860 resultados para Legal certification of accounts


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article explores the precarious status of Eritrean and Sudanese nationals in Israel. Having crossed the Israeli-Egyptian border without authorisation and not through an official border crossing, Israeli law defines such individuals as ‘infiltrators’, a charged term which dates back to border-crossings into Israel by Palestinian Fedayeen in the 1950s. Eritreans and Sudanese nationals constitute over 90 percent of ‘infiltrators’ in Israel. Their livelihood is curtailed through hostility, sanctions, and detention, while (at the time of writing) Israel refrains from deporting them to their respective countries of origin, recognising that such forced removal could expose them to risks to their lives and/or freedom. Israel was the 10th state to ratify the 1951 Refugee Convention, and has acceded to its 1967 Protocol which removed the 1951 Convention’s temporal and geographic restrictions, yet it has not incorporated these treaties into its domestic law not has it enacted primary legislation that sets eligibility criteria for ‘refugee’ status and regulates the treatment of asylum-seekers. Israeli law also fails to accord subsidiary protection status to persons that the state considers to be non-removable, whether or not they satisfy the definition of a ‘refugee’ under the 1951 Convention. Absent legal recognition of ‘refugee’, ‘asylum-seeker’, and ‘beneficiary of subsidiary protection’ statuses, Eritreans and Sudanese nationals are left in legal limbo for an indefinite period qua irregular non-removable persons. This article takes stock of their legal predicament.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article seeks to examine the cross-border legal recognition of same-sex relationships in the EU. Although the Member States maintain an exclusive competence in the field of family law and, thus, it is up to them to determine whether they will provide a legal status to same-sex couples within their territory, they need to exercise their powers in that field in a way that does not violate EU law. This, it is suggested, requires that Member States mutually recognize the legal status of same-sex couples and do not treat same-sex couples worse than opposite-sex couples, if the basis of the differentiation is, merely, the (homosexual) sexual orientation of the two spouses/partners. Nonetheless, the current legal framework does not make it clear that Member States are under such an obligation. The main argument of the article, therefore, is that the EU must adopt a more hands-on approach towards this issue.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses how global financial institutions are using big data analytics within their compliance operations. A lot of previous research has focused on the strategic implications of big data, but not much research has considered how such tools are entwined with regulatory breaches and investigations in financial services. Our work covers two in-depth qualitative case studies, each addressing a distinct type of analytics. The first case focuses on analytics which manage everyday compliance breaches and so are expected by managers. The second case focuses on analytics which facilitate investigation and litigation where serious unexpected breaches may have occurred. In doing so, the study focuses on the micro/data to understand how these tools are influencing operational risks and practices. The paper draws from two bodies of literature, the social studies of information systems and finance to guide our analysis and practitioner recommendations. The cases illustrate how technologies are implicated in multijurisdictional challenges and regulatory conflicts at each end of the operational risk spectrum. We find that compliance analytics are both shaping and reporting regulatory matters yet often firms may have difficulties in recruiting individuals with relevant but diverse skill sets. The cases also underscore the increasing need for financial organizations to adopt robust information governance policies and processes to ease future remediation efforts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper aims to verify the main contributions and adjustments that the paper “Towards a Legal Theory of Finance” from Katharina Pistor may bring to the role of the Brazilian National Bank for Economic and Social Development (BNDES) in the Brazilian development financing. In order to do so, I work with two questions in this paper: (i) such theory presents elements which allow analyzing the role of the BNDES and from there, if it is required, adjustments can be made in the governance of the BNDES? and (ii) there are academics and scholars that, together with the theory, also contribute with the improvement of the BNDES role in the development of Brazil?

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Includes bibliography

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Examina y analiza los principales asuntos legales relacionados al desarrollo y operación de las compañías de seguros generales en el Caribe, con especial referencia a los países de la Organización de Estados del Caribe Oriental.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

One of the enduring and yet unresolved issues concerning the Civil War is its legal nature: Was it an insurrection or an international war? During the war and since, the United States courts have repeatedly been called upon to determine the status of property which was under the control of the Confederacy and its agents during the Civil War. In the process of making such determinations, the courts have reopened questions about the war's legal status. United States v. Steinmetz is such a case.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of linear programming in various areas has increased with the significant improvement of specialized solvers. Linear programs are used as such to model practical problems, or as subroutines in algorithms such as formal proofs or branch-and-cut frameworks. In many situations a certified answer is needed, for example the guarantee that the linear program is feasible or infeasible, or a provably safe bound on its objective value. Most of the available solvers work with floating-point arithmetic and are thus subject to its shortcomings such as rounding errors or underflow, therefore they can deliver incorrect answers. While adequate for some applications, this is unacceptable for critical applications like flight controlling or nuclear plant management due to the potential catastrophic consequences. We propose a method that gives a certified answer whether a linear program is feasible or infeasible, or returns unknown'. The advantage of our method is that it is reasonably fast and rarely answers unknown'. It works by computing a safe solution that is in some way the best possible in the relative interior of the feasible set. To certify the relative interior, we employ exact arithmetic, whose use is nevertheless limited in general to critical places, allowing us to rnremain computationally efficient. Moreover, when certain conditions are fulfilled, our method is able to deliver a provable bound on the objective value of the linear program. We test our algorithm on typical benchmark sets and obtain higher rates of success compared to previous approaches for this problem, while keeping the running times acceptably small. The computed objective value bounds are in most of the cases very close to the known exact objective values. We prove the usability of the method we developed by additionally employing a variant of it in a different scenario, namely to improve the results of a Satisfiability Modulo Theories solver. Our method is used as a black box in the nodes of a branch-and-bound tree to implement conflict learning based on the certificate of infeasibility for linear programs consisting of subsets of linear constraints. The generated conflict clauses are in general small and give good rnprospects for reducing the search space. Compared to other methods we obtain significant improvements in the running time, especially on the large instances.