116 resultados para unlawful termination protections
Resumo:
Sexual harassment can be conceptualized as a series of interactions between harassers and targets that either inhibit or increase outrage by third parties. The outrage management model predicts the kinds of actions likely to be used by perpetrators to minimize outrage, predicts the consequences of failing to use these tactics—namely backfire, and recommends countertactics to increase outrage. Using this framework, our archival study examined outrage-management tactics reported as evidence in 23 judicial decisions of sexual harassment cases in Australia. The decisions contained precise, detailed information about the circumstances leading to the claim; the events which transpired in the courtroom, including direct quotations; and the judges' interpretations and findings. We found evidence that harassers minimize outrage by covering up the actions, devaluing the target, reinterpreting the events, using official channels to give an appearance of justice, and intimidating or bribing people involved. Targets can respond using countertactics of exposure, validation, reframing, mobilization of support, and resistance. Although there are limitations to using judicial decisions as a source of information, our study points to the value of studying tactics and the importance to harassers of minimizing outrage from their actions. The findings also highlight that, given the limitations of statutory and organizational protections in reducing the incidence and severity of sexual harassment in the community, individual responses may be effective as part of a multilevel response in reducing the incidence and impact of workplace sexual harassment as a gendered harm.
Resumo:
• The doctrine of double effect is an exception to the general rule that taking active steps that end life is unlawful. • The essence of the doctrine at common law is intention. • Hastening a patient’s death through palliative care will be lawful provided the primary intention is to relieve pain, and not cause death, even if that death is foreseen. • Some States have enacted legislative excuses that deal with the provision of palliative care. • These statutory excuses tend to be stricter than the common law as they impose other requirements in addition to having an appropriate intent, such as adherence to some level of recognised medical practice.
Contextualizing the tensions and weaknesses of information privacy and data breach notification laws
Resumo:
Data breach notification laws have detailed numerous failures relating to the protection of personal information that have blighted both corporate and governmental institutions. There are obvious parallels between data breach notification and information privacy law as they both involve the protection of personal information. However, a closer examination of both laws reveals conceptual differences that give rise to vertical tensions between each law and shared horizontal weaknesses within both laws. Tensions emanate from conflicting approaches to the implementation of information privacy law that results in different regimes and the implementation of different types of protections. Shared weaknesses arise from an overt focus on specified types of personal information which results in ‘one size fits all’ legal remedies. The author contends that a greater contextual approach which promotes the importance of social context is required and highlights the effect that contextualization could have on both laws.
Resumo:
Purpose: The purpose of this review was to present an in-depth analysis of literature identifying the extent of dropout from Internet-based treatment programmes for psychological disorders, and literature exploring the variables associated with dropout from such programmes. ----- ----- Methods: A comprehensive literature search was conducted on PSYCHINFO and PUBMED with the keywords: dropouts, drop out, dropout, dropping out, attrition, premature termination, termination, non-compliance, treatment, intervention, and program, each in combination with the key words Internet and web. A total of 19 studies published between 1990 and April 2009 and focusing on dropout from Internet-based treatment programmes involving minimal therapist contact were identified and included in the review. ----- ----- Results: Dropout ranged from 2 to 83% and a weighted average of 31% of the participants dropped out of treatment. A range of variables have been examined for their association with dropout from Internet-based treatment programmes for psychological disorders. Despite the numerous variables explored, evidence on any specific variables that may make an individual more likely to drop out of Internet-based treatment is currently limited. ----- ----- Conclusions: This review highlights the need for more rigorous and theoretically guided research exploring the variables associated with dropping out of Internet-based treatment for psychological disorders.
Resumo:
Practitioners will be aware that s 366 (1) of the Property Agents and Motor Dealers Act 2000 provides that a relevant contract must have attached, as its first or top sheet, a warning statement in the approved form. A failure to attach a warning statement in the prescribed manner triggers a right of termination in the buyer. The factual circumstances in Devine Ltd v Timbs [2004] QSC 24 are indicative of the problems that may arise in the construction of this statutory provision. The application concerned put and call option agreements entered into concerning 4 lots. The agreements, in identical terms, were signed before the applicant seller had completed a proposed residential apartment building. In each case the option agreement provided that the agreement was not binding on the seller until and unless the purchaser returned to the seller, amongst other things, two copies of the warning statement under the Property Agents and Motor Dealers Ac 2000 signed by the purchaser and two copies of the contract document signed by the purchaser. The seller was required to hold the contract documentation in escrow and was forbidden to sign it until and unless either option was exercised.
Resumo:
Extraterritorial processing schemes are designed to prevent and deter access to statutory and judicial safeguards in the country responsible for the interception and transfer of asylum seekers to a third country. In line with this objective, they incorporate interdiction, transfer and processing practices and standards that are deliberately isolated from the national legal and institutional protections within either the intercepting state or the third country where processing occurs. Australia's recent disbandment of its extraterritorial processing centres in third countries highlights the fact that extraterritorial processing schemes have proven unworkable as a matter of international law, as they negate the national safeguards fundamental to the satisfaction of a state's protection obligations.
Resumo:
In an attempt to curb online copyright infringement, copyright owners are increasingly seeking to enlist the assistance of Internet Service Providers (‘ISPs’) to enforce copyright and impose sanctions on their users.1 Commonly termed ‘graduated response’ schemes, these measures generally require that the ISP take some action against users suspected of infringing copyright, ranging from issuing warnings, to collating allegations made against subscribers and reporting to copyright owners, to suspension and eventual termination of service.
Resumo:
Durland and McCurdy [Durland, J.M., McCurdy, T.H., 1994. Duration-dependent transitions in a Markov model of US GNP growth. Journal of Business and Economic Statistics 12, 279–288] investigated the issue of duration dependence in US business cycle phases using a Markov regime-switching approach, introduced by Hamilton [Hamilton, J., 1989. A new approach to the analysis of time series and the business cycle. Econometrica 57, 357–384] and extended to the case of variable transition parameters by Filardo [Filardo, A.J., 1994. Business cycle phases and their transitional dynamics. Journal of Business and Economic Statistics 12, 299–308]. In Durland and McCurdy’s model duration alone was used as an explanatory variable of the transition probabilities. They found that recessions were duration dependent whilst expansions were not. In this paper, we explicitly incorporate the widely-accepted US business cycle phase change dates as determined by the NBER, and use a state-dependent multinomial Logit modelling framework. The model incorporates both duration and movements in two leading indexes – one designed to have a short lead (SLI) and the other designed to have a longer lead (LLI) – as potential explanatory variables. We find that doing so suggests that current duration is not only a significant determinant of transition out of recessions, but that there is some evidence that it is also weakly significant in the case of expansions. Furthermore, we find that SLI has more informational content for the termination of recessions whilst LLI does so for expansions.
Resumo:
While in the past surrogacy was illegal in Queensland, since June 2010 the Surrogacy Act 2010 (Qld) (“the Act”) has made altruistic surrogacy arrangements lawful in Queensland. In addition, it provides a mechanism for transfer of legal parentage from the surrogate to the person(s) wishing to have a child (the intended parent(s)). Commercial surrogacy – where a payment, reward or other material benefit of advantage (other than the reimbursement of the “birth mother’s surrogacy costs” (s11 of the Act) is made for entering into a surrogacy arrangement – remains unlawful. The paramount guiding principle underpinning the Act is that of the wellbeing and best interests of a child born as a result of surrogacy. The Surrogacy Act 2010 (Qld) allows a single person or a couple (heterosexual or same sex couples) to enter into an agreement with a woman, and her partner (if she has one), to become pregnant with the intention that the child will be relinquished to the intended parent(s). The Act also provides a mechanism for the intended parent(s) to be legally recognised as the parent(s) of the child. In order for the intended parent(s) to be legally recognised (via a parentage order, discussed below) it must be shown that the surrogacy arrangement was entered into when all the parties were over 25 years of age and the intended parent(s) are male or, in a heterosexual or lesbian couple the female(s) are not likely to conceive or give birth to a healthy child due to medical reasons. The arrangement must be entered into before the surrogate becomes pregnant and all parties must have obtained independent legal advice and counselling about the proposed arrangement, and evidence of this is required at the time a parentage order is applied for. For the purposes of the Act it does not matter how the surrogate conceives the child or if the child is genetically related to the parties. During the period of the pregnancy, the surrogate has the right to manage her pregnancy in the way she wishes. Although she cannot profit from acting as a surrogate, section 11 states that she is entitled to surrogacy costs. These include, for example, reasonable medical costs related to pregnancy and the birth of the child; counselling and legal costs associated with the surrogacy arrangement; actual lost earnings because of leave taken during pregnancy or following birth and any reasonable travel expenses incurred. The surrogacy arrangement itself is not legally enforceable; however, obligations to pay a surrogate’s surrogacy costs are enforceable unless she chooses not to relinquish the child to the intending parents. While the Act does not specifically deal with the situation where the surrogate decides she is unprepared to relinquish the child to the intended parents, there have been examples where parties have entered into these kinds of arrangements, and the arrangements have become difficult. For example, the Family Court case of Re Evelyn (1998) FLC 92–807 involved a child born to a surrogate mother who decided not to surrender her. The child was the genetic child of the surrogate mother and the husband of the couple who had contracted with the surrogate mother. Both sets of parents brought proceedings in the court, seeking that the child live with them. In hearing the application, the court applied the paramount principle of the ‘best interests of the child’. The court made clear that there is no presumption in favour of the birth mother, although in this case the court found that the child may be better placed with the surrogate mother’s family.
Resumo:
The customary approach to the study of meal size suggests that ‘events’ occurring during a meal lead to its termination. Recent research, however, suggests that a number of decisions are made before eating commences that may affect meal size. The present study sought to address three key research questions around meal size: the extent to which plate cleaning occurs; prevalence of pre-meal planning and its influence on meal size; and the effect of within-meal experiences, notably the development of satiation. To address these, a large-cohort internet-based questionnaire was developed. Results showed that plate cleaning occurred at 91% of meals, and was planned from the outset in 92% of these cases. A significant relationship between plate cleaning and meal planning was observed. Pre meal plans were resistant to modification over the course of the meal: only 18% of participants reported consumption that deviated from expected. By contrast, 28% reported continuing eating beyond satiation, and 57% stated that they could have eaten more at the end of the meal. Logistic regression confirmed pre-meal planning as the most important predictor of consumption. Together, our findings demonstrate the importance of meal planning as a key determinant of meal size and energy intake.
Resumo:
Small business has been shown to contribute significantly to a nation’s economic development. Small business owners typically confront challenges, uncertainty, and risks while operating new businesses. Franchising has become a way to minimize the risks of small business management (Chiou et al., 2004); however, a franchise system is not a guarantee of business success (Lee and Karkovista, 2001). A poor franchising relationship between franchisors and franchisees can result in franchise failure, such as termination and closure, or franchisee exit (Frazer and Winzar, 2005).
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
Seventeen year olds who come into contact with the police in Queensland are classified as adults and are not afforded the protections available under the Youth Justice Act 1992 (Qld) (YJA). As with any other adult, their offences are dealt with under a raft of legislative provisions including the Criminal Code 1889 (Qld) (the Code), the Police Powers and Responsibilities Act 2000 (Qld) (PPRA) and the Penalties and Sentences Act 1992 (Qld) (PSA). This article argues that this situation is unfair and contravenes international human rights agreements which Australia has ratified, in particular the United Nations Convention on the Rights of the Child (CROC). Article 1 of that Convention defines a child as a person under the age of 18. The youth offences legislation in Queensland only applies to those who have not yet turned 17. This article examines the effects of this anomaly in Queensland, focusing in particular on the pre-adjudication treatment of ‘17 year old adults’.