712 resultados para Corporate law
Resumo:
Discusses the importation of Western concepts of corporate governance into Hong Kong where many companies are family companies to which Asian culture is more familiar. Considers different models of corporate governance and questions the application of Western structures to family owned companies. Examines the weaknesses inherent in the typical structure of Asian companies, particularly from the point of view of minority shareholders. Suggests that a system of governance based on Confucian philosophy may be more effective in Hong Kong.
Resumo:
This article considers the opportunity, presented by the coincidence of simultaneous charity law reviews in the two jurisdictions on the island of Ireland, for an adjustment of charity law frameworks to maximise appropriate and effective charitable activity within each jurisdiction,while also facilitating the coordination of some such activity between both. It examines the nature of civil society and charity law, and the relationship between them. The article argues that a creative legislative response to this opportunity could address themes of social inclusion common to both jurisdictions and thereby contribute to the consolidation of civil society on this island.
Resumo:
In 2004, there were sweeping, radical changes made to the underlying legal framework regulating life in China. This reflected such things as the incorporation of basic international human rights standards into domestic law - not only in China but in countries worldwide which highlights the increasingly global nature of many important legal issues. China is not immune from this development of cross pollination of legal processes. This has led to an increase in the internationalisation of legal education and the rapid rise in the number of overseas students who undertake at least part of their university studies in a foreign country. Academics need to develop cross-cultural sensitivity in teaching these overseas students; there are important reasons why the educative process needs to meet the different set of needs presented by international students who come to study in Australia. This teaching note sets out the experiences of two particular situations, the teaching of Business Law to Asian students and an innovative Australian postgraduate program taught in Mandarin.
Resumo:
China is now seen as arguably, the next economic giant of the 21st century. From a country closed in the past to the external world, the Chinese market now presents as one of the most lucrative in the world economy. One area that has drawn increasing international interest is education - it has been estimated that by 2020 there will be 25 million excess demands for higher education places that the Chinese tertiary educational system cannot meet. Many overseas institutions have developed programs to cater for this immense potential market. In 2000 the Law Faculty of the University of Technology, Sydney (UTS)introduced a new postgraduate program specifically targeting the Chinese market. This paper is a brief assessment of the program - it examines general issues in the pedagogical delivery of programs in LOTE (Language Other Than English) and the use of 'proxies' in the delivery of LOTE programs. The paper concludes that while the UTS program demonstrates that it is feasible to use proxy lecturers or interpreters in the delivery of programs in LOTE, the exercise entails significant problems that can undermine the integrity of such programs.
Resumo:
On the surface the subjects of Corporate Social Responsibility (CSR) and Critical Management Studies (CMS) seem to be closely related. Both are concerned with reflecting on the impact of management and organisation on employees, the wider community and the environment. Both suggest that there may be a need for organisations to take responsibility for and account of people other than shareholders and both have used the concept of accountability to suggest that organisations may need to do more than just comply with the legal framework.
Resumo:
We investigate the roles of finn and country level agency conflicts in determining corporate payout policics. Based on a large sample of 29,610 firms in 42 countries from 2001 to 2006, we show there is a form of "pecking order" in investors' ability to extract cash (whether as dividends only or share repurchases) from firms. Although investors are able to use their legal powers to extract cash from firms in high protection countries, their ability to do so can be substantially hindered when agency costs at the firm level are high. In poor protection countries, investors seem to take whatever cash they can get, even though the amount may be small, and with scant regard for investment opportunities and firm level agency conflicts. Finally, compared to repurchases, we find dividends are more likely to be the sole method of payout in high protection countries and in non insider-dominated firms.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
The concept of "fair basing" is widely acknowledged as a difficult area of patent law. This article maps the development of fair basing law to demonstrate how some of the difficulties have arisen. Part I of the article traces the development of the branches of patent law that were swept under the nomenclature of "fair basing" by British legislation in 1949. It looks at the early courts' approach to patent construction, examines the early origin of fair basing and what it was intended to achiever. Part II of the article considers the modern interpretation of fair basing, which provides a striking contrast to its historical context. Without any consistent judicial approach to construction the doctrine has developed inappropriately, giving rise to both over-strict and over-generous approaches.
Resumo:
Vietnam's present draft of the proposed new Law on Competition is currently in its ninth version. Although there is a need to enact legislation as quickly as possible, Vietnam cannot rush the drafting process. Under its Bilateral Trade Agreement with the USA, Vietnam has committed to improve the quality of its laws and consistency of its legislative framework. Since the Law on Competition will be fundamental in establishing the legal framework for a more coherent and effective competition regime, and will have profound influences on Vietnam's objective of becoming a socialist-oriented market economy, its provisions must be well constructed and well considered, and this takes time. This article shows how the proposed Law is being crafted as compared to older drafts which sheds light on changes in policy during the drafting process. Where possible, the Draft is also compared with the laws in other jurisdictions for any assistance they might lend. In this author's opinion not all the changes are positive but any defects in the draft are not intractable and can be remedied prior to promulgation.
Resumo:
Since 1986 Vietnam has been engaged in the transition from a centrally-controlled economy to a socialist-oriented market economy (the 'doi moi' renovation). The process for global economic integration has been slow given the magnitude of necessary reforms. Consequently technology entrepreneurs often discount Vietnam as a possible commercialization base which means that it is not realising its economic potential as a hub of technology transfer in the Asia-Pacific region. Three significant factors in the current uncertainty are Vietnam's laws on competition, intellectual property and technology transfer. Another problem is the lack of literature on these laws. This article first discusses the conceptual relationship between competition, intellectual property and technology transfer. Hopefully the article will provide some guidance for the technology entrepreneur considering foreign direct investment (FDI) in Vietnam. The bottom line is that these laws still need further reform to bolster entrepreneurial confidence.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
Health Law in Australia is the first book to deal with health law on a comprehensive national basis. In a field of law that is becoming increasingly important and where the demand for expertise is rapidly expanding, Health Law in Australia takes a logical, structured approach to an examination of the law in all Australian jurisdictions. By covering all the major areas in this diverse field of law, Health Law in Australia enhances the understanding of the discipline as a whole. Beginning with an exploration of the general principles of health law, including chapters on “Medical Negligence”, “Children and Consent”, and “Confidentiality, Privacy, and Access to Health Records”, the book goes on to consider beginning-of-life and end-of-life issues before concluding with chapters on emerging areas in health law, such as biotechnology and medical research. The contributing authors include national leaders in the field who are specialists in these areas of health law and who can therefore reveal to readers the results of their research. Health Law in Australia has been written for those with a legal background and is essential reading for undergraduate law students, postgraduate law students, researchers and scholars in the disciplines of law, health and medicine, as well as legal practitioners, government departments and bodies in the health area, and private health providers.
Resumo:
• For the purposes of this chapter, “health law” encapsulates regulation of the medical and health professions, the administration of health services and the maintenance of public health to the extent that it is connected to the provision of health services. • There are diverging views as to whether health law can be regarded as a discrete “area of law”. • Health law draws on other areas of law such as tort law, criminal law and family law. It is also draws upon other disciplines, most notably medical and health ethics. • Social and economic forces have influenced the development and direction of health law, and these forces may become even more influential as the century develops. • The increasingly globalised world has implications for Australia’s health systems and raises questions and creates commitments in respect of the international community. • Technological developments, including in respect of treatment, diagnosis and information management, create ongoing challenges for health law. • Patient rights, human rights and consumerism are increasingly key drivers in the development of health law. • Health law is significant to contemporary Australian society because of the gravity of the topics that fall within its ambit, its social relevance to so many aspects of human existence and endeavour, the important role it plays in protecting the vulnerable, and the extent to which it engages with fundamental principles of justice.
Resumo:
On the back of the growing capacity of networked digital information technologies to process and visualise large amounts of information in a timely, efficient and user-driven manner we have seen an increasing demand for better access to and re-use of public sector information (PSI). The story is not a new one. Share knowledge and together we can do great things; limit access and we reduce the potential for opportunity. The two volumes of this book seek to explain and analyse this global shift in the way we manage public sector information. In doing so they collect and present papers, reports and submissions on the topic by leading authors and institutions from across the world. These in turn provide people tasked with mapping out and implementing information policy with reference material and practical guidance. Volume 1 draws together papers on the topic by policymakers, academics and practitioners while Volume 2 presents a selection of the key reports and submissions that have been published over the last few years.