1000 resultados para Secret commission
Resumo:
Mémoire numérisé par la Division de la gestion de documents et des archives de l'Université de Montréal
Resumo:
Mode of access: Internet.
Resumo:
In November 2013 the European Commission issued the “Proposal for a Directive on the European Parliament and of the Council on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure” (referred to as “TSD”). The TSD offers minimum harmonisation and aims at promoting sharing of knowledge, and the exploitation of innovations on the Internal Market. The European Parliament adopted the TSD on April 14, 2016 and the EU Member States will have two years to implement it. The TSD includes a harmonised definition of a trade secret that builds on the definition provided in Article 39 of the TRIPS Agreement. Moreover, it also ensures the freedom of expression and information and the protection of whistle-blowers. Appropriate means of actions and remedies against unlawful acquisition, use and disclosure of trade secrets are also included, such as provisional and pecuniary measures, injunctions and corrective measures or allocation of damages. This study examines the protection of trade secrets in the course of litigation regulated in Article 9 of the TSD. Currently, the protection of trade secrets within the EU is fragmented especially in this regard, which makes companies reluctant to resort to litigation when a trade secret has unlawfully been misappropriated or it is suspected that a trade secret is being misused. The regulations in Article 9 expand only to the hearing in court. Such protection is welcomed and a step in the right direction. However, in my study I have found that in order for the protection to be sufficient there is a need to further establish measures to protect trade secrets during the entire process, from the filing of the claim to the end when the judgement is given. Consequently, I also discuss different measures that could be used to strengthen the protection of trade secrets before the hearing in court, as evidence are gathered.
Resumo:
In November 2013 the European Commission issued the “Proposal for a Directive on the European Parliament and of the Council on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure” (referred to as “TSD”). The TSD offers minimum harmonisation and aims at promoting sharing of knowledge, and the exploitation of innovations on the Internal Market. The European Parliament adopted the TSD on April 14, 2016 and the EU Member States will have two years to implement it. The TSD includes a harmonised definition of a trade secret that builds on the definition provided in Article 39 of the TRIPS Agreement. Moreover, it also ensures the freedom of expression and information and the protection of whistle-blowers. Appropriate means of actions and remedies against unlawful acquisition, use and disclosure of trade secrets are also included, such as provisional and pecuniary measures, injunctions and corrective measures or allocation of damages. This study examines the protection of trade secrets in the course of litigation regulated in Article 9 of the TSD. Currently, the protection of trade secrets within the EU is fragmented especially in this regard, which makes companies reluctant to resort to litigation when a trade secret has unlawfully been misappropriated or it is suspected that a trade secret is being misused. The regulations in Article 9 expand only to the hearing in court. Such protection is welcomed and a step in the right direction. However, in my study I have found that in order for the protection to be sufficient there is a need to further establish measures to protect trade secrets during the entire process, from the filing of the claim to the end when the judgement is given. Consequently, I also discuss different measures that could be used to strengthen the protection of trade secrets before the hearing in court, as evidence are gathered.
Resumo:
The need to “reduce red tape” and regulatory inconsistencies is a desirable outcome (OECD 1997) for developed countries. The costs normally associated with regulatory regimes are compliance costs and direct charges. Geiger and Hoffman (1998) have noted that the extent of regulation in an industry tends to be negatively associated with firm performance. Typically, approaches to estimation of the cost of regulations examine direct costs, such as fees and charges, together with indirect costs, such as compliance costs. However, in a fragmented system, such as Australia, costs can also be incurred due to procedural delays, either by government, or by industry having to adapt documentation for different spheres of government; lack of predictable outcomes, with variations occurring between spheres of government and sometimes within the same government agency; and lost business opportunities, with delays and red tape preventing realisation of business opportunities (OECD 1997). In this submission these costs are termed adaptation costs. The adaptation costs of complying with variations in regulations between the states has been estimated by the Building Product Innovation Council (2003) as being up to $600 million per annum for building product manufacturers alone. Productivity gains from increased harmonisation of the regulatory system have been estimated in the hundreds of millions of dollars (ABCB 2003). This argument is supported by international research which found that increasing the harmonisation of legislation in a federal system of government reduces what we have termed adaptation costs (OECD 2001). Research reports into the construction industry in Australia have likewise argued that improved consistency in the regulatory environment could lead to improvements in innovation (PriceWaterhouseCoopers 2002), and that research into this area should be given high priority (Hampson & Brandon 2004). The opinion of industry in Australia has consistently held that the current regulatory environment inhibits innovation (Manley 2004). As a first step in advancing improvements to the current situation, a summary of the current costs experienced by industry needs to be articulated. This executive summary seeks to outline these costs in the hope that the Productivity Commission would be able to identify the best tools to quantify the actual costs to industry.
Resumo:
Bob Baxt, the third Chairman of the Trade Practices Commission, served for a single three year term from 1988 to 1991. He followed Bob McComas, who had deliberately adopted a non-litigious approach to preserving the competitive process, believing that he understood business as an insider and that much of what it did was not anti-competitive, when correctly viewed. Baxt was far more pro-active in his approach, and more closely aligned with that of the first Chairman, Ron Bannerman. Baxt sought to push the frontiers of investigation and precedent, and perhaps, more significantly, sought to influence his Ministers, the government, public servants and public opinion about the need to expand the coverage of the Trade Practices Act, increase penalties and properly resource the Commission so that it could perform its assigned roles. This article examines Baxt’s early and on-going role in teaching Australian students and professionals through his interdisciplinary Trade Practices Workshops, the political context of Baxt’s tenure, including his relations with the Attorney-General ,Michael Duffy, and his skilful handling of the Queensland Wire case.
Resumo:
This article examines the representation of Indigenous sexuality on Australian television drama since the 1970s, suggesting the political importance of such representations. In 1976 Justine Saunders became the first regular Indigenous character on an Australian television drama series, as the hairdresser Rhonda Jackson in Number 96. She was presented as sexually attractive, but this was expressed through a rape scene after a party. Twenty five years later, Deborah Mailman starred in The Secret Life of Us, as Kelly, who is also presented as sexually attractive. But her character can be seen in many romantic relationships. The article explores changing representations that moved us from Number 96 to The Secret Life of Us, via The Flying Doctors and Heartland. It suggests that in representations of intimate and loving relationships on screen it has only recently become possible to see hopeful models for interaction between Indigenous and non-Indigenous Australians.
Resumo:
This paper profiles Queensland's recent Crime and Misconduct Commission Inquiry into the abuse of children in foster care. The authors welcome the outcome as an opportunity to highlight the problems encountered by child protection jurisdictions in Australia and internationally, and they applaud some of the Inquiry's findings. However, the paper argues that the path to reform is hampered by insufficient accountability by government and management, and an inadequate challenge to the ideologies underpinning contemporary child protection policy and practice. The authors conclude with a call to value and assert social work's contribution to child protection systems so as to vastly improve outcomes for children and families.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.