885 resultados para Protection clause
Resumo:
The subject-wise distribtion of legislative competence among the three legislative jurisdictions, union, state and concurrent, gives rise to a problem of legislative conflicts in India. There does not seem to have been any study exclusively devoted to this aspect of Indian federalism. This study is an attempt in that direction. The study has been broadly divided into three parts after an historical introduction in chapter I. Chapters II to VIII deal with conflicts between the exclusive fields, chapters IX and X with conflicts in the concurrent field, and chapter XI with conflicts between the exclusive and concurrent fields. In the last chapter, i.e, chapter XII, has been collected together some conclusions which in most cases have also been noted in the course of the study
Resumo:
This project looked at the nature, contents, methods, means and legal and political effects of the influence that constitutional courts exercise upon the legislative and executive powers in the newly established democracies of Central and Eastern Europe. The basic hypothesis was that these courts work to provide a limitation of political power within the framework of the principal constitutional values and that they force the legislature and executive to exercise their powers and duties in strict accordance with the constitution. Following a study of the documentary sources, including primarily the relevant constitutional and statutory provisions and decisions of constitutional courts, Mr. Cvetkovski prepared a questionnaire on various aspects of the topics researched and sent it to the respective constitutional courts. A series of direct interviews with court officials in six of the ten countries then served to clarify a large number of questions relating to differences in procedures etc. that arose from the questionnaires. As a final stage, the findings were compared with those described in recent publications on constitutional control in general and in Central and Eastern Europe in particular. The study began by considering the constitutional and political environment of the constitutional courts' activities in controlling legislative and executive powers, which in all countries studied are based on the principles of the rule of law and the separation of powers. All courts are separate bodies with special status in terms of constitutional law and are independent of other political and judicial institutions. The range of matters within their jurisdiction is set by the constitution of the country in question but in all cases can be exercised only with the framework of procedural rules. This gives considerable significance to the question of who sets these rules and different countries have dealt with it in different ways. In some there is a special constitutional law with the same legal force as the constitution itself (Croatia), the majority of countries allow for regulation by an ordinary law, Macedonia gives the court the autonomy to create and change its own rules of procedure, while in Hungary the parliament fixes the rules on procedure at the suggestion of the constitutional court. The question of the appointment of constitutional judges was also considered and of the mechanisms for ensuring their impartiality and immunity. In the area of the courts' scope for providing normative control, considerable differences were found between the different countries. In some cases the courts' jurisdiction is limited to the normative acts of the respective parliaments, and there is generally no provision for challenging unconstitutional omissions by legislation and the executive. There are, however, some situations in which they may indirectly evaluate the constitutionality of legislative omissions, as when the constitution contains provision for a time limit on enacting legislation, when the parliament has made an omission in drafting a law which violates the constitutional provisions, or when a law grants favours to certain groups while excluding others, thereby violating the equal protection clause of the constitution. The control of constitutionality of normative acts can be either preventive or repressive, depending on whether it is implemented before or after the promulgation of the law or other enactment being challenged. In most countries in the region the constitutional courts provide only repressive control, although in Hungary and Poland the courts are competent to perform both preventive and repressive norm control, while in Romania the court's jurisdiction is limited to preventive norm control. Most countries are wary of vesting constitutional courts with preventive norm control because of the danger of their becoming too involved in the day-to-day political debate, but Mr. Cvetkovski points out certain advantages of such control. If combined with a short time limit it can provide early clarification of a constitutional issue, secondly it avoids the problems arising if a law that has been in force for some years is declared to be unconstitutional, and thirdly it may help preserve the prestige of the legislation. Its disadvantages include the difficulty of ascertaining the actual and potential consequences of a norm without the empirical experience of the administration and enforcement of the law, the desirability of a certain distance from the day-to-day arguments surrounding the political process of legislation, the possible effects of changing social and economic conditions, and the danger of placing obstacles in the way of rapid reactions to acute situations. In the case of repressive norm control, this can be either abstract or concrete. The former is initiated by the supreme state organs in order to protect abstract constitutional order and the latter is initiated by ordinary courts, administrative authorities or by individuals. Constitutional courts cannot directly oblige the legislature and executive to pass a new law and this remains a matter of legislative and executive political responsibility. In the case of Poland, the parliament even has the power to dismiss a constitutional court decision by a special majority of votes, which means that the last word lies with the legislature. As the current constitutions of Central and Eastern European countries are newly adopted and differ significantly from the previous ones, the courts' interpretative functions should ensure a degree of unification in the application of the constitution. Some countries (Bulgaria, Hungary, Poland, Slovakia and Russia) provide for the constitutional courts' decisions to have a binding role on the constitutions. While their decisions inevitably have an influence on the actions of public bodies, they do not set criteria for political behaviour, which depends rather on the overall political culture and traditions of the society. All constitutions except that of Belarus, provide for the courts to have jurisdiction over conflicts arising from the distribution of responsibilities between different organs and levels in the country, as well for impeachment procedures against the head of state, and for determining the constitutionality of political parties (except in Belarus, Hungary, Russia and Slovakia). All the constitutions studied guarantee individual rights and freedoms and most courts have jurisdiction over complaints of violation of these rights by the constitution. All courts also have some jurisdiction over international agreements and treaties, either directly (Belarus, Bulgaria and Hungary) before the treaty is ratified, or indirectly (Croatia, Czech Republic, Macedonia, Romania, Russia and Yugoslavia). In each country the question of who may initiate proceedings of norm control is of central importance and is usually regulated by the constitution itself. There are three main possibilities: statutory organs, normal courts and private individuals and the limitations on each of these is discussed in the report. Most courts are limited in their rights to institute ex officio a full-scale review of a point of law, and such rights as they do have rarely been used. In most countries courts' decisions do not have any binding force but must be approved by parliament or impose on parliament the obligation to bring the relevant law into conformity within a certain period. As a result, the courts' position is generally weaker than in other countries in Europe, with parliament remaining the supreme body. In the case of preventive norm control a finding of unconstitutionality may act to suspend the law and or to refer it back to the legislature, where in countries such as Romania it may even be overturned by a two-thirds majority. In repressive norm control a finding of unconstitutionality generally serves to take the relevant law out of legal force from the day of publication of the decision or from another date fixed by the court. If the law is annulled retrospectively this may or may not bring decisions of criminal courts under review, depending on the provisions laid down in the relevant constitution. In cases relating to conflicts of competencies the courts' decisions tend to be declaratory and so have a binding effect inter partes. In the case of a review of an individual act, decisions generally become effective primarily inter partes but is the individual act has been based on an unconstitutional generally binding normative act of the legislature or executive, the findings has quasi-legal effect as it automatically initiates special proceedings in which the law or other regulation is to be annulled or abrogated with effect erga omnes. This wards off further application of the law and thus further violations of individual constitutional rights, but also discourages further constitutional complaints against the same law. Thus the success of one individual's complaint extends to everyone else whose rights have equally been or might have been violated by the respective law. As the body whose act is repealed is obliged to adopt another act and in doing so is bound by the legal position of the constitutional court on the violation of constitutionally guaranteed freedoms and rights of the complainant, in this situation the decision of the constitutional court has the force of a precedent.
Resumo:
Chaque apparition d’une nouvelle technologie remet inévitablement en cause le cadre législatif établi pour protéger les droits de propriété. Cependant, avec la numérisation de l’information et l’avènement d’Internet, il est de plus en plus facile de reproduire et de distribuer librement des œuvres protégées. Toutefois, depuis le 20 décembre 1996, l’Organisation Mondiale de la Propriété Intellectuelle (OMPI) a adopté deux traités ayant pour objectif principal d’adapter le cadre juridique du droit d’auteur aux nouvelles technologies. C’est pour se conformer à ces traités que l’administration Clinton a adopté le Digital Millenium Copyright Act (DMCA) en 1998. Cet article examine d’abord les dimensions constitutionnelle du Copyright américain, et plus spécifiquement certaines limites qui viennent tempérer les prérogatives exclusives des titulaires de droits, notamment le domaine public et les usages équitables possibles d’ une œuvre. Sont ensuite examinés le DMCA et sa conformité aux principes énoncés à la clause constitutionnelle, source du pouvoir législatif du Congrès américain en matière de Copyright. De plus, comme le DMCA interdit non seulement le contournement de technologies protégeant une œuvre en format numérique, mais également la fabrication et la diffusion de technologies permettant d’arriver à cette fin, cet article analyse les répercussions de cette loi sur la liberté d’expression.
Resumo:
The concept of social clause has been accepted in the GATT agreement to prescribe the labour standards. Social clause , $tands for protecting labour standards, more specificalfy prohibition of employment of children in hazardous industries, providing adequate wages. healthy and hygienic working conditions, special social welfare protection for women, prescription of hours of work and rest and provision for efficacious remedy in case of default by employer to provide these conditions to his workers.
Resumo:
Pris dans l'engrenage de la pratique, comme avocat, depuis maintenant 17 ans, le retour aux études représentait un moment de réflexion et une occasion de faire le point sur l'évolution du judiciaire en matière de protection et la place qu'occupe l'enfant. Certes, la présente démarche n'est pas la solution qui liera le législateur, mais elle s'inscrit dans le cadre de l'évolution de la pratique en matière de protection qui devrait intéresser les intervenants du monde judiciaire et social. Bien que la protection des enfants constitue, pour la société, une action importante, il nous semble que l'analyse et la réflexion sur le sujet aient souvent été faites de façon hermétique en ce sens que les intervenants des différents secteurs se sont souvent ignorés et que le discours de chacun a été peu accessible pour les autres. Le présent travail s'adresse donc aux principaux intervenants en protection de l'enfance, soit les intervenants sociaux et les juristes. Bien sûr, il est possible que certaines parties du travail intéressent davantage les juristes alors que d'autres parties intéresseront plus les intervenants sociaux. Cependant, l'objectif visé est d'amorcer une réflexion qui soit accessible à tous les intervenants. Certains avis et prises de position sur les rôles ou aspects de la pratique intéresseront davantage les juristes, dans certains cas, et, plus indirectement les intervenants sociaux, alors que l'inverse se produira sur d'autres aspects. Le présent travail comporte certaines limites qu'il est nécessaire de signaler. Dans un premier temps, précisons qu'il n'y a pas de présentation ou d'étude systématique de loi, si ce n'est l'utilisation de certains articles de la Loi sur la protection de la jeunesse que nous avons cru nécessaire de citer. Dans un deuxième temps, signalons que l'objectif du travail n'est pas de proposer une réforme, mais qu'il s'agit plutôt d'une réflexion de la part d'un praticien sur certains éléments difficiles de la pratique en matière de protection de l'enfance. Dans un troisième temps, il est important de souligner que le présent travail a été préparé et rédigé avant que ne soient rendus publics les résultats de l'enquête Jasmin concernant la Loi sur la protection de la jeunesse. Les textes, recherches et commentaires déposés auprès de cette Commission n'ont pas été portés à notre connaissance.
Resumo:
In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.
Resumo:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.