930 resultados para Fundamental rights. Protection principle. Dignity


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The development of the Internet has made it possible to transfer data ‘around the globe at the click of a mouse’. Especially fresh business models such as cloud computing, the newest driver to illustrate the speed and breadth of the online environment, allow this data to be processed across national borders on a routine basis. A number of factors cause the Internet to blur the lines between public and private space: Firstly, globalization and the outsourcing of economic actors entrain an ever-growing exchange of personal data. Secondly, the security pressure in the name of the legitimate fight against terrorism opens the access to a significant amount of data for an increasing number of public authorities.And finally,the tools of the digital society accompany everyone at each stage of life by leaving permanent individual and borderless traces in both space and time. Therefore, calls from both the public and private sectors for an international legal framework for privacy and data protection have become louder. Companies such as Google and Facebook have also come under continuous pressure from governments and citizens to reform the use of data. Thus, Google was not alone in calling for the creation of ‘global privacystandards’. Efforts are underway to review established privacy foundation documents. There are similar efforts to look at standards in global approaches to privacy and data protection. The last remarkable steps were the Montreux Declaration, in which the privacycommissioners appealed to the United Nations ‘to prepare a binding legal instrument which clearly sets out in detail the rights to data protection and privacy as enforceable human rights. This appeal was repeated in 2008 at the 30thinternational conference held in Strasbourg, at the 31stconference 2009 in Madrid and in 2010 at the 32ndconference in Jerusalem. In a globalized world, free data flow has become an everyday need. Thus, the aim of global harmonization should be that it doesn’t make any difference for data users or data subjects whether data processing takes place in one or in several countries. Concern has been expressed that data users might seek to avoid privacy controls by moving their operations to countries which have lower standards in their privacy laws or no such laws at all. To control that risk, some countries have implemented special controls into their domestic law. Again, such controls may interfere with the need for free international data flow. A formula has to be found to make sure that privacy at the international level does not prejudice this principle.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Big Brother Watch and others have filed a complaint against the United Kingdom under the European Convention on Human Rights about a violation of Article 8, the right to privacy. It regards the NSA affair and UK-based surveillance activities operated by secret services. The question is whether it will be declared admissible and, if so, whether the European Court of Human Rights will find a violation. This article discusses three possible challenges for these types of complaints and analyses whether the current privacy paradigm is still adequate in view of the development known as Big Data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

During the last decades, the virtual world increasingly gained importance and in this context the enforcement of privacy rights became more and more difficult. An important emanation of this trend is the right to be forgotten enshrining the protection of the data subject’s rights over his/her “own” data. Even though the right to be forgotten has been made part of the proposal for a completely revised Data Protection Regulation and has recently been acknowledged by the Court of Justice of the European Union (“Google/Spain” decision), to date, the discussions about the right and especially its implementation with regard to the fundamental right to freedom of expression have remained rather vague and need to be examined in more depth.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Convention on the Protection and Promotion of the Diversity of Cultural Expressions, adopted under the auspices of the United Nations Educational, Cultural and Scientific Organization (UNESCO) in 2005, entered into force on 18 March 2007 after an incredibly swift ratification process. The Convention is the culmination of multiple-track efforts that spread over many years with the objective of providing a binding instrument for the protection and promotion of cultural diversity at the international level. These efforts, admirable as they may be, are not however isolated undertakings of goodwill, but a reaction to economic globalisation, whose advancement has been significantly furthered by the emergence of enforceable multilateral trade rules. These very rules, whose bearer is the World Trade Organization (WTO), have been perceived as the antipode to "culture" and have commanded the formulation of counteracting norms that may sufficiently "protect" and "promote" it. Against this backdrop of institutional tension and fragmentation, the present chapter explicates the emergence of the concept of cultural diversity on the international policy- and law-making scene and its legal dimensions given by the new UNESCO Convention. It critically analyses the Convention's provisions, in particular the rights and obligations of the State Parties, and asks whether indeed the UNESCO Convention provides a sufficient and appropriate basis for the protection and promotion of a thriving and diverse cultural environment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter discusses the relationship between labour market regulation and regional trade agreements from both a legal and an economic angle. We examine empirically whether regional trade liberalisation is associated with deterioration (“race to the bottom”) of domestic labour standards beyond those reflected in the 1998 ILO Declaration on the Fundamental Principles and Rights at Work. Using a panel of 90 developed and developing countries, covering the years from 1980 to 2005, we find that after the entry into force of a regional trade agreement (RTA), labour standards applying to employment protection and unemployment benefits are significantly weakened. We show that such a lowering of protection levels tends to occur in high income countries and that this effect mainly stems from RTAs among such countries rather than with low or middle income countries. Concern about competitive pressure to weaken domestic labour regulation is reflected in a variety of undertakings in RTAs not to administer labour laws with a view to improving one’s competitive position in trade or foreign direct investment (FDI). The above-mentioned empirical findings indicate that such provisions could potentially become relevant, and that this is more likely to be the case for high income members of RTAs. Our analysis, from a legal point of view, of relevant institutional and procedural mechanisms indicates however that enforceability of the relevant provisions is weak for most of the existing legal texts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bluetongue virus (BTV) is an economically important member of the genus Orbivirus and closely related to African horse sickness virus (AHSV) and Epizootic hemorrhagic disease virus (EHDV). Currently, 26 different serotypes of BTV are known. The virus is transmitted by blood-feeding Culicoides midges and causes disease (bluetongue [BT]) in ruminants. In 2006/2007, BTV serotype 8 (BTV-8) caused widespread outbreaks of BT amongst livestock in Europe, which were eventually controlled employing a conventionally inactivated BTV vaccine. However, this vaccine did not allow the discrimination of infected from vaccinated animals (DIVA) by the commonly used VP7 cELISA. RNA replicon vectors based on propagation-incompetent recombinant vesicular stomatitis virus (VSV) represent a novel vaccine platform that combines the efficacy of live attenuated vaccines with the safety of inactivated vaccines. Our goal was to generate an RNA replicon vaccine for BTV-8, which is safe, efficacious, adaptable to emerging orbivirus infections , and compliant with the DIVA principle. The VP2, VP5, VP3 and VP7 genes encoding the BTV-8 capsid proteins, as well as the non-structural proteins NS1 and NS3 were inserted into a VSV vector genome lacking the essential VSV glycoprotein (G) gene. Infectious virus replicon particles (VRP) were produced on a transgenic helper cell line providing the VSV G protein in trans. Expression of antigens in vitro was analysed by immunofluorescence using monoclonal and polyclonal antibodies. In a pilot study, sheep were immunized with two different VRP-based vaccine candidates, one comprising the BTV-8 antigens VP2, VP5, VP3, VP7, NS1, and NS3, the other one containing antigens VP3, VP7, NS1, and NS3. Control animals received VRPs containing an irrelevant antigen. Virus neutralizing antibodies and protection after BTV-8 challenge were evaluated and compared to animals immunized with the conventionally inactivated vaccine. Full protection was induced only when the two antigens VP2 and VP5 were included in the vaccine. To further evaluate if VP2 alone, a combination of VP2 and VP5 or VP5 alone were necessary for complete protection, we performed a second animal trial. Interestingly, VP2 as well as the combination of VP2 and VP5 but not VP5 alone conferred full protection in terms of neutralizing antibodies, and protection from clinical signs and viremia after BTV-8 challenge. These results show that the VSV replicon system represents a safe, efficacious and DIVA-compliant vaccine against BTV as well as a possible platform for protection against other Orbiviruses, such as AHSV and EHDV.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The enduring electoral success of populist parties across Europe and the increasing opportunities they have gained to access government in recent years bring once more into relief the question of whether populism and democracy are fully compatible. In this article we show how, despite playing different roles in government within very different political systems, and despite the numerous constraints placed upon them (for instance, EU membership, international law and domestic checks and balances), populist parties consistently pursued policies that clashed with fundamental tenets of liberal democracy. In particular, the idea that the power of the majority must be limited and restrained, the sanctity of individual rights and the principle of the division of powers have all come under threat in contemporary Europe. This has contributed to the continuing erosion of the liberal consensus, which has provided one of the fundamental foundations of the European project from its start.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Preferentialism and multilateralism are not two independent and succinct avenues in the pur-suit of market access and regulatory policies. They historically build upon each other in a dialectical process, closely related and linked through regulatory bridges and references. They influence and direct each other in various ways. The paper mainly focuses on the evolution of international protection of intellectual property rights and of services. The multilateral regulation of the TRIPS and others derive from years of regulatory experience and high numbers of preferential agreements across the globe. The GATS and others, on the other hand, have entered the pluri- or multilateral stage early. Once regulation has reached the mul-tilateral stage, preferentialism focuses on WTO-plus and -extra commitments. Both areas, however, show close interaction. The principle of MFN ensures that multilateralism and preferentialism do not evolve independently from each other. It produces significant spill-over effects of preferential agreements. Such effects and the need to develop uniform and coherent regulatory standards have led in parallel to a number of preferential, plurilateral and multilateral regulatory initiatives. We submit that the process will eventually encourage the return to multilateralism and negotiations in international fora, in particular the WTO while traditional market access may stay with preferential relations among Nations. Such burden-sharing between different regulatory fora should be reflected in future WTO rules providing the overall backbone of the system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Digital Rights Management Systems (DRMS) are seen by content providers as the appropriate tool to, on the one hand, fight piracy and, on the other hand, monetize their assets. Although these systems claim to be very powerful and include multiple protection technologies, there is a lack of understanding about how such systems are currently being implemented and used by content providers. The aim of this paper is twofold. First, it provides a theoretical basis through which we present shortly the seven core protection technologies of a DRMS. Second, this paper provides empirical evidence that the seven protection technologies outlined in the first section of this paper are the most commonly used technologies. It further evaluates to what extent these technologies are being used within the music and print industry. It concludes that the three main Technologies are encryption, password, and payment systems. However, there are some industry differences: the number of protection technologies used, the requirements for a DRMS, the required investment, or the perceived success of DRMS in fighting piracy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Technology advances in hardware, software and IP-networks such as the Internet or peer-to-peer file sharing systems are threatening the music business. The result has been an increasing amount of illegal copies available on-line as well as off-line. With the emergence of digital rights management systems (DRMS), the music industry seems to have found the appropriate tool to simultaneously fight piracy and to monetize their assets. Although these systems are very powerful and include multiple technologies to prevent piracy, it is as of yet unknown to what extent such systems are currently being used by content providers. We provide empirical analyses, results, and conclusions related to digital rights management systems and the protection of digital content in the music industry. It shows that most content providers are protecting their digital content through a variety of technologies such as passwords or encryption. However, each protection technology has its own specific goal, and not all prevent piracy. The majority of the respondents are satisfied with their current protection but want to reinforce it for the future, due to fear of increasing piracy. Surprisingly, although encryption is seen as the core DRM technology, only few companies are currently using it. Finally, half of the respondents do not believe in the success of DRMS and their ability to reduce piracy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis seeks to analyze the relationship between public attitudes toward refugees in a refugee receiving state and the realization of the legal rights afforded refugees (de facto rights). I hypothesize that the more negative a host culture is toward refugees, the less refugees are able to realize their rights. Conversely, the more positive a host culture is toward refugees, the more refugees are able to realize their rights. I test the hypothesis through a case study of refugee populations in Cape Town, South Africa, based on research conducted from May to June 2007. The orientation (positive or negative) of the host culture's perceptions toward a refugee group (Independent Variable) is measured through: (1) a coded content analysis of the South African media, (2) a coded content analysis of semi-structured interviews, and (3) an assessment of secondary source public opinion surveys and reports. The realization of refugee rights (Dependent Variable) is operationalized as a function of two rights: (1) the right to personal physical integrity and (2) the right to protection from unlawful detention. These rights are measured by coding (1) media reports and (2) interviews, and by (3) assessing NGO reports and secondary source public opinion surveys. My empirical data shows that the cultural orientation toward refugees is not overwhelmingly negative, and the realization of rights is not conclusively "low." However, the frequency of data coded "negative" and "low" versus "positive" or "high" suggest that South Africans regard refugees somewhat negatively and that rights are not fully realized. This finding is strengthened by the analysis of secondary sources and field notes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Universal Declaration of Human Rights (UDHR) states that education should be "directed to the full development of the human personality and to the strengthening of respect for human rights and fundamental freedoms... promote understanding, tolerance and friendship among all nations, racial or religious groups." This study surveyed 53 teachers on their views of Human Rights Education, including their familiarity with the concept, their self-efficacy with teaching it, and conditions that would increase the likelihood of their teaching it. The study found that, regardless of familiarity with the topic, years of teaching experience, or school location (urban/suburban), most teachers were open to teaching Human Rights Education. They did identify the need for better resources in the form of lesson plans, teaching materials, and professional training. In addition, support from other teachers, administration, and parents was felt to be important in order for them to undertake Human Rights Education. The best strategy to move forward with Human Rights Education would be to provide resources and support for teachers so that we can be living up to the expectations put forth in the UDHR.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The goal of the AEgIS experiment is to measure the gravitational acceleration of antihydrogen – the simplest atom consisting entirely of antimatter – with the ultimate precision of 1%. We plan to verify the Weak Equivalence Principle (WEP), one of the fundamental laws of nature, with an antimatter beam. The experiment consists of a positron accumulator, an antiproton trap and a Stark accelerator in a solenoidal magnetic field to form and accelerate a pulsed beam of antihydrogen atoms towards a free-fall detector. The antihydrogen beam passes through a moir ́e deflectometer to measure the vertical displacement due to the gravitational force. A position and time sensitive hybrid detector registers the annihilation points of the antihydrogen atoms and their time-of-flight. The detection principle has been successfully tested with antiprotons and a miniature moir ́e deflectometer coupled to a nuclear emulsion detector.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Literature on agency problems arising between controlling and minority owners claim that separation of cash flow and control rights allows controllers to expropriate listed firms, and further that separation emerges when dual class shares or pyramiding corporate structures exist. Dual class share and pyramiding coexisted in listed companies of China until discriminated share reform was implemented in 2005. This paper presents a model of controller to expropriate behavior as well as empirical tests of expropriation via particular accounting items and pyramiding generated expropriation. Results show that expropriation is apparent for state controlled listed companies. While reforms have weakened the power to expropriate, separation remains and still generates expropriation. Size of expropriation is estimated to be 7 to 8 per cent of total asset at mean. If the "one share, one vote" principle were to be realized, asset inflation could be reduced by 13 percent.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using panel data of 57 countries during the period of 1995-2012, this study investigates the impact of intellectual property rights (IPR) processes on productivity growth. The IPR processes are decomposed into three stages, innovation process, commercialization process, and IPR protection process. Our results suggest that better IPR protection is directly associated with productivity improvement only in developed economies. In addition, the contribution of IPR processes on growth through foreign direct investment (FDI) appears to be very limited. Only FDI inflows in developed countries which help to create a better innovative capability lead to a higher growth. And in connection with FDI outflows, only IPR protection and commercialization processes are proven to improve productivity in the case of developing countries, particularly when the country acts as the investing country.