328 resultados para Property (Roman law)
Resumo:
This guide explains how copyright law applies to Australian government material, how copyright can be managed to facilitate beneficial open access practices by government, how CC licences can be used to achieve open access to government material, and provides practical step-by-step guidance for agencies and their officers on licensing and use of government copyright materials under CC 2.5 Australia licences.
Resumo:
Design talks LOUDLY!!! Is a series of interactive presentations exploring issues and opportunities involving professional design. --------------- These seminars are organised by the Industrial Design Network Queensland (IDnetQLD) in coordination with the Design Institute of Australia (DIA). This event was held at the State Library of Queensland (SLQ) with invited public presentations by a panel of industry experts from the Australian Government – IP Australia. --------------- The first seminar "Intellectual Property : designing 4 success" highlighted to design professionals how the various forms of Intellectual Property interact, what protections and pitfalls exist, and how these impact upon the work and responsibilities of designers. The overlaps, gaps and in congruencies in the various IP protection systems were highlighted by the expert line-up of speakers. --------------- The underlying message is that a clear understanding of all IP types is necessary in order to gain the best advantage from IP protection and therefore eliminate potential IP ownership issues before they become a problem.
Resumo:
This presenation is part of the UDIA (Qld) Property Development Essentials program, which is a two-day introductory course designed for new entrants to the property industry. The course provides practical advice and direction for those looking to take the first steps into the development industry. This presentation identifies economic factors and their influence on land acquisitions, as well as providing an understanding the property development and business cycles and their impacts on acquisition strategies (long v. short term projects)
Resumo:
The changing development and population sprawl in major cities, especially those located in high rainfall areas, has resulted in the need to review and re-assess potential flood impacts in these cities. In many cases these new flood lines and flood maps have placed residential property that was previously considered to be flood free to now be considered to be potentially flood liable. Previous research based in Sydney and the UK has identified the fact that residential property that has been subject to flooding has a decreased price and higher investment risk than flood free property in the same location. These studies have also shown that the greatest impact on residential property subject to flooding is just following a flood event. In June 2009, Brisbane City Council released revised flood maps for the Greater Brisbane region and these maps have identified areas that have not previously been considered flood liable. This paper will analyse the sale performance of flood liable streets in the main flood areas of Brisbane over the period January 1990 through to June 2009, to determine the variation in price for these flood liable areas to the residential property immediately adjoining them. The average sale price will be tracked on both a geographic location and socio-economic basis.
Resumo:
This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.
Resumo:
The doctrine of 'prosecution history estoppel' (PH estoppel) as developed in the United States has strong intuitive appeal, especially when applied to counterbalance a related patent law principle, the doctrine of equivalents. The doctrines are receiving increasing attention in US patent decisions, to the point where one patent litigator recently compared them to "two cars that keep bumping fenders. They are frequently returned to the shop for repairs". Could PH estoppel find its way into UK patent law? This article briefly examines the doctrine, its evolution in the US and the problems associated with importing the doctrine into the UK. As the EU legislation stands, Article 69 and the Protocol to the European Patent Convention (EPC) pose serious obstacles to using the doctrine directly in claim construction. However there appears to be some scope to apply the doctrine as a limited form of defence in infringement actions.
Resumo:
Last year European Intellectual Property Review published an article comparing the latest version of the proposed US database legislation, the Collections of Information Antipiracy Bill with the UK's Copyright and Rights in Database Regulations 1997. Subsequently a new US Bill, the Consumer and Investor Access to Information Act has emerged, the Antipiracy Bill has been amended and much debate has occurred, but the US seems no closer to enacting database legislation. This article briefly outlines the background to the US legislative efforts, examines the two Bills and draws some comparisons with the UK Regulations. A study of the US Bills clearly demonstrates the starkly divided opinion on database protection held by the Bills' proponents and the principal lobby groups driving the legislative efforts: the Antipiracy Bill is very protective of database producers' interests, whereas the Access Bill is heavily user-oriented. If the US experience is any indication there will be a long horizon involved in achieving any consensus on international harmonisation of this difficult area.
Resumo:
In a recent decision by Mr Justice Laddie, a patent was held anticipated by, inter alia, prior use of a device which fell within the claims of the patent in suit, even though its circuitry was enclosed in resin. The anticipating invention had been "made available to the public" within the terms of section 2 (2) of the Patents Act 1977 because its essential integers would have been revealed by an interesting character, the "skilled forensic engineer".
Resumo:
This article updates a previous article on the Lockwood v Doric fair basing case in the Full Court of the Federal Court which was recently appealed to the High Court. The High Court's decision provides a new and welcome level of clarity in this difficult area of patent law. With this new clarity we can finally lock away some of the mysteries that have plagued the area for some time. Already, indications are that Lockwood's guidelines are being usefully applied in the Patent Office and Federal Court.
Resumo:
In an earlier article the concept of fair basing in Australian patent law was described as a "problem child", often unruly and unpredictable in practice, but nevertheless understandable and useful in policy terms. The article traced the development of several different branches of patent law that were swept under the nomenclature of "fair basing" in Britain in 1949. It then went on to examine the adoption of fair basis into Australian law, the modern interpretation of the requirement, and its problems. This article provides an update. After briefly recapping on the relevant historical issues, it examines the recent Lockwood "internal" fair basing case in the Federal and High Courts.
Resumo:
Lawmakers are asking whether Australian researchers need an express 'experimental use' defense against patent infringement. The overriding policy for establishing a patent system is indisputably the promotion of innovation. According to traditional intellectual property pedagogy, the incentive to innovate flows from the reward afforded to the inventor. A balancing policy is that the patentee must fully disclose the invention to help minimize the risks of duplication and provides a basis for improvements by further research.Where there is uncertainty as to how these competing policy limbs are balanced and whether a patentee can exclude others from experimenting on a patented invention, the uncertain legal environment disadvantages both the patentee and researcher. Different jurisdictions have treated the experimental use question quite differently with varied results for the researcher. The biotechnology industry is evolving at an unprecedented pace and the law will as is always the case, lag behind in its usual cautious fashion. The Australian law may finally catch up to researchers' concerns.
Resumo:
Part I of this book covers the commercial and contractual background to technology licensing agreements. Part II discusses the European Community's new regime on the application and enforcement of Article 81 to technology licensing agreements. EC Council Regulation 1/2003 replaced the Council Regulation 17/1962 and repealed the system under which restrictive agreements and practices could be notified to the EC Commission. A new Commission regulation on technology transfer agreements, Regulation 772/2004. These two enactments required consequential amendments to the chapters in Part III where the usual terms of technology licensing agreements are analysed and exemplified by reference to decided cases.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.