To see the other types of publications on this topic, follow the link: Privacy legislation.

Dissertations / Theses on the topic 'Privacy legislation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Privacy legislation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gunnarsson, Annicka, and Siri Ekberg. "Invasion of Privacy : Spam - one result of bad privacy protection." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.

Full text
Abstract:
Our personal privacy is being eroded from various directions as modern technologies bring lots of new threats towards our personal privacy. Unfortunately, people are often oblivious about it and accept invasion of privacy to a great extent without questions. This thesis is a presentation of our study dealing with privacy violations while using the Internet. It also includes a further investigation about unsolicited bulk email, which is one of many consequences of bad privacy protection. We have also examined the differences between the United States and the European Union and found that the fundamental privacy protection is better in the European Union. We have used different methods to complete this thesis such as studies of literature and articles as well as performing a spam study. Using these methods we have concluded that privacy violations on the Internet is a significant problem and that the Internet users have a right to an adequate privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
2

Harding, Ian M., and n/a. "The introduction of privacy legislation to Australia as a case study in policy making." University of Canberra. Administrative Studies, 1998. http://erl.canberra.edu.au./public/adt-AUC20060720.124331.

Full text
Abstract:
The basis of this study was my belief that the introduction of the present privacy legislation had been done in such a "try and see" manner. To me, the whole process "begged" for a much closer look to try to understand the rationale behind successive governments' decisions on this policy initiative. I begin my look at the process from the 1960s as this is when general public concern for the security of personal information was high. I then move to the introduction of the proposed Australia Card and its demise and then to the present. Then, with reference to the "classic" policy analysis authors, I show that the implementation of federal privacy laws in Australia was an excellent example of how not to go about convincing the public the new laws would offer the protection they, the public, sought. I also explore the reasons behind negative lobbying by certain non-government sector interests to demonstrate how this sector has influenced government thinking. As an example of the study of a policy issue this thesis shows the effect a lack of planning, and a terrible lack of communication, can have on the introduction of any new legislation. Much of this is due to the fact that the real issue behind the introduction of privacy legislation was that of increasing taxation revenue and not the protection of individuals' privacy. The privacy legislation was the "sweetener" the government believed was needed to satisfy the general public's concerns so that the government could achieve the desired result for its taxation revenue policy.
APA, Harvard, Vancouver, ISO, and other styles
3

Saganich, Robert Lee. "An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.

Full text
Abstract:
This study examined privacy legislation in California to identify those electronic Protected Health Information (e-PHI) privacy policies that are suited to seniors using in-home health monitoring systems. Personal freedom and independence are essential to a person's physical and mental health, and mobile technology applications provide a convenient and economical method for monitoring personal health. Many of these apps are written by third parties, however, which poses serious risks to patient privacy. Current federal regulations only cover applications and systems developed for use by covered entities and their business partners. As a result, the responsibility for protecting the privacy of the individual using health monitoring apps obtained from the open market falls squarely on the states. The goal of this study was to conduct an exploratory study of existing legislation to learn what was being done at the legislative level to protect the security and privacy of users using in-home mobile health monitoring systems. Specifically, those developed and maintained by organizations or individuals not classified as covered entities under the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The researcher chose California due to its reputation for groundbreaking privacy laws and high population of seniors. The researcher conducted a content analysis of California state legislation, federal and industry best practices, and extant literature to identify current and proposed legislation regarding the protection of e-PHI data of those using in-home health monitoring systems. The results revealed that in-home health monitoring systems show promise, but they are not without risk. The use of smartphones, home networks, and downloadable apps puts patient privacy at risk, and combining systems that were not initially intended to function together carries additional concerns. Factors such as different privacy-protection profiles, opt-in/opt-out defaults, and privacy policies that are difficult to read or are not adhered to by the application also put user data at risk. While this examination showed that there is legislative support governing the development of the technology of individual components of the in-home health monitoring systems, it appears that the in-home health monitoring system as a whole is an immature technology and not in wide enough use to warrant legislative attention. In addition – unlike the challenges posed by the development and maintenance of the technology of in-home health monitoring systems – there is ample legislation to protect user privacy in mobile in-home health monitoring systems developed and maintained by those not classified as covered entities under HIPAA. Indeed, the volume of privacy law covering the individual components of the system is sufficient to ensure that the privacy of the system as a whole would not be compromised if deployed as suggested in this study. Furthermore, the legislation evaluated over the course of this study demonstrated consistent balance between technical, theoretical, and legal stakeholders. This study contributes to the body of knowledge in this area by conducting an in-depth review of current and proposed legislation in the state of California for the past five years. The results will help provide future direction for researchers and developers as they struggle to meet the current and future needs of patients using this technology as it matures. There are practical applications for this study as well. The seven themes identified during this study can serve as a valuable starting point for state legislators to evaluate existing and proposed legislation within the context of medical data to identify the need for legislation to assist in protecting user data against fraud, identity theft, and other damaging consequences that occur because of a data breach.
APA, Harvard, Vancouver, ISO, and other styles
4

Caple, Andrew. "Transparency, privacy and equality: A human rights analysis of the open justice principle in Australian mental health legislation." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/109615/1/Andrew_Caple_Thesis.pdf.

Full text
Abstract:
This research analysed Australia's statutory recognition of the common law principle of open justice at mental health civil commitment review hearings and whether its operation complies with the current United Nations human rights framework. This thesis argues that Australia's statutory approaches are inconsistent and that accordingly, each Australian state and territory should implement a supported decision-making framework to enable mental health involuntary patients, should they wish, to make autonomous decisions to waive rights to privacy and confidentiality, and to open a review hearing either in part, or in full. In addition, reviewing tribunals are obliged to publish reasons statements according to a test of 'significance'.
APA, Harvard, Vancouver, ISO, and other styles
5

Moller, Kerry. "The Right to Digital Privacy: Advancing the Jeffersonian Vision of Adaptive Change." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/936.

Full text
Abstract:
The relationship between privacy, technology, and law is complex. Thomas Jefferson’s prescient nineteenth century observation that laws and institutions must keep pace with the times offers a vision for change. Statutory law and court precedents help to define our right to privacy, however, the development of new technologies has complicated the application of old precedents and statutes. Third party organizations, such as Google, facilitate new methods of communication, and the government can often collect the information that third parties receive with a subpoena or court order, rather than a Fourth Amendment-mandated warrant. Privacy promotes fundamental democratic freedoms, however, under current law, the digital age has diminished the right to privacy in our electronic communications data. This work explores the statutory and constitutional law protecting our right to privacy, as well as the inadequacies that have developed with the digital revolution. With commonplace use of third parties to facilitate electronic communication, our courts and lawmakers must amend current laws and doctrines to protect the privacy of communications in the digital age. To provide clarity and appropriate data privacy protections, the following clarifications and amendments should be made to the third party doctrine and the Stored Communications Act (SCA): 1) third party doctrine should only apply to context data, 2) content data should be protected by the Fourth Amendment, 3) the SCA should eliminate the distinction between Remote Computing Services (RCS) data and Electronic Communication Services (ECS) data, and 4) the SCA should require warrants for all content data acquisition.
APA, Harvard, Vancouver, ISO, and other styles
6

Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.

Full text
Abstract:
An in-depth study of Advance Passenger Information and Passenger Name Record has never been accomplished prior to the events of September 11 th. It is of great importance to distinguish both of these concepts as they entail different legal consequence. API is to be understood as a data transmission that Border Control Authorities possess in advance in order to facilitate the movements of passengers. It is furthermore imperative that harmonization and inter-operability between States be achieved in order for this system to work. Although the obligations seem to appear for air carriers to be extraneous, the positive impact is greater than the downfalls.
Passenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
APA, Harvard, Vancouver, ISO, and other styles
7

Kan, Chi-keung, and 簡志強. "A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31965507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26536/1/James_Watt_Thesis.pdf.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
9

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26536/.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
10

Mabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.

Full text
Abstract:

"
The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as they stand do not necessarily provide for the protection of an employee's right to privacy, but the incorporation of these sections could be construed as meaning that the legislature or the framers of the legislation intended to limit the employers right to trade freely, at the same breath, limit the employees right to privacy. It is argued that RICA does not provide protection for the right to privacy wherein consent has been obtained under duress or based on misrepresentation of facts. It is contended that the interception of employees electronic communications in such circumstances would be regarded as an infringement of such employees right to privacy. The burden of proving duress or misrepresentation of facts rests on the employee who alleges that such consent was obtained under duress or based on misrepresentation of facts. It is also argued that RICA does not define the meaning of the words in the course of carrying on of business or reasonable steps provided in section 6 of RICA. It is argued that the meaning of in the course of carrying on of business would be determined by the type of the industry upon which the business operates, as well as the circumstances of the case. Reasonable steps would be regarded as being taken if employers notify employees that their electronic communications would be intercepted..."

APA, Harvard, Vancouver, ISO, and other styles
11

Gondwe, Mimmy. "The Protection of Privacy in the Workplace: A Comparative Study." Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17849.

Full text
Abstract:
Thesis (LLD )--Stellenbosch University, 2011.
ENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background checks. Hence, the issue at the heart of this dissertation is to determine to what extent privacy is protected in the South African workplace given advancements in technology and the implications (if any) for the right to privacy as such. A secondary aim of the dissertation is to attempt to provide a realistic balance between the privacy concerns of employees and the operational needs of employers in this technological age. As such the main focus of dissertation falls within the sphere of employment law. In order to provide an answer to the research issue discussed above, the dissertation addresses five ancillary or interrelated issues. First, the broad historical development of the legal protection of privacy is traced and examined. Second, a workable definition of privacy is identified with reference to academic debate and comparative legislative and judicial developments. Third, those policies and practices, which would typically threaten privacy in the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of the tension between privacy and a number of selected policies and practices in selected countries is provided. More specifically, the dissertation considers how these policies and practices challenge privacy, the rationale for their existence and, if applicable, how these policies and practices – if necessary through appropriate regulation – may be accommodated while simultaneously accommodating both privacy and the legitimate concerns of employers. The selection of these practices and policies is guided by two considerations. At the first level the emphasis is on those challenges to privacy, which can be traced back to technological developments and which, as such, foster new and unique demands to the accommodation of privacy in the workplace. The secondary emphasis is on those policies, which are representative of the fundamental challenges created by new technologies to privacy. To effectively address the above issues the dissertation uses the traditional legal methodology associated with comparative legal research, which includes a literature review of applicable law and legal frame work and a review of relevant case law and a comparative study of selected foreign jurisdictions.
AFRIKAANSE OPSOMMING: Geen opsomming
Fulbright Foundation
Stellenbosch University
Mellon Foundation
NFR
APA, Harvard, Vancouver, ISO, and other styles
12

Dixon, Henry George. "Email security policy implementation in multinational organisations with special reference to privacy laws." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/229.

Full text
Abstract:
In 1971, scientist Ray Tomlinson sent what is now considered the first email message. It was considered as “nothing short of revolutionary … deserv[ing] a spot in the list of great communication inventions such as the printing press, telegraph and telephone” (Festa, 2001). Whereas email was first used exclusively in the military (Arpanet) and in academic circles, it has now become almost ubiquitous, used widely for private, as well as for business correspondence. According to a Berkeley study (Berkeley, 2000), there were approximately 440 million corporate and personal [e-] mailboxes worldwide in 2001, of which more than a third was corporate mailboxes. As a result of the extensive use of email in the corporate environment, Information Officers have to ensure that the use of email adds business value. In an “always on” market place, the efficiency, immediacy and cost effectiveness of email communication are immediately evident. A study by Ferris Research, quoted by Nchor (2001), shows that there is “an overall productivity gain of US$9000 per employee as they send and receive emails to get projects done.” However, the use of email in the corporate envi-ronment also poses business risks that need to be uniquely addressed. Among these “key business risks” (Surfcontrol, 2001) are security risks, viruses, legal liability, pro-ductivity loss and bandwidth abuse. To address the risks mentioned above and to protect the business value of email, spe-cific policies have to be implemented that address email usage. Information Security Policies are defined in most corporate environments. In a study done by Elron Soft-ware (2001), 83% of respondents who have abused email have company policies regu-lating email usage. There appears to be a gap between policy conception and policy implementation. Various factors inhibit effective policy implementation – ethical, legal and cultural. The implementation of corporate policy becomes especially complex in multinational environments where differing information law Email usage is ubiquitous in the modern business environment, but few companies adequately manage the risks associated with email.
APA, Harvard, Vancouver, ISO, and other styles
13

Gamlashe, Thembinkosi. "Freedom of the press, or the infringement of the right to privacy?: media coverage of President Kgalema Motlanthe from October 2008 to April 2009 in three newspapers." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1010118.

Full text
Abstract:
The researcher attempts to assess in which respect the privacy of former President Kgalema Motlanthe may have been invaded during his presidency, in view of journalistic ethics and press codes currently in effect. The study will explore media practices based on media freedom at the time of publication, and assess whether this freedom is understood to suggest the infringement of the right to privacy in the coverage of the private lives of politicians in the media. This study will therefore examine a sample of articles from the Sunday Times, City Press and Mail and Guardian, covering former President Kgalema Motlanthe’s public behaviour that related to his private life, assess which aspects of his demeanour became the subject of media coverage, and correlate such reporting trends with fluctuations in his political career. The researcher will focus on the period when Kgalema Motlanthe was at the helm as the Head of State – from October 2008 to April 2009, and consider particularly the trends in the sampled press reports regarding his private life. The study furthermore examines some of the legislative and normative changes that affected the media in South Africa after democratisation, to correlate the trends observed in the press coverage with legislation. This further serves to identify possible gray areas that arise from reporting on the freedom of the press and may lead to the invasion of privacy.
APA, Harvard, Vancouver, ISO, and other styles
14

Skolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.

Full text
Abstract:
Cloud Computing has advanced to the point where it may be considered an attractive proposition for an increasing number of South African organisations, yet the adoption of Cloud Computing in South Africa remains relatively low. Many organisations have been hesitant to adopt Cloud solutions owing to a variety of inhibiting factors and concerns that have created mistrust in Cloud Computing. One of the top concerns identified is security within the Cloud Computing environment. The approaching commencement of new data protection legislation in South Africa, known as the Protection of Personal Information Act (POPI), may provide an ideal opportunity to address the information security-related inhibiting factors and foster a trust relationship between potential Cloud users and Cloud providers. POPI applies to anyone who processes personal information and regulates how they must handle, store and secure that information. POPI is considered to be beneficial to Cloud providers as it gives them the opportunity to build trust with potential Cloud users through achieving compliance and providing assurance. The aim of this dissertation is, therefore, to develop a framework for Cloud Computing adoption that will assist in mitigating the information security-related factors inhibiting Cloud adoption by fostering a trust relationship through compliance with the POPI Act. It is believed that such a framework would be useful to South African Cloud providers and could ultimately assist in the promotion of Cloud adoption in South Africa.
APA, Harvard, Vancouver, ISO, and other styles
15

Karlsson, Rikard. "Samverkan och sekretess : en rättsvetenskaplig studie av myndigheters informationsutbyte vid olyckor och extraordinära händelser." Doctoral thesis, Umeå universitet, Juridiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-111204.

Full text
Abstract:
Cooperation between authorities is of great importance for effective crisis management. A new crisis management system was introduced in Sweden in 2002 to enhance the ability of public authorities to manage accidents and extraordinary events. It expects authorities to cooperate with each other both before and while dealing with such situations. An important aspect of this cooperation is the exchange of information, which is hampered when authorities are obliged to observe secrecy rules even if this limits their ability to manage accidents and extraordinary events. It may be said, therefore, that the legislation governing the exchange of information by authorities, chiefly the Public Access to Information and Secrecy Act (2009:400), is essentially at variance with the rules that require cooperation. The thesis analyses legal requirements on authorities to cooperate and exchange information when dealing with accidents and extraordinary events and how these requirements relate to secrecy rules. The study does not merely examine the legal requirements placed on authorities to cooperate and exchange information and to observe secrecy rules when dealing with accidents and extraordinary events; it also undertakes a critical analysis of the current legislation, with the aim of identifying deficiencies and ambiguities, taking as its criteria that good legislation should be clear, coherent and well-balanced. Since the thesis shows that there are deficiencies in the legislation, it also suggests improvements and alternative forms of regulation.
APA, Harvard, Vancouver, ISO, and other styles
16

Jeppson, Jonas. "The OECD cryptography policy guidelines and their implementation /." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=31164.

Full text
Abstract:
The Organization for Economic Co-operation and Development (OECD) issued on 27 March 1997 a recommendation concerning cryptography policy guidelines in an attempt to foster international co-operation and harmonization. Information is becoming increasingly valuable in society. Globalization of markets, improvements in information and communication technology and the shift to a knowledge-based economy has, furthermore, created an enormous potential for electronic commerce. Conservative estimates predict electronic commerce will have a turnover of more than US $400 billion by 2002. The increasing importance of information and communications has, however, made the information society vulnerable. Cryptography plays an important part in securing transactions in electronic commerce and moreover, in establishing a secure electronic environment in the information society. Fear of privacy infringements and lack of secure methods for electronic transactions has until now been holding electronic commerce back. Cryptographic methods are an essential part in securing electronic commerce. Law enforcement agencies and national security organizations fear, however, that widespread use of strong encryption will impede their work substantially. This thesis analyzes the advantages and disadvantages of strong encryption and how the balance of the conflicting interests has been dealt with in the OECD Cryptography Policy Guidelines. Moreover, shows the thesis how the OECD Cryptography Policy Guidelines have been implemented and makes suggestions on how the guidelines should be implemented.
APA, Harvard, Vancouver, ISO, and other styles
17

Arès, Sébastien. "Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82651.

Full text
Abstract:
Data matching is the automated process permitting the comparison of significant amounts of personal data from two or more different databanks in order to produce new information. Its use by governments implicates many rights and freedoms, including the protection against unreasonable search and seizure under section 8 of the Canadian Charter.
In the author's opinion, a governmental data matching program will probably constitute a search or seizure under section 8 when a positive answer is given to two questions. First, is there a use or transfer of information which implicates constitutionally protected information? Generally, section 8 will only protect biographical personal information, as described in the Plant case. Second, one must determine if a reasonable expectation of privacy exists as to the purpose for which the information will be used. In other words, one must determine if the two governmental databanks are separate on the constitutional level.
However, a positive answer to both of theses questions does not mean that the matching program necessarily infringes section 8. It will not be considered unreasonable if it is authorised by law, if the law itself is reasonable, and if the execution of the program is reasonable. Presuming that the program is authorised by law, it is probable that a matching program aimed to detect individuals collecting illegally social benefits will not be considered unreasonable.
APA, Harvard, Vancouver, ISO, and other styles
18

Olsson, Andreas. "Hanteringen av integritetsperspektiv inom IT-forensik : En kvalitativ intervjustudie med rättsväsendets aktörer." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17208.

Full text
Abstract:
IT-forensik har funnits i många år och vuxit fram inom brottsutredningar då allt blir mer digitaliserat i vårt samhälle. Samtidigt som det blir mer digitalisering ökar mängden data inom IT. Mycket av vårt privata liv lagras i telefoner eller datorer, till exempel bilder eller personuppgifter. På senare år har integriteten blivit viktigare för varje individ och att följa de mänskliga rättigheterna är ett måste i dagsläget. IT-forensik är i grunden ett integritetsintrång hos den misstänkte och det betyder att aktörerna som utför detta måste vara mer försiktiga och ta hänsyn till de involverades integritet. Syftet med arbetet har varit att undersöka hur aktörerna inom rättsväsendet hanterar integritetsperspektiv under IT-forensiska undersökningar, samt att få en bild av hur detta tillämpas i praktiken. De aktörer som blev intervjuade i denna kvalitativa studie var åklagare, domare och försvarare. Resultatet visar att det finns många gråzoner och det sker mycket personliga bedömningar samt tolkningar hos aktörerna. Lagstiftningen skriver i teorin om hur vissa moment ska gå till, men när det tillämpas i praktiken blir detta betydligt mer komplicerat, vilket resulterar i att aktörerna får åtskilda åsikter och hur det ska tillämpas. Aktörerna finner vidare problematik kring vem som ska få tillgång till vad och hur de ska hantera integriteten.
Digital forensics has been around for many years and has emerged in criminal investigations since more is being digitized in our society. At the same time as there is more digitization, the amount of data within IT increases. Much of our private life is stored in phones or computers, such as pictures or personal data. In recent years, the privacy has become more important for each individual and to follow human rights is a must in the present. Digital forensics in its very core is a privacy infringement of the suspect which means that the actors who perform this must be more cautious and consider the privacy of the people involved. The purpose of this work has been to investigate how the actors in the judicial system manage the perspective of privacy during IT forensic investigations and to get a picture of how this is applied in practice. The actors who were interviewed in this qualitative study were prosecutors, judges and defenders. The results show that there are a lot of gray areas and that very personal assessments and interpretations are made by the actors. The law, in theory, explains how certain elements should be done, but when applied in practice, this becomes much more complicated. This results in the actors getting separate opinions of how they should be applied, furthermore who should have access to what and how to handle the privacy.
APA, Harvard, Vancouver, ISO, and other styles
19

Valduga, Fernando. "O direito fundamental à intimidade e à vida privada nas relações de emprego : limitações ao poder diretivo do empregador no ambiente de trabalho." reponame:Repositório Institucional da UCS, 2009. https://repositorio.ucs.br/handle/11338/481.

Full text
Abstract:
A dissertação trata do estudo acerca dos direitos fundamentais do empregado, sob a ótica do direito fundamental à intimidade e à vida privada nas relações de emprego. Discute-se sobre a problemática gerada em torno do poder diretivo do empregador quando utiliza de métodos abusivos no controle da atividade laboral do empregado. Procura-se elucidar esses limites de controle, utilizando-se para tanto do direito comparado, da análise jurisprudencial e dos posicionamentos doutrinários. Em torno do tema proposto fala-se sobre o respeito e consideração ao princípio da dignidade da pessoa humana no trabalho, bem como da importância do princípio da proporcionalidade, sendo que neste último sugere-se sua possível aplicação nos casos em concreto, pelos intérpretes e aplicadores do direito na hipótese de haver colisão de direitos. Como parte exemplificativa do trabalho questiona-se a monitoração no âmbito das relações laborais e, aborda-se, também, a questão do teletrabalho.
Submitted by Marcelo Teixeira (mvteixeira@ucs.br) on 2014-05-30T16:22:29Z No. of bitstreams: 1 Dissertacao Fernando Valduga.pdf: 341942 bytes, checksum: f85ad115f5dd64bc151574ec54934bde (MD5)
Made available in DSpace on 2014-05-30T16:22:29Z (GMT). No. of bitstreams: 1 Dissertacao Fernando Valduga.pdf: 341942 bytes, checksum: f85ad115f5dd64bc151574ec54934bde (MD5)
The dissertation deals with the study about fundamental rights of the employee, from the perspective of the fundamental right to intimacy and privacy in employment relations. It discusses on the problems generated around the power steering when the employer uses abusive methods to control the employee´s work activity. It seeks to elucidate these control limits, using for both comparative law, jurisprudence and the analysis of doctrinal positions. Around the proposed theme speaks out about respect and consideration to the principle of human dignity at work and the importance of the principle of proportionality, while the latter suggest their possible application in concrete cases, the interpreters and law enforcers in case of collision of rights there. As part of examples of work questions the monitoring in industrial relations, and one addresses also the issue of teleworking.
APA, Harvard, Vancouver, ISO, and other styles
20

Barnardt, Gerard Louis. "Electronic communication in the workplace : employer vs employee legal rights." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49942.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2004.
ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's right to privacy?" This thesis is an attempt to answer these and other related questions by analysing, inter alia, South African legislation, the Constitution and case law, as well as comparing the law as it applies in the United Kingdom and the United States of America. The analysis and conclusion offered in this thesis aim to provide theoretical consideration to academics and practical application for employers that are faced with the reality of monitoring electronic communications.
AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie wat daarop gemik is om te help met die monitering van elektroniese kommunikasie, maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van hulle werknemers te monitor. Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is "mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak monitering die werknemer se reg tot privaatheid?" Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika. Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies gekonfronteer word.
APA, Harvard, Vancouver, ISO, and other styles
21

Trouille, Helen L. "Rights, responsibilities and reform : a study of French justice (1990-2016)." Thesis, University of Bradford, 2017. http://hdl.handle.net/10454/16020.

Full text
Abstract:
The principal questions addressed in this portfolio of eleven publications concern the reforms to French justice at the end of the twentieth and beginning of the twenty-first centuries. The portfolio is accompanied by a supporting statement explaining the genesis and chronology of the portfolio, its originality and the nature of the submission's distinct contribution to knowledge. The thesis questions whether the reforms protect the rights of the defence adequately. It considers how the French state views its responsibility to key figures in criminal justice, be they suspected and convicted criminals, the victims of offences or the professionals who are prosecuting the offences. It reflects upon the role of the examining magistrate, the delicate relationship between justice, politics and the media, breaches of confidentiality and the catastrophic conditions in which suspects and prisoners are detained in French prisons. It then extends its scope to a case study of the prosecution of violent crimes before the International Criminal Tribunal for Rwanda, and discovers significant flaws in procedures even at international levels. In concluding, it asks whether, given the challenges facing the French criminal justice system, French courts are adequately equipped to assure justice when suspects charged with the most serious international crimes appear before them under the principle of universal jurisdiction. The research, carried out over a number of years, relies predominantly on an analysis of French-language sources and represents a unique contribution to the understanding and knowledge of French justice for an English-speaking public at the turn of the twenty-first century.
APA, Harvard, Vancouver, ISO, and other styles
22

Klasson, Torgny. "Informationsteknik och avvägningar mellan individens frihet och statsmakt : - En analys av svenska riksdagsdebatter." Doctoral thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-64539.

Full text
Abstract:
The main question in this thesis is what kind of considerations political parties in the Swedish parliament have made between individual freedoms and state power in matters concerning information technology. Hence, it relates to a central and never ending debate about the proper relationship between the individual rights of citizens and protection of their personal integrity vis-à-vis state power and the interest of society in general, and in particular how this is affected by the rapid development of information technology. Four cases of legislative processes about information technology are analyzed. These cases concern parliamentary debates regarding the secrecy act (sekretesslagen) in 1980 (first debate), three debates concerning the personal data act (personuppgiftslagen) in 1998-99, three debates concerning the surveillance and crime prevention act (lag om hemlig rumsavlyssning & åtgärder för att förhindra vissa särskilt allvarliga brott med mera) in 2006-07 and three debates concerning the national defence radio establishment act (FRA & lag om signalspaning) in 2007-09. An analytical model is developed that includes two ideal types, individual freedom and state power, for the study and categorization of the parties and their positions in each debate. Thus, parties are categorized according to their proximity to the ideal types. The study illustrates that the majority of parties have a tendency to compromise between values constituting the two ideal types; they choose a so called hybrid position in between individual freedom and state power. The exception to this pattern is the Green Party and the Left Party that tend to choose a position close to individual freedom. Three hypotheses are tested. The first implies that parties tend to position themselves in-between the ideal type positions of individual freedom and state power (hybrid positions). This hypothesis gets strong support as hybrid positions are the most common outcome. The second hypothesis infers that a party has a tendency to support state power when in government, but individual freedom when in opposition. This hypothesis also gets empirical support, as parties, when in government, tend increasingly to support values related to state power, but support is somewhat weaker than for the first hypothesis. Finally, the third hypothesis implies that September 11 2001 was a critical moment in relation to how parties deal with values related to individual freedom and state power, i.e. parties were expected generally to be more disposed to support state power after than before September 11. This gets some support as most parties show this tendency. In parliamentary debates after September 11 the Social Democrats, the Moderate Party and the Liberal Party have been more disposed to position themselves close to the value of state power. On the other hand, the Green Party and the Left Party have not changed their positons. One reason could be that neither of these two parties were in government during the studied years
APA, Harvard, Vancouver, ISO, and other styles
23

劉曉敏. "互聯網上泄露公民個人信息行為的犯罪化探析 : 以 人肉搜索 為視角." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2129880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Miles, Joseph M. "Public Policy and Private Prisons: A probe into legislation that populates private prisons with immigrants." Youngstown State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1420732865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Schindeler, Emily Martha. "A genealogy of the problematic of homelessness and the homeless in Australia." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/32068/1/Emily_Schindeler_Thesis.pdf.

Full text
Abstract:
The homeless have been subject to considerable scrutiny, historically and within current social, political and public discourse. The aetiology of homelessness has been the focus of a large body of economic, sociological, historical and political investigation. Importantly, efforts to conceptualise, explain and measure, the phenomenon of homelessness and homeless people has occurred largely within the context of defining “the problem of the homeless” and the generation of solutions to the ‘problem’. There has been little consideration of how and why homelessness has come to be seen, or understood, as a problem, or how this can change across time and/or place. This alternative stream of research has focused on tracing and analysing the relationship between how people experiencing homeless have become a matter of government concern and the manner in which homelessness itself has been problematised. With this in mind this study has analysed the discourses - political, social and economic rationalities and knowledges - which have provided the conditions of possibility for the identification of the homeless and homelessness as a problem needing to be governed and the means for translating these discourses into the applied domain. The aim of this thesis has been to contribute to current knowledge by developing a genealogy of the conditions and rationalities that have underpinned the problematisation of homelessness and the homeless. The outcome of this analysis has been to open up the opportunity to consider alternative governmental possibilities arising from the exposure of the way in which contemporary problematisation and responses have been influenced by the past. An understanding of this process creates an ability to appreciate the intended and unintended consequences for the future direction of public policy and contemporary research.
APA, Harvard, Vancouver, ISO, and other styles
26

Dikranian, Harry. "The development of private education legislation in the province of Québec." Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=22579.

Full text
Abstract:
One of the unique aspects of education in Quebec is a strong private sector. It is well rooted in the province's history and tradition. This study offers a preliminary examination into the historical development of policies in the area of private education in Quebec.
The first two pieces of legislation governing private schools provided subsidies of 100% at par with the public sector. These early laws were repealed and replaced by the Act respecting Private Education.
In August 1991, the government proposed a new and comprehensive piece of legislation. Following the first reading of this Bill a parliamentary commission was established to study the proposed law. Over 15 groups expressed their reactions in briefs to this commission. The Bill was harshly criticized by those opposed to public funding of private schools. It was also criticized by those in favor of the private sector. Given the negative reactions from groups opposed and groups in favor, government ministers decided that the Bill must be changed. (Abstract shortened by UMI.)
APA, Harvard, Vancouver, ISO, and other styles
27

Alam, Gazi M. "Private HE in Bangladesh : the impact on HE governance & legislation." Thesis, University of Nottingham, 2007. http://eprints.nottingham.ac.uk/11581/.

Full text
Abstract:
Although it is claimed that private education is a recent phenomenon in the developing world, criteria of private educations and their schemata have evolved out of historical practices. The introduction of private education in South Asia was implemented by a process known as 'Gru-Shiso'. An individual with a good analytical knowledge was considered as `Gru' and his or her followers were known as 'Shiso'. Exercising knowledge through Gru-Shiso had always been a fundamental part of education in Bangladesh. With the gradual increase of demand for education in contemporary Bangladesh, there has been an increase in private education provision though most acknowledge that education should be the fundamental concern of public policy. In Bangladesh, education is considered as the weapon of development and it is important to ensure the equal right of every individual to have access to education. However, with the advantage of a sound financial background, privileged individuals are not only accessing better quality education, but also gain a better quality of life through improved access to better quality fundamental goods and rights. The recent expansion of private higher education has thus not only opened the door for the privileged to access better quality education, but it has helped those within the elite that would not normally get access to higher education the means by which to enter this form of provision. This has had significant impact on the quality of HE and research in Bangladesh. It is important thus that issues of governance and regulation with the private HE sector be addressed since it affects the whole HE system. Earlier, private education was provided on a very small scale and was not a major concern of public policy. However, its recent expansion has become a cause for major concern. The public policies currently available, particularly with regard to governance and regulatory control, are aimed at governing public education and private education lacks adequate rules and regulations. A further problem in Bangladesh is that the ruling elite do not always confirm to the rules and regulations of the state system. As the main consumers of private education this means that private education provision often lacks the governance and control to make it an effective form of provision. Thus the huge responsibility of public policy is to ensure a regulatory environment that is able to deal with these concerns. The main contention of the thesis is to argue for the development of a PHEC that will fulfil this kind of function.
APA, Harvard, Vancouver, ISO, and other styles
28

Pupo, Alvaro de Carvalho Pinto. "Privacidade, liberdade de expressão e proteção dos dados pessoais: uma perspectiva brasileira com base na jurisprudência do Supremo Tribunal Federal." Pontifícia Universidade Católica de São Paulo, 2017. https://tede2.pucsp.br/handle/handle/20598.

Full text
Abstract:
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-11-14T11:28:30Z No. of bitstreams: 1 Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5)
Made available in DSpace on 2017-11-14T11:28:30Z (GMT). No. of bitstreams: 1 Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5) Previous issue date: 2017-10-31
This study analyzes the concept of intimacy, privacy, free speech and personal data under a brazilian perspective, as well as the protection for each of the itens mentioned. The study makes references to authorities, legislation and case law pertaining to each of the subjects. The study pursues the clarification of what each of these understands as privacy protection and personal data protection, and how these correlates. It also pursues to understand if these understandings are aligned and propose, in the end, some way of uniformization considering the legislative bill proposals being discussed in the Brazilian Congress
O presente trabalho analisa o conceito da intimidade, privacidade, liberdade de expressão e de dados pessoais sob uma perspectiva brasileira, bem como a proteção outorgada a cada um dos itens tratados acima. São analisados os pontos doutrinários, legais e jurisprudenciais associados com cada um deles. A análisa busca averiguar o que cada um desses campos entende como proteção da privacidade e dos dados pessoais e como a privacidade e dados pessoais se relacionam, além verificar se esses entendimentos estão alinhados e propor, ao final, uma forma de uniformização, considerando inclusive propostas legislativas que se encontram em debate no Congresso Nacional
APA, Harvard, Vancouver, ISO, and other styles
29

Rose, Cecily Elizabeth. "International regulation of private sector corruption." Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Héros, Pérez Albela Alfonso de los, Lucero Beatriz Merino, and Mulanovich Gonzalo Zegarra. "La inversión privada a la luz del decreto legislativo 757." THĒMIS-Revista de Derecho, 2012. http://repositorio.pucp.edu.pe/index/handle/123456789/108836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tse, Sau-kuen. "Labour policy and the protection of the legal entitlements of private sector employees." [Hong Kong : University of Hong Kong], 1992. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13236416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ralby, Ian McDowell. "Private military and security companies in the uncharted spaces of the law." Thesis, University of Cambridge, 2012. https://www.repository.cam.ac.uk/handle/1810/252261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dextre, Chacón José Carlos. "Análisis crítico de los discursos sobre la universidad en la prensa impresa peruana y su influencia en el cambio de normatividad de la universidad privada durante el periodo 1993-2018." Doctoral thesis, Universitat Autònoma de Barcelona, 2021. http://hdl.handle.net/10803/672068.

Full text
Abstract:
L’objectiu general de la recerca és realitzar l’anàlisi crítica de l’discurs sobre els esdeveniments comunicatius que van expressar el debat sobre els problemes de la universitat peruana a la premsa escrita de país, i concloure si aquest debat d’idees i propostes influir en els canvis de la legislació de la universitat privada peruana. La tesi aspira a produir i gestionar informació que permeti als professionals de la comunicació avaluar com la ciència de la comunicació gestiona, ressalta i prioritza determinats temes cap a la societat, i com, amb això, planteja a la societat una agenda de debat, en aquest cas, per al desenvolupament d’una política educativa innovadora. La investigació analitza i associa la relació de el text amb el context mitjançant l’anàlisi crítica de l’discurs (ACD). Vincula els esdeveniments comunicatius, en aquest cas els articles d’opinió, amb la cronologia de la legislació normativa de la universitat en el període de 1993 a 2018, sota estudi estructurant-los en tres grans períodes d’estudi i tretze subperíodes. Paral·lelament realitza un procés de conformació dels principals discursos de la universitat segons el tema tractat pels diversos actors, líders polítics i / o mediàtics, representants dels grups d’interès vinculats. Es realitza la deconstrucció textual de cada esdeveniment comunicatiu en proposicions que després, lliures de retòrica, es vinculen a arguments. D’aquesta manera es trasllada la interpretació de l’estructura específica textual a una específica estructura contextual (Van Dijk, 2003: 149), a l’entendre que el discurs és l’assumpte de què es tracta socialment, la creença social compartida (Van Dijk, 1980) en funció a l’context historicosocial. A l’agrupar les proposicions pel tipus de context que el text tracta, es constitueix el tipus de discurs. Els tipus de discurs definits en la investigació són: • Acadèmic: Tracten la docència i la investigació. • Organitzacional: Tracten la gestió i la governança de la universitat. • Social: Tracten la interacció universitat-societat. La metodologia desenvolupada en la investigació defineix a la premsa escrita, i en ella, als esdeveniments comunicatius de l’gènere articles d’opinió que tenen com a propòsit general la problemàtica universitària, com l’univers per al desenvolupament de la investigació, per la seva característica de major capacitat d’anàlisi i credibilitat en relació amb altres mitjans, com les xarxes socials o els audiovisuals, especialitzats en publicar promptament les notícies de fets succeïts. La metodologia identifica les variables presents en l’esdeveniment comunicatiu descomponent el text en els seus components bàsics textuals: les proposicions, i les reestructura novament com a arguments. Cada argument és la suma de proposicions presents en l’article d’opinió vinculades per connectors. Obté així, l’argument resum de l’esdeveniment o article d’opinió. L’argument és vinculat també als diversos discursos presents en ell i a un tema determinat. És, doncs, un gran repositori de el tema universitari. El treball de recerca permet mostrar a l’anàlisi crítica del el Discurs i a l’Anàlisi de Continguts com estratègies vàlides per a l’anàlisi d’un gran corpus de dades. A més, facilitarà la discussió d’aquests temes entre els que dirigeixen les institucions educatives i entre els que proposen la legislació a l’respecte. A més, permetrà que els analistes de comunicacions i els analistes socials accedeixin a una informació organitzada i fàcil d’interrelacionar, així com la interiorització i socialització en l’opinió pública dels endarreriments i els futurs beneficis que el manteniment o la modificació dels paradigmes de gestió educativa poden produir en l’educació universitària de el Perú.
El objetivo general de la investigación es realizar el análisis crítico del discurso sobre los eventos comunicativos que expresaron el debate sobre los problemas de la universidad peruana en la prensa escrita del país, y concluir si dicho debate de ideas y propuestas influyó en los cambios de la legislación de la universidad privada peruana. La tesis aspira a producir y gestionar información que permita a los profesionales de la comunicación evaluar cómo la ciencia de la comunicación gestiona, resalta y prioriza determinados temas hacia la sociedad, y cómo, con ello, plantea a la sociedad una agenda de debate, en este caso, para el desarrollo de una política educativa innovadora. La investigación analiza y asocia la relación del texto con el contexto mediante el análisis crítico del discurso (ACD). Vincula los eventos comunicativos, en este caso los artículos de opinión, con la cronología de la legislación normativa de la universidad en el periodo de 1993 a 2018, bajo estudio estructurándolos en tres grandes periodos de estudio y trece subperiodos. Paralelamente realiza un proceso de conformación de los principales discursos de la universidad según el tema tratado por los diversos actores, líderes políticos y/o mediáticos, representantes de los grupos de interés vinculados. Se realiza la deconstrucción textual de cada evento comunicativo en proposiciones que luego, libres de retórica, se vinculan en argumentos. De esta forma se traslada la interpretación de la estructura específica textual a una específica estructura contextual (Van Dijk, 2003: 149), al entender que el discurso es el asunto del que se trata socialmente, la creencia social compartida (Van Dijk, 1980) en función al contexto histórico-social. Al agrupar las proposiciones por el tipo de contexto que el texto trata, se constituye el tipo de discurso. Los tipos de discurso definidos en la investigación son: • Académico: Tratan la docencia y la investigación. • Organizacional: Tratan la gestión y la gobernanza de la universidad. • Social: Tratan la interacción universidad-sociedad. La metodología desarrollada en la investigación define a la prensa escrita, y en ella, a los eventos comunicativos del género artículos de opinión que tienen como propósito general la problemática universitaria, como el universo para el desarrollo de la investigación, por su característica de mayor capacidad de análisis y credibilidad en relación con otros medios, como las redes sociales o los audiovisuales, especializados en publicar prontamente las noticias de hechos sucedidos. La metodología identifica las variables presentes en el evento comunicativo descomponiendo el texto en sus componentes básicos textuales: las proposiciones, y las reestructura nuevamente como argumentos. Cada argumento es la suma de proposiciones presentes en el artículo de opinión vinculadas por conectores. Obtiene así, el argumento resumen del evento o artículo de opinión. El argumento es vinculado también a los diversos discursos presentes en él y a un tema determinado. Es, pues, un gran repositorio del tema universitario. El trabajo de investigación permite mostrar al Análisis Crítico del Discurso y al Análisis de Contenido como estrategias válidas para el análisis de un gran corpus de datos. Además, facilitará la discusión de estos temas entre quienes dirigen las instituciones educativas y entre quienes proponen la legislación al respecto. Además, permitirá que los analistas de comunicaciones y los analistas sociales accedan a una información organizada y fácil de interrelacionar, así como la interiorización y socialización en la opinión pública de los atrasos y los futuros beneficios que el mantenimiento o la modificación de los paradigmas de gestión educativa pueden producir en la educación universitaria del Perú.
The general objective of the research is to carry out the critical analysis of the discourse on the communicative events that expressed the debate on the problems of the Peruvian university in the written press of the country, and to conclude if said debate of ideas and proposals influenced the changes in the legislation of the Peruvian private university. The thesis aims to produce and manage information that allows communication professionals to evaluate how the science of communication manages, highlights and prioritizes certain issues towards society, and how, with this, it raises a debate agenda for society, in this case, for the development of an innovative educational policy. The research analyzes and associates the relationship of the text with the context through critical discourse analysis (ACD). It links the communicative events, in this case the opinion articles, with the chronology of the university’s normative legislation in the period from 1993 to 2018, under study, structuring them in three large periods of study and thirteen sub-periods. At the same time, it carries out a process of shaping the main speeches of the university according to the subject dealt with by the various actors, political and / or media leaders, representatives of the related interest groups. The textual deconstruction of each communicative event is carried out in propositions that then, free of rhetoric, are linked in arguments. In this way, the interpretation of the specific textual structure is transferred to a specific contextual structure (Van Dijk, 2003: 149), by understanding that the discourse is the social issue, the shared social belief (Van Dijk, 1980) depending on the historical-social context. By grouping the propositions by the type of context that the text deals with, the type of discourse is constituted. The types of speech defined in the research are: • Academic: They deal with teaching and research. • Organizational: They deal with the management and governance of the university. • Social: They deal with university-society interaction. The methodology developed in the research defines the written press, and in it, the communicative events of the opinion articles genre whose general purpose is university problems, such as the universe for the development of research, due to its characteristic of greater capacity of analysis and credibility in relation to other media, such as social networks or audiovisuals, specialized in promptly publishing the news of events that have occurred. The methodology identifies the variables present in the communicative event by decomposing the text into its basic textual components: propositions, and restructures them again as arguments. Each argument is the sum of propositions present in the opinion article linked by connectors. You thus get the summary argument of the event or opinion piece. The argument is also linked to the various discourses present in it and to a specific theme. It is, therefore, a great repository of the university subject. The research work allows to show Critical Discourse Analysis and Content Analysis as valid strategies for the analysis of a large corpus of data. In addition, it will facilitate the discussion of these issues among those who direct educational institutions and among those who propose legislation in this regard. In addition, it will allow communications analysts and social analysts to access organized information that is easy to interrelate, as well as internalization and socialization in the public opinion of the delays and future benefits that the maintenance or modification of the management paradigms education can produce in the university education of Peru.
Universitat Autònoma de Barcelona. Programa de Doctorat en Comunicació i Periodisme
APA, Harvard, Vancouver, ISO, and other styles
34

Iqbal, Muhammed Asim. "The effectiveness of shareholder dispute resolution in private companies under UK companies legislation : an evaluation." Thesis, Nottingham Trent University, 2008. http://irep.ntu.ac.uk/id/eprint/306/.

Full text
Abstract:
The aim of the research is to evaluate the effectiveness of the legal means of resolving shareholder disputes in private companies. The principal means are ex ante contracting in shareholders' agreements and court-based dispute resolution mechanism in sections 994-996 of the Companies Act 2006. Private companies are often formed on the basis of mutual trust deriving from personal relationships between shareholders. The breakdown of these relationships termed 'relational breakdown' commonly precipitates squeeze-out behaviour that causes disputes over the terms of exit. Ex ante contracting in shareholders' agreements cannot eliminate the underlying factors that cause relational breakdown, but can only mitigate the effects of relational breakdown by qualifying the powers of the majority and providing an exit to the minority on fair terms. Moreover, due to a range of limitations associated with ex ante contracting in shareholders' agreements, shareholders need recourse to a legal mechanism such as sections 994-996 of the Companies Act 2006 (formerly sections 459-461 of the Companies Act 1985) to resolve their disputes. In a Consultation Paper and subsequent Report published in October 1997 the Law Commission criticised the length, cost and complexity of proceedings under these provisions which were said to diminish their effectiveness as a tool for resolving shareholder disputes. After the Law Commission Report there have been significant developments both in terms of substantive law and procedure which have sought to streamline the remedy and make it more effective. The present research is the first attempt to consider from a legal perspective the effectiveness of sections 994-996 of the Companies Act 2006 as a court-based dispute resolution mechanism, in the decade since the Law Commission produced its Report on shareholders' remedies. The research draws extensively on empirical evidence derived from a series of semi-structured interviews that were carried out with fifteen barristers experienced in this area of work. It concludes that (i) substantive law developments have enhanced legal certainty in the area and influenced shareholders to settle early; (ii) procedural developments, in particular, the use of mediation, has also contributed to earlier settlement; and (iii) in sum these developments have improved the effectiveness of these proceedings for shareholders,companies and the administration of justice by the courts.
APA, Harvard, Vancouver, ISO, and other styles
35

Ko, Chun-wa Johnason, and 高振華. "Sewage treatment in private sector." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1996. http://hub.hku.hk/bib/B31253404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wampler, Brian Douglas. "Private executives, legislative brokers, and participatory publics : building local democracy in Brazil /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Rylander, Lisa. "Effective private enforcement of EU competition law : A justification for legislative harmonization of national procedural rules?" Thesis, Uppsala universitet, Juridiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-196484.

Full text
Abstract:
In the strive towards a highly competitive market, the European Commission has long promoted an extensive use of so-called private enforcement, where individuals claim their rights, as guaranteed by the acquis communautaire, before national courts. The incentive to litigate is, mostly, the right to receive damages for loss suffered due to another private party’s violation of the EU antitrust rules, established by the CJEU in its famous ruling in Courage, in 2001.          Lately, the Commission seems to believe that the aim of a more effective private enforcement of antitrust law justifies rather extensive intrusions into the internal legal systems of the Member States. In a White Paper of 2008, the Commission proposed several measures aimed at enhancing the possibilities for individuals to be awarded with compensation for having suffered from a breach of the antitrust rules. These measures include the harmonization of certain national procedural laws, to facilitate inter alia damages claims at a national level. One year later, in 2009, an internal document with a draft for a directive was leaked out from the Commission, which suggests that there are advanced plans for issuing a harmonizing legislation.          Extensive critique has been aimed at the Commission’s proposal, mainly on the basis that procedural rules should be left unaltered by the European Union. Procedural rules are often considered to be the result of careful considerations of specific domestic characteristics and problems, which over time have resulted in a well-balanced internal system based on legal traditions and culture. Even though national rules would still apply in purely domestic situations, it is said that the internal balance of the national procedural systems would be undermined if certain procedural rules were to be harmonized throughout the Union.          This thesis aims at analysing whether the aim of an effective private enforcement of Union competition law does justify a harmonization of procedural rules that could facilitate inter alia private damage claims before national courts. In the case of a confirmative answer, the work also aims at answering to the question of what form such a harmonization should take: should the Commission initiate a legislative process or should it be left to the CJEU to continue developing the state of law through sporadic rulings on the matter? Recourse is made throughout the work to several important general principles of Union law, such as the principles of national procedural autonomy, subsidiarity, and equality.
I sin strävan efter att åstadkomma en marknad med hög konkurrenskraft har Europeiska kommissionen länge förespråkat ett mer extensivt nyttjande av så kallad private enforcement (ung. privat genomförande) där individer åberopar sina rättigheter, som följer av acquis communataire, inför nationella domstolar. Incitamentet för att driva processer består i dessa fall mestadels av rätten att erhålla skadestånd för den skada som klaganden lidit på grund av en annan privat aktörs brott mot konkurrensreglerna, grundad av EU-domstolen (EUD) i målet Courage, 2001.          På senare tid tycks kommissionen anse att målet med en mer effektiv private enforcement rättfärdigar relativt djupa intrång i medlemsstaternas interna rättssystem. I en Vitbok från 2008 föreslog kommissionen flera medel för att förbättra möjligheterna för individer att erhålla kompensation för skada orsakad av konkurrensöverträdelser. Förslagen skulle innebära en harmonisering av vissa processuella regler för att underlätta bland annat skadeståndstalan på nationell nivå. Ett år efter Vitbokens publicering läckte ett annat dokument ut från kommissionen, innehållande ett utkast på ett direktiv som föreslår liknande regler som Vitboken. Detta tyder på att det finns långt skridna planer för att skapa en harmoniserande lagstiftning på EU-nivå.          Omfattande kritik har riktats mot kommissionens förslag, mestadels på grunden att processuella regler bör undanhållas från Europeiska Unionens inflytande. Processuella regler anses ofta vara en produkt av noggranna överväganden av nationella särdrag och problem, som under tidens gång lett till ett välbalanserat internt system baserat på gamla rättstraditioner och rättskultur. Trots att nationella regler skulle fortsätta att gälla för rent interna situationer, påstås det att den interna balansen inom de nationella processuella systemen skulle undergrävas vid en harmonisering.          Denna magisteruppsats syftar till att analysera huruvida målet med en effektiv private enforcement av Unionens konkurrensregler rättfärdigar en harmonisering av processuella regler, för att underlätta bland annat privata skadeståndstalan i nationella domstolar. Om så visar sig vara fallet skall arbetet även undersöka vilken form en sådan harmonisering borde ta: skall kommissionen initiera en lagstiftningsprocess eller skall det vara upp till EUD att fortsätta utveckla det relevanta rättsläget? Under arbetet används genomgående några viktiga generella EU-rättsliga principer som referensramar. Dessa är bland annat principen om nationell processautonomi, subsidiaritet och likabehandling.
APA, Harvard, Vancouver, ISO, and other styles
38

Yung, Hiu-kwan Esther, and 容曉君. "Evaluation of statutory and contractual controls for private development in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31251778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Buldini, Alberto <1982&gt. "Unitarietà della successione mortis causa, successioni anomale e separate, alla luce delle recenti evoluzioni legislative." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1219/.

Full text
Abstract:
L'Autore opera una ricostruzione teorica del concetto di unità della successione, apprezzandone diverse sfumature: un significato più ristretto, per cui esso si lega al concetto di universitas ed individua appunto come unico il complesso delle situazioni giuridiche soggettive riferibili al de cuius; un secondo concetto più ampio, per cui unitarietà della successione mortis causa è il fenomeno per cui la successione nella somma delle posizioni giuridiche spettanti al defunto riceve una unica regolazione legislativa; un terzo profilo, che abbandona il concetto di successione mortis causa in senso giuridico, per accostarsi ad un concetto (piuttosto di natura economica)di unità della vicenda successoria. Se il concetto di unità della successione possiede un triplice, valore, anche la deroga ad esso potrà assumere diverse vesti, a seconda che incida sul primo, sul secondo o sul terzo di questi significati. Se il terzo profilo riguarda piuttosto un concetto economico e non tecnico di successione, ed importa conseguentemente deroghe solo indirette all’unità della successione, l’anomalia può essere di due tipi: possono essere dettate regole particolari per singoli beni, che però rimangono entro l’unica massa ereditaria, pur avendo una destinazione loro propria, e può invece essere creata dal legislatore una separata massa per cui si fa luogo ad una distinta regolazione successoria. Procedendo nella classificazione, le ipotesi di una deroga del primo tipo possono essere definite successioni speciali, riservando alla seconda classe di anomalie il nome di successioni separate. Conclusivamente, l'autore rileva che la disciplina della vicenda successoria, così come consegnata dalla tradizione e sancita ancora nelle norme della codificazione del 1942, non è più caratterizzata dall’assoluto dominio del principio di unità della successione, anche perché non si è rivelata, nella esperienza giuridica successiva alla codificazione, del tutto adeguata, in relazione a determinate categorie di beni e ad alcune categorie di soggetti coinvolti. Il legislatore ha infatti ritenuto di introdurre deroghe, via via maggiori al principio, con riferimento sia ai beni d’impresa sia alla particolare posizione – ed agli interessi tutelati – dei soggetti più vicini al de cuius, come il coniuge ed i parenti che vivessero a suo carico.
APA, Harvard, Vancouver, ISO, and other styles
40

Malmsköld, Elin. "The status of abortion in public international law and its effect on domestic legislation." Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355922.

Full text
Abstract:
Few issues divide leaders and policy-makers as much as abortion, which regularly sparks heated political, religious and philosophical debates. Numerous states choose to prohibit or criminalize abortion, despite the fact that it has been practiced throughout recorded history. In many of these states, women turn to unsafe abortion methods, such as consuming bleach or inserting a coat hanger, which may cause long-term damage or death. In the light of this tragic reality, one could ask whether these women have a right to safe abortion in human rights law or not. In order to answer this question, the author analyzes the status of abortion in public international law. The results are based on a thorough examination of the preparatory works (travaux préparatoires) and reservations to CEDAW, CRC, ECHR, and ICCPR, as well as documents by international and regional treaty bodies. The author applies a treaty-based international law methodology, analyzes the results through Hilary Charlesworth and Christine Chinkin’s theory of the public and private distinction in public international law and discusses the juridical- political context. The author concludes that there is neither an explicitly formulated human right to abortion, nor is abortion included within the right to family planning. However, she finds that domestic legislation which criminalizes or restrict access to safe abortions may be in violation of other fundamental human rights.
APA, Harvard, Vancouver, ISO, and other styles
41

Calipo, Sylvia Maria. "Saúde, estado e ética -NOB/96 e Lei das Organizações Sociais: a privatização da instituição pública da saúde?" Universidade de São Paulo, 2002. http://www.teses.usp.br/teses/disponiveis/7/7137/tde-19092006-174708/.

Full text
Abstract:
Este trabalho tomou como objeto de estudo a relação entre saúde, Estado e ética no âmbito do Sistema Único de Saúde brasileiro. Utilizando os espaços público e privado como categorias de análise, teve como objetivo verificar como a reforma do setor saúde, especificamente a legislação complementar Norma Operacional Básica de 1996 (NOB/96), que tem servido de base à reforma, e a Lei n. 9.637/98, que cria as Organizações Sociais e o Programa Nacional de Publicização, coadunam-se com o princípio ético, presente na Constituição “saúde é direito de todos e dever do Estado”. A análise baseou-se na legislação do SUS. Observou-se que o direito à saúde não está garantido na reforma do setor saúde, pois a concepção de Estado presente no SUS e aquela da reforma são diferentes. A análise mostrou ainda que a atual reforma tende a privatizar a saúde tanto na forma dos Programas da Saúde da Família e do Agente Comunitário da Saúde como através da transformação dos equipamentos de saúde de maior complexidade em organizações públicas não-estatais, submetendo a assistência à saúde às leis do mercado. Esse processo faz parte da reforma liberalizante do Estado brasileiro e acompanha a crescente privatização do espaço público, na contemporaneidade, que permite que o poder político seja ocupado por agências internacionais que impõem suas normas aos Estados nacionais.
This study took as a general object the relationship among health, State and ethics under the scope of the Brazilian Health Care System (BHCS). Utilizing public and private spheres as analytical categories, it had a particular objective of verifying how the health reform - particularly the complementary legislation Basic Operational Norm/96 and the law n. 9.637/98, that creates Social Organizations and the National Publicizing Program -, is in accordance with the ethical principle of the Constitution health is a citizen right and a State duty. Analysis was based on the BHCS legislation. It was observed that the right to health is not guaranteed by the health reform, mainly because its conception of State is different from that of the Constitution. Analysis shows yet that the current reform tends to privatize health care through both the Health Family Program and Community Health Agent Program and through the transformation of high complex health services in non-state health organizations. This process is part of the Brazilian State liberalizing reform and follows closely the growing privatization of public sphere on contemporary societies, that has being allowing international agencies to occupy political power by imposing their norms to the National States.
APA, Harvard, Vancouver, ISO, and other styles
42

Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Svobodová, Zuzana. "Legislativně-regulatorní aspekty rozvoje trhu rizikového a rozvojového kapitálu." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-14125.

Full text
Abstract:
Diplomová práce se zabývá tématem rizikového a rozvojového kapitálu se zaměřením na legislativně-regulatorní opatření vedoucí k podpoře jeho rozvoje a shrnuje současný stav tohoto odvětví v České republice. Cílem diplomové práce je analyzovat podmínky pro soukromé investory a pokusit se charakterizovat na základě dosavadních zkušeností z České republiky i z jiných zemí klíčové faktory ovlivňující objem investic rizikového a rozvojového kapitálu.
APA, Harvard, Vancouver, ISO, and other styles
44

Svobodová, Zuzana MUDr. "Legislativně-regulatorní aspekty rozvoje trhu rizikového a rozvojového kapitálu." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-161750.

Full text
Abstract:
Diplomová práce se zabývá tématem rizikového a rozvojového kapitálu se zaměřením na legislativně-regulatorní opatření vedoucí k podpoře jeho rozvoje a shrnuje současný stav tohoto odvětví v České republice. Cílem diplomové práce je analyzovat podmínky pro soukromé investory a pokusit se charakterizovat na základě dosavadních zkušeností z České republiky i z jiných zemí klíčové faktory ovlivňující objem investic rizikového a rozvojového kapitálu.
APA, Harvard, Vancouver, ISO, and other styles
45

Ternström, Pontus. "Investment Savings Account : A Legislative Proposal on Swedish Capital Taxtion for Private Investors." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Rättsvetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15209.

Full text
Abstract:
In December 2010 the Treasury Department presented a proposal contain-ing change in regard of current endowment assurance laws and an alterna-tive way of saving financial instruments called Investment Savings Account. The purpose of the proposal is to make investing in financial instruments easier for private investors and to prevent reigning tax evasion regarding endowment assurances. The objective of this thesis is to determine if the proposal will have the desired effect of making investments in financial in-struments easier for private investors. The purpose is also to determine whether the changes imposed by the proposal are relevant and adequate. The proposal suggests that the Investment Savings Account should be sub-jected to flat-rate tax instead of taxation on capital profit upon divestment of financial instruments, which is the case today. By doing this the investor does not have to calculate expenditure costs of investments making declar-ing tax return to the Tax Agency easier. The proposal also includes change regarding endowment assurance laws stating that deposits and withdrawals should affect the capital base of the assurance preventing tax evasion. Fur-thermore the proposal suggests an elevation of tax on endowment assur-ances conform to the tax-rate of the Investment Savings Account. The proposal shows good intentions since the Treasury Department has ac-knowledged that something has to be done concerning taxation on capital. However, the execution is in some areas quite poor. Excessive measures are taken in comparison to what is achieved. Calculations are complicated, mak-ing capital profit and taxation unpredictable for private investors. Elevating taxation on endowment assurances within a Swedish tax system which is al-ready high might impede the financial market.
APA, Harvard, Vancouver, ISO, and other styles
46

Neple, Pernille. "The regulation of mercenary and private security-related activites under South African law compared to other legislations and conventions /." Link to online version, 2008. http://hdl.handle.net/10019/1603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Thiessen, Carol D. "Whistleblowing in the private and public sectors, should Canada adopt a modified form of the American whistleblowing legislation?" Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0014/MQ32264.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tse, Sau-kuen, and 謝秀娟. "Labour policy and the protection of the legal entitlements of private sector employees." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1992. http://hub.hku.hk/bib/B31964163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Alhoudail, Mamdouh Ali. "Air carrier liability : unfinished unification of private international air law." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98601.

Full text
Abstract:
On 31 November 2003 the 1999 Montreal Convention for the Unification of Certain Rules for International Carriage by Air entered into force. Its purpose was to consolidate and modernize the Warsaw system and to reunify the provisions of several international instruments of private international air law under one legal instrument. The Montreal Convention consolidates the positive elements of the Warsaw Convention, the Hague Protocol, the Guadalajara Convention, the Guatemala City Protocol and Additional Protocol Numbers 3 and 4. It also simplifies and modernizes the requirements of documentation relating to the carriage by air of passengers, baggage and cargo. Most importantly, the Montreal Convention modernizes of the liability regime for death and injury to passengers by adopting the passenger liability regime in the IATA Inter-carrier Agreement. It also modernizes the liability regime for damage to baggage and cargo and the delay. In spite of the foregoing, the Montreal Convention fails to advance the unification of private international air law any further than the Warsaw Convention.
This thesis analyzes the provisions of liability regimes under the Warsaw System and the 1999 Montreal Convention. Chapter one studies the liability regime established under the original Warsaw Convention and the subsequent attempts by states, air carriers and other interested entities to update it. Chapter two analyzes the new regime of unlimited liability established by the 1999 Montreal Convention. Chapter three examines the liability of the air carrier for damage caused by terrorist activities. In an effort to demonstrate the innovative elements of the new Convention and to encourage states to ratify it, chapter four surveys the main benefits that have accrued to the Kingdom of Saudi Arabia and its national air carrier upon ratification of the 1999 Montreal Convention.
APA, Harvard, Vancouver, ISO, and other styles
50

劉子榕 and Chi-yung Joseph Lau. "Evaluation of the estate management of private residential buildings in Hong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B4389477X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography