987 resultados para Libyan privacy law
Resumo:
Power laws, also known as Pareto-like laws or Zipf-like laws, are commonly used to explain a variety of real world distinct phenomena, often described merely by the produced signals. In this paper, we study twelve cases, namely worldwide technological accidents, the annual revenue of America׳s largest private companies, the number of inhabitants in America׳s largest cities, the magnitude of earthquakes with minimum moment magnitude equal to 4, the total burned area in forest fires occurred in Portugal, the net worth of the richer people in America, the frequency of occurrence of words in the novel Ulysses, by James Joyce, the total number of deaths in worldwide terrorist attacks, the number of linking root domains of the top internet domains, the number of linking root domains of the top internet pages, the total number of human victims of tornadoes occurred in the U.S., and the number of inhabitants in the 60 most populated countries. The results demonstrate the emergence of statistical characteristics, very close to a power law behavior. Furthermore, the parametric characterization reveals complex relationships present at higher level of description.
Resumo:
Advances in technology have produced more and more intricate industrial systems, such as nuclear power plants, chemical centers and petroleum platforms. Such complex plants exhibit multiple interactions among smaller units and human operators, rising potentially disastrous failure, which can propagate across subsystem boundaries. This paper analyzes industrial accident data-series in the perspective of statistical physics and dynamical systems. Global data is collected from the Emergency Events Database (EM-DAT) during the time period from year 1903 up to 2012. The statistical distributions of the number of fatalities caused by industrial accidents reveal Power Law (PL) behavior. We analyze the evolution of the PL parameters over time and observe a remarkable increment in the PL exponent during the last years. PL behavior allows prediction by extrapolation over a wide range of scales. In a complementary line of thought, we compare the data using appropriate indices and use different visualization techniques to correlate and to extract relationships among industrial accident events. This study contributes to better understand the complexity of modern industrial accidents and their ruling principles.
Resumo:
The adhesive bonding technique enables both weight and complexity reduction in structures that require some joining technique to be used on account of fabrication/component shape issues. Because of this, adhesive bonding is also one of the main repair methods for metal and composite structures by the strap and scarf configurations. The availability of strength prediction techniques for adhesive joints is essential for their generalized application and it can rely on different approaches, such as mechanics of materials, conventional fracture mechanics or damage mechanics. These two last techniques depend on the measurement of the fracture toughness (GC) of materials. Within the framework of damage mechanics, a valid option is the use of Cohesive Zone Modelling (CZM) coupled with Finite Element (FE) analyses. In this work, CZM laws for adhesive joints considering three adhesives with varying ductility were estimated. The End-Notched Flexure (ENF) test geometry was selected based on overall test simplicity and results accuracy. The adhesives Araldite® AV138, Araldite® 2015 and Sikaforce® 7752 were studied between high-strength aluminium adherends. Estimation of the CZM laws was carried out by an inverse methodology based on a curve fitting procedure, which enabled a precise estimation of the adhesive joints’ behaviour. The work allowed to conclude that a unique set of shear fracture toughness (GIIC) and shear cohesive strength (ts0) exists for each specimen that accurately reproduces the adhesive layer’ behaviour. With this information, the accurate strength prediction of adhesive joints in shear is made possible by CZM.
Resumo:
Livro editado para celebrar dos 10 anos da Faculdade de Direito da UNL
Resumo:
ABSTRACT - The Patient Protection and Affordable Care Act shook the foundations of the US health system, offering all Americans access to health care by changing the way the health insurance industry works. As President Obama signed the Act on 23 March 2010, he said that it stood for “the core principle that everybody should have some basic security when it comes to their health care”. Unlike the U.S., the Article 64 of the Portuguese Constitution provides, since 1976, the right to universal access to health care. However, facing a severe economic crisis, Portugal has, under the supervision of the Troika, a tight schedule to implement measures to improve the efficiency of the National Health Service. Both countries are therefore despite their different situation, in a conjuncture of reform and the use of new health management measures. The present work, using a qualitative research methodology examines the Affordable Care Act in order to describe its principles and enforcement mechanisms. In order to describe the reality in Portugal, the Portuguese health system and the measures imposed by Troika are also analyzed. The intention of this entire analysis is not only to disclose the innovative U.S. law, but to find some innovative measures that could serve health management in Portugal. Essentially we identified the Exchanges and Wellness Programs, described throughout this work, leaving also the idea of the possibility of using them in the Portuguese national health system.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Economics from the NOVA – School of Business and Economics
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Economics from the NOVA – School of Business and Economics
Resumo:
Versão online da Revista Brasileira de Estudos Políticos, Belo Horizonte, nº 107, pp. 149-200, jul./dez.2013
Resumo:
Tax evasion and fraud threaten the economic and social objectives of modern tax systems, precluding the state funding for the satisfaction of collective needs and the fair distribution of wealth, being a violation of basic principles and values of our society. In tax law, to give tax administration the necessary powers to supervise and control the information provided by taxpayers and combat tax evasion and fraud, over the last years the grounds for a derogation of bank secrecy without judicial authorization have been extended, which raises some constitutional compatibility issues. Similarly, this tendency of making this legal regime more flexible and increasing automatic exchange of information has been followed by the European Union and the international community. Banking secrecy, as a professional secrecy, is an instrument to protect the right to privacy but also appears as an anti-abuse and repressive mechanism of evasive and fraudulent behaviors. Because of the conflict of interests will always be necessary to make a practical agreement between them, ensuring the legality and the due guarantees of the taxpayers but also an effective way to combat tax evasion and fraud. Bank secrecy cannot be one method to, behind the right to privacy, taxpayers practice illegal activities. But the practice of these irregular conducts also does not justify a total annihilation of the right to banking secrecy, uncovering all documents and bank information’s. Although considering the legislative changes, the administrative derogation of bank secrecy will always be what the tax administration does of it.
Resumo:
Images have gained a never before seen importance. Technological changes have given the Information Society extraordinary means to capture, treat and transmit images, wheter your own or those of others, with or without a commercial purpose, with no boundaries of time or country, without “any kind of eraser”. From the several different ways natural persons may engage in image processing with no commercial purpose, the cases of sharing pictures through social networks and video surveillance assume particular relevance. Consequently there are growing legitimate concerns with the protection of one's image, since its processing may sometimes generate situations of privacy invasion or put at risk other fundamental rights. With this in mind, the present thesis arises from the question: what are the existent legal instruments in Portuguese Law that enable citizens to protect themselves from the abusive usage of their own pictures, whether because that image have been captured by a smartphone or some video surveillance camera, whether because it was massively shared through a blog or some social network? There is no question the one's right to not having his or her image used in an abusive way is protected by the Portuguese constitution, through the article 26th CRP, as well as personally right, under the article 79th of the Civil Code, and finally through criminal law, articles 192nd and 193rd of the Criminal Code. The question arises in the personal data protection context, considering that one's picture, given certain conditions, is personal data. Both the Directive 95/46/CE dated from 1995 as well as the LPD from 1998 are applicable to the processing of personal data, but both exclude situations of natural persons doing so in the pursuit of activities strictly personal or family-related. These laws demand complex procedures to natural persons, such as the preemptive formal authorisation request to the Data Protection National Commission. Failing to do so a natural person may result in the application of fines as high as €2.500,00 or even criminal charges. Consequently, the present thesis aims to study if the image processing with no commercial purposes by a natural person in the context of social networks or through video surveillance belongs to the domain of the existent personal data protection law. To that effect, it was made general considerations regarding the concept of video surveillance, what is its regimen, in a way that it may be distinguishable from Steve Mann's definition of sousveillance, and what are the associated obligations in order to better understand the concept's essence. The application of the existent laws on personal data protection to images processing by natural persons has been analysed taking into account the Directive 95/46/CE, the LPD and the General Regulation. From this analysis it is concluded that the regimen from 1995 to 1998 is out of touch with reality creating an absence of legal shielding in the personal data protection law, a flaw that doesn't exist because compensated by the right to image as a right to personality, that anyway reveals the inability of the Portuguese legislator to face the new technological challenges. It is urgent to legislate. A contrary interpretation will evidence the unconstitutionality of several rules on the LPD due to the obligations natural persons are bound to that violate the right to the freedom of speech and information, which would be inadequate and disproportionate. Considering the recently approved General Regulation and in the case it becomes the final version, the use for natural person of video surveillance of private spaces, Google Glass (in public and private places) and other similar gadgets used to recreational purposes, as well as social networks are subject to its regulation only if the images are shared without limits or existing commercial purposes. Video surveillance of public spaces in all situations is subject to General Regulation provisions.
Resumo:
The emergence of new technologies has introduced significant changes in the citizens life’s. There is a constant evolution of technological means and profound impact of their use in the habits of life of the human being. These new technological media are important tools in labor relations. The working and businesses worlds are increasingly turning to these new technologies, so that the use of video surveillance in the workplace is nowadays common. New technologies in general and the use of video surveillance in workplace in particular are providing ways to allow control of the work performance that are desired by most employers. However, the collection of images in the workplace often collides with the fundamental rights and freedoms of workers, in particular, with the right to privacy. The subject concerns the question of investigating is whether the images collected in workplace can be used as evidence in disciplinary proceedings. In fact, this issue is controversial. Doctrine and jurisprudence defend, at least, two responses for the same question. Those who understand that the evidence may be admitted for not violate any right of the worker, and others who argue that the evidence should not be admitted in disciplinary office. In the Portuguese legal system, there is, even, a new intermediate theory that begins to be defended, that only on certain occasions the evidence may be admitted. The solution to this problem involves the study of employment law and data video surveillance processing. Analysis of workers fundamental rights is fundamental to come to a grounded conclusion.
Resumo:
In this work, the fracture mode I parameters of steel fibre reinforced self-compacting concrete (SFRSCC) were derived from the numerical simulation of indirect splitting tensile tests. The combined experimental and numerical research allowed a comparison between the stress-crack width (σ - w) relationship acquired straightforwardly from direct tensile tests, and the σ - w response derived from inverse analysis of the splitting tensile tests results. For this purpose a comprehensive nonlinear 3D finite element (FE) modeling strategy was developed. A comparison between the experimental results obtained from splitting tensile tests and the corresponding FE simulations confirmed the good accuracy of the proposed strategy to derive the σ – w for these composites. It is concluded that the post-cracking tensile laws obtained from inverse analysis provided a close relationship with the ones obtained from the experimental uniaxial tensile tests.
Resumo:
We study the problem of privacy-preserving proofs on authenticated data, where a party receives data from a trusted source and is requested to prove computations over the data to third parties in a correct and private way, i.e., the third party learns no information on the data but is still assured that the claimed proof is valid. Our work particularly focuses on the challenging requirement that the third party should be able to verify the validity with respect to the specific data authenticated by the source — even without having access to that source. This problem is motivated by various scenarios emerging from several application areas such as wearable computing, smart metering, or general business-to-business interactions. Furthermore, these applications also demand any meaningful solution to satisfy additional properties related to usability and scalability. In this paper, we formalize the above three-party model, discuss concrete application scenarios, and then we design, build, and evaluate ADSNARK, a nearly practical system for proving arbitrary computations over authenticated data in a privacy-preserving manner. ADSNARK improves significantly over state-of-the-art solutions for this model. For instance, compared to corresponding solutions based on Pinocchio (Oakland’13), ADSNARK achieves up to 25× improvement in proof-computation time and a 20× reduction in prover storage space.
Resumo:
Doctoral Thesis in Juridical Sciences (Specialty in Public Legal Sciences)