UK Academics pen open letter regarding state surveillanceMark Leiser
Last year the UK Government made changes to UK surveillance laws to allow law enforcement bodies and intelligence agencies to hack computers without fear of prosecution under the Computer Misuse Act. This was done with very little transparency and almost no consultation. (You can read Privacy International’s take on this here (https://www.privacyinternational.org/?q=node/584).)UK academics have united to pen a letter asking for government accountability and respect for the democratic processes of Parliament. The aim of the letter is to jolt some of the new intake into the Commons into taking responsibility for scrutiny of the Government’s surveillance strategy, in particular with the Snoopers’ Charter almost certain to be in the Queen’s Speech. The letter is below:
Nearly two dozen media outlets and nonprofits penned a letter to Hawaii Gov. David Ige about government transparency and accountability, delivered to his office Dec. 26, 2014.
UK Academics pen open letter regarding state surveillanceMark Leiser
Last year the UK Government made changes to UK surveillance laws to allow law enforcement bodies and intelligence agencies to hack computers without fear of prosecution under the Computer Misuse Act. This was done with very little transparency and almost no consultation. (You can read Privacy International’s take on this here (https://www.privacyinternational.org/?q=node/584).)UK academics have united to pen a letter asking for government accountability and respect for the democratic processes of Parliament. The aim of the letter is to jolt some of the new intake into the Commons into taking responsibility for scrutiny of the Government’s surveillance strategy, in particular with the Snoopers’ Charter almost certain to be in the Queen’s Speech. The letter is below:
Nearly two dozen media outlets and nonprofits penned a letter to Hawaii Gov. David Ige about government transparency and accountability, delivered to his office Dec. 26, 2014.
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
The ‘World Wide Web (WWW)’ or popularly known as the ‘Internet’ has become an essential part of our professional and personal lives. It has revolutionized communication
and trade beyond the control of National and International borders. Therefore, the prevention of trafficking of drugs through World Wide Web is the emerging evil and
remains a global challenge for Law Enforcement Agencies. The problem of understanding ‘Trafficking of Drugs through Internet’ has been compared with the problem of elephant
and the five blind men.
A Typical modus operandi of drug trafficking through internet and operation of Internet Pharmacies has been identified on the basis of Indian case -studies. Based on the Indian experience, a Strategic Roadmap for prevention of drug trafficking through Internet has been prepared. The obstacles to the implementation of Strategic Roadmap have been identified and solutions proposed within the existing system of Criminal Justice Administration. Finally, the process of evaluation of the proposed Strategic Plan has been proposed by author.
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentAlex Baulf
On February 24, 2016, President Barack Obama signed the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA) which makes permanent the moratorium on Internet
access taxes and multiple or discriminatory taxes on electronic commerce established by the Internet Tax Freedom Act. Additionally, under the TFTEA, the ability of grandfathered states to tax Internet access will be completely phased out by June 30, 2020.
Recorded on Monday, April 16, 2012. This webinar, presented by Margaret Capes, Legal Education Coordinator of Community Law School (Sarnia-Lambton) Inc., looks at telephone scams and other consumer problems with phones. It reviews the role of the Competition Bureau, the Ministry of Consumer Services, the Canadian Radio-television and Telecommunications Commission (CRTC), and the Canadian Anti Fraud Centre in combatting telephone trickery. Examples of recent versions of these scams will be reviewed so attendees will have an idea of what to watch for in their everyday lives.
To watch an archived version visit:
http://yourlegalrights.on.ca/webinar/Fighting-Telephone-Trickery-Using-Consumer-Protection-Laws
Tunisia Elects President in Successful and Transparent Electoral ProcessJamaity
Early Carter Center observer reports indicate that Tunisia has successfully completed its first democratic election cycle under the new constitution with Dec. 21's final round of the presidential election. The country's transition from an authoritarian regime, ousted in a largely peaceful revolution on Jan. 14, 2011, to transparent elections and permanent democratic institutions represents the brightest hope in the region for a successful and peaceful transition following the Arab revolutions. Once the electoral process is finalized, Tunisia's leaders should work to consolidate the country's achievements and fulfill the promise of the revolution by enshrining the tenets of its new constitution in domestic legislation and tackling pressing economic and social concerns.
The object of analysis in the present text is the issue of surveillance and data retention in Poland. The analysis of this issue follows from a critical stance taken by NGOs and state institutions on the scope of operational control wielded by the Polish police and special services – it concerns, in particular, the employment of " itemised phone bills and phone tapping. " Besides the quantitative analysis of surveillance and the scope of data retention, the text features the conclusions of the Human Rights Defender referred to the Constitutional Tri-bunal in 2011. It must be noted that the main problems concerned with the employment of surveillance and data retention are caused by: (1) a lack of specification of technical means which can be used by individual services; (2) a lack of specification of what kind of information and evidence is in question; (3) an open catalogue of information and evi-dence which can be clandestinely acquired in an operational mode. Furthermore, with re-gard to the access granted to teleinformation data by the Telecommunications Act, attention should be drawn to the wide array of data submitted to particular services. Also, the text draws on open interviews conducted mainly with former police officers with a view to highlighting some non-formal reasons for " phone tapping " in Poland. This comes in the form of a summary.
Digital security law security of individual or governmentM S Siddiqui
The subject again seems complicated further complicate as cyber security is often conflated with cybercrime, or confused with related but distinct concepts such as cyber-resilience, cyber-warfare and cyber-defense. However, it is taken to mean the protection of digital information systems against attack, either by states or individual hackers.
The proposed law apparently drafted to protect the national interest from possible acts of citizens. It has mixed up the security of individual and nation.
The ‘World Wide Web (WWW)’ or popularly known as the ‘Internet’ has become an essential part of our professional and personal lives. It has revolutionized communication
and trade beyond the control of National and International borders. Therefore, the prevention of trafficking of drugs through World Wide Web is the emerging evil and
remains a global challenge for Law Enforcement Agencies. The problem of understanding ‘Trafficking of Drugs through Internet’ has been compared with the problem of elephant
and the five blind men.
A Typical modus operandi of drug trafficking through internet and operation of Internet Pharmacies has been identified on the basis of Indian case -studies. Based on the Indian experience, a Strategic Roadmap for prevention of drug trafficking through Internet has been prepared. The obstacles to the implementation of Strategic Roadmap have been identified and solutions proposed within the existing system of Criminal Justice Administration. Finally, the process of evaluation of the proposed Strategic Plan has been proposed by author.
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentAlex Baulf
On February 24, 2016, President Barack Obama signed the Trade Facilitation and Trade Enforcement Act of 2015 (TFTEA) which makes permanent the moratorium on Internet
access taxes and multiple or discriminatory taxes on electronic commerce established by the Internet Tax Freedom Act. Additionally, under the TFTEA, the ability of grandfathered states to tax Internet access will be completely phased out by June 30, 2020.
Recorded on Monday, April 16, 2012. This webinar, presented by Margaret Capes, Legal Education Coordinator of Community Law School (Sarnia-Lambton) Inc., looks at telephone scams and other consumer problems with phones. It reviews the role of the Competition Bureau, the Ministry of Consumer Services, the Canadian Radio-television and Telecommunications Commission (CRTC), and the Canadian Anti Fraud Centre in combatting telephone trickery. Examples of recent versions of these scams will be reviewed so attendees will have an idea of what to watch for in their everyday lives.
To watch an archived version visit:
http://yourlegalrights.on.ca/webinar/Fighting-Telephone-Trickery-Using-Consumer-Protection-Laws
Tunisia Elects President in Successful and Transparent Electoral ProcessJamaity
Early Carter Center observer reports indicate that Tunisia has successfully completed its first democratic election cycle under the new constitution with Dec. 21's final round of the presidential election. The country's transition from an authoritarian regime, ousted in a largely peaceful revolution on Jan. 14, 2011, to transparent elections and permanent democratic institutions represents the brightest hope in the region for a successful and peaceful transition following the Arab revolutions. Once the electoral process is finalized, Tunisia's leaders should work to consolidate the country's achievements and fulfill the promise of the revolution by enshrining the tenets of its new constitution in domestic legislation and tackling pressing economic and social concerns.
The object of analysis in the present text is the issue of surveillance and data retention in Poland. The analysis of this issue follows from a critical stance taken by NGOs and state institutions on the scope of operational control wielded by the Polish police and special services – it concerns, in particular, the employment of " itemised phone bills and phone tapping. " Besides the quantitative analysis of surveillance and the scope of data retention, the text features the conclusions of the Human Rights Defender referred to the Constitutional Tri-bunal in 2011. It must be noted that the main problems concerned with the employment of surveillance and data retention are caused by: (1) a lack of specification of technical means which can be used by individual services; (2) a lack of specification of what kind of information and evidence is in question; (3) an open catalogue of information and evi-dence which can be clandestinely acquired in an operational mode. Furthermore, with re-gard to the access granted to teleinformation data by the Telecommunications Act, attention should be drawn to the wide array of data submitted to particular services. Also, the text draws on open interviews conducted mainly with former police officers with a view to highlighting some non-formal reasons for " phone tapping " in Poland. This comes in the form of a summary.
Turkey’s parliament adopted the much-critiqued ‘disinformation law’ that accords jail terms of up to three years to social media users and journalists for spreading ‘disinformation’.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
1. An
open
letter
to
all
members
of
the
House
of
Commons,
Dear
Parliamentarian,
Ensuring
the
Rule
of
Law
and
the
democratic
process
is
respected
as
UK
surveillance
law
is
revised
Actions
Taken
Under
the
Previous
Government
During
the
past
two
years,
the
United
Kingdom’s
surveillance
laws
and
policies
have
come
under
scrutiny
as
the
increasingly
expansive
and
intrusive
powers
of
the
state
have
been
revealed
and
questioned
in
the
media.
Such
introspection
is
healthy
for
any
democracy.
However,
despite
a
need
for
transparency
in
all
areas
of
lawmaking,
and
in
particular
in
areas
of
controversy,
the
previous
Government
repeatedly
resisted
calls
for
an
open
and
transparent
assessment
and
critique
of
UK
surveillance
powers.
Instead,
in
response
to
legal
challenges,
it
extended
the
powers
of
the
state
in
the
guise
of
draft
Codes
of
Practice
and
“clarifying
amendments.”
As
we
welcome
a
new
Government
we
expect
another
round
of
revisions
to
UK
surveillance
laws,
with
the
likelihood
that
the
Queen’s
Speech
will
signal
a
revival
of
the
Communications
Data
Bill.
At
this
time
we
call
on
the
new
Government,
and
the
members
of
the
House,
to
ensure
that
any
changes
in
the
law,
and
especially
any
expansions
of
power,
are
fully
and
transparently
vetted
by
Parliament,
and
open
to
consultation
from
the
public
and
all
relevant
stakeholders.
Last
year,
in
response
to
the
introduction
of
the
Data
Retention
and
Investigatory
Powers
Bill
(“DRIP”),
a
number
of
leading
academics
in
the
field
–
including
many
of
the
signatories
to
this
letter
–
called
for
full
and
proper
parliamentary
scrutiny
of
the
Bill
to
ensure
Parliamentarians
were
not
misled
as
to
what
powers
it
truly
contained.
Our
concern
emanated
from
the
Home
Secretary’s
attempt
to
characterise
the
Bill,
which
substantially
expanded
investigatory
powers,
as
merely
a
re-‐affirmation
of
the
pre-‐existing
data
retention
regime.1
Since
that
letter
was
written,
it
has
become
apparent
that
the
introduction
of
the
DRIP
Bill
was
not
the
only
time
an
expansion
of
surveillance
powers
was
presented
in
a
way
seemingly
designed
to
stifle
robust
democratic
consideration.
In
February
2015,
the
Home
Office
published
the
draft
Equipment
Interference
Code
of
Practice.2
The
draft
Code
was
the
first
time
the
intelligence
services
openly
sought
specific
authorisation
to
hack
computers
both
within
and
outside
the
UK.
Hacking
is
a
much
more
intrusive
form
of
surveillance
than
any
previously
authorised
by
Parliament.
It
also
threatens
the
security
of
all
internet
services
as
the
tools
intelligence
services
use
to
hack
can
create
or
maintain
security
vulnerabilities
that
may
be
used
by
criminals
to
commit
criminal
acts
and
other
governments
to
invade
our
privacy.
The
Government,
though,
sought
to
authorise
its
hacking,
not
through
primary
legislation
and
full
Parliamentary
consideration,
but
via
a
Code
of
Practice.
The
previous
Government
also
introduced
an
amendment
via
the
Serious
Crimes
Act
2015,
described
in
the
explanatory
notes
to
the
Bill
as
a
‘clarifying
amendment’.3
The
amendment
effectively
exempts
the
police
and
intelligence
2. services
from
criminal
liability
for
hacking.
This
has
had
an
immediate
impact
on
the
ongoing
litigation
of
several
organisations
who
are
suing
the
Government
based
in
part
on
the
law
amended,
the
Computer
Misuse
Act
1990.4
The
Way
Ahead
The
new
Conservative
Government
has
announced
its
intention
to
propose
new
surveillance
powers
through
a
resurrection
of
the
Communications
Data
Bill.
This
will
require
internet
and
mobile
phone
companies
to
keep
records
of
customers’
browsing
activity,
social
media
use,
emails,
voice
calls,
online
gaming
and
text
messages
for
a
year,
and
to
make
that
information
available
to
the
government
and
security
services.
We
also
anticipate
this
Parliament
will
see
a
review
of
the
Regulation
of
Investigatory
Powers
Act
2000,
which
currently
regulates
much
of
the
Government’s
surveillance
powers.
The
Independent
Reviewer
of
Terrorism
Legislation,
David
Anderson
QC,
has
conducted
an
independent
review
of
the
operation
and
regulation
of
investigatory
powers,
with
specific
reference
to
the
interception
of
communications
and
communications
data.
The
report
of
that
review
has
been
submitted
to
the
Prime
Minister,
but
has
yet
to
be
made
public:
when
it
is
made
public,
parliamentary
scrutiny
of
the
report
and
any
recommendations
made
following
it
will
be
essential.
As
the
law
requires
that
surveillance
powers
must
be
employed
proportionate
to
any
harm
to
privacy
caused
(as
required
by
Article
8
of
the
European
Convention
on
Human
Rights
and
Article
12
of
the
Universal
Declaration
of
Human
Rights)
we
believe
that
any
expansion
or
change
to
the
UK’s
surveillance
powers
should
be
proposed
in
primary
legislation
and
clearly
and
accurately
described
in
the
explanatory
notes
of
any
Bill.
The
Bill
and
its
consequences
must
then
be
fully
and
frankly
debated
in
Parliament.
When
reaching
an
assessment
of
the
proportionality,
of
any
measure
that
restricts
rights,
both
our
domestic
courts
and
the
European
Court
of
Human
Rights
place
great
stock
on
the
degree
and
quality
of
Parliamentary
involvement
prior
to
any
measure
being
adopted.
If
the
matter
ever
came
to
before
the
courts
one
issue
examined
would
be
the
nature
of
any
“exacting
review”
undertaken
by
MPs
into
the
necessity
of
extending
these
powers.
The
Government
should
not
be
permitted
to
surreptitiously
change
the
law
whenever
it
so
desires,
especially
where
such
changes
put
our
privacy
and
security
at
risk.
This
letter
has
been
prepared
and
signed
by
38
academic
researchers.
We
are
comprised
of
people
from
both
sides
of
this
issue
-‐
those
who
believe
that
increased
powers
are
a
reasonable
response
to
an
emerging
threat,
and
those
who
think
them
an
unjustified
extension
of
state
interference.
Our
common
goal
is
to
see
the
Rule
of
Law
applied
and
Parliamentary
oversight
reasserted.
We
are
calling
on
all
members
of
the
House
of
Commons,
new
and
returning,
and
of
all
political
persuasions
to
support
us
in
this
by
ensuring
Parliamentary
scrutiny
is
applied
to
all
developments
in
UK
surveillance
laws
and
powers
as
proposed
by
the
current
Government.
Signatories
3. Andrew
Murray
(contact
signatory)
Paul
Bernal
(contact
signatory)
Professor
of
Law
London
School
of
Economics
a.murray@lse.ac.uk
Lecturer
in
Information
Technology,
Intellectual
Property
and
Media
Law
University
of
East
Anglia
Paul.Bernal@uea.ac.uk
Anne
Barron
Associate
Professor
of
Law
London
School
of
Economics
Subhajit
Basu
Associate
Professor
of
Law
University
of
Leeds
Sally
Broughton
Micova
Deputy
Director
LSE
Media
Policy
Project,
Department
of
Media
and
Communications
London
School
of
Economics
Abbe
E.L.
Brown
Senior
Lecturer
School
of
Law
University
of
Aberdeen
Ian
Brown
Professor
of
Information
Security
and
Privacy
Oxford
Internet
Institute
Ray
Corrigan
Senior
Lecturer
in
Maths,
Computing
and
Technology
Open
University
Angela
Daly
Postdoctoral
Research
Fellow
Swinburne
Institute
for
Social
Research
Swinburne
University
of
Technology
Richard
Danbury
Postdoctoral
Research
Fellow
Faculty
of
Law
University
of
Cambridge
Catherine
Easton
Lecturer
in
Law
Lancaster
University
School
of
Law
Lilian
Edwards
Professor
of
E-‐Governance
Strathclyde
University
Andres
Guadamuz
Senior
Lecturer
in
Intellectual
Property
Law
University
of
Sussex
Edina
Harbinja
Lecturer
in
Law
University
of
Hertfordshire
Julia
Hörnle
Professor
in
Internet
Law
Queen
Mary
University
of
London
Argyro
P
Karanasiou
Senior
Lecturer
in
Law
Centre
for
Intellectual
Property,
Policy
&
Management
(CIPPM)
Bournemouth
University
Theodore
Konstadinides
Senior
Lecturer
in
Law
University
of
Surrey
Douwe
Korff
Emeritus
Professor
of
International
Law
London
Metropolitan
University
Associate
of
the
Oxford
Martin
School,
University
of
Oxford
Mark
Leiser
Postgraduate
Researcher
Strathclyde
University
Orla
Lynskey
Assistant
Professor
of
Law
London
School
of
Economics
4.
Daithi
Mac
Sithigh
Reader
in
Law
Newcastle
Law
School
Robin
Mansell
Professor,
Department
of
Media
and
Communication
London
School
of
Economics
Chris
Marsden
Professor
of
Law
University
of
Sussex
David
Mead
Professor
of
UK
Human
Rights
Law
UEA
Law
School
University
of
East
Anglia
Steve
Peers
Professor
of
Law
University
of
Essex
Gavin
Phillipson
Professor,
Law
School
University
of
Durham
Julia
Powles
Researcher
Faculty
of
Law
University
of
Cambridge
Andrew
Puddephatt
Executive
Director
Global
Partners
Digital
Judith
Rauhofer
Lecturer
in
IT
Law
University
of
Edinburgh
Chris
Reed
Professor
of
Electronic
Commerce
Law
Queen
Mary
University
of
London
Felipe
Romero-‐Moreno
Lecturer
in
Law
University
of
Hertfordshire
Burkhard
Schafer
Professor
of
Computational
Legal
Theory
University
of
Edinburgh
Joseph
Savirimuthu
Senior
Lecturer
in
Law
University
of
Liverpool
Andrew
Scott
Associate
Professor
of
Law
London
School
of
Economics
Peter
Sommer
Visiting
Professor
Cyber
Security
Centre,
De
Montfort
University
Gavin
Sutter
Senior
Lecturer
in
Media
Law
Queen
Mary
University
of
London
Judith
Townend
Director
of
the
Centre
for
Law
and
Information
Policy
Institute
of
Advanced
Legal
Studies
University
of
London
Asma
Vranaki
Post-‐Doctoral
Researcher
in
Cloud
Computing
Queen
Mary
University
of
London
Lorna
Woods
Professor
of
Law
University
of
Essex