951 resultados para Legal obligation for security


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Mémoire présenté à la Faculté des études supérieures en vue de l'obtention du grade de maîtrise en droit (LL.M.) option Nouvelles technologies de l'information"

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Asylum is being gradually denuded of the national institutional mechanisms (judicial, legislative and administrative) that provide the framework for a fair and effective asylum hearing. In this sense, there is an ongoing ‘denationalization’ or ‘deformalization’ of the asylum process. This chapter critically examines one of the linchpins of this trend: the erection of pre-entry measures at ports of embarkation in order to prevent asylum seekers from physically accessing the territory of the state. Pre-entry measures comprise the core requirement that foreigners possess an entry visa granting permission to enter the state of destination. Visa requirements are increasingly implemented by immigration officials posted abroad or by officials of transit countries pursuant to bilateral agreements (so-called ‘juxtaposed’ immigration controls). Private carriers, which are subject to sanctions if they bring persons to a country who do not have permission to enter, also engage in a form of de facto immigration control on behalf of states. These measures constitute a type of ‘externalized’ or ‘exported’ border that pushes the immigration boundaries of the state as far from its physical boundaries as possible. Pre-entry measures have a crippling impact on the ability of asylum seekers to access the territory of states to claim asylum. In effect, states have ‘externalized’ asylum by replacing the legal obligation on states to protect refugees arriving at ports of entry with what are perceived to be no more than moral obligations towards asylum seekers arriving at the external border of the state.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Com base nos rebatimentos da Lei n 8.213/1991, que prevê a obrigatoriedade legal de empresas privadas brasileiras contratarem de 2% a 5% de beneficiários da Previdência Social reabilitados ou de pessoas com deficiência (PcDs) habilitadas em seus quadros funcionais, o objetivo da presente pesquisa foi avaliar as repercussões da Lei de Cotas, tendo como referência as concepções de deficiência preponderantes dentro de uma organização privada de ensino profissionalizante por meio do seu Projeto de Sensibilização Gerencial. O projeto de sensibilização gerencial objetivou consolidar as etapas iniciais, na implementação de um programa institucional de valorização da diversidade. A hipótese principal formulada para a pesquisa, dentre outras relativas às concepções de deficiência, por parte de gestores, é que as reverberações positivas produzidas pela Lei de Cotas atingem, inclusive, as organizações empresariais supostamente distanciadas do movimento inclusionista. Para fins de avaliação das concepções de deficiência foram utilizados delineamentos de pesquisa estatística, compreendendo o teste de Shapiro-Wilk para determinar se as respostas às perguntas configuravam ou não uma distribuição normal, além do Coeficiente de Correlação de Pearson para medir a intensidade da relação linear entre as variáveis estudadas. Serviram como instrumentos da pesquisa um questionário sociodemográfico e um inventário de concepções de deficiência (ICD), sendo este direcionado para o objeto atitudinal, considerando-se as percepções sociais favoráveis e desfavoráveis no grupo pesquisado. Esse inventário de concepções de deficiência é composto de sete blocos de asserções e de uma escala do tipo Likert de seis pontos, que foi aplicada em um universo que contempla estrategicamente 60 participantes selecionados em três (3) grupos (Grupo piloto 1 envolvendo 30 participantes das áreas do Comitê Gestor do projeto na empresa; Grupo piloto 2 envolvendo 12 trainees; e Grupo Gerencial envolvendo 18 participantes, incluindo Gerentes de Área e Gerentes de Equipe da Superintendência de Produtos Educacionais). De posse dos resultados da avaliação das concepções de deficiência pelo ICD, foram realizados workshops de sensibilização com os participantes com o objetivo de sensibilizá-los e disseminar o conhecimento sobre inclusão social e laboral de PcDs, as ações de políticas públicas na atualidade, a natureza das deficiências, considerando-se os aspectos sociais da profissionalização, empregabilidade de pessoas com deficiência na empresa. Para tanto, foram empregadas técnicas e procedimentos lúdicos, além de debates para fins de reflexão crítica por parte dos participantes. A avaliação de reação foi conduzida ao término desses workshops. O conjunto dos dados levantados até então possibilitou proceder-se a um diagnóstico das concepções que prevalecem sobre PcDs na organização alvo da pesquisa. Os resultados evidenciaram a coexistência de concepções distintas da deficiência, indicando que, embora concepções negativas se perpetuem, as reverberações da Lei de Cotas têm apresentado também repercussões visivelmente positivas valorizando, assim, as ações corporativas apontadas para a diversidade humana, no contexto do trabalho. Em termos conclusivos, considera-se, no entanto, que o processo de inclusão laboral deva ser percebido por parte dos gestores como contínuo e em direção à mudança do comportamento humano nas organizações frente à profissionalização de PcDs. Posteriormente, tendo-se como suporte os resultados da presente pesquisa, um plano de ação institucional será implementado, como proposta de um programa balizado em 10 projetos sintéticos que servirão de modelo para empresas brasileiras interessadas em incluir a diversidade e reter talentos com deficiência em seus postos de trabalho, de modo a garantir-lhes o direito de exercício pleno da cidadania.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

With the great advancement of computer technologies, electronic information starts to play a more and more important role in modern business transactions. Therefore, electronic data, such as e-mail, is frequently required in the process of litigation. Companies, on the one hand, have the legal obligations to produce this kind of e-mail evidence. On the other hand, they also undertake a high cost of e-mail evidence preservation due to the great volume on a daily basis. This Article firstly analyzed features of e-mail evidence with the comparison of paper evidence. Then, it discussed about how e-mail is authenticated and admitted into evidence. By using the case laws in different legal aspects and current Canadian legislations, the Author demonstrated the importance of e-mail evidence preservation in ordinary business course. After that, the Article focused on the practical dilemma of the companies between their legal obligation and the expensive cost to preserve e-mail evidence. Finally, the Author proposed suggestions to both companies and courts on how to coordinate the obligation and cost. More specifically, while companies should adopt a document management policy to implement e-mail evidence preservation, courts need to take into consideration of the high cost of e-mail evidence preservation in electronic discovery.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Le développement exponentiel des réseaux informatiques a largement contribué à augmenter le volume des renseignements personnels disponibles et à remplacer les méthodes désuètes de collecte des renseignements par des méthodes plus rapides et plus efficaces. La vie privée et le contrôle sur les informations personnelles, tels que nous les connaissions il y a quelques décennies, sont des notions difficilement compatibles avec la société ouverte et commerciale comme la nôtre. Face à cette nouvelle réalité menaçante pour les droits et libertés de l’homme, il est essentiel de donner un cadre technique et légal stable qui garantisse une protection adéquate de ces données personnelles. Pour rester dans le marché ou bénéficier de la confiance des individus, les entreprises et les gouvernements doivent posséder une infrastructure de sécurité efficace. Cette nouvelle donne a tendance à devenir plus qu’une règle de compétitivité, elle se transforme en une authentique obligation légale de protéger les données à caractère personnel par des mesures de sécurité adéquates et suffisantes. Ce mémoire aborde justement ces deux points, soit l’étude du développement d’une obligation légale de sécurité et l’encadrement juridique de la mise en place d’un programme de sécurisation des données personnelles par des mesures de sécurités qui respectent les standards minimaux imposés par les textes législatifs nationaux et internationaux.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Medical emergencies on international flights are not uncommon. In these situations the question often arises whether physicians are obliged to render first aid and whether omission leads to legal consequences. The general obligation to aid those in need applies to everyone, not only to physicians. Evading this duty makes liable to prosecution for omittance of defence of a third person in line with Art. 128 of the Swiss Penal Code, punishable by custodial sentence up to three years or an equivalent punitive fine. Vocational and professional law extend the duty to aid for physicians to urgent cases. Although resulting from the performance of a legal obligation, malpractice occurred in the course of first aid can lead to claims for compensation - even from foreign patients, and that according to their own domestic law.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

O artigo apresenta uma selecção dos resultados de um estudo empírico realizado em Portugal em 2004, numa amostra por conveniência, sobre diversos aspectos da conduta ética das empresas e seus trabalhadores. A dimensão ética da conduta das empresas e dos trabalhadores foi assumida como conceito composto pelos seguintes aspectos: reflexão ética, legalidade da conduta, relações entre a ética e a eficiência, responsabilidade das empresas, percepção da conduta não ética e denúncia da sua ocorrência, institucionalização e formalização da ética nas empresas. Dos resultados destacam-se: o impacto positivo ao nível cognitivo da implementação dos elementos de ética formal na empresa, o qual pode, contudo, conduzir à supressão da responsabilidade e à desculpabilização pelos actos potencialmente imorais; o crescimento da imagem positiva do tecido empresarial com a ascendência na posição hierárquica e o inverso com o decréscimo do poder organizacional; o decréscimo de confiança nas empresas nacionais à medida que o sentimento de segurança de/no emprego se reduz e a sua transferência para as empresas estrangeiras; o crescimento de confiança depositada pelos inquiridos nas empresas com o aumento da dimensão destas últimas; a predominância de documentos escritos de ética nas empresas de origem estrangeira e a sua escassez nas empresas nacionais.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, we present WebPut, a prototype system that adopts a novel web-based approach to the data imputation problem. Towards this, Webput utilizes the available information in an incomplete database in conjunction with the data consistency principle. Moreover, WebPut extends effective Information Extraction (IE) methods for the purpose of formulating web search queries that are capable of effectively retrieving missing values with high accuracy. WebPut employs a confidence-based scheme that efficiently leverages our suite of data imputation queries to automatically select the most effective imputation query for each missing value. A greedy iterative algorithm is also proposed to schedule the imputation order of the different missing values in a database, and in turn the issuing of their corresponding imputation queries, for improving the accuracy and efficiency of WebPut. Experiments based on several real-world data collections demonstrate that WebPut outperforms existing approaches.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

E-government is seen as a promising approach for governments to improve their service towards citizens and become more cost-efficient in service delivery. This is often combined with one-stop government, which is a citizen-oriented approach stressing integrated provision of services from multiple departments via a single access point, the one-stop government portal. While the portal concept is gaining prominence in practice, there is little know about its status in academic literature. This hinders academics in building an accumulated body of knowledge around the concept and makes it hard for practitioners to access relevant academic insights on the topic. The objective of this study is to identify and understand the key themes of the one-stop government portal concept in academic, e-government research. A holistic analysis is provided by addressing different viewpoints: social-political, legal, organizational, user, security, service, data & information, and technical. As overall finding we conclude that there are two different approaches: a more pragmatic approach focuses on quick wins in particular related to usability and navigation and a more ambitious, transformational approach having far reaching social-political, legal, organizational implications.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Stakeholders commonly agree that food systems need to be urgently reformed. Yet, how food systems should be reformed is extremely contested. Public international law and regulations are uniquely placed to influence and guide law, policy, programmes and action at regional, national and local levels. Although plenty of international legal instruments intersect with food-related issues, the international regulation of food systems is fragmented, understudied and contested. In order to address these issues, this paper maps and analyses the public international regulatory aspects of food production with a view to providing recommendations for reform. Accordingly, this paper brings together a variety of binding and non-binding international regulatory instruments that to varying degrees and from a range of angles deals with the first activity in the food system: food production. The following paper traces the regulatory tools from natural resources, to the farmers and farm workers that apply skill and experience, and finally to the different dimension of world trade in food. The various regulatory instruments identified, and their collective whole, will be analysed against a rights-based approach to food security.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It’s the stuff of nightmares: your intimate images are leaked and posted online by somebody you thought you could trust. But in Australia, victims often have no real legal remedy for this kind of abuse. This is the key problem of regulating the internet. Often, speech we might consider abusive or offensive isn’t actually illegal. And even when the law technically prohibits something, enforcing it directly against offenders can be difficult. It is a slow and expensive process, and where the offender or the content is overseas, there is virtually nothing victims can do. Ultimately, punishing intermediaries for content posted by third parties isn’t helpful. But we do need to have a meaningful conversation about how we want our shared online spaces to feel. The providers of these spaces have a moral, if not legal, obligation to facilitate this conversation.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Seat belts are effective safety devices used to protect car occupants from severe injuries and fatalities during road vehicle accidents. Despite the proven effectiveness of seat belts, seat belt use rates are quite low, especially in developing countries, such as Turkey. The general aim of the present study was to investigate a large variety of factors related to seat belt use among Turkish car occupants using different perspectives and methods and therefore, to contribute to the design of effective seat belt use interventions for increasing seat belt use rates in Turkey. Five sub-studies were conducted within the present study. In the first sub-study, environmental (e.g., road type) and psycho-social factors (e.g., belt use by other car occupants) related to the seat belt use of front-seat occupants were investigated using observation techniques. Being male, of a young age, and traveling on city roads were the main factors negatively related to seat belt use. Furthermore, seat belt use by the drivers and front-seat passengers was highly correlated and a significant predictors of each other. In the second sub-study, the motivations of the car occupants for seat belt use and non-use were investigated using interview techniques. Situational conditions, such as traveling on city roads and for short distances, and not believing in the effectiveness and relevance of seat belt use for safety, were the most frequently reported reasons for not using a seat belt. Safety, habit and avoiding punishment were among the most frequently reported reasons for using a seat belt. In the third sub-study, the Theory of Planned Behavior (TPB) and the Health Belief Model (HBM) were applied to seat belt use using Structural Equation Modeling techniques. The TPB model showed a good fit to the data, whereas the HBM showed a poor fit to the data. Within the TPB model, attitude and subjective norm were significant predictors of intentions to use a seat belt on both urban and rural roads. In the fourth sub-study, seat belt use frequency and motivations for seat belt use among taxi drivers were investigated and compared between free-time and work-time driving using a survey. The results showed that taxi drivers used seat belts more when driving a private car in their free-times compared to when driving a taxi during their work-times. The lack of a legal obligation to use a seat belt in city traffic and fear of being attacked or robbed by the passengers were found as two specific reasons for not using a seat belt when driving a taxi. Lastly, in the fifth sub-study, the relationship of seat belt use to driver and health behaviors was investigated using a survey. Although seat belt use was related both to health and driver behaviors, factor analysis results showed that it grouped with driver behaviors. Based on the results of the sub-studies, a tentative empirical model showing different predictors of seat belt use was proposed. According to the model, safety and normative motivations and perceived physical barriers related to seat belt use are the three important predictors of seat belt use. Keywords: Seat belt use; environmental factors; psycho-social factors; safety and normative motivations; the Theory of Planned Behavior; the Health Belief Model; health behaviors; driver behaviors; front-seat occupants; taxi drivers; Turkey.