首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 20 毫秒
1.
论电子商务交易的流转税法律属性问题   总被引:1,自引:0,他引:1  
廖益新 《法律科学》2005,23(3):109-114
如何确定电子商务在线交易数据化产品的流转税法律属性,是目前中外各国财税当局在电子商务税收实践中面临的共同问题,税法理论界也存在着不同的观点。在我国现行流转税体制未进行结构性的改革调整的情况下,在线交易的数据化产品提供,不宜视为增值税意义上的销售货物行为,而应该区别具体情况,分别确定为营业税意义上的提供服务或转让无形财产交易。这样能够在更大程度上体现税收中性原则和实现课税公平,也有利于我国对电子商务课征流转税的制度与未来可能形成的电子商务流转税国际协调规则的接轨。  相似文献   

2.
The shift in socio-economic transactions from real space to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 2 of this article, I will construct the customary rules to Internet law-making that are applicable to electronic transactions by adapting customary international law rules; apply the suggested rules for determining customary Internet norms and identify some existing practices that may amount to established norms on the Internet, specifically practices relating to the Internet Infrastructure and Electronic Contracting.  相似文献   

3.
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective.  相似文献   

4.
刘琳 《时代法学》2011,9(1):104-108
文物由于具有稀缺性被视为保值增值的上佳投资品,因而其跨国流转日益频繁,不过其中相当一部分是被盗掘或盗窃后进八国际市场交易。不法分子利用各国所有权取得的种种歧异的规定,将非法获取文物的所有权“漂白”后转手给善意购买人,而最后的纠纷往往在原始所有人与善意购买人间发生。在相关国际公约在解决此类纠纷存在不足的情况下,应从国际私法法律适用的角度探讨解决上述问题的现实可行的方法,即:扬弃“物之所在地法”既有原则,引入文物最初来源地法,在平衡各方利益的基础上形成一套更具灵活性和综合性考量的法律适用方法。  相似文献   

5.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   

6.
The aim of this article is to scrutinise the uncertainty of the Iranian Electronic Commerce Law (IRI ECL 2004) provisions especially on the issue of capacity of parties. Issues of parties’ legal capacity have been resolved in traditional contracts but they are still debatable in electronic commerce transactions. Under UK law, contracts formed by minors for things other than necessities are unenforceable against the minor but enforceable against the merchant (seller) while according to US uniform commercial code in online contracts capacity is not recognized as a legal excuse to nullify a contract. At the mean time, contracts made by incapacitate person is considered null under Iranian law. In spite of technical developments such as digital signatures and smart cards used in verifying the identity and capacity of parties in electronic commerce transactions, the legal certainty on capacity of parties is still questionable. The article also examines the application of traditional contract general rules on parties’ legal capacity in Iran to electronic commerce with reference to EU law. The EU law which is already at an advance stage serves a guide for future development of e-commerce law in Iran.  相似文献   

7.
自从多哈回合谈判陷入僵局之后,各国开始积极谈判自由贸易协议,其中包含的国际经济贸易规则与WTO体系中的国际经济贸易规则有所不同,有学者将这种情形描述为"国际经济贸易规则重构"。知识产权规则作为国际经济贸易规则中的重要部分,各国在此领域的利益各不相同,体现于这些自由贸易协议中的具体规则也各有侧重。其中,网络技术发展作为对知识产权规则的发展变化有所影响的因素,也是各国在签订自由贸易协议时不可忽视的因素之一。在分析几个具有代表性的自由贸易协议中的数字知识产权规则的基础上,可以观察其中数字知识产权保护标准,结合实际情况讨论我国应当作何应对,从而更好地构建我国主导FTA法律框架中相应的知识产权规则。  相似文献   

8.
This contribution argues that the particular relevance of informal circles of ministers lies in their ability to routinise and communise the process of the interpretation of constitutional norms at the intergovernmental level. The informal setting triggers a particular mode of interaction—deliberative intergovernmentalism. In the case of economic policy coordination among the euro–zone countries, which is analysed in this article, this interaction produces common standards for the assessment of the economic situation in the member states and guidelines on appropriate policy responses in particular budgetary and economic situations. In a situation, in which there is growing need for closer policy coordination but European Union member states are reluctant to transfer further decision–making competences to the supranational level, the mediation between diverging interpretations of the rather 'thin' formal constitutional norms governing the coordination process is crucial in order to ensure the overall stability of the coordination framework. Informal circles of ministers can therefore be a way out of the current institutional dilemmas arising from the attitude of national governments to move towards new areas of common engagement while being increasingly reluctant to transfer further formal decision–making competences to the supranational level.  相似文献   

9.
Problems with consumer trust and confidence in the Internet as a safe environment in which to shop, browse and associate are well documented, as are the correlations between this lack of consumer trust and fears about privacy and security online. This paper attempts first to show why existing legal and extra‐legal modes for the protection of privacy online are failing to protect consumers and promote consumer trust. In particular it critiques the European regime of mandatory data protection laws as outdated and inappropriate to a world of multinational corporatism and ubiquitous transnational data flows via cyberspace. In the second part lessons are drawn from the crisis currently faced by intellectual property in cyberspace, particularly in reference to MP3 music files and peer‐to‐peer downloading and useful parallels are drawn from the solution devised by William Fisher of the Berkman Centre, Harvard, in the form of an alternative payment scheme for copyright holders. Finally, the insights drawn from Fisher's work are combined with original proposals drawn from a comparison of the consumer–data collector relationship in cyberspace with the roles played by truster, trustee and beneficiary in the institution of common law trust. The resulting ‘modest proposal’ suggests that a ‘privacy tax’ be levied on the profits made by data collectors and data processors. This could fund no‐fault compensation for identified ‘privacy harms’, improve public privacy enforcement resources, provide privacy‐enhancing technologies to individuals, satisfy the desire of commerce for less data protection‐related internal bureaucracy and possibly create the conditions for better promotion of consumer trust and confidence. The uptake of electronic commerce would thus be significantly enhanced.  相似文献   

10.
电子提单冲突法问题研究   总被引:1,自引:0,他引:1  
电子提单主要用于国际海上货物运输和国际贸易与融资中,这注定了电子提单交易中会产生大量的法律冲突。电子提单的发展尚处于初级阶段,各国法律对其规定多处于空白状态,即使少数已有规定的,彼此间也大相径庭,更何况电子提单除了海商法外,还要涉及电子商务法、电子证据法等问题,这些都使得电子提单的法律冲突问题相对于传统提单而言要远为复杂。  相似文献   

11.
论“国际行政”类型界分   总被引:1,自引:0,他引:1  
林泰 《河北法学》2012,30(11):2-18
国际行政法概念的前提是所谓“国际行政”的存在.通过对全球治理中不同类型的规制主体进行理论界分可以对国际行政做出适当的阐释,划分的标准为主体的固有特征及其权力行使方式,在这个基础上把国际行政划分为国际组织的内部行政、正式的政府间国际组织的行政、私人机制国际组织的行政、公私混合型国际组织之行政、基于国内官员之间合作安排的跨国网络实施的行政、一国国内当局实施的涉外行政等六种.事实上每一种形态都包含众多的跨国规制机构,这只是选取其中最为典型的跨国规制机构重点进行阐述.当然,这种界分是一种为便于研究的相对理想化的做法,在实践中,许多形态的规制机构界限并不是非常清晰,或者是相互重合的.这仅仅是试图对国际行政法所调整的行政关系类型化的一种尝试性的概括.  相似文献   

12.
Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely under-appreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.  相似文献   

13.
For many years, transatlantic cooperation between the EU and the US in the area of personal data exchange has been a subject of special interest on the part of lawmakers, courts – including supranational ones – NGOs and the public. When implementing recent reform of data protection law, the European Union decided to further strengthen guarantees of the protection of privacy in cyberspace. At the same time, however, it faced the practical problem of how to ensure compliance with these principles in relation to third countries. The approach proposed in the GDPR, which is based on a newly-defined territorial scope of application, clearly indicates an attempt to apply EU rules extraterritorially in relation to data processors in third countries.Irrespective of EU activity, the United States has also introduced its own regulations addressing the same problem. An example is the federal law adopted in 2018, specifying how to execute national court orders for the transfer of electronic data. The CLOUD Act was established in response to legal doubts raised in the Microsoft v United States case regarding the transfer of electronic data stored in the cloud by US obliged entities to law enforcement authorities, as well as in cases where this data is physically located in another country and its transfer could result in violating the legal norms of a foreign jurisdiction. The CLOUD Act also facilitates bilateral international agreements that enable the cross-border transfer of e-evidence for the purposes of ongoing criminal proceedings. Both the content of the new regulations and the model proposed by the US legislature for future agreements concluded on the basis of the CLOUD Act can be seen as an alternative to regulations arising from EU law.The purpose of this paper is to analyse the CLOUD Act and CLOUD Act Agreements from the perspective of EU law and, in particular, attempt to answer the question as to whether this new legal mechanism brings the EU and the USA closer to finding common ground with regard to a coherent model of exchange and protection of personal data.  相似文献   

14.
This article examines how governments can regulate the values of social media companies that themselves regulate disinformation spread on their own platforms. We use ‘disinformation’ to refer to motivated faking of news. We examine the effects that disinformation initiatives (many based on automated decision-making systems using Artificial Intelligence [AI] to cope with the scale of content being shared) have on freedom of expression, media pluralism and the exercise of democracy, from the wider lens of tackling illegal content online and concerns to request proactive (automated) measures of online intermediaries. We particularly focus on the responses of the member states and institutions of the European Union. In Section 1, we argue that the apparent significance of the threat has led many governments to legislate despite this lack of evidence, with over 40 national laws to combat disinformation chronicled by March 2019. Which types of regulation are proposed, which actors are targeted, and who is making these regulations? Regulating fake news should not fall solely on national governments or supranational bodies like the European Union. Neither should the companies be responsible for regulating themselves. Instead, we favour co-regulation. Co-regulation means that the companies develop – individually or collectively – mechanisms to regulate their own users, which in turn must be approved by democratically legitimate state regulators or legislatures, who also monitor their effectiveness. In Section 2, we explain the current EU use of Codes of Conduct. In Section 3, we then explain the relatively novel idea that social media content regulation, and specifically disinformation, can be dealt with by deploying AI at massive scale. It is necessary to deal with this technological issue in order to explain the wider content of co-regulatory policy options, which we explain and for which we argue in Section 4. In Section 5 we explain what this means for technology regulation generally, and the socio-economic calculus in this policy field.  相似文献   

15.
黄晓辉  陈诚 《政法学刊》2006,23(4):37-41
全球化背景下,世界各国面临超国家干预经济的客观现实。超国家干预经济有霸权干预经济和国际经济机制干预两种模式。前者是传统的超国家干预模式,曾经促进过国际经济秩序的稳定和发展,但在理论和实践中均存在诸多弊端,如今已不符合国际经济发展的需要,逐渐为国际社会所抛弃;后者作为新的超国家干预经济手段,符合经济全球化发展的趋势,已被国际社会所广泛认同和接纳,理应作为未来超国家干预经济的模式。但国际经济机制干预模式仍存在诸多缺陷,应当完善其多元化设计,并推进其实现从自由化到社会化的转型,最终建立和谐世界经济环境。  相似文献   

16.
《民法典》第406条修改了原《物权法》第191条关于禁止抵押物转让的规则,允许抵押人在设定抵押权后转让抵押物.新规则虽然有利于促进物尽其用,鼓励交易,但是由此也可能给抵押权人监管抵押物或实现抵押权造成困难.因此有必要赋予禁止转让特约以公示能力,在违反经公示的禁止转让特约后,转让合同有效但不能发生物权变动的效力,从而兼顾...  相似文献   

17.
Non‐possessory secured transactions are key components of market economies. National and international legal reform projects have been advanced to further their use and broaden access to credit. Yet reforms appear to be limited by practical obstacles posed by national legal categories. This article shifts the focus from domestically defined categories to the operational rules that allow secured transactions to perform their economic function of managing credit risk. This shift leads to a reconsideration of the rules governing publicity and an examination of the policy issues underpinning the evolution of publicity. The article argues that international publicity standards, based on a registry system, could offer a new strategy for reforming secured transactions laws. The recently adopted UNCITRAL's Registry Guide is analysed and considered as a possible tool for reforming national secured transactions laws.  相似文献   

18.
This article analyzes rights consciousness as distinct from legal consciousness, and uses the post‐1989 housing restitution in Romania to study property rights consciousness as a type of rights consciousness. I argue that property rights consciousness is only partially an outcome of state power and the political regime, and that rights consciousness more generally must be explicitly analyzed beyond formal rights, legal mobilization, and litigation. I explore sources of rights consciousness for former owners and their heirs, state tenants, and lawyers. Sources of rights consciousness include state policies under distinct property regimes, value systems and ideologies, history, identity, practices, supranational actors, and expectations of what rights can deliver. I find clear distinctions between legal and rights consciousness, as well as variations between and within the groups. The article is based on extensive archival research, interviews conducted in the city of Timi?oara, Romania, textbooks, academic articles, and court decisions pre‐ and post‐1989.  相似文献   

19.
Cyberspace is a new frontier for both international and domestic family law. On the one hand, it presents great opportunities for society and, on the other, great dangers particularly for children. This paper explores a number of issues from a domestic and international family law perspective. These issues include:
  • ? What is cyberspace, how has it emerged, and where is it likely to go?
  • ? What are the potential dangers for children that arise from children's engagement with cyberspace?
  • ? What is the nature and extent of domestic and international family laws that protect children from the dangers of cyberspace?
  • ? What are some of the present and emerging policy issues that impact on these matters?
Cyber‐abuse is a term that encompasses a wide range of aggressive online activities.  相似文献   

20.
The Internet is often described as inherently free from regulation; a space where freedoms and liberties are guaranteed by the design of the network environment. The naivety of this view has, however, been exposed by commentators such as Shapiro, Reidenberg, and Lessig who have clearly demonstrated the inherent regulability of networked space. The question no longer is: can networked space be regulated? but rather, how and by whom is it regulated? This paper examines the regulation of rights in networked space. Property rights and rights to free speech, or free expression, are examined in relation to a number of issues that have emerged in the networked environment, or cyberspace. Its aim is to examine whether the embryonic regulatory structure of cyberspace, which has the advantage of starting with a completely clean slate, is sufficiently sympathetic to the unique qualities of this fledgling jurisdiction.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号