756 resultados para Privacy, Right of.
Resumo:
Section 180 of the Property Law Act 1974 (Qld) makes provision for an applicant to seek a statutory right of user over a neighbour’s property where such right of use is reasonably necessary in the interests of effective use in any reasonable manner of the dominant land. A key issue in an application under s 180 is compensation. Unfortunately, while s 180 expressly contemplates that an order for compensation will include provision for payment of compensation to the owner of servient land there are certain issues that are less clear. One of these is the basis for determination of the amount of compensation. In this regard, s 180(4)(a) provides that, in making an order for a statutory right of user, the court: (a) shall, except in special circumstances, include provision for payment by the applicant to such person or persons as may be specified in the order of such amount by way of compensation or consideration as in the circumstances appears to the court to be just The operation of this statutory provision was considered by de Jersey CJ (as he then was) in Peulen v Agius [2015] QSC 137.
Resumo:
This week, Sotheby's sold the late Clifford Possum Tjapaltjarri's painting, Warlugulong. The auction-house's spokesman, Tim Klingender, was enthusiastic about the high price commanded by the art work: "The painting was a really great painting and it deserved to make a really fantastic price, and it made that price."
Resumo:
A notable feature of the surveillance case law of the European Court of Human Rights has been the tendency of the Court to focus on the “in accordance with the law” aspect of the Article 8 ECHR inquiry. This focus has been the subject of some criticism, but the impact of this approach on the manner in which domestic surveillance legislation has been formulated in the Party States has received little scholarly attention. This thesis addresses that gap in the literature through its consideration of the Interception of Postal Packets and Telecommunications Messages (Regulation) Act, 1993 and the Criminal Justice (Surveillance) Act, 2009. While both Acts provide several of the safeguards endorsed by the European Court of Human Rights, this thesis finds that they suffer from a number of crucial weaknesses that undermine the protection of privacy. This thesis demonstrates how the focus of the European Court of Human Rights on the “in accordance with the law” test has resulted in some positive legislative change. Notwithstanding this fact, it is maintained that the legality approach has gained prominence at the expense of a full consideration of the “necessary in a democratic society” inquiry. This has resulted in superficial legislative responses at the domestic level, including from the Irish government. Notably, through the examination of a number of more recent cases, this project discerns a significant alteration in the interpretive approach adopted by the European Court of Human Rights regarding the application of the necessity test. The implications of this development are considered and the outlook for Irish surveillance legislation is assessed.
Resumo:
The joint tenancy with its inherent right of survivorship is the most prevalent form of co-ownership in the common law world today. Most couples will be joint tenants of a family home, while relations (such as siblings) who purchase property together may opt for this arrangement. Inter vivos acquisitions aside, the huge intergenerational transfer of wealth within families on death can result in a joint tenancy, and it may also be a convenient estate planning device. The fact that property automatically vests in the surviving joint tenants on death is the reason why many people choose this form of co-ownership. However, there is one serious disadvantage. A joint tenancy is an inflexible form of landholding where relationships sour or family circumstances change over time, and co-owners want their respective `shares' of the property to pass to someone else on death. Where consensual severance is not possible, one joint tenant can sever unilaterally. The latter mechanism is vital in terms of giving effect to the wishes of the severing joint tenant, especially in situations of discord or a breakdown in relations with their fellow co-owners. However, unilateral severance also has serious implications for the non-severing joint tenant(s) who expected to inherit property through survivorship, and can impact significantly on ownership of the home and other family property. This article looks at unilateral severance as a means of subverting the right of survivorship. The focus is on personal and inter-family relationships, and the various legal issues and policy considerations associated with unilateral severance across the common law jurisdictions of Britain, Ireland, Australia, Canada, and New Zealand. It assesses the various methods of effecting unilateral severance and proposes specific measures, as well as considering novel arguments for preventing unilateral severance based on contractual agreements to the contrary and proprietary estoppel.
Resumo:
This is a survey of the applicable international human rights standards concerning the right which alleged terrorists have to access a lawyer.
Resumo:
As all human beings are consumers of health care provision across the life span and in receipt of care delivered by accountable health care professionals, all should have the right to be involved in shaping the future of their own health care. Rights-based participation, when applied successfully, has the potential to inform and influence the delivery of child health care, the child’s experience of health care, plus children’s nursing education (Coyne & Gallagher, 2011). The “right” of every child and young person to participate in research that relates to their own health care is also sustained by the author’s lead position as a Senior Lecturer in Higher Education for pre-registration children’s nursing in Northern Ireland and the appreciation of their voice when practicing as a registered children’s nurse and ward sister. The report provides an insight into seminal work on human and child rights; the historical context of children in Western society, and the evolution of children’s nursing amid the child’s right to participate in shaping their own health care.
Resumo:
While there is no lack of studies on the use of armed force by states in self-defence, its qualification as an ‘inherent right’ in article 51 of the Charter of the United Nations has received little scholarly attention and has been too quickly dismissed as having no significance. The present article fills this gap in the literature. Its purpose is not to discuss the limits to which article 51 or customary international law submit the exercise of the right of self-defence by states, but to examine what its 'inherent’ character means and what legal consequences it entails. The article advances two main arguments. The first is that self-defence is a corollary of statehood as presently understood because it is essential to preserving its constitutive elements. The second argument is that the exercise of the right of self-defence must be distinguished from the right itself: it is only the former that may be delegated to other states or submitted to limitations under customary international law and treaty law. The right of self-defence, however, cannot be alienated and it takes precedence over other international obligations, although not over those specifically intended to limit the conduct of states in armed conflict or over non-derogable human rights provisions.
Resumo:
Abstract 1: Social Networks such as Twitter are often used for disseminating and collecting information during natural disasters. The potential for its use in Disaster Management has been acknowledged. However, more nuanced understanding of the communications that take place on social networks are required to more effectively integrate this information into the processes within disaster management. The type and value of information shared should be assessed, determining the benefits and issues, with credibility and reliability as known concerns. Mapping the tweets in relation to the modelled stages of a disaster can be a useful evaluation for determining the benefits/drawbacks of using data from social networks, such as Twitter, in disaster management.A thematic analysis of tweets’ content, language and tone during the UK Storms and Floods 2013/14 was conducted. Manual scripting was used to determine the official sequence of events, and classify the stages of the disaster into the phases of the Disaster Management Lifecycle, to produce a timeline. Twenty- five topics discussed on Twitter emerged, and three key types of tweets, based on the language and tone, were identified. The timeline represents the events of the disaster, according to the Met Office reports, classed into B. Faulkner’s Disaster Management Lifecycle framework. Context is provided when observing the analysed tweets against the timeline. This illustrates a potential basis and benefit for mapping tweets into the Disaster Management Lifecycle phases. Comparing the number of tweets submitted in each month with the timeline, suggests users tweet more as an event heightens and persists. Furthermore, users generally express greater emotion and urgency in their tweets.This paper concludes that the thematic analysis of content on social networks, such as Twitter, can be useful in gaining additional perspectives for disaster management. It demonstrates that mapping tweets into the phases of a Disaster Management Lifecycle model can have benefits in the recovery phase, not just in the response phase, to potentially improve future policies and activities. Abstract2: The current execution of privacy policies, as a mode of communicating information to users, is unsatisfactory. Social networking sites (SNS) exemplify this issue, attracting growing concerns regarding their use of personal data and its effect on user privacy. This demonstrates the need for more informative policies. However, SNS lack the incentives required to improve policies, which is exacerbated by the difficulties of creating a policy that is both concise and compliant. Standardization addresses many of these issues, providing benefits for users and SNS, although it is only possible if policies share attributes which can be standardized. This investigation used thematic analysis and cross- document structure theory, to assess the similarity of attributes between the privacy policies (as available in August 2014), of the six most frequently visited SNS globally. Using the Jaccard similarity coefficient, two types of attribute were measured; the clauses used by SNS and the coverage of forty recommendations made by the UK Information Commissioner’s Office. Analysis showed that whilst similarity in the clauses used was low, similarity in the recommendations covered was high, indicating that SNS use different clauses, but to convey similar information. The analysis also showed that low similarity in the clauses was largely due to differences in semantics, elaboration and functionality between SNS. Therefore, this paper proposes that the policies of SNS already share attributes, indicating the feasibility of standardization and five recommendations are made to begin facilitating this, based on the findings of the investigation.
Resumo:
There is growing interest in the ways in which the location of a person can be utilized by new applications and services. Recent advances in mobile technologies have meant that the technical capability to record and transmit location data for processing is appearing in off-the-shelf handsets. This opens possibilities to profile people based on the places they visit, people they associate with, or other aspects of their complex routines determined through persistent tracking. It is possible that services offering customized information based on the results of such behavioral profiling could become commonplace. However, it may not be immediately apparent to the user that a wealth of information about them, potentially unrelated to the service, can be revealed. Further issues occur if the user agreed, while subscribing to the service, for data to be passed to third parties where it may be used to their detriment. Here, we report in detail on a short case study tracking four people, in three European member states, persistently for six weeks using mobile handsets. The GPS locations of these people have been mined to reveal places of interest and to create simple profiles. The information drawn from the profiling activity ranges from intuitive through special cases to insightful. In this paper, these results and further extensions to the technology are considered in light of European legislation to assess the privacy implications of this emerging technology.
Resumo:
Includes bibliography