and, it is argued, raises several issues of concern both with regard to freedom of expression, and for human rights adjudication more generally. In particular, the Court's use of a doctrine of ‘general measures’ led it to place a great deal of reliance on the quality and quantity of legislative debate that preceded the UK ban, rather than its actual impact upon the applicant.  相似文献   

11.
Taking the UK Ministry of Justice's ongoing quest to ensure a more diverse judiciary as its starting point and backdrop, this paper establishes the House of Lords' decision in Secretary of State for the Home Department v. K (FC); Fornah (FC) v. Secretary of State for the Home Department [2006] as a lens through which to explore the ‘difference’ of the woman judge and, in particular, the developing jurisprudence of Baroness Hale—the first (and only) female law lord in the UK. It argues that Baroness Hale's candid recognition and articulation of the gendered nature of the experiences and violence in Fornah's story reveals not only the difference difference (in whatever form) might make to understandings of the judge, judging and justice but also the importance of recognising the transformative potential of judicial diversity to create a space in which difference is celebrated and valued on its own terms, a place where difference can truly make a difference.  相似文献   

12.
Legal context: Dual use technology, or technology which can be used for bothinfringing and non-infringing uses, raises interesting issuesin the area of copyright law. This note analyses inter aliathe two US Supreme Court decisions on dual use technology, separatedby a gap of over 20 years—Sony v Universal Studios (1984)and MGM v Grokster (2005). Key points: Sony lays down the famous ‘Betamax’ defence—ifthe technology is ‘capable of substantial non-infringinguses’, then it cannot be challenged as infringing. Thistest had stood the test of time, and it is only recently inGrokster that there arose an occasion to reconsider its application.The Court in Grokster, borrowing from the jurisprudence developedin Patent law, recognized a novel test of liability—basedon the active ‘inducement’ to infringe. The flawin Grokster is that despite its attempt to develop new standardsfor a digital age, the ruling leaves areas of uncertainty. Practical significance: Dual use technology has become ubiquitous in this age—fromthe iPod to YouTube to P2P software, all are capable of beingused in lawful as well as unlawful ways. Legal pronouncementshave the potential to impact not just the development of law,but also innovation in technology. Some believe that the ‘brightline’ of Sony has been muddled thereby threatening technologicalinnovation. Others, me included, believe that Sony is inapplicablein the face of new technology, and hail the decision in Groksteras a positive step forward in what it actually decides. However,in what it does not decide, Grokster still represents a lostopportunity by the Court to clear up the muddled waters.  相似文献   

13.
The decision of the Supreme Court in AIB Group (UK) Plc v Mark Redler & Co confirms the approach taken by Lord Browne‐Wilkinson in Target Holdings Ltd v Redferns: where a trustee misapplies trust assets, a beneficiary is limited to a claim for equitable compensation for losses caused by the trustee's breach of duty. This seems to be a departure from traditional equitable doctrine, which held that the beneficiary could falsify the trustee's unauthorised disbursement and bring a claim for an ‘equitable debt’. This note considers the impact of the decision of the Supreme Court, and how the law regarding ‘equitable compensation’ might continue to develop.  相似文献   

14.
A handful of ‘child-friendly’ judgments have emerged in the UK in recent years, attempting to adopt a child-centred approach to the decision-making stage of the legal process. Most notable is Sir Peter Jackson's judgment in Re A: Letter to a Young Person which, in taking the form of a letter to the child, has been applauded as a model of how to achieve ‘child friendly justice’. This article examines how and why the form and presentation of judicial decisions is an important aspect of children's access to justice, considering not just the potential but the duty of judges to enhance children's status and capacities as legal citizens through judgment writing. We identify four potential functions of judgments written for children (communicative, developmental, instructive and legally transformative), and call for a radical reappraisal of the way in which judgments are constructed and conveyed with a view to promoting children's access to justice.  相似文献   

15.
Any civic project naturally seeks an effective means of spreading the word about its activities. Sometimes, such projects are able to create a system, in which a large nmber of people take part in collecting primary information, processing, enriching, verifying and interpreting it, and in distributing the finished product. The latter is particularly important and useful given external pressure from the state and its coercive apparatus. This ‘exit’ point for information is always the most vulnerable in any voluntary community that is forced to withstand aggressive pressure from the state’s oversight and law-enforcement structures. It is technically possible to create a distributed, decentralized working environment (a dispersed ‘office’ or ‘newsroom’), in which workers are not physically proximate to one another. It is also possible to store information, materials, work-in-progress and finished products on remote or distributed servers. Indeed, any organization can be spatially ‘dispersed’. All of these methods are well-known and widely used by those who have reason to fear external intrusion into their work processes. But the finished informational product is still a concrete website with a unique address, and that is what is most vulnerable: it can be easily blocked, most simply by the internet providers themselves. However, it turns out that ‘populous’ civic projects are best positioned to overcome this threat. Each participant in the community de facto becomes an element in a distributed system, through which the community can publish the results of its work. It thus becomes possible to organize not only a decentralized ‘entry point’ for information, but a decentralized ‘exit point’ as well.  相似文献   

16.
In R (on the application of Friends of the Earth Ltd and others) v Heathrow Airport Ltd the UK Supreme Court allowed an appeal against the Court of Appeal's decision that there had been a series of legal errors in the designation of the Airport National Policy Statement. This case note analyses the case from an ‘internal’ doctrinal perspective and argues that the Supreme Court could have engaged more explicitly with the legal issues that arise from climate change legislation for administrative law adjudication. For courts to adjudicate well in such circumstances they need to be prepared to develop administrative law doctrine, particularly in light of the issues of integrating climate change into public decision-making and of scientific/policy uncertainty which lie in the background of climate change legislation.  相似文献   

17.
Book reviews     
Books for review should be sent to the Book Review Editor, D.V.E. Royall, at Lanchester College of Technology, Coventry.

SALE OF GOODS by G.H.L. Fridman, published by Sweet & Maxwell, Ltd., at 50s.

PRACTICE AND PROCEDURE by Rowland G. Witchell, (1966) published by Oyez Publications at 37s. 6d.

COMPANY LAW by Kenneth Smith and Denis J. Keenan. (1966) published by Sir Isaac Pitman & Sons, Ltd. at 30s.

BUILDING LAW by J.R. Lewis published by Allman & Son, Ltd., at 18s 6d.

BUSINESS LAW by Neil Merritt and E.G. Howard Clayton (1966) published by Sweet & Maxwell Ltd. at 35s (hardback) and 18s: 6d. (paperback).

HILL AND REDMAN'S LAW OF LANDLORD AND TENANT (14th Edn) by W. J. Williams, published by Butterworths & Co. Ltd. at £9. 17. 6 (main work with supplement); supplement alone £1. 7. 6d.  相似文献   

18.
Organisations in both business and government face a considerable risk from inadequately secured information systems. In recognition of these risks, Directorate-General XIII (Telecommunications, Information Industries and Innovation) of the Commission of the European Communities commissioned a series of projects to examine security issues in the use of information technology. The results of one of these studies, concentrating on the security of network systems, is reviewed below.It was an objective of the study that its results should be seen as definitive, authoritative and applicable across the European Community as a whole. In order to meet this objective, the study, led by Coopers & Lybrand, drew upon the skills and experience of 44 organisations in seven European countries, including:
  • •⊎ Coopers and Lybrand practices in France, Germany, Italy, the Netherlands and the United Kingdom;
  • •⊎ Admiral Management Services Ltd;
  • •⊎ The Commission of the European Communities;
  • •⊎ 17 vendors of IT products and services in five European countries;
  • •⊎ 20 major users of network systems in seven European countries.
In particular, the study benefited from detailed case studies in each of the 20 large and sophisticated users of network systems and from assessments of 27 security products from twelve IT vendors.  相似文献   

19.
Book reviews     

COMPANY LAW by Mary C. Oliver, (1967), published by MacDonald & Evans Ltd,, at 12s. 6d.

A CASEBOOK ON TORT by Tony Weir, published by Sweet and Maxwell Ltd. (1967). Bound: £3.17.6d. Paperback: £2. 2. Od.

PRINCIPLES OF PUBLIC INTERNATIONAL LAW by Ian Brownlie, (1966), published by Oxford University Press, at 63/‐.

THE LAW OF CONTRACT by G. H. Treitel, Second Edition (1966) published by Stevens & Sons Ltd. Bound £3. 17. 6. Paperback £1. 18. 6,

CASEBOOK ON MERCANTILE LAW by E.R. Hardy Ivamy (1967) published by Butterworths: at 25s.

“COMMERCIAL LAW OF SCOTLAND”, by Campbell B. Burns, published by William Hodge & Company Limited, (1966), at 42/‐

BRITAIN AND EUROPE: AN INDUSTRIAL APPRAISAL, vol. 1. by the Confederation of British Industry (1966), published by C.B.I, at 10s.  相似文献   

20.
This note examines the UK Supreme Court's judgment in the Brexit case, Miller v Secretary of State for Exiting the European Union. The case upheld the decision of the High Court, which rejected the claim that the foreign affairs prerogative provided a legal basis for giving notice to EU institutions of the UK's intention to withdraw from the EU. But the Supreme Court's preferred basis for dismissing that claim rested on the more general proposition that significant constitutional change can only be effected by statute. This position offers the germs of a jurisprudence of constitutional change and was substantiated by means of an analysis of Parliament's dual capacity as legislator and constituent agent. Miller also includes important and potentially innovative dicta on the relationship between international and domestic sources of law.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号