排序方式: 共有613条查询结果,搜索用时 683 毫秒
221.
The EU Proposal for a General Data Protection Regulation has caused a wide debate between lawyers and legal scholars and many opinions have been voiced on the issue of the right to be forgotten. In order to analyse the relevance of the new rule provided by Article 17 of the Proposal, this paper considers the original idea of the right to be forgotten, pre-existing in both European and U.S. legal frameworks. This article focuses on the new provisions of Article 17 of the EU Proposal for a General Data Protection Regulation and evaluates its effects on court decisions. The author assumes that the new provisions do not seem to represent a revolutionary change to the existing rules with regard to the right granted to the individual, but instead have an impact on the extension of the protection of the information disseminated on-line. 相似文献
222.
This article analyses the jurisdictional principles employed by Australian courts in establishing personal jurisdiction in traditional settings and its extension to e-commerce cases. The Australian courts apply the court rules to exercise personal jurisdiction over defendants. The article discusses these rules relating to serving process within and outside Australia and jurisdiction based on the submission of the parties. The adequacies of principles like forum-non-conveniens, forum selection clauses which are vital in the personal jurisdiction inquiry are analysed. The unique High Court decision in Dow Jones v. Gutnick is discussed and the approach followed by the court critically analysed to highlight the excessive exercise of personal jurisdiction. Other cases concerning the internet are also discussed to highlight the approaches followed to establish personal jurisdiction in internet and e-commerce cases. It is argued that the drawbacks highlight the need for legislation to regulate personal jurisdiction in e-commerce cases. 相似文献
223.
The existence of a fundamental right to the protection of personal data in European Union (EU) law is nowadays undisputed. Established in the EU Charter of Fundamental Rights in 2000, it is increasingly permeating EU secondary law, and is expected to play a key role in the future EU personal data protection landscape. The right's reinforced visibility has rendered manifest the co-existence of two possible and contrasting interpretations as to what it come to mean. If some envision it as a primarily permissive right, enabling the processing of such data under certain conditions, others picture it as having a prohibitive nature, implying that any processing of data is a limitation of the right, be it legitimate or illegitimate. This paper investigates existing tensions between different understandings of the right to the protection of personal data, and explores the assumptions and conceptual legacies underlying both approaches. It traces their historical lineages, and, focusing on the right to personal data protection as established by the EU Charter, analyses the different arguments that can ground contrasted readings of its Article 8. It also reviews the conceptualisations of personal data protection as present in the literature, and finally contrasts all these perspectives with the construal of the right by the EU Court of Justice. 相似文献
224.
This is a brief comment on a meeting held at the Council of Europe in Strasbourg, which discussed ways of improving transnational access to data by law enforcement through the Cybercrime Convention. In particular, the possible introduction of a new protocol, and a guidance note on art. 32(b), were considered. It is argued that there are serious concerns with both proposals. Moreover, the meeting revealed a surprising lack of knowledge as to current levels of cooperation between law enforcement and foreign service providers. 相似文献
225.
Ivan Y. Sun Author Vitae James J. Sobol Author Vitae Author Vitae Scott W. Phillips Author Vitae 《Journal of criminal justice》2010,38(4):640
While police attitudes and behaviors have been the subject of a large number of studies conducted since the 1960s, very few studies had assessed Chinese police officers’ work-related attitudes and compared them with those of the U.S. police cadets. Using survey data collected from 263 Chinese and American police cadets, the research empirically tested whether Chinese and American police cadet attitudes differed across four attitudinal dimensions: aggressive patrol, order maintenance, legal restrictions, and distrust of citizens. Bivariate and multivariate results showed that Chinese cadets displayed occupational outlooks that distinguished them from their American counterparts. Chinese cadets supported aggressive patrol and were more distrustful of citizens than their American counterparts. American cadets were more favorable of order maintenance activities and more accepting of legal restrictions compared with Chinese cadets. Implications for future research and policy are discussed. 相似文献
226.
Stuart S. Yeh Author Vitae 《Journal of criminal justice》2010,38(5):1090
Objective
The objective of this study was to estimate the benefits and costs of using electronic monitoring (EM) and home detention to reduce crime committed by parolees and probationers.Method
Data from a national survey of state prison inmates was adjusted and used to estimate the number of crimes that would have been committed by all parolees and probationers over the course of one year in the absence of EM and home detention. The data were analyzed in combination with existing analyses of the effectiveness and costs of EM and home detention and the economic costs of crime to estimate the benefit-cost ratio of nationwide implementation of EM and home detention with all parolees and probationers.Results
EM plus home detention could avert an estimated 781,383 crimes every year. The social value of the annual reduction in crime is $481.1 billion. Society would gain $12.70 for every dollar expended on the proposed intervention.Conclusion
EM plus home detention could be an effective deterrent to crime and could have enormous social benefits, especially if it is applied early and saves what would otherwise be habitual offenders from a life of crime. 相似文献227.
Business Registers (BRs) are a very important information resource for investors, creditors, financial institutions and public authorities. The possibility to aggregate and interconnect these data at a European level could enhance the transparency of companies towards those actors and add a great deal of value to the raw Business Register data. The European BRITE project intended to provide adequate tools to meet these demands. BRITE will provide easier access and cross-border interoperability of Business Register data throughout Europe. On the other hand, the processing of BR data within the BRs and BRITE triggers several important European legislations such as the Data Protection Directive and the Directive on the re-use of public sector information. In this paper, the processing of BR data will be analysed from the perspective of both data protection and public sector information laws, analysing as well the relation between both regulations. Do these regulations strike an optimal balance between the interests of private data vendors to re-use BR data and enhance business transparency and the need to protect the personal data of natural persons? 相似文献
228.
Nehaluddin AhmadAuthor Vitae 《Computer Law & Security Report》2009,25(2):173-180
The developments of technology in communications industry have radically altered the ways in which we communicate and exchange information. Along with the speed, efficiency, and cost-saving benefits of the digital revolution come new challenges to the security and privacy of communications and information traversing the global communications infrastructure. As is with any technology the misuse of technology is noticed similarly the encryption technology. Encryption and other advanced technologies may be used, with direct impact on law enforcement and therefore some restrictions are necessary in the interests of national security. The problem, however, is ensuring that the restriction is legitimate and solely for in the interests of national security, the state not being allowed to interfere and keep a track on individuals' activities and private lives without sufficient cause. The individual needs encryption to protect their personal privacy and confidential data such as medical information, personal financial data, and electronic mail. In a networked environment, such information is increasingly at risk of being stolen or misused. Therefore, encryption is critical to building a secure and trusted global information infrastructure. Digital computers have changed the landscape considerably and the entire issue, at its simplest level, boils down to a form of balancing of interests. The specific legal and rights-related problems arising from the issue of cryptography and privacy in the Indian context are examined in this paper. 相似文献
229.
Ewan NettletonAuthor Vitae 《Computer Law & Security Report》2009,25(2):181-184
Four years from the European Court of Justice's seminal rulings on database right in the British Horseracing Board and Fixtures Marketing cases, the Court has once again looked at the extent of protection this right affords. The earlier decisions had suggested the right was weak, with many databases not qualifying for protection and the extent of infringement required being difficult to meet. However, the ECJ's recent ruling in the Directmedia case (C-304/07) handed down in late-2008 is more positive for database owners. Adopting the reasoning of the Advocate General, the ECJ has clarified the types of acts which can constitute infringement of database right and confirmed they are broad in scope. The outcome and implications of the ruling are discussed below. 相似文献
230.
Clare SullivanAuthor Vitae 《Computer Law & Security Report》2009,25(3):227-236
This paper examines the concept of digital identity which the author asserts is now evident in the United Kingdom as a consequence of the Identity Cards Act (UK) 2006 and the National Identity Scheme it establishes. The nature and functions of the concept, particularly the set of information which constitutes an individual's transactional identity, are examined. The paper then considers the central question of who, or what, is the legal person in a transaction i.e. who or what enters into legal relations. The analysis presents some intriguing results which were almost certainly not envisaged by the legislature. The implications extend beyond the United Kingdom to similar schemes in other jurisdictions, and to countries, like Australia, which may implement such a scheme. 相似文献