881 resultados para offshore service providers


Relevância:

80.00% 80.00%

Publicador:

Resumo:

This Judgment by the Presidium of the Supreme Arbitration Court of the Russian Federation can be considered as a landmark ruling for Internet Service Provider’s (ISP) liability. The Court stipulates for the first time concise principles under which circumstances an ISP shall be exempt from liability for transmitting copyright infringing content. But due to the legislation on ISP liability in the Russian Federation it depends on the type of information which rules of liability apply to ISP. As far as a violation of intellectual property rights is claimed, the principles given now by the Supreme Arbitration Court are applicable, which basically follow the liability limitations of the so called EU E-Commerce Directive. But, furthermore, preventive measures that are provided in service provider contracts to suppress a violation through the use of services should be taken into account as well. On the other hand, as far as other information is concerned the limitations of the respective Information Law might be applicable which stipulates different liability requirements. This article gives a translation of the Supreme Arbitration Court’s decision as well as a comment on its key rulings with respect to the legal framework and on possible consequences for practice.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The article discusses the problems of applicable law to copyright infringements online. It firstly identifies the main problems related to the well established territoriality principle and the lex loci protectionis rules. Then; the discussion focuses on the "ubiquitous infringement" rule recently proposed by the American Law Institute (ALI) and the European Max Planck Group for Conflicts of Law and Intellectual Propoperty (CLIP). The author strongly welcomes a compromise between the territoriality and universality approaches suggested in respect of ubiquitous infringement cases. At the same time; the paper draws the attention that the interests of "good faith" online service providers (such as legal certainty and foreseeability) have been until now underestimated and invites to take these interests into account when merging the projects into a common international proposal.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Internet Service Providers’ liability for copyright infringement is a debated issue in France and Belgium, particularly with respect to intermediaries such as providers of hyperlinks and location tool services for which the e-commerce directive does not set explicitly any exemption from liability. Thus, the question arises among other things whether the safe harbour provisions provided for in respect of caching and hosting also could apply to search engines. French and Belgian Courts had recently to decide on this issue in several cases concerning Google’s complementary tools such as Google Videos, Google Images, Google Suggest and Google News. This article seeks to give a summary of and to assess this recent case law.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cloud computing is a new development that is based on the premise that data and applications are stored centrally and can be accessed through the Internet. Thisarticle sets up a broad analysis of how the emergence of clouds relates to European competition law, network regulation and electronic commerce regulation, which we relate to challenges for the further development of cloud services in Europe: interoperability and data portability between clouds; issues relating to vertical integration between clouds and Internet Service Providers; and potential problems for clouds to operate on the European Internal Market. We find that these issues are not adequately addressed across the legal frameworks that we analyse, and argue for further research into how to better facilitate innovative convergent services such as cloud computing through European policy – especially in light of the ambitious digital agenda that the European Commission has set out.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The UK’s Digital Economy Act 2010 contains measures to enforce copyright on the Internet, specifically a two-tiered form of a graduated response.The Act was challenged in the High Court by two of the UK’s biggest Internet Service Providers (ISP), who obtained a Judicial Review of the copyright enforce- ment provisions. This paper is an overview of the case, based on the hearing of March 2011 and the ensuing judgement. It focuses on the two most hotly contested grounds for the challenge, namely an al- leged failure to notify the European Commission under the Technical Standards Directive, and the pro- portionality or otherwise of the contested provisions. It observes how the judgement accepted the defence argumentation of the government and the copyright owners as interested parties, and how the ISPs appeared to be put on the back foot.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Opaque products enable service providers to hide specific characteristics of their service fulfillment from the customer until after purchase. Prominent examples include internet-based service providers selling airline tickets without defining details, such as departure time or operating airline, until the booking has been made. Owing to the resulting flexibility in resource utilization, the traditional revenue management process needs to be modified. In this paper, we extend dynamic programming decomposition techniques widely used for traditional revenue management to develop an intuitive capacity control approach that allows for the incorporation of opaque products. In a simulation study, we show that the developed approach significantly outperforms other well-known capacity control approaches adapted to the opaque product setting. Based on the approach, we also provide computational examples of how the share of opaque products as well as the degree of opacity can influence the results.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Aufbau einer föderativen Dienstlandschaft in der Ruhr-Region auf Basis von SAML mit dem Ziel eine organisationsübergreifende Nutzung von webbasierten IT-Diensten zu ermöglichen

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Enforcement of copyright online and fighting online “piracy” is a high priority on the EU agenda. Private international law questions have recently become some of the most challenging issues in this area. Internet service providers are still uncertain how the Brussels I Regulation (Recast) provisions would apply in EU-wide copyright infringement cases and in which country they can be sued for copyright violations. Meanwhile, because of the territorial approach that still underlies EU copyright law, right holders are unable to acquire EU-wide relief for copyright infringements online. This article first discusses the recent CJEU rulings in the Pinckney and Hejduk cases and argues that the “access approach” that the Court adopted for solving jurisdiction questions could be quite reasonable if it is applied with additional legal measures at the level of substantive law, such as the targeting doctrine. Secondly, the article explores the alternatives to the currently established lex loci protectionis rule that would enable right holders to get EU-wide remedies under a single applicable law. In particular, the analysis focuses on the special applicable law rule for ubiquitous copyright infringements, as suggested by the CLIP Group, and other international proposals.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Since 2010, the client base of online-trading service providers has grown significantly. Such companies enable small investors to access the stock market at advantageous rates. Because small investors buy and sell stocks in moderate amounts, they should consider fixed transaction costs, integral transaction units, and dividends when selecting their portfolio. In this paper, we consider the small investor’s problem of investing capital in stocks in a way that maximizes the expected portfolio return and guarantees that the portfolio risk does not exceed a prescribed risk level. Portfolio-optimization models known from the literature are in general designed for institutional investors and do not consider the specific constraints of small investors. We therefore extend four well-known portfolio-optimization models to make them applicable for small investors. We consider one nonlinear model that uses variance as a risk measure and three linear models that use the mean absolute deviation from the portfolio return, the maximum loss, and the conditional value-at-risk as risk measures. We extend all models to consider piecewise-constant transaction costs, integral transaction units, and dividends. In an out-of-sample experiment based on Swiss stock-market data and the cost structure of the online-trading service provider Swissquote, we apply both the basic models and the extended models; the former represent the perspective of an institutional investor, and the latter the perspective of a small investor. The basic models compute portfolios that yield on average a slightly higher return than the portfolios computed with the extended models. However, all generated portfolios yield on average a higher return than the Swiss performance index. There are considerable differences between the four risk measures with respect to the mean realized portfolio return and the standard deviation of the realized portfolio return.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO) across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP). Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

By enabling connections between individuals, Social Networking Sites, such as Facebook, promise to create significant individual as well as social value. Encouraging connections between users is also crucial for service providers who increasingly rely on social advertising and viral marketing campaigns as important sources of their revenue. Consequently, understanding user’s network construction behavior becomes critical. However, previous studies offer only few scattered insights into this research question. In order to fill this gap, we employ Grounded Theory methodology to derive a comprehensive model of network construction behavior on social networking sites. In the following step we assess two Structural Equation Models to gain refined insights into the motivation to send and accept friendship requests – two network expansion strategies. Based on our findings, we offer recommendations for social network providers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Texas is home to over one million Latino teens who are at risk for negative reproductive health outcomes, such as teen pregnancy and STIs. Teen pregnancy disproportionately impacts the health of Latino teens in Texas and places them at risk of continued high rates of poverty, school dropout, and unemployment unless Texas makes a concerted effort to reduce its teen pregnancy rate. The birth rate among Latina girls is astonishing: 98 per 1000 Latinas (aged 15-19) are giving birth. This translates to over 32,000 births each year among Latina teens, costing almost $98 million in direct medical expenditures and well over $638 million if other costs are included. Most teens become sexually experienced while they are of school age, which translates to an estimated 414,583 sexually experienced Latino students attending Texas public schools. Of these Latino youth, 237,466 report being currently sexually active, and 89,000 report having had four or more sexual partners in their lifetime. While causes of teen pregnancy are complex, the solutions to teen pregnancy are known. Texas needs an effective, comprehensive approach to address the sexual health needs of Texas Latino youth that includes: statewide implementation and monitoring of evidence-based sex education for middle school and high school students, access to reproductive health services for students who are already sexually experienced, and widespread training on adolescent sexual health for teachers, service providers, and parents. By tackling teen pregnancy, we can positively impact the future and well-being of not only Latinos, but of all Texans, and subsequently can contribute to the social and economic success of Texas.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

All too often, human trafficking victims – like victims of other crimes – are overlooked. When these victims are in need of support and resources, our governments are often underprepared and overburdened. As public servants, Congressman Ted Poe and State Senator Leticia Van de Putte recognize the deficiency in attention and resources dedicated to trafficked victims at both levels of government. Federal and state governments should provide the necessary resources for victims and victim service providers and help facilitate restitution for trafficking victims. In addition, the federal and state governments should help raise awareness of this crime’s impact on our nation. The problem of human trafficking cannot be dealt with at only one level of government. It will take the cooperation of all relevant local, state, and federal government entities to truly make an impact in combating human trafficking in the United States. We will continue to be a voice in Washington and in the State of Texas for victims and victim advocates to provide the needed resources for victims around the country and to draw attention to growing concerns surrounding human trafficking.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Given the increased awareness and attention to human trafficking, including the establishment of federal laws and policies, federally funded task forces that provide law enforcement responses, and specialized victim services, it is important to assess the impact of these procedures and services on survivors/victims of international human trafficking and their immigrant children. By federal definition, certified victims of international human trafficking are eligible for all services provided to refugees in this country, including reunification with their minor children. This research is based on a qualitative study conducted in Austin and Houston, Texas with human trafficking victims/survivors. The project’s goal was to gain an understanding of the needs of human trafficking survivors after their rescue, their overall integration into American life, and the subsequent needs of their immigrant children after reunification. The project objectives examined the factors that either promote or hinder self-sufficiency, the determination of social service needs, and policy and practice recommendations to strengthen survivors, their children and their families living both locally and abroad. For this project, nine (n = 9) in-depth interviews were conducted with adult foreign-born victims of human trafficking. Researchers gathered data using a semi-structured questionnaire that queried about factors that promote or hinder victims’ services and needs. Interviews were conducted in participants’ homes using bilingual research staff and/or trained interpreters, were digitally-recorded, and subsequently transcribed. Participation in this study was completely voluntary. Specific steps were taken to ensure that the participants’ identities were protected. Open coding of data was utilized and the data were subsequently organized or grouped into properties and later developed into contextual themes around the research questions. The findings are grounded with the use of direct quotes from participants. As a result of progressive U.S. policy, many victims of human trafficking are being reunited with their minor children. Immigrant children are one of the largest and fastest growing populations in the U.S. and for a variety of reasons are vulnerable to exploitation. Research also indicates that victims of trafficking are identified by traffickers because of their perceived “vulnerabilities” or lack of opportunities (Clark, 2003). Therefore, it is important that practices and policies are developed to address the unique needs of these families with an eye toward positive outcomes for parent and child safety and well-being. Social service providers are provided a toolkit that may be utilized before and during the reunification period.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In recent years, development of information systems (IS) has rapidly changed towards increasing division of labor between firms. Two trends are emerging. First, client companies increasingly outsource software development to external service providers. Second, the formerly oligopolistic enterprise application software industry has started to disintegrate into focal partnership networks – so called platform ecosystems. Despite the increasing prominence of IS outsourcing and platform ecosystems, many of these inter-organizational partnerships fail to achieve expected benefits. Ineffective governance and control frequently plays a pivotal role in producing these failures. While designing effective governance and control mechanisms is always challenging, inter-organizational software development projects are often business-critical and exhibit additional dynamics and uncertainty. As a consequence governance and control have to be adapted over time. The three research projects included in this book provide a better understanding of how and why governance and control can be effectively adapted over time. The implications for successful management of inter-organizational software development projects are highly relevant for theory and practice.