753 resultados para Legal Profession Act 2004 (NSW)
Resumo:
The extant literature covering the plights of indigenous people resident to the African continent consistently targets colonial law as an obstacle to the recognition of indigenous rights. Whereas colonial law is argued to be archaic and in need of review, which it is, this article argues the new perspective that colonial law is illegitimate for ordering the population it presides over – specifically in Africa. It is seen, in five case studies, that post-colonial legal structures have not considered the legitimacy of colonial law and have rather modified a variety of statutes as country contexts dictated. However, the modified statutes are based on an alien theoretical legality, something laden with connotations that hark to older and backward times. It is ultimately argued that the legal structures which underpin ex-colonies in Africa need considerable revision so as to base statutes on African theoretical legality, rather than imperialistic European ones, so as to maximise the law’s legitimacy.
Resumo:
Increasingly, major insurers and reinsurers are operating on a global basis. For example, General Re Corporation and Cologne Re operate in almost 150 countries : see "General Re Corporation 1999 Annual Report". This is also true for the world's major brokers, and the emergence of large broking conglomerates such as Aon and Marsh are good examples of global service providers. Against the background of this increasingly global insurance market with global participants, there are a range of common legal issues in this article but a selection of certain critical matters are canvassed in the secitons below. First there are a range of regulatory issues that must be addressed. Secondly globalisation of the industry does create added incentive for a common legal regime to cover the formation of insurance transactions and the resolution of disputes about claims, coverage and termination. In this contect codifcation of insurance laws is a critical issue. Thirdly, major advances in genetic research and biotechnology over recent years have resulted in a dramatic increase in the availability of genetic testing. These developments have given rise to concerns worldwide about the potential for misuse of genetic information by third parties such as insurers and employers. Fourthly, the essence of an insurance transaction is the transference of risk from one person to anther. It is generally accepted that this transference should occur in informed circumstances and without undue advantage being bestowed upon either party. Finally this article will consider some legal matter in relation to transacting insurance on the internet
Resumo:
Insurance fraud continues to be a major problem worldwide. This article will canvass recent legal developments in relation to selected issues and matters of particular concern to the insurance industry. This article is confined to fraudulent claims. Fraud may arise at various points in the insurance relationship, including initial fraud on placement and fraudulent breach of contract by the assured. Fraud at the outset by the assured is treated differently from innocent or negligent conduct. "Fraud" in the context of this paper embraces all claims where an insured intednds to deceive an insurer by getting out i money to which the insured knew he had no right. This article will examine fraudulent insurance claims.
Resumo:
"Know How" protection varies enormously from country to country and is a complex equation of legal, political, cultural and economic factors. A contrast between Japan and Australia serves to highlight some of these factors. For the purposes of this article, a working definition of "know how" is required. In Australia and other common law systems, no statutory definition of "know how" exists, "confidential information" proving the closest comparative term in Australia ('trade secret law' in the United States).
Resumo:
Section 35 of the Insurance Contracts Act 1984 requires insurers offering insurance policies in six prescribed areas "to clearly inform" prospective insureds of any departure their policies may constitute from the standard covers established by the Act and its accompanying Regulations. This prescribed insurance contracts regime was designed to remedy comprehension problems generated by the length and complexity of insurance documents and to alleviate misunderstanding over the terms and conditions of individual policies. This article examines the rationale underpinning s 35 and the prescribed insurance contracts regime and looks at the operation of the legislation with particular reference to home contents insurance in Australia. It is argued that the means whereby disclosure of derogation from standard cover may be effected largely negates the thrust of the prescribed insurance contract reform. Recommendations to address these operational deficiencies are made.
Resumo:
There are a number of publications in Australian which summarises annual developments n the law for business or various industries, but little is available in accessible form for nonprofit staff, boards or volunteers. This publication seeks to fill that gap by bringing together in one place case reports and significant legislative initiatives.
Resumo:
In 2005, the Association of American Publishers (AAP) and the Authors Guild (AG) sued Google for ‘massive copyright infringement’ for the mass digitization of books for the Google Book Search Project. In 2008, the parties reached a settlement, pending court approval. If approved, the settlement could have far-reaching consequences for authors, libraries, educational institutions and the reading public. In this article, I provide an overview of the Google Book Search Settlement. Firstly, I explain the Google Book Search Project, the legal questions raised by the Project and the lawsuit brought against Google. Secondly, I examine the terms of the Settlement Agreement, including what rights were granted between the parties and what rights were granted to the general public. Finally, I consider the implications of the settlement for Australia. The Settlement Agreement, and consequently the broader scope of the Google Book Search Project, is currently limited to the United States. In this article I consider whether the Project could be extended to Australia at a later date, how Google might go about doing this, and the implications of such an extension under the Copyright Act 1968 (Cth). I argue that without prior agreements with rightholders, our limited exceptions to copyright infringement mean that Google is unlikely to be able to extend the full scope of the Project to Australia without infringing copyright.
Resumo:
This Report, prepared for Smart Service Queensland (“SSQ”), addresses legal issues, areas of risk and other factors associated with activities conducted on three popular online platforms—YouTube, MySpace and Second Life (which are referred to throughout this Report as the “Platforms”). The Platforms exemplify online participatory spaces and behaviours, including blogging and networking, multimedia sharing, and immersive virtual environments.
Resumo:
Questions the extent to which Westerrn commercial laws adopted by China, particularly in its Company Laws of 1993 and 1995, are comptaible with China's different cultural and legal traditions. Suggests that Western concepts of the rule of law and of corporate governance are alient to China. Outlines the development of the Western legal tradition. based on Judaeo-Christian beliefs and legal rationalism. Compares this with the deveopment of the Chinese legal tradtion, based on Confucianism and legalism. Proposes ways in which the two traditions could be reconciled more effectively.
Resumo:
In 2004, there were sweeping, radical changes made to the underlying legal framework regulating life in China. This reflected such things as the incorporation of basic international human rights standards into domestic law - not only in China but in countries worldwide which highlights the increasingly global nature of many important legal issues. China is not immune from this development of cross pollination of legal processes. This has led to an increase in the internationalisation of legal education and the rapid rise in the number of overseas students who undertake at least part of their university studies in a foreign country. Academics need to develop cross-cultural sensitivity in teaching these overseas students; there are important reasons why the educative process needs to meet the different set of needs presented by international students who come to study in Australia. This teaching note sets out the experiences of two particular situations, the teaching of Business Law to Asian students and an innovative Australian postgraduate program taught in Mandarin.
Resumo:
This chapter provides an overview of the substantial and often neglected contribution of feminist theory and research to critical criminology. There are an array of feminist approaches to studying crime, violence and victimisation ( see Naffine 1997:29; Young 1996:34. this field of study has bourgeoned and diversified so much over the last decade that it would be a disservice to caricature it as simply "feminist". A range of influences and approaches from literary theory, jurisprudence, legal studies, cultural studies, postmodernism, neo-liberalism, post-colonialism and neo-Marxism are apparen across this large disparate body of work.
Resumo:
In the study of student learning literature, the traditional view holds that when students are faced with heavy workload, poor teaching, and content that they cannot relate to – important aspects of the learning context, they will more likely utilise the surface approach to learning due to stresses, lack of understanding and lack of perceived relevance of the content (Kreber, 2003; Lizzio, Wilson, & Simons, 2002; Ramdsen, 1989; Ramsden, 1992; Trigwell & Prosser, 1991; Vermunt, 2005). For example, in studies involving health and medical sciences students, courses that utilised student-centred, problem-based approaches to teaching and learning were found to elicit a deeper approach to learning than the teacher-centred, transmissive approach (Patel, Groen, & Norman, 1991; Sadlo & Richardson, 2003). It is generally accepted that the line of causation runs from the learning context (or rather students’ self reported data on the learning context) to students’ learning approaches. That is, it is the learning context as revealed by students’ self-reported data that elicit the associated learning behaviour. However, other research studies also found that the same teaching and learning environment can be perceived differently by different students. In a study of students’ perceptions of assessment requirements, Sambell and McDowell (1998) found that students “are active in the reconstruction of the messages and meanings of assessment” (p. 391), and their interpretations are greatly influenced by their past experiences and motivations. In a qualitative study of Hong Kong tertiary students, Kember (2004) found that students using the surface learning approach reported heavier workload than students using the deep learning approach. According to Kember if students learn by extracting meanings from the content and making connections, they will more likely see the higher order intentions embodied in the content and the high cognitive abilities being assessed. On the other hand, if they rote-learn for the graded task, they fail to see the hierarchical relationship in the content and to connect the information. These rote-learners will tend to see the assessment as requiring memorising and regurgitation of a large amount of unconnected knowledge, which explains why they experience a high workload. Kember (2004) thus postulate that it is the learning approach that influences how students perceive workload. Campbell and her colleagues made a similar observation in their interview study of secondary students’ perceptions of teaching in the same classroom (Campbell et al., 2001). The above discussions suggest that students’ learning approaches can influence their perceptions of assessment demands and other aspects of the learning context such as relevance of content and teaching effectiveness. In other words, perceptions of elements in the teaching and learning context are endogenously determined. This study attempted to investigate the causal relationships at the individual level between learning approaches and perceptions of the learning context in economics education. In this study, students’ learning approaches and their perceptions of the learning context were measured. The elements of the learning context investigated include: teaching effectiveness, workload and content. The authors are aware of existence of other elements of the learning context, such as generic skills, goal clarity and career preparation. These aspects, however, were not within the scope of this present study and were therefore not investigated.
Resumo:
The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.
Resumo:
US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.
Resumo:
Midwives are involved in a very dynamic profession. As they face their everyday tasks they encounter many different situations and a variety of people which results in a vast number of interactions. This narrative research project sought to identify some of the ‘ordinary’ encounters and interactions that midwives working in a hospital environment experience in their daily work and explore them from an ethical perspective. It found that many ethical decisions have to be made ‘on-the-run’, with no time to contemplate or decide what the best course of action might be. As ethics is embedded within every encounter a midwife has, it is essential that all midwives have an awareness and understanding of their own value systems, professional ethical codes and ethical principles that can act as guides when they have to make choices in these situations, which are frequently challenging.