420 resultados para mandatory disclosure


Relevância:

10.00% 10.00%

Publicador:

Resumo:

By December 2010 total superannuation assets had reached $1.3 trillion, covering 94% of all Australians. This substantial growth was not a natural evolution. Rather it can be directly traced to three decades of bipartisan reform strategies based on a claimed public interest ideology. This article investigates the concerns raised by Superannuation Select Committees, consumer and union organisations, independent researchers and actuarial experts that, in contrast to the public interest rhetoric, the regulatory reforms have primarily achieved major private interest gains for powerful lobbyists. The findings of this analysis indicate that the democratic power of Australian governments to set economic policy agendas has been progressively eclipsed by the power of the financial services industry's producer groups. Rather than producing a best practice governance structure, fund members remain trapped in a post-reform cost paradox: no right of exit regardless of the deepening cost burden imposed. In an industry set to control a projected nominal figure of $6.7 trillion in superannuation assets by 2035, these findings suggest that the real change necessary to improve the deepening cost burden faced by fund members within a life-long, mandatory superannuation investment is now beyond any government's reach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Few studies have investigated iatrogenic outcomes from the viewpoint of patient experience. To address this anomaly, the broad aim of this research is to explore the lived experience of patient harm. Patient harm is defined as major harm to the patient, either psychosocial or physical in nature, resulting from any aspect of health care. Utilising the method of Consensual Qualitative Research (CQR), in-depth interviews are conducted with twenty-four volunteer research participants who self-report having been severely harmed by an invasive medical procedure. A standardised measure of emotional distress, the Impact of Event Scale (IES), is additionally employed for purposes of triangulation. Thematic analysis of transcript data indicate numerous findings including: (i) difficulties regarding patients‘ prior understanding of risks involved with their medical procedure; (ii) the problematic response of the health system post-procedure; (iii) multiple adverse effects upon life functioning; (iv) limited recourse options for patients; and (v) the approach desired in terms of how patient harm should be systemically handled. In addition, IES results indicate a clinically significant level of distress in the sample as a whole. To discuss findings, a cross-disciplinary approach is adopted that draws upon sociology, medicine, medical anthropology, psychology, philosophy, history, ethics, law, and political theory. Furthermore, an overall explanatory framework is proposed in terms of the master themes of power and trauma. In terms of the theme of power, a postmodernist analysis explores the politics of patient harm, particularly the dynamics surrounding the politics of knowledge (e.g., notions of subjective versus objective knowledge, informed consent, and open disclosure). This analysis suggests that patient care is not the prime function of the health system, which appears more focussed upon serving the interests of those in the upper levels of its hierarchy. In terms of the master theme of trauma, current understandings of posttraumatic stress disorder (PTSD) are critiqued, and based on data from this research as well as the international literature, a new model of trauma is proposed. This model is based upon the principle of homeostasis observed in biology, whereby within every cell or organism a state of equilibrium is sought and maintained. The proposed model identifies several bio-psychosocial markers of trauma across its three main phases. These trauma markers include: (i) a profound sense of loss; (ii) a lack of perceived control; (iii) passive trauma processing responses; (iv) an identity crisis; (v) a quest to fully understand the trauma event; (vi) a need for social validation of the traumatic experience; and (vii) posttraumatic adaption with the possibility of positive change. To further explore the master themes of power and trauma, a natural group interview is carried out at a meeting of a patient support group for arachnoiditis. Observations at this meeting and members‘ stories in general support the homeostatic model of trauma, particularly the quest to find answers in the face of distressing experience, as well as the need for social recognition of that experience. In addition, the sociopolitical response to arachnoiditis highlights how public domains of knowledge are largely constructed and controlled by vested interests. Implications of the data overall are discussed in terms of a cultural revolution being needed in health care to position core values around a prime focus upon patients as human beings.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Schools in Australia today are expected to improve student outcomes in an increasingly constrained context focused on accountability. At the same time as teachers work within these constraints, they are also working to ensure that all students are able to achieve quality outcomes from schooling while dealing with increasing diversity of the student population. So what is a teacher’s role in providing equitable possibilities for all of the students in their care? Teachers are left with the difficult task of balancing the many mandatory requirements placed on them, and on their students, such as gaining improvements on high stakes test scores, with the important work of dealing with individual students and student cohorts in equitable and socially just ways. This impacts on the work of all teachers, however for those teachers working in schools in contexts of complexity and duress these pressures are never greater.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract Objective Involuntary commitment and treatment (IC&T) of people affected by mental illness may have reference to considerations of dangerousness and/or need for care. While attempts have been made to classify mental health legislation according to whether IC&T has obligatory dangerousness criteria, there is no standardised procedure for making classification decisions. The aim of this study was to develop and trial a classification procedure and apply it to Australia's mental health legislation. Method We developed benchmarks for ‘need for care’ and ‘dangerousness’ and applied these benchmarks to classify the mental health legislation of Australia's 8 states and territories. Our focus was on civil commitment legislation rather than criminal commitment legislation. Results One state changed its legislation during the course of the study resulting in two classificatory exercises. In our initial classification, we were able to classify IC&T provisions in legislation from 6 of the 8 jurisdictions as being based on either ‘need for care’ or ‘dangerousness’. Two jurisdictions used a terminology that was outside the established benchmarks. In our second classification, we were also able to successfully classify IC&T provisions in 6 of the 8 jurisdictions. Of the 6 Acts that could be classified, all based IC&T on ‘need for care’ and none contained mandatory ‘dangerousness’ criteria. Conclusions The classification system developed for this study provided a transparent and probably reliable means of classifying 75% of Australia's mental health legislation. The inherent ambiguity of the terminology used in two jurisdictions means that further development of classification may not be possible until the meaning of the terms used has been addressed in case law. With respect to the 6 jurisdictions for which classification was possible, the findings suggest that Australia's mental health legislation relies on ‘need for care’ and not on ‘dangerousness’ as the guiding principle for IC&T. Keywords: Involuntary commitment; Mental health legislation; Dangerousness; Australia

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tort law reform has resulted in legislation being passed by all Australian jurisdictions in the past decade implementing the recommendations contained in the Ipp Report. The report was in response to a perceived crisis in medical indemnity insurance. The objective was to restrict and limit liability in negligence actions. This paper will consider to what extent the reforms have impacted on the liability of health professionals in medical negligence actions. The reversal of the onus of proof through the obvious risk sections has attempted to extend the scope of the defence of voluntary assumption of risk. There is no liability for the materialisation of an inherent risk. Presumptions and mandatory reductions for contributory negligence have attempted to reduce the liability of defendants. It is now possible for reductions of 100% for contributory negligence. Apologies can be made with no admission of legal liability to encourage them being made and thereby reduce the number of actions being commenced. The peer acceptance defence has been introduced and enacted by legislation. There is protection for good samaritans even though the Ipp Report recommended against such protection. Limitation periods have been amended. Provisions relating to mental harm have been introduced re-instating the requirement of normal fortitude and direct perception. After an analysis of the legislation, it will be argued in this paper that while there has been some limitation and restriction, courts have generally interpreted the civil liability reforms in compliance with the common law. It has been the impact of statutory limits on the assessment of damages which has limited the liability of health professionals in medical negligence actions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While much narrative inquiry is concerned with issues of self and identity, doing study on the processes (the how) of self-making offers ongoing challenges to methodology. This article explores the creation of a dialogic space that assisted young adolescents to write about themselves and their daily lives using email journals as an alternative to face-to-face interviews. With the researcher acting as a listener-responder, and in the absence of researcher-designed questions, a dynamic field was opened up for participant-led self-making to emerge over a six month period of self-reflective written expression. The article describes a shared email relationship based on a dialogic pattern of thinking, writing, listening and response intended to foster participants’ voices as ontological narratives of self. Findings show the use of email journals created a synergy for self-disclosure and a safe space for self-expression where the willingness of participants to be themselves was encouraged. The self-representations of a specific group of gifted young adolescents thus emerged as written versions of “who” they are —offering data that differs from interview approaches and contributing to discussion of the value of ontology narratives.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to jointly assess the impact of regulatory reform for corporate fundraising in Australia (CLERP Act 1999) and the relaxation of ASX admission rules in 1999, on the accuracy of management earnings forecasts in initial public offer (IPO) prospectuses. The relaxation of ASX listing rules permitted a new category of new economy firms (commitments test entities (CTEs))to list without a prior history of profitability, while the CLERP Act (introduced in 2000) was accompanied by tighter disclosure obligations and stronger enforcement action by the corporate regulator (ASIC). Design/methodology/approach – All IPO earnings forecasts in prospectuses lodged between 1998 and 2003 are examined to assess the pre- and post-CLERP Act impact. Based on active ASIC enforcement action in the post-reform period, IPO firms are hypothesised to provide more accurate forecasts, particularly CTE firms, which are less likely to have a reasonable basis for forecasting. Research models are developed to empirically test the impact of the reforms on CTE and non-CTE IPO firms. Findings – The new regulatory environment has had a positive impact on management forecasting behaviour. In the post-CLERP Act period, the accuracy of prospectus forecasts and their revisions significantly improved and, as expected, the results are primarily driven by CTE firms. However, the majority of prospectus forecasts continue to be materially inaccurate. Originality/value – The results highlight the need to control for both the changing nature of listed firms and the level of enforcement action when examining responses to regulatory changes to corporate fundraising activities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines recent changes to the Building Act 1975 (Qld) intended to promote pool safety in Queensland. The impact of these statutory changes is considered in relation to both compliance obligations and disclosure obligations associated with sale and leasing transactions. The interrelationship of these changes with the operation of standard contractual provisions in Queensland is also examined.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is generally understood that the patent system exists to encourage the conception and disclosure of new and useful inventions embodied in machines and other physical devices, along with new methods that physically transform matter from one state to another. What is not well understood is whether, and to what extent, the patent system is to encourage and protect the conception and disclosure of inventions that are non-physical methods – namely those that do not result in a physical transformation of matter. This issue was considered in Grant v Commissioner of Patents. In that case the Full Court of the Federal Court of Australia held that an invention must involve a physical effect or transformation to be patentable subject matter. In doing so, it introduced a physicality requirement into Australian law. What this article seeks to establish is whether the court’s decision is consistent with the case law on point. It does so by examining the key common law cases that followed the High Court’s watershed decision in National Research Development Corporation v Commissioner of Patents, the undisputed authoritative statement of principle in regard to the patentable subject matter standard in Australia. This is done with a view to determining whether there is anything in those cases that supports the view that the Australian patentable subject matter test contains a physicality requirement.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Central Queensland Mining Supplies Pty Ltd v Columbia Steel Casting Co Ltd [2011] QSC 183 Applegarth J considered complaints made by the defendant about the approach the plaintiff had taken in its endeavour to comply with its disclosure obligation under r 211 of the Uniform Civil Procedure Rules 1999 (Qld). The judgment also provides an indication of the direction the court is taking in relation to disclosure and document management in matters involving large numbers of documents.