988 resultados para Copyright laws
Resumo:
This article provides a detailed critique of the incentives-access binary in copyright discourse. Mainstream copyright theory generally accepts that copyright is a balance between providing incentives to authors to invest in the production of cultural works and enhancing the dissemination of those works to the public. This Article argues that dominant copyright theory obscures the possibility of developing a model of copyright that is able to support authors without necessarily limiting access to creative works. The abundance that the Internet allows suggests that increasing access to cultural works to enhance learning, sharing, and creative play should be a fundamental goal of copyright policy. This Article examines models of supporting and coordinating cultural production without exclusivity, including crowdfunding, tips, levies, restitution, and service-based models. In their current forms, each of these models fails to provide a cohesive and convincing vision of the two main functions of copyright: instrumentally (how cultural production can be funded) and fairness (how authors can be adequately rewarded). This article provides three avenues for future research to investigate the viability of alternate copyright models: (1) a better theory of fairness in copyright rewards; (2) more empirical study of commons models of cultural production; and (3) a critical examination of the noneconomic harm limiting function that exclusivity in copyright provides.
Resumo:
This article, published in ON LINE Opinion on 26 October 2006, discusses the broad ranging amendments to the Copyright Act which (in part) implement obligations under the Australia-US Free Trade Agreement (AUSFTA) which were introduced into parliament on October 19, 2006. It covers issues relating to the criminalisation of copyright infringement, user rights and liabilities, and Technological Protection Measures (TPMs).
Resumo:
Welcome to another issue of the Queensland Environmental Practice Reporter. This issue begins with a paper by QUT masters student, Jenny Kortlaender, which considers the effectiveness of the United Nations Convention on Biological Diversity in addressing global biodiversity decline. This is followed by a paper by Fiona Leddy which critically analyses international shipping in Australian waters and the approach taken by Australia laws in addressing the risks posed by ship-based oil pollution. The third paper in this issue is by Adjunct Professor Hugh Lavery, Gina Lee and Carolyn S. Sandercoe. This paper considers the ecological principles to be followed in the sustainable design of large-scale marina developments. This paper highlights the differences between the practice of landscape ecology and the design of ecological landscapes...
Resumo:
A database will be protected under Australian law if it is a literary work; expressed in material form; meets the originality test; and has a relevant connection with Australia. Facts and data in themselves are not protected by copyright. However, a collection of data, a dataset, or a database may be protected by copyright if it is sufficiently original. Whether a work is sufficiently original to be protected by copyright depends on whether it has been produced by the application of independent intellectual effort by the author/s, which may involve the exercise of skill, judgement, or creativity in selecting, presenting, or arranging the information. This summary synthesises recent cases regarding originality in factual compilations.
Resumo:
In what is being billed as iiNet versus Hollywood, the Australian internet service provider has come out an apparent winner after the High Court dismissed a copyright infringement case brought by industry movie studios. The case was a final appeal by the industry in its attempts to crack down on internet users infringing copyright by using BitTorrent to download movies.
Resumo:
Many governments throughout the world rely heavily on traffic law enforcement programs to modify driver behaviour and enhance road safety. There are two related functions of traffic law enforcement, apprehension and deterrence, and these are achieved through three processes: the establishment of traffic laws, the policing of those laws, and the application of penalties and sanctions to offenders. Traffic policing programs can vary by visibility (overt or covert) and deployment methods (scheduled and non-scheduled), while sanctions can serve to constrain, deter or reform offending behaviour. This chapter will review the effectiveness of traffic law enforcement strategies from the perspective of a range of high-risk, illegal driving behaviours including drink/drug driving, speeding, seat belt use and red light running. Additionally, this chapter discusses how traffic police are increasingly using technology to enforce traffic laws and thus reduce crashes. The chapter concludes that effective traffic policing involves a range of both overt and covert operations and includes a mix of automatic and more traditional manual enforcement methods. It is important to increase both the perceived and actual risk of detection by ensuring that traffic law enforcement operations are sufficiently intensive, unpredictable in nature and conducted as widely as possible across the road network. A key means of maintaining the unpredictability of operations is through the random deployment of enforcement and/or the random checking of drivers. The impact of traffic enforcement is also heightened when it is supported by public education campaigns. In the future, technological improvements will allow the use of more innovative enforcement strategies. Finally, further research is needed to continue the development of traffic policing approaches and address emerging road safety issues.
Resumo:
Mandatory data breach notification laws have been a significant legislative reform in response to unauthorized disclosures of personal information by public and private sector organizations. These laws originated in the state-based legislatures of the United States during the last decade and have subsequently garnered worldwide legislative interest. We contend that there are conceptual and practical concerns regarding mandatory data breach notification laws which limit the scope of their applicability, particularly in relation to existing information privacy law regimes. We outline these concerns here, in the light of recent European Union and Australian legal developments in this area.
Resumo:
Many corporations and individuals realize that environmental sustainability is an urgent problem to address. In this chapter, we contribute to the emerging academic discussion by proposing two innovative approaches for engaging in the development of environmentally sustainable business processes. Specifically, we describe an extended process modeling approach for capturing and documenting the dioxide emissions produced during the execution of a business process. For illustration, we apply this approach to the case of a government Shared Service provider. Second, we then introduce an analysis method for measuring the carbon dioxide emissions produced during the execution of a business process. To illustrate this approach, we apply it in the real-life case of a European airport and show how this information can be leveraged in the re-design of "green" business processes.
Resumo:
Submission to the Australian Government Attorney General’s Department consultation paper on Revising the Scope of the Copyright ‘Safe Harbour Scheme’
Resumo:
A new scaling analysis has been performed for the unsteady natural convection boundary layer under a downward facing inclined plate with uniform heat flux. The development of the thermal or viscous boundary layers may be classified into three distinct stages including an early stage, a transitional stage and a steady stage, which can be clearly identified in the analytical as well as numerical results. Earlier scaling shows that the existing scaling laws of the boundary layer thickness, velocity and steady state time scales for the natural convection flow on a heated plate of uniform heat flux provide a very poor prediction of the Prandtl number dependency. However, those scalings performed very well with Rayleigh number and aspect ratio dependency. In this study, a modifed Prandtl number scaling has been developed using a triple-layer integral approach for Pr > 1. It is seen that in comparison to the direct numerical simulations, the new scaling performs considerably better than the previous scaling.
Resumo:
Significant reform of the laws regulating charities is under way in Australia. The reforms cover almost every facet of the relationship between charities and government and the process has brought to the surface different assumptions about the role of charities in society, their entitlement to fiscal and other privileges and the scope and nature of regulation that can or should be imposed on the charities. This paper explores these broader issues in the context of the Aid/Watch case, involving an organisation used by citizens to challenge the State. Such organisations occupy contested space as to what does and does not constitute a charity. Accordingly the case provides a useful perspective from which to consider the broader issues in the relationship between government and charity. This paper seeks to build on the contribution made by other academics, by exploring the constitutional significance of political purposes and drawing from philosophy to provide context and meaning to potentially significant aspects of the judgment that might be missed when it is analysed only in terms of legal precedent through the narrow lens of the existing four heads of charity. Revenue implications for taxation of charities and political parties are also considered and it is suggested that in practice, if not in theory, the fence between them has come down.
Resumo:
This report presents an analysis of quantitative data collected from the Australian Human Rights Commission, the Anti-Discrimination Commission of Queensland, the Victorian Equal Opportunity and Human Rights Commission, the Anti-Discrimination Board of New South Wales, the Equal Opportunity Commission of South Australia, the Australian Capital Territory Human Rights Commission, the Equal Opportunity Commission Western Australia, the Northern Territory Anti-Discrimination Commission, and the Office of the Anti-Discrimination Commissioner (Tasmania) (hereafter referred to as the Commissions). The data comprise formal complaints lodged under the various federal, state and territory anti-discrimination laws in the period 1 July 2009 to 31 December 2009 where a complainant had alleged sexual harassment in the area of employment.