6 resultados para Optimal Protection Policy

em Digital Peer Publishing


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Within the international community there have been many calls for better protection of traditional cultural expressions (TCEs), for which classic instruments of intellectual property rights do not seem to fit. In response, at least five model laws have been advanced within the last 40 years. These are referred to as sui generis because, though they generally belong to the realm of intellectual property they structurally depart from classic copyright law to accommodate the needs of the holders of TCEs. The purpose of this paper is to provide a well-founded basis for national policy makers who wish to implement protection for TCEs within their country. This is achieved by systematically comparing and evaluating economic effects that can be expected to result from these regulatory alternatives and a related system or private ordering. Specifically, we compare if and how protection preferences of local communities are met as well as the social costs that are likely to arise from the different model laws.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The care and protection of children experiencing orphanhood presents a major child-care policy challenge. This paper draws on a review of the literature to document divergent conceptualizations of orphanhood, how the hurdles for the care of orphans reflect wider issues of poverty and inequality, as well as the ways in which different care interventions (familial, institutional, community-based and rights-based) might be appropriated for children in need. It is argued that the map of contemporary orphanhood overlaps with the contours of global poverty, inequality, age-based deprivations and marginalization. An example of a ‘globalised’ model of orphan care, namely SOS Children’s Villages, is presented and its implications for policy are examined. The paper highlights the significance of fighting poverty and enhancing the care-giving capabilities of extended families in the care and protection of children from a rights-based perspective. It suggests that external interventions should primarily address the structural causes of poverty and marginality, rather than amplifying inequalities through the selective support of orphans in economically vulnerable communities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since the mapping of the human genome and the technical innovations in the field of biotechnology, patent law has gone through great controversies. Protection is required for an investor to make an investment but how broad should the given protection be? Whether the invention is a mi- cro-organism capable of dissolving crude oil, or the gene of a soya plant, the genetic engineering required for their production entails vast amounts of capi- tal. The policy in that respect is tailored by legislative acts and judicial decisions, ensuring a fair balance be- tween the interests of patent right holders and third parties. However, the policy differs from jurisdiction to jurisdiction, thus creating inconsistencies with re- gards to the given protection to the same invention, and as a result this could deter innovation and pro- mote stagnation. The most active actors shaping the patent policy on an international level are the patent offices of the United States of America, Japan and the European Patent Organization. These three patent offices have set up a cooperation programme in order to promote and improve efficiency with regards to their patent policies on a global scale. However, recent judicial de- velopments have shown that the policy in respect to the field of biotechnology differs between the patent regimes of the United States of America and the two- layer system of the European Patent Organisation/ the European Union.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Facebook requires all members to use their real names and email addresses when joining the social network. Not only does the policy seem to be difficult to enforce (as the prevalence of accounts with people’s pets or fake names suggests), but it may also interfere with European (and, in particular, German) data protection laws. A German Data Protection Commissioner recently took action and ordered that Facebook permit pseudonymous accounts as its current anti-pseudonymous policy violates § 13 VI of the German Telemedia Act. This provision requires telemedia providers to allow for an anonymous or pseudonymous use of services insofar as this is reasonable and technically feasible. Irrespective of whether the pseudonymous use of Facebook is reasonable, the case can be narrowed down to one single question: Does German data protection law apply to Facebook? In that respect, this paper analyses the current Facebook dispute, in particular in relation to who controls the processing of personal data of Facebook users in Germany. It also briefly discusses whether a real name policy really presents a fix for anti-normative and anti-social behaviour on the Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The objective of this paper is to discuss EU lobbying in the area of copyright. Legislation needs to regulate the legal position of various different stakeholders in a balanced manner. However, a number of EU copyright provisions brought into effect over recent years were highly controversial and have led to suggestions that powerful lobbying forces may have had some influence. This article investigates the effects of lobbying on copyright law-making in Europe. A specific comparative and multi-faceted analysis is provided of the legislative process for two recently adopted directives: 2011/77/EU which extends the term of protection of sound recordings and 2012/28/EU which introduces certain permitted uses of orphan works (some references are also made to the ACTA case). Firstly, a short presentation is given of the legal bases for the EU consultation process and lobbying. Next, an analysis is provided of the two cases, taking into consideration the policy-making procedures (with special focus on how the consultation process was handled), the legal solutions proposed and adopted and the various stakeholders’ claims. Lastly, it asks why some interest groups were successful and some others failed (the analysis identifies two types of factor for the effectiveness of lobbying: those resulting from stakeholders’ actions and those connected with the consultation process).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

After years of deliberation, the EU commission sped up the reform process of a common EU digital policy considerably in 2015 by launching the EU digital single market strategy. In particular, two core initiatives of the strategy were agreed upon: General Data Protection Regulation and the Network and Information Security (NIS) Directive law texts. A new initiative was additionally launched addressing the role of online platforms. This paper focuses on the platform privacy rationale behind the data protection legislation, primarily based on the proposal for a new EU wide General Data Protection Regulation. We analyse the legislation rationale from an Information System perspective to understand the role user data plays in creating platforms that we identify as “processing silos”. Generative digital infrastructure theories are used to explain the innovative mechanisms that are thought to govern the notion of digitalization and successful business models that are affected by digitalization. We foresee continued judicial data protection challenges with the now proposed Regulation as the adoption of the “Internet of Things” continues. The findings of this paper illustrate that many of the existing issues can be addressed through legislation from a platform perspective. We conclude by proposing three modifications to the governing rationale, which would not only improve platform privacy for the data subject, but also entrepreneurial efforts in developing intelligent service platforms. The first modification is aimed at improving service differentiation on platforms by lessening the ability of incumbent global actors to lock-in the user base to their service/platform. The second modification posits limiting the current unwanted tracking ability of syndicates, by separation of authentication and data store services from any processing entity. Thirdly, we propose a change in terms of how security and data protection policies are reviewed, suggesting a third party auditing procedure.