4 resultados para Policy discussion
em CiencIPCA - Instituto Politécnico do Cávado e do Ave, Portugal
Resumo:
Abstract: If we think there is a significant number of legal offshore in the globalized world, then there is not even a global consensus about what «corruption» is. The «illegal corruption» in a country may be legal in another. Moreover, the great global corruption is above the law or above democratic States. And not all democratic States are «Rule of Law». Therefore, the solution is global earlier in time and space law, democratic, free and true law. While the human being does not reach a consensus of what «corruption» really is, the discussion will not go further than a caricature. One of the other problems about «corruption» is that it is very difficult to establish the imputation of crimes, including «corruption» (v.g. Portugal) on some «companies», corporations. We have a juridical problem in the composition of the art. 11. of the Portuguese Penal Code.
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.
Resumo:
This report summarises our idea of code clone detection in Haskell code and refactorings based on identified clones as it evolved in our group-of-three discussion
Resumo:
Risk management can be considered as part of the Occupational Health and Safety System (OHS) of an organization and can be used to develop and implement the OHS policy and manage the associated risks. The success of the integration of risk management in OHS depends on both technical and human aspects. Thus, this paper presents and discusses the case of a company working in the area of solid waste treatment. This company was certified in 2009 with an Integrated Management Systems for Quality, Environment, Occupational Health and Safety. The evolution of accidents before and after the implementation of the integrated system was analysed and a questionnaire was used to capture the perceptions of the technicians on the risk management system. The analysis of the findings showed that the frequency of accidents increased since 2009 but the severity has been reduced. Several interrelated causes and consequences were analysed and discussed. Furthermore, the analysis of the opinions of the company’s technicians permitted to highlight some important aspects on the integration of risk management in the OHS system of the company. In line with this discussion some hypothesis have been formulated.