The document discusses how information technology impacts the practice of law. It outlines trends in IT use by lawyers, including tools for case management, communication, and legal research. It also describes EU and CCBE activities related to promoting e-justice, including cross-border projects and recommendations on electronic identification, signatures and evidence. Substantive legal issues that arise from increased IT use, such as privacy and intellectual property, are also mentioned.
Amid mounting criticism of Ireland’s privacy watchdog, top European Commission official Didier Reynders has come to Dublin’s defense, brushing off calls to penalize the country over claims it has failed to uphold Europeans’ privacy rights.
The defense, in a letter to MEPs, comes after lawmakers including Sophie in ‘t Veld and Tineke Strik from the Netherlands and Cornelia Ernst and Birgit Sippel from Germany urged the EU executive to open a disciplinary procedure against Dublin.
In the light of the rapid technological developments in our world , it has become necessary for states to keep pace with the technological revolution in order for them to become modern and advanced countries, or, at least , to be on the road to become so, by investing in modern technologies of communication of information, and through the development and investment in favor of public services.
There is no doubt that the tremendous revolution that took place in the world of communications has led to a change in the means and methods of business transactions and expressions of the will for what is called now “Electronic Data Interchange”. In lieu of paper documents seeking the legislation of modern developments and keeping up with the technological developments of the countries, Jordanian legislators took the lead among their Arab counterparts and issued the Interim Electronic Transactions Act No. 85 for the year 2011 on 11/12/2001. This legislation comprised of the first Jordanian law in the field of information technology , which was the second Arab law in the field of e-commerce after the Tunisian law making room for other Arab countries, out of which was Dubai which enacted the Act on electronic exchanges and Bahrain which passed the Bahraini law of e-commerce.
The Jordanian legislature came up with this law to put a legal framework that conforms with the international legislative framework in order to regulate the electronic transactions and to recognize all means of electronic data and electronic signatures in terms of their validity or invalidity. Moreover, the objective was the establishment of legal obligations on one side and the recognition electronic records on the other side.
The Electronic Transactions Act allowed the establishment of authorities of authentication and electronic signatures for giving evidence in a given argument.
Amid mounting criticism of Ireland’s privacy watchdog, top European Commission official Didier Reynders has come to Dublin’s defense, brushing off calls to penalize the country over claims it has failed to uphold Europeans’ privacy rights.
The defense, in a letter to MEPs, comes after lawmakers including Sophie in ‘t Veld and Tineke Strik from the Netherlands and Cornelia Ernst and Birgit Sippel from Germany urged the EU executive to open a disciplinary procedure against Dublin.
In the light of the rapid technological developments in our world , it has become necessary for states to keep pace with the technological revolution in order for them to become modern and advanced countries, or, at least , to be on the road to become so, by investing in modern technologies of communication of information, and through the development and investment in favor of public services.
There is no doubt that the tremendous revolution that took place in the world of communications has led to a change in the means and methods of business transactions and expressions of the will for what is called now “Electronic Data Interchange”. In lieu of paper documents seeking the legislation of modern developments and keeping up with the technological developments of the countries, Jordanian legislators took the lead among their Arab counterparts and issued the Interim Electronic Transactions Act No. 85 for the year 2011 on 11/12/2001. This legislation comprised of the first Jordanian law in the field of information technology , which was the second Arab law in the field of e-commerce after the Tunisian law making room for other Arab countries, out of which was Dubai which enacted the Act on electronic exchanges and Bahrain which passed the Bahraini law of e-commerce.
The Jordanian legislature came up with this law to put a legal framework that conforms with the international legislative framework in order to regulate the electronic transactions and to recognize all means of electronic data and electronic signatures in terms of their validity or invalidity. Moreover, the objective was the establishment of legal obligations on one side and the recognition electronic records on the other side.
The Electronic Transactions Act allowed the establishment of authorities of authentication and electronic signatures for giving evidence in a given argument.
Decision CAMP 2014 - Tobias Vigmostad - Digitalizing Business and Legislative...Decision CAMP
The focus of the presentation will be to explain what challenges the Directorate of Immigration in Norway (UDI) faced when trying to move from the traditional legal casework towards an electronic process industry while also maintaining sound legal control of the automated rules. (UDI is the central agency in the Norwegian Immigration Administration.)
The project delivered tools centered on BRS and extensive use of RMA. UDI continually uses these tools to implement new business rules and to improve the business processes and decisions.
The presentation will also touch upon key events in the past that influenced the decision to externalize business rules from the application level and compare how two different systems handled the same legal rule changes.
The key to the project’s success was to build a solution where the legal caseworkers themselves could manage and update the rules in the system, and continue to build new rules for decision support, and how this process over time transforms itself into standard decisions, a necessary stage before going into fully automated decisions.
The presentation will finally focus on the necessity for users to get experience with rules and how they work, and how that inspires new and better policies, which in turn transforms into new business rules. A key success factor is a short time to market for new rules and that the business rules were managed by the business people.
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
THE IMPACT OF SUPREME COURT DECISION IN KUBOR v. DICKSON (2014) 4 NWLR (Part 1345) 534-594 ON THE DEVELOPMENT OF E-COMMERCE IN NIGERIA: ISSUES AND PROSPECTS
Policy Brief on Europe's "Right to be Forgotten"William Nyikuli
This policy brief is an overview of the European Union's proposed policies on digital privacy as announced on January 25, 2012. It has been prepared for the benefit of US business interests as represented by the US Chamber of Commerce
The object of analysis in the present text is the issue of surveillance and data retention in Poland. The analysis of this issue follows from a critical stance taken by NGOs and state institutions on the scope of operational control wielded by the Polish police and special services – it concerns, in particular, the employment of " itemised phone bills and phone tapping. " Besides the quantitative analysis of surveillance and the scope of data retention, the text features the conclusions of the Human Rights Defender referred to the Constitutional Tri-bunal in 2011. It must be noted that the main problems concerned with the employment of surveillance and data retention are caused by: (1) a lack of specification of technical means which can be used by individual services; (2) a lack of specification of what kind of information and evidence is in question; (3) an open catalogue of information and evi-dence which can be clandestinely acquired in an operational mode. Furthermore, with re-gard to the access granted to teleinformation data by the Telecommunications Act, attention should be drawn to the wide array of data submitted to particular services. Also, the text draws on open interviews conducted mainly with former police officers with a view to highlighting some non-formal reasons for " phone tapping " in Poland. This comes in the form of a summary.
Data Protection in the EU | babelforce Insightbabelforce
https://www.babelforce.com
The Insight will go through the essential factors for EU business and data protection, focusing on a business process which is often affected: call recording.
Data Protection Guide – What are your rights as a citizen?Edouard Nguyen
Guide UK Data Protection Law EUROPA - Internal Market - Data Protection - Data Protection Guide – What are your rights as a citizen?http://ec.europa.eu/justice/policies/privacy/docs/guide/guide-ukingdom_en.pdf
Asia Counsel Insights gives readers a concise insight into legal and business developments in Vietnam. This edition has news on: the new law on Cybersecurity; the new law on access to Government information; the new decree on foreign investment in the education sector; and the new circular on health care subsidization.
Decision CAMP 2014 - Tobias Vigmostad - Digitalizing Business and Legislative...Decision CAMP
The focus of the presentation will be to explain what challenges the Directorate of Immigration in Norway (UDI) faced when trying to move from the traditional legal casework towards an electronic process industry while also maintaining sound legal control of the automated rules. (UDI is the central agency in the Norwegian Immigration Administration.)
The project delivered tools centered on BRS and extensive use of RMA. UDI continually uses these tools to implement new business rules and to improve the business processes and decisions.
The presentation will also touch upon key events in the past that influenced the decision to externalize business rules from the application level and compare how two different systems handled the same legal rule changes.
The key to the project’s success was to build a solution where the legal caseworkers themselves could manage and update the rules in the system, and continue to build new rules for decision support, and how this process over time transforms itself into standard decisions, a necessary stage before going into fully automated decisions.
The presentation will finally focus on the necessity for users to get experience with rules and how they work, and how that inspires new and better policies, which in turn transforms into new business rules. A key success factor is a short time to market for new rules and that the business rules were managed by the business people.
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
THE IMPACT OF SUPREME COURT DECISION IN KUBOR v. DICKSON (2014) 4 NWLR (Part 1345) 534-594 ON THE DEVELOPMENT OF E-COMMERCE IN NIGERIA: ISSUES AND PROSPECTS
Policy Brief on Europe's "Right to be Forgotten"William Nyikuli
This policy brief is an overview of the European Union's proposed policies on digital privacy as announced on January 25, 2012. It has been prepared for the benefit of US business interests as represented by the US Chamber of Commerce
The object of analysis in the present text is the issue of surveillance and data retention in Poland. The analysis of this issue follows from a critical stance taken by NGOs and state institutions on the scope of operational control wielded by the Polish police and special services – it concerns, in particular, the employment of " itemised phone bills and phone tapping. " Besides the quantitative analysis of surveillance and the scope of data retention, the text features the conclusions of the Human Rights Defender referred to the Constitutional Tri-bunal in 2011. It must be noted that the main problems concerned with the employment of surveillance and data retention are caused by: (1) a lack of specification of technical means which can be used by individual services; (2) a lack of specification of what kind of information and evidence is in question; (3) an open catalogue of information and evi-dence which can be clandestinely acquired in an operational mode. Furthermore, with re-gard to the access granted to teleinformation data by the Telecommunications Act, attention should be drawn to the wide array of data submitted to particular services. Also, the text draws on open interviews conducted mainly with former police officers with a view to highlighting some non-formal reasons for " phone tapping " in Poland. This comes in the form of a summary.
Data Protection in the EU | babelforce Insightbabelforce
https://www.babelforce.com
The Insight will go through the essential factors for EU business and data protection, focusing on a business process which is often affected: call recording.
Data Protection Guide – What are your rights as a citizen?Edouard Nguyen
Guide UK Data Protection Law EUROPA - Internal Market - Data Protection - Data Protection Guide – What are your rights as a citizen?http://ec.europa.eu/justice/policies/privacy/docs/guide/guide-ukingdom_en.pdf
Asia Counsel Insights gives readers a concise insight into legal and business developments in Vietnam. This edition has news on: the new law on Cybersecurity; the new law on access to Government information; the new decree on foreign investment in the education sector; and the new circular on health care subsidization.
presentatie voor 1 uur durende workshop voor vertegenwoordigers van bedrijven en opleidingen tijdens 'The Voice of the Future', evenement van Christelijke Agrarische Hogeschool in Dronten 14 februari 2012
Problem solving strategies in mathematics and computer scienceUT, San Antonio
This presentation was placed on a course project of reading course in the university of texas, san Antonio. This is a group project and the project lead was Lishu Li
The Central and Eastern Europe countries are undergoing significant change as they accelerate to becoming digital economies. A key cornerstone for the region’s future economic success is the quality of its justice system. Investors will steer clear of societies who have anything less than a robust justice system. With increased mobility citizens will similarly vote with their feet.
Presentation about the SPOCS project on pan-European interoperability for the Services Directive, given at the EEMA eIdentity conference in London on 10 June 2010.
SPOCS Presentation EEMA Conference London June 2010Dinand Tinholt
Presentation given by Dinand Tinholt, SPOCS Programme Director, about European interoperability of cross-border business startup at the EEMA conference in London on 10 June 2010.
E-contracting and Commerce is presented by Pria Chetty and details the South African legal position with regard to electronic contracts and the effect on commerce.
Strategy and experience of Spain in interoperability for eGovernment. Governm...Miguel A. Amutio
Text of the presentation made at the event of the World Bank Office in Bucharest, GOVERNMENT TRANSFORMATION WORKSHOP: MOVING FROM NICE‐TO‐HAVE TO MUST‐HAVE May 30, 2013
The techo revolution is finally here. We need to intergrate technology and litigation proces. Its a high time litigants used smartphones for submitting their cases, highlighting their submissions and case management.
Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.
Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.
Using technology and data for closing gaps, Hugo NunesOECD Governance
Presentation by Hugo Nunes made at the OECD Global Policy Roundtable on Equal Access to Justice, 28 March 2019.
For more information see www.oecd.org/gov/equal-access-to-justice-oecd-expert-roundtable-portugal-2019.htm
Paul Whittaker CBE, Common Platform Transformation Director, Crown Prosecutio...CSSaunders
A presentation by Paul Whittaker CBE, Common Platform Transformation Director, CPS, on how digital technology will transform the interface between policing and the criminal justice system - delivered at the Police Foundation's annual conference 'Policing and justice for a digital age' December 2016.
Similar to Arve Foyen "How does IT impact on the practise of law" (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
12. Altinn is the Norwegian government’s portal for electronic dialogue with businesses … but does even contain significant services for citizens – simplified electronic dialogue
13. Tax return for businesses – more than 60 percent market penetration – simplified electronic dialogue
14. At the end of 2008, electronic reporting of all public forms required by law had been made available through Altinn. – simplified electronic dialogue
15.
16. 4 security levels and PKI Log in with pin codes distributed by post or sms at security level 2 … … or with smart card at security level 4 – simplified electronic dialogue
22. Norwegian Land Registry Background and history: NE was established to transfer the former paperbased Land Register to electronic form (6 M Pages) Performed 1988 - 1995
42. The CCBE The council of Bars and Law Societies of Europe
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53. Internet Mr Smith Received Mailbox Sent Mailbox E-mail SMS Mr Smith Place Receipt Acknowledge Received Mailbox Sent Mailbox Mr Perez Place Receipt Acknowledge Internet Mr Perez E-mail SMS Concept Diagram PenalNET SSL Session SSL Session Country 2 Country 1 Country N DIRECTORY
better information : At European level, it means providing information on some national procedures in all official languages of EU improving judicial cooperation Important issue as judicial answer to cross border crime is a request of EU citizen increasing the efficiency of justice It is important to use ICT to save money and time during procedures, but it also important to consider this issue also in respect of increasing the quality of procedures (for exemple use videoconference to hear a witness which would not have been heard otherwise improve the quality of the court hearings)
better information : At European level, it means providing information on some national procedures in all official languages of EU improving judicial cooperation Important issue as judicial answer to cross border crime is a request of EU citizen increasing the efficiency of justice It is important to use ICT to save money and time during procedures, but it also important to consider this issue also in respect of increasing the quality of procedures (for exemple use videoconference to hear a witness which would not have been heard otherwise improve the quality of the court hearings)
better information : At European level, it means providing information on some national procedures in all official languages of EU improving judicial cooperation Important issue as judicial answer to cross border crime is a request of EU citizen increasing the efficiency of justice It is important to use ICT to save money and time during procedures, but it also important to consider this issue also in respect of increasing the quality of procedures (for exemple use videoconference to hear a witness which would not have been heard otherwise improve the quality of the court hearings)
better information : At European level, it means providing information on some national procedures in all official languages of EU improving judicial cooperation Important issue as judicial answer to cross border crime is a request of EU citizen increasing the efficiency of justice It is important to use ICT to save money and time during procedures, but it also important to consider this issue also in respect of increasing the quality of procedures (for exemple use videoconference to hear a witness which would not have been heard otherwise improve the quality of the court hearings)