891 resultados para Evidence (Jewish law)


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Vol. 2 bears imprint: Casablanca, Yehudah Razon, 1934.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This report presents the results of the largest study ever conducted into the law, policy and practice of primary school teachers’ reporting of child sexual abuse in New South Wales, Queensland and Western Australia. The study included the largest Australian survey of teachers about reporting sexual abuse, in both government and non-government schools (n=470). Our research has produced evidence-based findings to enhance law, policy and practice about teachers’ reporting of child sexual abuse. The major benefits of our findings and recommendations are to: • Show how the legislation in each State can be improved; • Show how the policies in government and non-government school sectors can be improved; and • Show how teacher training can be improved. These improvements can enhance the already valuable contribution that teachers are making to identify cases of child sexual abuse. Based on the findings of our research, this report proposes solutions to issues in seven key areas of law, policy and practice. These solutions are relevant for State Parliaments, government and non-government educational authorities, and child protection departments. The solutions in each State are practicable, low-cost, and align with current government policy approaches. Implementing these solutions will: • protect more children from sexual abuse; • save cost to governments and society; • develop a professional teacher workforce better equipped for their child protection role; and • protect government and school authorities from legal liability.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

While transnational antitrust enforcement is becoming only more common, the access to foreign-based evidence remains a considerable practical challenge. This article appraises considerations and concerns surrounding confidentiality, and looks into ways of their possible accommodation. It further identifies and critically evaluates the existing mechanisms allowing for inter-agency confidential information/ evidence sharing in competition law enforcement. The article outlines the shortcomings of the current framework and points to novel unilateral approaches. In the latter regard the focus is devoted to Australia, where the competition agency is empowered to share confidential information with foreign counterparts, also without any underlying bilateral agreement and on a non-reciprocal basis. This solution shows that a pragmatic and workable approach to inter-agency evidence sharing can be achieved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

UANL

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper applies stationarity tests to examine evidence of market integration for a relatively large sample of food products in Colombia. We Önd little support for market integration when using the univariate KPSS tests for stationarity. However, within a panel context and after allowing for cross sectional dependence, the Hadri tests provide much more evidence supporting the view that food markets are integrated or, in other words, that the law of one price holds for most products.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article analyses the results of an empirical study on the 200 most popular UK-based websites in various sectors of e-commerce services. The study provides empirical evidence on unlawful processing of personal data. It comprises a survey on the methods used to seek and obtain consent to process personal data for direct marketing and advertisement, and a test on the frequency of unsolicited commercial emails (UCE) received by customers as a consequence of their registration and submission of personal information to a website. Part One of the article presents a conceptual and normative account of data protection, with a discussion of the ethical values on which EU data protection law is grounded and an outline of the elements that must be in place to seek and obtain valid consent to process personal data. Part Two discusses the outcomes of the empirical study, which unveils a significant departure between EU legal theory and practice in data protection. Although a wide majority of the websites in the sample (69%) has in place a system to ask separate consent for engaging in marketing activities, it is only 16.2% of them that obtain a consent which is valid under the standards set by EU law. The test with UCE shows that only one out of three websites (30.5%) respects the will of the data subject not to receive commercial communications. It also shows that, when submitting personal data in online transactions, there is a high probability (50%) of incurring in a website that will ignore the refusal of consent and will send UCE. The article concludes that there is severe lack of compliance of UK online service providers with essential requirements of data protection law. In this respect, it suggests that there is inappropriate standard of implementation, information and supervision by the UK authorities, especially in light of the clarifications provided at EU level.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

by H.S.Q. Henriques