988 resultados para legal profession


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly, major insurers and reinsurers are operating on a global basis. For example, General Re Corporation and Cologne Re operate in almost 150 countries : see "General Re Corporation 1999 Annual Report". This is also true for the world's major brokers, and the emergence of large broking conglomerates such as Aon and Marsh are good examples of global service providers. Against the background of this increasingly global insurance market with global participants, there are a range of common legal issues in this article but a selection of certain critical matters are canvassed in the secitons below. First there are a range of regulatory issues that must be addressed. Secondly globalisation of the industry does create added incentive for a common legal regime to cover the formation of insurance transactions and the resolution of disputes about claims, coverage and termination. In this contect codifcation of insurance laws is a critical issue. Thirdly, major advances in genetic research and biotechnology over recent years have resulted in a dramatic increase in the availability of genetic testing. These developments have given rise to concerns worldwide about the potential for misuse of genetic information by third parties such as insurers and employers. Fourthly, the essence of an insurance transaction is the transference of risk from one person to anther. It is generally accepted that this transference should occur in informed circumstances and without undue advantage being bestowed upon either party. Finally this article will consider some legal matter in relation to transacting insurance on the internet

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Insurance fraud continues to be a major problem worldwide. This article will canvass recent legal developments in relation to selected issues and matters of particular concern to the insurance industry. This article is confined to fraudulent claims. Fraud may arise at various points in the insurance relationship, including initial fraud on placement and fraudulent breach of contract by the assured. Fraud at the outset by the assured is treated differently from innocent or negligent conduct. "Fraud" in the context of this paper embraces all claims where an insured intednds to deceive an insurer by getting out i money to which the insured knew he had no right. This article will examine fraudulent insurance claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are a number of publications in Australian which summarises annual developments n the law for business or various industries, but little is available in accessible form for nonprofit staff, boards or volunteers. This publication seeks to fill that gap by bringing together in one place case reports and significant legislative initiatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This Report, prepared for Smart Service Queensland (“SSQ”), addresses legal issues, areas of risk and other factors associated with activities conducted on three popular online platforms—YouTube, MySpace and Second Life (which are referred to throughout this Report as the “Platforms”). The Platforms exemplify online participatory spaces and behaviours, including blogging and networking, multimedia sharing, and immersive virtual environments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Questions the extent to which Westerrn commercial laws adopted by China, particularly in its Company Laws of 1993 and 1995, are comptaible with China's different cultural and legal traditions. Suggests that Western concepts of the rule of law and of corporate governance are alient to China. Outlines the development of the Western legal tradition. based on Judaeo-Christian beliefs and legal rationalism. Compares this with the deveopment of the Chinese legal tradtion, based on Confucianism and legalism. Proposes ways in which the two traditions could be reconciled more effectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discusses the role of legislation and codes of conduct in influencing the behaviour of non-executive directors. Outlines the functions of a board of directors and considers the role on non-executive directors in particular. Traces the development of standards of skill required on non-executive directors both under the Australian Corporations Act 2001 and under common law. Questions whether these have brought about a real change in behaviour. Considers whether professionalisation of directorship could be more effective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter is about the role of law in the creation and operation of Australian health systems. Accordingly, this chapter discusses how law regulates the way in which health services in Australia are funded, organised, regulated, managed, operated and governed. (The question of how health professionals are regulated is discussed in Chapter 15.) Although the focus of much of health law is on legal mechanisms for the resolution of disputes or disagreements between the state, health providers, professionals, patients and families and friends, and through dispute resolutions processes setting standards for practice, these are only some of the “jobs” that health law performs. In health systems where the state undertakes a significant role in regulating, funding, managing and providing health services, health law also performs an important constitutive function. Health law declares the values upon which the health system is based, shapes social processes to achieve public ends and provides a structure for the complex interactions that occur within a modern health system. Health law regulates decision-makers in health systems by establishing who has the power to participate in decisions and in what circumstances, establishing processes through which decisions are made and creating mechanisms for decision-makers to be held publicly accountable. It is this broader constitutive function of health law that is a primary focus of much of this chapter — how and why governments use their legislative powers to structure and shape the health system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.