145 resultados para RIGHTS OF THE CHLD
Resumo:
Patents provide monopoly rights to patent holders. There are safeguards in patent regime to ensure that exclusive right of the patent holder is not misused. Compulsory licensing is one of the safeguards provided under TRIPS using which patent granting state may allow a third party to exploit the invention without patent holder’s consent upon terms and conditions decided by the government. This concept existed since 1623 and was not introduced by TRIPS for the first time. But this mechanism has undergone significant changes especially in post-TRIPS era. History of evolution of compulsory licensing is one of the least explored areas of intellectual property law. This paper undertakes an analysis of different phases in the evolution of the compulsory licensing mechanism and sheds light on reasons behind developments especially after TRIPS.
Resumo:
In 2015 the UN Secretary-General established an External Independent Review to review how the United Nations has responded to allegations of child sexual exploitation and child sexual abuse, and to make recommendations concerning how the United Nations should respond to allegations in the future. This submission to the Review Panel draws on literature regarding children's rights, the nature of child sexual abuse, international instruments and policy, the nature of institutional child sexual abuse, and the CAR case itself. It makes recommendations for reform of UN protocols and procedures to better prevent child sexual abuse, and to improve responses to future occurrences.
Resumo:
In this article the author discusses issues arising from counselling and family dispute resolution (FDR) in relation to confidentiality and admissibility, such as whether an admission of abuse to a child, or a threat to harm the other parent, can be disclosed by the counsellor or family dispute resolution practitioner (FDRP) and used in court proceedings. It is found that the admissibility provisions in the Family Law Act 1975 (Cth) are far more narrowly defined than the confidentiality requirements and have been interpreted strictly by the courts. There are competing policy considerations: the strict “traditionalist” approach, that people can have absolute faith in the integrity of counsellors and mediators and in the confidential nature of the process, must be balanced against a more “protectionist” stance, being the individual rights of victims to have all relevant information placed before the court and to be protected from violence and abuse. It is suggested that legislative reform is required to ensure that courts balance these considerations appropriately and don’t compromise the safety of victims of abuse and family violence.
Resumo:
The Internet Engineering Task Force (IETF) is currently developing the next version of the Transport Layer Security (TLS) protocol, version 1.3. The transparency of this standardization process allows comprehensive cryptographic analysis of the protocols prior to adoption, whereas previous TLS versions have been scrutinized in the cryptographic literature only after standardization. This is even more important as there are two related, yet slightly different, candidates in discussion for TLS 1.3, called draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based. We give a cryptographic analysis of the primary ephemeral Diffie–Hellman-based handshake protocol, which authenticates parties and establishes encryption keys, of both TLS 1.3 candidates. We show that both candidate handshakes achieve the main goal of providing secure authenticated key exchange according to an augmented multi-stage version of the Bellare–Rogaway model. Such a multi-stage approach is convenient for analyzing the design of the candidates, as they establish multiple session keys during the exchange. An important step in our analysis is to consider compositional security guarantees. We show that, since our multi-stage key exchange security notion is composable with arbitrary symmetric-key protocols, the use of session keys in the record layer protocol is safe. Moreover, since we can view the abbreviated TLS resumption procedure also as a symmetric-key protocol, our compositional analysis allows us to directly conclude security of the combined handshake with session resumption. We include a discussion on several design characteristics of the TLS 1.3 drafts based on the observations in our analysis.
Resumo:
Over hundreds of generations, indigenous groups around the world have passed down their traditional landscape associations, a number of which are intangible and therefore unquantifiable. Yet, these associative relationships with nature have been, and continue to be, pivotal in cultural evolution. Determining the authenticity of intangible landscape associations has caused much controversy, and in recent decades, indigenous groups have begun seeking protection of their places of significance. In response, the United Nations Educational, Scientific and Cultural Organisation (UNESCO) World Heritage Committee (WHC) developed a criterion that intended to assist in the identification and protection of cultural landscapes. The WHC has therefore become the global authority responsible for determining the authenticity of cultural landscapes, including those with intangible associations rather than material cultural evidence. However, even with the support of the United Nations, UNESCO and the WHC, it is unlikely that every tangible cultural landscape will be sufficiently recognised and protected. Therefore, this research paper explores the effectiveness of current approaches to gauging authenticity in instances where multiple landscapes are valued according to similar characteristics. Further, this work studies the inherent relationship between the indigenous Maori population of the South Island of New Zealand, in particular Kai Tahi peoples, and their significant landscape features, as a means of considering the breadth and depth of historic intangible associations. In light of these findings, this research challenges the appropriateness of the term 'authenticity' when analysing not only the subjective, but more pressingly, the intangible. It therefore questions the role of empirical data in demonstrating authenticity, while recognising that a prolific list of such intangible cultural landscapes has the potential to diminish integrity. This, this paper addresses an urgent need for increased social research in this area, namely in identifying cultural landscape protection methods that empower all local indigenous communities, not just those which are the most critically acclaimed.
Resumo:
Additive manufacturing or ‘3D printing’ has emerged into the mainstream in the last few years, with much hype about its revolutionary potential as the latest ‘disruptive technology’ to destroy existing business models, empower individuals and evade any kind of government control. This book examines the trajectory of 3D printing in practice and how it interacts with various areas of law, including intellectual property, product liability, gun laws, data privacy and fundamental/constitutional rights. A particular comparison is made between 3D printing and the Internet as this has been, legally-speaking, another ‘disruptive technology’ and also one on which 3D printing is partially dependent. This book is the first expert analysis of 3D printing from a legal perspective and provides a critical assessment of the extent to which existing legal regimes can be successfully applied to, and enforced vis-à-vis, 3D printing.
Resumo:
Free software is viewed as a revolutionary and subversive practice, and in particular has dealt a strong blow to the traditional conception of intellectual property law (although in its current form could be considered a 'hack' of IP rights). However, other (capitalist) areas of law have been swift to embrace free software, or at least incorporate it into its own tenets. One area in particular is that of competition (antitrust) law, which itself has long been in theoretical conflict with intellectual property, due to the restriction on competition inherent in the grant of ‘monopoly’ rights by copyrights, patents and trademarks. This contribution will examine how competition law has approached free software by examining instances in which courts have had to deal with such initiatives, for instance in the Oracle Sun Systems merger, and the implications that these decisions have on free software initiatives. The presence or absence of corporate involvement in initiatives will be an important factor in this investigation, with it being posited that true instances of ‘commons-based peer production’ can still subvert the capitalist system, including perplexing its laws beyond intellectual property.
Resumo:
This paper provides a framework for understanding Twitter as a historical source. We address digital humanities scholars to enable the transfer of concepts from traditional source criticism to new media formats, and to encourage the preservation of Twitter as a cultural artifact. Twitter has established itself as a key social media platform which plays an important role in public, real-time conversation. Twitter is also unique as its content is being archived by a public institution (the Library of Congress). In this paper we will show that we still have to assume that much of the contextual information beyond the pure tweet texts is already lost, and propose additional objectives for preservation.
Resumo:
The 6-item Kessler Psychological Distress Scale (K6; Kessler et al., 2002) is a screener for psychological distress that has robust psychometric properties among adults. Given that a significant proportion of adolescents experience mental illness, there is a need for measures that accurately and reliably screen for mental disorders in this age group. This study examined the psychometric properties of the K6 in a large general population sample of adolescents (N = 4,434; mean age = 13.5 years; 44.6% male). Factor analyses were conducted to examine the dimensionality of the K6 in adolescents and to investigate sex-based measurement invariance. This study also evaluated the K6 as a predictor of scores on the Strengths and Difficulties Questionnaire (SDQ; Goodman, 1997). The K6 demonstrated high levels of internal consistency, with the 6 items loading primarily on 1 factor. Consistent with previous research, females reported higher mean levels of psychological distress when compared with males. The identification of sex-based measurement noninvariance in the item thresholds indicated that these mean differences most likely represented reporting bias in the K6 items rather than true differences in the underlying psychological distress construct. The K6 was a fair to good predictor of abnormal scores on the SDQ, but predictive utility was relatively low among males. Future research needs to focus on refining and augmenting the K6 scale to maximize its utility in adolescents. (PsycINFO Database Record (c) 2015 APA, all rights reserved)
Resumo:
The frugivorous 'true' fruit fly, Bactrocera tryoni (Queensland fruit fly), is presumed to have a non-resourced-based lek mating system. This is largely untested, and contrary data exists to suggest Bactrocera tryoni may have a resource-based mating system focused on fruiting host plants. We tested the mating system of Bactrocera tryoni, and its close sibling Bactrocera neohumeralis, in large field cages using laboratory reared flies. We used observational experiments that allowed us to determine if: - (i) mating pairs were aggregated or non-aggregated; - (ii) mating system was resource or non-resource based; - (iii) flies utilised possible landmarks (tall trees over short) as mate-rendezvous sites, and; - (iv) males called females from male-dominated leks. We recorded nearly 250 Bactrocera tryoni mating pairs across all experiments, revealing that: - (i) mating pairs were aggregated; - (ii) mating nearly always occurred in tall trees over short; - (iii) mating was non-resource based, and; - (iv) that males and females arrived at the mate-rendezvous site together with no evidence that males preceded females. Bactrocera neohumeralis copulations were much more infrequent (only 30 mating pairs in total), but for those pairs there was a similar preference for tall trees and no evidence of a resource-based mating system. Some aspects of Bactrocera tryoni mating behaviour align with theoretical expectations of a lekking system, but others do not. Until evidence for unequivocal female choice can be provided (as predicted under a true lek), the mating system of Bactrocera tryoni is best described as a non-resource based, aggregation system for which we also have evidence that land-marking may be involved. This article is protected by copyright. All rights reserved.