ONE PAGE NOTE: Crowdfunding related legislation in Greece - C PARISSIS 2013Constantinos Parissis
This document provides an introduction to the Greek legislative environment for crowdfunding. It notes that Greece currently has no crowdfunding-specific legislation, so different rules apply to donation-based, rewards-based, equity-based, and lending-based crowdfunding models. General rules regarding online offerings also apply. The document outlines several common laws that apply to all crowdfunding models in Greece. It also discusses laws specific to each crowdfunding model, noting that donation-based crowdfunding faces significant operating burdens, rewards-based crowdfunding has relatively straightforward regulations, and equity-based crowdfunding is most regulated but allows minimal requirements for startups raising under 150,
This document discusses Mongolia's legal environment and international trade. It covers Mongolia's Romano-Germanic legal tradition, its court system including levels of courts and training for judges. The development of business and international trade law is also examined, including key legislation and Mongolia's accession to the WTO. Main trade related laws are listed and foreign investment framework and trends are outlined. Finally, dispute resolution options are mentioned including the national arbitration court and international litigation under the New York Convention.
Data Protection and "Intermediary" Responsibility: An Historical PerspectiveDavid Erdos
These slides look historically at the tension between being in "control" of personal data and benefiting from certain freedom of expression shields when acting as an “intermediary” between an original content producer and an end user. It is show that these tensions emerged as early as the 1980s in European data protection, with both the French and certain Scandinavian Data Protection Authorities (DPAs) adopting a strict construction of law vis-à-vis provides of interactive services on the Minitel and various news archive and other public databases respectively. By the late 1990s when the e-Commerce Directive 2000/31/EC was being negotiated a similar tension re-emerged in the form of the data protection “exemption” (art. 1(5)(b)) and the more general ambiguity as to whether “active” as opposed to “passive” services could benefit from the “host” shield (art. 14) in any case. A partial solution to the latter question was found in the reasonable “duties of care” preamble inserted in the instrument as recital 48. These early debates cast a new perspective on more contemporary developments in EU data protection and e-Commerce case law including C-131/12 Google Spain, C-507/17 Google v CNIL and C-18/18 Glawischnig-Piesczek.
The document discusses challenges in online dispute resolution (ODR) and ways to overcome them. It outlines legal, technical, and cultural obstacles to ODR. These include differences in global legal systems, lack of online infrastructure in some countries, and absence of a universal culture. However, the document states that ODR challenges can be overcome through legislation providing opportunities for technology in dispute resolution. It provides examples of progress in the EU and other regions through laws and directives supporting ODR and electronic contracts. Recommendations include increasing education, support from governments and international organizations, and building confidence in ODR effectiveness.
Data Protection and Journalism: The Changing LandscapeDavid Erdos
These slides provide an overview of the changing landscape for data protection and journalism in decade or so since the Leveson Inquiry. As well as detailing the core public interest and incompatibility tests, they look at developments in case law, at the ICO and under the GDPR and DPA 2018. They are intended to provide background to the ICO consultation on a data protection and journalism code of practice which runs until 10 January 2022.
Viviane Reding, the EU Justice Commissioner, gave a speech to the Council of Bars and Law Societies of Europe highlighting key justice initiatives. She discussed proposals to streamline civil justice procedures like contract law, debt recovery, and judgments to facilitate business growth. Reding also addressed strengthening procedural rights for suspects, reforming the European Arrest Warrant, and establishing minimum standards for crime victims. The goal is to build an area of justice that meets the needs of EU citizens and businesses in the post-Lisbon Treaty era.
This document discusses jurisdiction in international law as it relates to regulating the internet and the EU's "right to be forgotten" ruling. It makes the following key points:
1) Jurisdiction in international law is traditionally based on a state's territory and sovereignty, but modern economic law has challenged this through the "effects doctrine."
2) The EU's "right to be forgotten" ruling in Google Spain concerned private litigation between individuals and corporations, falling under private international law.
3) Orders to extend compliance with the ruling to Google's global domains raise questions about the territorial reach of the ruling under public and private international law.
4) The document aims to clarify concepts of jurisdiction in public and private
ONE PAGE NOTE: Crowdfunding related legislation in Greece - C PARISSIS 2013Constantinos Parissis
This document provides an introduction to the Greek legislative environment for crowdfunding. It notes that Greece currently has no crowdfunding-specific legislation, so different rules apply to donation-based, rewards-based, equity-based, and lending-based crowdfunding models. General rules regarding online offerings also apply. The document outlines several common laws that apply to all crowdfunding models in Greece. It also discusses laws specific to each crowdfunding model, noting that donation-based crowdfunding faces significant operating burdens, rewards-based crowdfunding has relatively straightforward regulations, and equity-based crowdfunding is most regulated but allows minimal requirements for startups raising under 150,
This document discusses Mongolia's legal environment and international trade. It covers Mongolia's Romano-Germanic legal tradition, its court system including levels of courts and training for judges. The development of business and international trade law is also examined, including key legislation and Mongolia's accession to the WTO. Main trade related laws are listed and foreign investment framework and trends are outlined. Finally, dispute resolution options are mentioned including the national arbitration court and international litigation under the New York Convention.
Data Protection and "Intermediary" Responsibility: An Historical PerspectiveDavid Erdos
These slides look historically at the tension between being in "control" of personal data and benefiting from certain freedom of expression shields when acting as an “intermediary” between an original content producer and an end user. It is show that these tensions emerged as early as the 1980s in European data protection, with both the French and certain Scandinavian Data Protection Authorities (DPAs) adopting a strict construction of law vis-à-vis provides of interactive services on the Minitel and various news archive and other public databases respectively. By the late 1990s when the e-Commerce Directive 2000/31/EC was being negotiated a similar tension re-emerged in the form of the data protection “exemption” (art. 1(5)(b)) and the more general ambiguity as to whether “active” as opposed to “passive” services could benefit from the “host” shield (art. 14) in any case. A partial solution to the latter question was found in the reasonable “duties of care” preamble inserted in the instrument as recital 48. These early debates cast a new perspective on more contemporary developments in EU data protection and e-Commerce case law including C-131/12 Google Spain, C-507/17 Google v CNIL and C-18/18 Glawischnig-Piesczek.
The document discusses challenges in online dispute resolution (ODR) and ways to overcome them. It outlines legal, technical, and cultural obstacles to ODR. These include differences in global legal systems, lack of online infrastructure in some countries, and absence of a universal culture. However, the document states that ODR challenges can be overcome through legislation providing opportunities for technology in dispute resolution. It provides examples of progress in the EU and other regions through laws and directives supporting ODR and electronic contracts. Recommendations include increasing education, support from governments and international organizations, and building confidence in ODR effectiveness.
Data Protection and Journalism: The Changing LandscapeDavid Erdos
These slides provide an overview of the changing landscape for data protection and journalism in decade or so since the Leveson Inquiry. As well as detailing the core public interest and incompatibility tests, they look at developments in case law, at the ICO and under the GDPR and DPA 2018. They are intended to provide background to the ICO consultation on a data protection and journalism code of practice which runs until 10 January 2022.
Viviane Reding, the EU Justice Commissioner, gave a speech to the Council of Bars and Law Societies of Europe highlighting key justice initiatives. She discussed proposals to streamline civil justice procedures like contract law, debt recovery, and judgments to facilitate business growth. Reding also addressed strengthening procedural rights for suspects, reforming the European Arrest Warrant, and establishing minimum standards for crime victims. The goal is to build an area of justice that meets the needs of EU citizens and businesses in the post-Lisbon Treaty era.
This document discusses jurisdiction in international law as it relates to regulating the internet and the EU's "right to be forgotten" ruling. It makes the following key points:
1) Jurisdiction in international law is traditionally based on a state's territory and sovereignty, but modern economic law has challenged this through the "effects doctrine."
2) The EU's "right to be forgotten" ruling in Google Spain concerned private litigation between individuals and corporations, falling under private international law.
3) Orders to extend compliance with the ruling to Google's global domains raise questions about the territorial reach of the ruling under public and private international law.
4) The document aims to clarify concepts of jurisdiction in public and private
The Private International Law Dimension of the UN Principles on Business and ...Veerle Van Den Eeckhout
Powerpoint-presentation
at Lausanne, 10 October 2014
Conference "The Implementation of the UN Principles on Business and Human Rights in Private International Law"
( see http://www.isdc.ch/d2wfiles/document/4713/4018/0/Human%20Rights%20in%20PIL-%2010-10-2014.pdf at http://www.isdc.ch )
Abstract:
In the reports on Business and Human Rights by John Ruggie, "access to remedies cq access to justice" appears to be a key element.
Rules of Private International Law can be seen as key factors in achieving access to remedies cq access to justice: PIL rules act like hinges that allow doors - granting access to a specific court and to a specific legal norm - to be opened or to be kept closed; thus, as PIL deals with issues of international jurisdiction and applicable law, PIL rules are of paramount importance in determining access to a specific court and access to a specific legal norm.
In his Guiding Principles, Ruggie addresses the responsibility of States for issuing suitable legislation and ‘access to remedies’; it may be well argued that PIL legislation (rules on jurisdiction and applicable law) and the interpretation of this legislation should also be examined in this context.
In the presentation the focus will be on the hypothesis that plaintiffs want to bring an action before a EU Member State court. When focusing on this hypothesis, one can observe that at least some PIL-aspects are covered by rules of PIL of European origin (the regulation of some other aspects is still left to the EU- Member States themselves). To what extent do these rules allow or deny access to remedies cq access to justice?
In the presentation, some rules and issues of (mainly) European PIL - both jurisdiction and applicable law - that deserve attention from this perspective will be highlighted in an introductory way.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
The document summarizes the Greek legal system and practice of law. It discusses:
- Greece's Council of State ruling that a Memorandum of Understanding between Greece and its creditors did not violate the constitution.
- Key details about Greece such as its population, coastline, official language, and democratic and civil law system.
- Greece's industries including shipping, tourism, and energy. It also notes Greeks have large sums in Swiss bank accounts.
- Requirements to establish foreign companies in Greece and incentives for shipping companies.
- Structure of the Greek court system and bar associations.
- Employment options and qualifications for lawyers in Greece.
- Websites with additional legal information about
European Data Protection and Social NetworkingDavid Erdos
These slides explore significant issues arising under data protection for both users and platforms as a result of the publication of third party personal data on such sites. Although the GDPR’s new wording of the household exemption could potentially exclude non-intrusive processing (e.g. sharing innocuous pictures taken in public), the Court of Justice of the EU (CJEU) is increasingly insistent that users acquire responsibilities when the publish such data to an indeterminate number. In principle, most EU Data Protection Authorities (DPAs) accept this although others including the UK and Irish have been very resistant. Many users could therefore have weighty data protection obligations here, although if contributing to a collective public debate they may be covered by the journalistic/special expression derogation and in any case there is a need for a balance with freedom of expression. CJEU ʻjoint controllerʼ case law also points to social networking sites have their own duties here, a proposition which has been backed by Working Party, the UK DPA and the UK courts. Whilst the e-Commerce ʻhostʼ shield should significantly limit ex ante responsibility here, this must be tempered by the ʻduty of careʼ which is inherent in being a ʻcontrollerʼ under data protection. In sum, data protection in principle remains central to the regulation of ʻonline harmsʼ here although ensuring effective and well-balanced regulation in practice remains a formidable challenge.
See further:
“Intermediary Publishers and European data protection: Delimiting the ambit of responsibility for third-party rights through a synthetic interpretation of the EU acquis”, International Journal of Law and Information Technology (Vol. 26(3), pp. 189-225) (2018) - https://academic.oup.com/ijlit/article/26/3/189/5033541
“Beyond ʻHaving a Domesticʼ? Regulatory Interpretation of European Data Protection Law and Individual Publication”, Computer Law and Security Review (Vol. 33 (3), pp. 275-297) (2017) - Pre-print https://www.repository.cam.ac.uk/handle/1810/263883
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
Authors: Mauro Cislaghi | Domenico Pellegrini | Elisa Negroni.
Cooperation between judicial systems is a key factor for sustainable development, one of the EU’s major priorities. eGovernment plans and e-Justice initiatives supported by the European Commission and national governments create a very favourable background for the adoption of ICT standards in the area of cross-border judicial cooperation, both in Member States and in pre-Accession countries.
2010 - Towards new rules for the determination of the legislation applicable?trESS Network
The document discusses potential revisions to the rules for determining applicable legislation for social security in the EU, including exceptions for activities in multiple countries, intra-group mobility, and posting. It proposes a new definition for "group of companies" and an exception to allow continued coverage under the legislation of the initial employer's state for successive short-term postings within the same group of companies across EU states.
Legal reference works are too expensive, making the law inaccessible to most people. Open access to primary legal materials is a right, but charging high fees denies most of the population access to the law. The proposed solution is the Open Law Project, a community-driven effort to create an open access wiki of South African law, following the model of Wikipedia. It would use a federated approach and smart partnerships to make legal information freely available under open licensing.
CIOB Complex Projects Contract 2013: Construction Issues in the Middle EastFrancis Ho
This document discusses construction issues related to complex projects in the Middle East. It notes that while the CIOB Complex Projects Contract 2013 has international and common law roots, provisions allow for compliance with local laws and requirements. Special conditions can further modify the contract to suit local markets. The document also outlines considerations for local sponsors, contractors, and split EPC contracts, highlighting potential impacts of local content rules, joint venture requirements, religious holidays, and tax advantages. It concludes with discussions of contract administration expectations and managing disputes in international projects.
Making EU legislation more accessable - William RobinsonClarity2010
European leaders have called for clearer and simpler EU legislation that is better understood by the public. While efforts have been made, including guidelines for clear drafting and a joint practical guide, making EU laws accessible remains difficult due to having 23 official languages, autonomous legal concepts, and laws negotiated by 27 member states. It is important to improve accessibility given the EU's 500 million citizens and global impact. A package of measures is proposed, including specialized drafters, training, technology, vetting, and binding requirements for clarity in EU laws.
Pob stage 2 lecture 7 introduction advance ole set (1)Diana Shore
This document provides an introduction to law within the context of business principles. It discusses the meaning and significance of the rule of law, key characteristics of English law such as its gradual evolution and doctrine of precedent. It also distinguishes between civil and criminal law, explaining their different purposes and procedures. Finally, it outlines several major areas of private law that are important for business, including contract law, tort law, and company law.
The document discusses e-contracts and licensing in business law. It covers the Uniform Computer Information Transactions Act (UCITA), which provides rules for computer information and software license contracts. The UCITA governs formation, performance, warranties, breach, and remedies for these types of contracts. It also discusses the internet, world wide web, e-mail, domain names, electronic signatures, and exclusive licenses. Licensing agreements transfer limited intellectual property rights from the licensor to the licensee. The parties can be liable for damages if they breach the obligations in these contracts.
This document discusses open access to legislation in Romania. It notes that while there are currently several public databases of legislation, access is limited and the data is not open. However, opening legislation as open data represents a high opportunity, as the raw data is already available electronically and could be easily opened at low cost. Open data has social, economic, and transparency benefits. The document outlines some projects underway in Romania to improve access to legislation, including the N-lex project by the Ministry of Justice to provide free electronic access to the national legislative database. In conclusion, while open access to Romanian legislation does not currently exist, legislation represents an extremely viable domain for open data.
The document discusses Brazil's Marco Civil law and its implications for cloud services. It provides background on the development of Marco Civil from 2009-2014 through a civil society process. Key points of Marco Civil include establishing principles of network neutrality, data protection, and non-liability of intermediaries. For cloud services, the law specifies requirements for data storage timeframes, access protocols, and security standards. Overall, Marco Civil aims to balance an open internet with basic privacy protections.
The document discusses building a legal framework for e-commerce and outlines several key issues and approaches. It notes fundamental changes from internet technologies, questions around identity and location, and whether law acts as an enabler or constraint. It also discusses different forms of regulation like non-discrimination laws, emerging customs, censorship approaches, and precedents from international space and sea laws. International aspects around applicable laws, comparative advantage, and mutual recognition are examined.
This document summarizes the findings of an analytical study on social security coverage of non-active persons moving to another EU Member State. The study was conducted through a fact-finding questionnaire to Member States. It found uncertainty around definitions, concerns about social tourism and increased claims. Current EU law leaves room for different interpretations around the relationship between regulations. Possible future routes discussed are clarification through safeguarding clauses, reconciliation through flexible waiting periods and cost compensation, or a stronger focus on assessing genuine residence.
Ethical Implications of Legal Marketing in a Web 2.0 WorldScott Wolfe
Scott Wolfe is a named plaintiff in a federal suit against the Louisiana State Bar Association, whereby he challenges new regulations on attorney advertising. Specifically, advertising online.
Scott used these slides in a presentation at the American Bar Associations' Young Lawyers Spring 2009 conference, in a seminar titled: Ethical Implications of Marketing in a Web 2.0 World.
The presentation examines the new Louisiana rules, and how the practical effects of the rules to attorneys advertising and marketing online.
The document discusses several issues related to EU information law, including:
1) Liability exemptions for intermediaries under the E-Commerce Directive and exceptions for temporary reproduction under the Copyright Directive.
2) Constitutional concerns around the proportionality and oversight of "three strikes" policies that cut off internet access for repeat copyright infringers.
3) The challenges of regulating both individuals and intermediaries as "data controllers" under the Data Protection Directive.
4) Debates around techniques like website blocking to reduce access to child abuse images and ensuring constitutional values like privacy are considered.
This document summarizes various legal defenses that can be used against home repossession in Ireland. It discusses defenses based on unfair contract terms, the right to cancel distance and off-premises contracts, proportionality and the right to a home, using data protection requests, and issues with tracker mortgages. Specifically, it outlines how the Unfair Terms in Consumer Contracts Regulations allow courts to examine contract terms for fairness and strike out unfair terms. It also discusses a consumer's right to cancel a contract within 7 days under distance and off-premises contract laws. When considering proportionality of repossession, it notes courts examine factors like arrears level and a person's right to adequate housing. The document concludes by
Jurisdictional Issues In Internet DisputesTalwant Singh
This document discusses various jurisdictional issues that arise in internet disputes. It covers different approaches taken by courts around the world in determining jurisdiction for online disputes. Issues around applicable law and enforcing foreign judgments are also examined. Several suggestions are proposed to address jurisdictional uncertainty for cross-border internet transactions, including developing uniform internet laws or alternative dispute resolution mechanisms, but each approach faces challenges in implementation.
This document discusses the growth of e-commerce and the need for an online dispute resolution (ODR) system to handle cross-border disputes. It outlines the decade of progress that has been made toward developing ODR, including guidelines published by organizations like OECD and UNCITRAL. The document proposes a new global e-commerce ODR system modeled on ICANN, to provide quick, low-cost resolution of disputes across borders through a central clearinghouse and approved ODR providers.
The document discusses cyber law and conventions regarding online responsibility. It summarizes key Albanian laws related to electronic communications, electronic commerce, data protection, and other areas of cyber law. It also discusses international sources of cyber law like the UNCITRAL Model Law on Electronic Signatures and the EU Directive on Electronic Commerce. Decisions by the European Court of Human Rights are analyzed that relate to the responsibility of online news portals for user comments.
The Private International Law Dimension of the UN Principles on Business and ...Veerle Van Den Eeckhout
Powerpoint-presentation
at Lausanne, 10 October 2014
Conference "The Implementation of the UN Principles on Business and Human Rights in Private International Law"
( see http://www.isdc.ch/d2wfiles/document/4713/4018/0/Human%20Rights%20in%20PIL-%2010-10-2014.pdf at http://www.isdc.ch )
Abstract:
In the reports on Business and Human Rights by John Ruggie, "access to remedies cq access to justice" appears to be a key element.
Rules of Private International Law can be seen as key factors in achieving access to remedies cq access to justice: PIL rules act like hinges that allow doors - granting access to a specific court and to a specific legal norm - to be opened or to be kept closed; thus, as PIL deals with issues of international jurisdiction and applicable law, PIL rules are of paramount importance in determining access to a specific court and access to a specific legal norm.
In his Guiding Principles, Ruggie addresses the responsibility of States for issuing suitable legislation and ‘access to remedies’; it may be well argued that PIL legislation (rules on jurisdiction and applicable law) and the interpretation of this legislation should also be examined in this context.
In the presentation the focus will be on the hypothesis that plaintiffs want to bring an action before a EU Member State court. When focusing on this hypothesis, one can observe that at least some PIL-aspects are covered by rules of PIL of European origin (the regulation of some other aspects is still left to the EU- Member States themselves). To what extent do these rules allow or deny access to remedies cq access to justice?
In the presentation, some rules and issues of (mainly) European PIL - both jurisdiction and applicable law - that deserve attention from this perspective will be highlighted in an introductory way.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
The document summarizes the Greek legal system and practice of law. It discusses:
- Greece's Council of State ruling that a Memorandum of Understanding between Greece and its creditors did not violate the constitution.
- Key details about Greece such as its population, coastline, official language, and democratic and civil law system.
- Greece's industries including shipping, tourism, and energy. It also notes Greeks have large sums in Swiss bank accounts.
- Requirements to establish foreign companies in Greece and incentives for shipping companies.
- Structure of the Greek court system and bar associations.
- Employment options and qualifications for lawyers in Greece.
- Websites with additional legal information about
European Data Protection and Social NetworkingDavid Erdos
These slides explore significant issues arising under data protection for both users and platforms as a result of the publication of third party personal data on such sites. Although the GDPR’s new wording of the household exemption could potentially exclude non-intrusive processing (e.g. sharing innocuous pictures taken in public), the Court of Justice of the EU (CJEU) is increasingly insistent that users acquire responsibilities when the publish such data to an indeterminate number. In principle, most EU Data Protection Authorities (DPAs) accept this although others including the UK and Irish have been very resistant. Many users could therefore have weighty data protection obligations here, although if contributing to a collective public debate they may be covered by the journalistic/special expression derogation and in any case there is a need for a balance with freedom of expression. CJEU ʻjoint controllerʼ case law also points to social networking sites have their own duties here, a proposition which has been backed by Working Party, the UK DPA and the UK courts. Whilst the e-Commerce ʻhostʼ shield should significantly limit ex ante responsibility here, this must be tempered by the ʻduty of careʼ which is inherent in being a ʻcontrollerʼ under data protection. In sum, data protection in principle remains central to the regulation of ʻonline harmsʼ here although ensuring effective and well-balanced regulation in practice remains a formidable challenge.
See further:
“Intermediary Publishers and European data protection: Delimiting the ambit of responsibility for third-party rights through a synthetic interpretation of the EU acquis”, International Journal of Law and Information Technology (Vol. 26(3), pp. 189-225) (2018) - https://academic.oup.com/ijlit/article/26/3/189/5033541
“Beyond ʻHaving a Domesticʼ? Regulatory Interpretation of European Data Protection Law and Individual Publication”, Computer Law and Security Review (Vol. 33 (3), pp. 275-297) (2017) - Pre-print https://www.repository.cam.ac.uk/handle/1810/263883
A new approach to International Judicial Cooperation through secure ICT platf...ePractice.eu
Authors: Mauro Cislaghi | Domenico Pellegrini | Elisa Negroni.
Cooperation between judicial systems is a key factor for sustainable development, one of the EU’s major priorities. eGovernment plans and e-Justice initiatives supported by the European Commission and national governments create a very favourable background for the adoption of ICT standards in the area of cross-border judicial cooperation, both in Member States and in pre-Accession countries.
2010 - Towards new rules for the determination of the legislation applicable?trESS Network
The document discusses potential revisions to the rules for determining applicable legislation for social security in the EU, including exceptions for activities in multiple countries, intra-group mobility, and posting. It proposes a new definition for "group of companies" and an exception to allow continued coverage under the legislation of the initial employer's state for successive short-term postings within the same group of companies across EU states.
Legal reference works are too expensive, making the law inaccessible to most people. Open access to primary legal materials is a right, but charging high fees denies most of the population access to the law. The proposed solution is the Open Law Project, a community-driven effort to create an open access wiki of South African law, following the model of Wikipedia. It would use a federated approach and smart partnerships to make legal information freely available under open licensing.
CIOB Complex Projects Contract 2013: Construction Issues in the Middle EastFrancis Ho
This document discusses construction issues related to complex projects in the Middle East. It notes that while the CIOB Complex Projects Contract 2013 has international and common law roots, provisions allow for compliance with local laws and requirements. Special conditions can further modify the contract to suit local markets. The document also outlines considerations for local sponsors, contractors, and split EPC contracts, highlighting potential impacts of local content rules, joint venture requirements, religious holidays, and tax advantages. It concludes with discussions of contract administration expectations and managing disputes in international projects.
Making EU legislation more accessable - William RobinsonClarity2010
European leaders have called for clearer and simpler EU legislation that is better understood by the public. While efforts have been made, including guidelines for clear drafting and a joint practical guide, making EU laws accessible remains difficult due to having 23 official languages, autonomous legal concepts, and laws negotiated by 27 member states. It is important to improve accessibility given the EU's 500 million citizens and global impact. A package of measures is proposed, including specialized drafters, training, technology, vetting, and binding requirements for clarity in EU laws.
Pob stage 2 lecture 7 introduction advance ole set (1)Diana Shore
This document provides an introduction to law within the context of business principles. It discusses the meaning and significance of the rule of law, key characteristics of English law such as its gradual evolution and doctrine of precedent. It also distinguishes between civil and criminal law, explaining their different purposes and procedures. Finally, it outlines several major areas of private law that are important for business, including contract law, tort law, and company law.
The document discusses e-contracts and licensing in business law. It covers the Uniform Computer Information Transactions Act (UCITA), which provides rules for computer information and software license contracts. The UCITA governs formation, performance, warranties, breach, and remedies for these types of contracts. It also discusses the internet, world wide web, e-mail, domain names, electronic signatures, and exclusive licenses. Licensing agreements transfer limited intellectual property rights from the licensor to the licensee. The parties can be liable for damages if they breach the obligations in these contracts.
This document discusses open access to legislation in Romania. It notes that while there are currently several public databases of legislation, access is limited and the data is not open. However, opening legislation as open data represents a high opportunity, as the raw data is already available electronically and could be easily opened at low cost. Open data has social, economic, and transparency benefits. The document outlines some projects underway in Romania to improve access to legislation, including the N-lex project by the Ministry of Justice to provide free electronic access to the national legislative database. In conclusion, while open access to Romanian legislation does not currently exist, legislation represents an extremely viable domain for open data.
The document discusses Brazil's Marco Civil law and its implications for cloud services. It provides background on the development of Marco Civil from 2009-2014 through a civil society process. Key points of Marco Civil include establishing principles of network neutrality, data protection, and non-liability of intermediaries. For cloud services, the law specifies requirements for data storage timeframes, access protocols, and security standards. Overall, Marco Civil aims to balance an open internet with basic privacy protections.
The document discusses building a legal framework for e-commerce and outlines several key issues and approaches. It notes fundamental changes from internet technologies, questions around identity and location, and whether law acts as an enabler or constraint. It also discusses different forms of regulation like non-discrimination laws, emerging customs, censorship approaches, and precedents from international space and sea laws. International aspects around applicable laws, comparative advantage, and mutual recognition are examined.
This document summarizes the findings of an analytical study on social security coverage of non-active persons moving to another EU Member State. The study was conducted through a fact-finding questionnaire to Member States. It found uncertainty around definitions, concerns about social tourism and increased claims. Current EU law leaves room for different interpretations around the relationship between regulations. Possible future routes discussed are clarification through safeguarding clauses, reconciliation through flexible waiting periods and cost compensation, or a stronger focus on assessing genuine residence.
Ethical Implications of Legal Marketing in a Web 2.0 WorldScott Wolfe
Scott Wolfe is a named plaintiff in a federal suit against the Louisiana State Bar Association, whereby he challenges new regulations on attorney advertising. Specifically, advertising online.
Scott used these slides in a presentation at the American Bar Associations' Young Lawyers Spring 2009 conference, in a seminar titled: Ethical Implications of Marketing in a Web 2.0 World.
The presentation examines the new Louisiana rules, and how the practical effects of the rules to attorneys advertising and marketing online.
The document discusses several issues related to EU information law, including:
1) Liability exemptions for intermediaries under the E-Commerce Directive and exceptions for temporary reproduction under the Copyright Directive.
2) Constitutional concerns around the proportionality and oversight of "three strikes" policies that cut off internet access for repeat copyright infringers.
3) The challenges of regulating both individuals and intermediaries as "data controllers" under the Data Protection Directive.
4) Debates around techniques like website blocking to reduce access to child abuse images and ensuring constitutional values like privacy are considered.
This document summarizes various legal defenses that can be used against home repossession in Ireland. It discusses defenses based on unfair contract terms, the right to cancel distance and off-premises contracts, proportionality and the right to a home, using data protection requests, and issues with tracker mortgages. Specifically, it outlines how the Unfair Terms in Consumer Contracts Regulations allow courts to examine contract terms for fairness and strike out unfair terms. It also discusses a consumer's right to cancel a contract within 7 days under distance and off-premises contract laws. When considering proportionality of repossession, it notes courts examine factors like arrears level and a person's right to adequate housing. The document concludes by
Jurisdictional Issues In Internet DisputesTalwant Singh
This document discusses various jurisdictional issues that arise in internet disputes. It covers different approaches taken by courts around the world in determining jurisdiction for online disputes. Issues around applicable law and enforcing foreign judgments are also examined. Several suggestions are proposed to address jurisdictional uncertainty for cross-border internet transactions, including developing uniform internet laws or alternative dispute resolution mechanisms, but each approach faces challenges in implementation.
This document discusses the growth of e-commerce and the need for an online dispute resolution (ODR) system to handle cross-border disputes. It outlines the decade of progress that has been made toward developing ODR, including guidelines published by organizations like OECD and UNCITRAL. The document proposes a new global e-commerce ODR system modeled on ICANN, to provide quick, low-cost resolution of disputes across borders through a central clearinghouse and approved ODR providers.
The document discusses cyber law and conventions regarding online responsibility. It summarizes key Albanian laws related to electronic communications, electronic commerce, data protection, and other areas of cyber law. It also discusses international sources of cyber law like the UNCITRAL Model Law on Electronic Signatures and the EU Directive on Electronic Commerce. Decisions by the European Court of Human Rights are analyzed that relate to the responsibility of online news portals for user comments.
Industrial revolution and notions of technology .pptxVishweshSingh16
The document discusses the United Nations Commission on International Trade Law's (UNCITRAL) Model Law on Electronic Commerce (MLEC) from 1996. The MLEC aims to facilitate electronic commerce by establishing principles of non-discrimination of electronic documents, technological neutrality, and functional equivalence of electronic and paper documents. It sets rules for electronic contracting, digital signatures, and attribution of electronic messages. The MLEC has been influential as many states have based domestic e-commerce laws on it, helping unify international standards in the area. It also establishes that electronic documents cannot be denied validity solely due to their electronic form.
A New Solution Concerning Choice-Of-Law for the Assignment of Debts.pdfAmber Ford
This document discusses choice-of-law issues regarding the assignment of debts across borders. It explores existing challenges, including a lack of clear private international law rules, and analyzes efforts toward harmonization. Specifically, it examines the European Union's Rome I Regulation and proposed new regulations aimed at unifying choice-of-law approaches for international assignments within the EU. The document focuses on analyzing solutions to increase legal certainty for parties involved in cross-border debt assignments.
Law & Emerging Technology - The Model Law on E-Commerce (Unit 2).pptxssuser32bd0c
The document discusses the Model Law on Electronic Commerce (MLEC) adopted by UNCITRAL in 1996. It summarizes the key principles and provisions of the MLEC, including non-discrimination, technological neutrality, functional equivalence. It provides examples of how countries have incorporated the MLEC into their laws governing e-commerce and discusses some relevant case laws. It also discusses electronic contracts and signatures under Indian law, particularly the Information Technology Act, 2000.
Gastón Mirkin, from Paolantonio & Legón Abogados, explains the differences between jurisdictions throughout Latin American countries and how software users, developers and localizers can protect themselves when working in the region.
This document summarizes information about procedures for restricting access to online content in several countries, including Russia. It describes 5 main types of content blocking used worldwide, and notes that IP-based blocking, the type relevant to this case, is not very effective and causes high rates of false positives according to the Internet Society. It then provides details on blocking procedures and rules in the UK, Turkey, France, Germany, and Russia. For Russia specifically, it outlines the legal framework and process for adding websites to a registry which requires ISPs to block access within 24 hours.
The document discusses the implementation of the EU Damages Directive in Romania through a draft law prepared by the Romanian Competition Council. The draft law aims to facilitate private damages claims for breaches of competition law by clarifying procedures, improving access to evidence, and extending limitation periods. However, it remains unclear if the new law will significantly increase private enforcement given the complexity of competition law cases and need for economic expertise. Courts may also struggle with ensuring confidentiality of evidence. Additional funding and training may be needed to realize the goals of improving private damages actions.
Policy and Technical Solutions for Online Cross-Border Legal Problems in AsiaAPNIC
This document discusses policy and technical solutions for online cross-border legal problems in Asia. It notes increasing data transactions and cases that cross international borders. Areas of law like criminal, civil, copyright and intellectual property are impacted. Past cases show courts asserting jurisdiction over foreign entities. Possible solutions discussed include takedown requests, trade laws regarding IoT devices, and cross-border arbitrations. Challenges include evolving technologies, differing privacy philosophies between regions, and Asia lacking legal harmonization compared to Europe. Initiatives in Asia to address these issues are noted.
This document discusses some of the legal challenges of e-commerce, including unfair terms, cybercrime, and jurisdictional issues. Specifically, it outlines how unfair standard form contracts can negatively impact consumers and businesses. It also examines how cybercrime has increased with the rise of e-commerce and poses a challenge, citing statistics on financial losses from a Norton cybercrime report. Additionally, the document reviews some international and regional efforts to combat cybercrime, such as through organizations like Interpol, APEC, and the Council of Europe.
This document discusses some of the legal challenges posed by e-commerce, including unfair terms, cybercrime, and jurisdictional issues. It outlines how unfair terms in e-commerce contracts can negatively impact consumers and businesses. Specifically, standard form contracts and clickwrap agreements commonly contain unfair terms. The document also examines how cybercrime threatens e-commerce through data theft, hacking, and other illegal online acts. Finally, it notes the jurisdictional problems that can arise when transactions occur across international borders and the applicable laws are unclear. Overall, the document analyzes several significant legal issues presented by the rise of e-commerce and global digital trade.
Cómo podría operar un Sistema Global de Resolución Electrónica de Disputas - ...Marcos Pueyrredon
Presentacion realizada por Colin Rule http://www.linkedin.com/in/crule
Director the Resolución Electrónica de Disputas de Pay Pal / Ebay (EEUU) en el Marco del Coloquio Internacional sobre Resolucion Online de Disputas RED - Online Dispute Resolution ODR organizado por el Instituto Latinoamericano de Comercio Electronico ILCE. Para mayor informacion ingrese en http://www.einstituto.org/onlinedisputeresolution/
The document discusses alternative dispute resolution (ADR) mechanisms for standard essential patent (SEP) disputes in industries like telecommunications and information technology. It notes that ADR options like mediation and arbitration can provide global solutions within reasonable timeframes and costs, avoiding multiple litigations in national courts. The telecom industry desires certainty and efficiency in SEP royalty disputes. As technologies like the Internet of Things and Industry 4.0 expand, SEP/FRAND disputes are also likely to increase regarding related standards. Mediation and arbitration are presented as options that could help minimize hold-up risks in this new landscape. The document also examines principles for arbitration and notes ongoing discussions around balancing stakeholder needs in SEP/FRAND disputes.
This document discusses conflict of laws in intellectual property rights (IPR). It begins by defining IPR and explaining why states create laws to protect intellectual creations through monopoly rights for creators. As technology has reduced national boundaries, courts increasingly face conflicts between IPR laws of different countries. Private international law is important because IPR issues now extend beyond nations. The principle of territoriality and its absence in today's globalized world can create conflicts. The document examines jurisdictional roles and choices of law in resolving international IPR disputes.
This document discusses intellectual property law challenges in the age of internet and converging technologies. It notes that the balance of rights between copyright owners, internet service providers, consumers, and other stakeholders is difficult to maintain as technology advances faster than legal developments. It also examines issues around regulating converged media and the need for coordinated intellectual property legislation to address digital copyright issues raised by new communication technologies. The document surveys IP laws and regulations globally to analyze challenges and solutions around protecting multimedia content, software, and websites in the internet era.
Litigation: Enforcement of Foreign Judgments in IrelandMatheson Law Firm
Partner Julie Murphy-O'Connor and Senior Associate Gearóid Carey of the Commercial Litigation and Dispute Resolution Department co-author an article for Lexology Navigator - Litigation: Enforcement of Foreign Judgments in Ireland.
This document discusses judicial protection of trade secrets in China. It notes that:
1) Trade secret protection started in the 1990s and has been strengthened through judicial interpretations and policies. However, cases are still difficult for plaintiffs due to challenges in evidence collection.
2) The Supreme Court has issued interpretations and policies to guide judicial practice and address issues like standards of proof and the relationship between trade secrets and occupations.
3) Recent amendments allow courts to take preservation measures before lawsuits are filed to better protect trade secrets, though a unified trade secret law is still lacking.
Ongoing Work of UNCITRAL in Relation to the EU Proposal for a Multilateral In...Marlen Estévez Sanz
The EU has proposed establishing a permanent Multilateral Investment Court (MIC) through UNCITRAL to replace the existing system of investor-state dispute settlement (ISDS). UNCITRAL's Working Group III has begun discussions on ISDS reform, identifying concerns about the costs, duration, coherence and impartiality of arbitration. The EU believes the MIC would address these issues by being permanent, transparent, and ensuring predictable interpretations of investment treaties through precedents set by appeals. Working Group III will continue discussions on reforming concurrent proceedings and arbitrator ethics.
Similar to Blockchain and Jurisdiction - Bedrettin Gurcan (20)
This document discusses intrusion detection systems, including common attack patterns like port, ping, and login sweeps. It outlines Snort as an example network-based intrusion detection system and provides Snort rule examples. Different types of intrusion detection systems are also covered, along with considerations for host-based versus network-based placement.
This document outlines key network protocols including ARP, SYN, FTP, ICMP, DNS, port scans, SYN floods, and the application layer. It discusses how these protocols work from the bit level up through data encapsulation using Ethernet, IP, and TCP. Specific topics covered include the three-way handshake, how ARP maps IP addresses to MAC addresses, SYN scans, the FTP protocol, ICMP, DNS name resolution, types of port scans, and SYN floods as a denial of service attack.
This document discusses memory, big data, and security information and event management (SIEM). It outlines how a SIEM infrastructure can be modeled after the human brain's memory to gather and analyze large amounts of data. Specifically, it proposes that machines should be adaptive, interactive, iterative and stateful, and contextual to effectively learn from data over time and identify security threats, similar to how the human brain functions. The document also mentions directed graphs and the five V's of big data - volume, velocity, variety, veracity, and value.
This document discusses different types and formats of data including unstructured, semi-structured, and structured data. It explains that unstructured data has no formal structure, semi-structured data has some defined tags but not a formal schema, and structured data has a formal schema and relationships defined. The document also covers topics like data encoding, compression, magic numbers, and different data formats like CSV, JSON, XML, and more.
Threat hunters collect internal and external data to establish hypotheses about potential threats. They hunt for information to identify real threats and determine an appropriate response. Open source intelligence includes data from social networks, crowd-sourced sites, wikis, and photographs that can provide information about people, organizations, technologies and more. Tools like Google dorking, the Wayback Machine and Shodan allow searching open webpages and networks for intelligence.
The document discusses converting data into information using NumPy and Pandas Python libraries. It covers topics like arrays and matrices, different data formats, NumPy operations for linear algebra and math, and Pandas for working with labeled data and performing analyses like sorting, filtering, and correlations. The goal is to understand how to structure and analyze data using these Python tools.
The document discusses information security, defense mechanisms, and risks. It outlines concepts like data, information, knowledge and wisdom. It describes kill chain models used to investigate security incidents and defenses that use layers like deterrence, detection, protection, reaction, recovery, and auditing. The document also covers risks, costs, benefits, and harm from physical, economic, psychological and reputational impacts.
This document discusses cybersecurity, intelligence, and the differences between human and machine intelligence. It provides an overview of cybersecurity job roles and frameworks. It also covers types of intelligence including naturalist, musical, logical-mathematical, existential, and inter-personal. Humans are described as having advantages in areas like creativity, perception, memory, verbal skills, and reasoning compared to current computer capabilities. Motivations for cyberattacks include entertainment, hacktivism, financial gain, spying, and revenge.
The document discusses ARTiFACTS, a platform that uses blockchain technology to provide attribution for research works. It allows researchers to establish proof of authorship, protect and share research materials, and receive valid attribution and credit for any research output. Researchers, scholars, and publishers can integrate with the ARTiFACTS open platform. It provides a case study of its partnership with the journal JBBA, where researchers can link supporting files and publications to receive citations.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
2. The official power to make
legal decisions and
judgements on international
level.
02
International
Jurisdiction
3. •According to the Brussel I Regulation the
udgment must be rendered by a court of Member
State so as to be recognized and enforced in other
EU Member States.
However, as we took attention above, this
Convention can be applied just for civil and
commercial matters. However, there
are several matters on Blockchain as consumer and
criminal law matters for example the consumer
protection regulations and Anti Money Laundering
Regulations.
Yusuf Çalışkan, Zeynep Çalışkan, The Free Movement of Judgments within the European Union(2010),
Ankara Bar Journal, Vol.3, Available at
http://www.ankarabarosu.org.tr/siteler/ankarabarosu/tekmakale/2010-3/2010-3-caliskan-caliskan.pdf,
P. 15
03
4. •During the term of Brussel Convention
1978, the rule of country of origin was chosen. With
Brussel Recast, the rule is changed and if an e-
commerce website targets a consumer, jurisdiction
exists over any contract dispute in the costumer’s
country.
•Michael T. Zugelder
JD, Theresa B. Flaherty PhD & Irvine Clarke
III (2003) Jurisdictional Issues for Electronic
Marketing, Journal of Internet Commerce, 2:3, 11-26, P: 20
•
02
05
5. •Main central authority is ICANN, the Internet
Corporation for Assigned Names and Numbers,
which is a non-profit organization, registered in
California USA.
•Every computer or device that go on the Internet
needs its own IP address. Regional Internet
Registry (RIR) is an organization that manages and
controls Internet addresses in the regions and
continents.
Internet
Jurisdiction
06
6. There are five RIRs, which each
one divided into region by region
as :
1- ARIN (American Registry for
Internet Numbers),
2- RIPE NCC (Reseaux IP
Europeens Network Coordination
Centre)
3- APNIC (The Asia-Pacific
Network Information Centre),
4- LACNIC (Latin American and
Caribbean Internet Address
Registry) and
5- AfriNIC (The African Network
Information Centre)
07
7. •One example of international internet
jurisdiction is Uniform Domain Name
Dispute Resolution Process, which is a
process, sets out the legal framework
for the resolution of disputes between a
domain name registrant and third
parties. This procedure is administered
by dispute resolution service providers
accredited by ICANN as one of them is
WIPO (World Intellectual Property
Organization).
08
8. •Jurisdiction on the internet based on six
equal jurisdiction principles recognized in
international law, results in a situation
where each internet user is subject to every
national legal regime, particularly when
they decide to create content and enable it
online.
These principals are:
1- Territorial jurisdiction,
2- Effective jurisdiction,
3- Personal jurisdiction,
4- Passive personal jurisdiction,
5- Protective jurisdiction,
6- Universal jurisdiction.
Joanna Kulesza (2012) International Internet law, Global Change, Peace & Security, 24:3, 351-
364, DOI: 10.1080/14781158.2012.716417 P: 362
[1] The Restatement of The Law the Foreign Relations of The United States Para 402
09
9. 7
Signatories
•Hague Conference on Private
International Law, Convention
of 2005 on Choice of Court
Agreements is published.
The Convention is designed for
transactions between mostly
corporate bodies.
11
10. •The Convention on Cybercrime of the Council of Europe is
the only binding international instrument on the
Cybercrime.
This Convention also known as Budapest Convention
serves as a guideline for any country developing
comprehensive national legislation against
Cybercrime and as a framework for international
cooperation between State Parties to this treaty.
•Convention on Cybercrime, Budapest,
23.XI.2001, European Treaty Series - No. 185,
http://www.europarl.europa.eu/meetdocs/2014_2019/documents/libe/dv/7_conv_budapest_/7_conv_budapest_en.pd
f, accessed on 27th May 2019
•
12
11. Jurisdiction on the Blockchain
•Business Law as E-
Commerce Methods?
•Criminal Law
•AML-KYC
Regulations
•Arbitration on
Blockchain
16
•Smart Contracts and
Jurisdiction