The power point presentation of the lecture held by Professor Giovanni Maria Riccio on "Social Networks and Civil Liability" at the International Summer School on Cyber Law which took place in Moscow June 30 - July 4, 2014.
Discussion of the main elements of the draft Data Protection Regulation: what difference will it make to industry practice and user rights to control their data?
Offdata: a prosumer law agency to govern big data in the public interestChris Marsden
Presentation to St Petersburg International Legal Forum 19 May 2016 Track Smart Society4.5. Information Security in the Digital Environment: Limits of Big Data Use http://regulatingcode.blogspot.co.uk/2016/05/offdata-prosumer-law-agency-to-govern.html
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...beamatinet
Conference Jan. 23 2012, Stanford Law School on SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to tackle online infringement?
(by @beamartinet)
Privacy and Access to Information Law - Lecture 1James Williams
The first lecture from Law 3040X.03, Privacy and Access to Information Law. This lecture was given in January 2013 at Osgoode Hall Law School, York University. The rest of our slides are for students only.
Discussion of the main elements of the draft Data Protection Regulation: what difference will it make to industry practice and user rights to control their data?
Offdata: a prosumer law agency to govern big data in the public interestChris Marsden
Presentation to St Petersburg International Legal Forum 19 May 2016 Track Smart Society4.5. Information Security in the Digital Environment: Limits of Big Data Use http://regulatingcode.blogspot.co.uk/2016/05/offdata-prosumer-law-agency-to-govern.html
SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to t...beamatinet
Conference Jan. 23 2012, Stanford Law School on SOPA, OPEN, ACTA and parallel copyright reforms in Europe, The right way to tackle online infringement?
(by @beamartinet)
Privacy and Access to Information Law - Lecture 1James Williams
The first lecture from Law 3040X.03, Privacy and Access to Information Law. This lecture was given in January 2013 at Osgoode Hall Law School, York University. The rest of our slides are for students only.
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
With the move to a more digital, mobile, and platform-dominated media environment people increasingly find and access news and information via platforms like search engines and social media. These have empowered citizens in many ways and are important drivers of attention to established publishers but have also enabled the distribution of disinformation from a range of different actors. In a context where citizens are often increasingly sceptical of both platforms, publishers, and public authorities, what do we know about the scale and scope of disinformation problems and what can different actors do to counter the problems we face?
https://www.scl.org/articles/10662-interoperability-an-answer-to-regulating-ai-and-social-media-platforms
"Information Compliance - Freedom of Information, Data Protection and Librari...Terry O'Brien
"Information Compliance - FoI, data protection and libraries". Presentation given by Terry O'Brien at Joint English / Irish IIUG Conference, Institute of Technology, Blanchardstown, Dublin, Ireland, June 2009
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
Network neutrality has been at the center of intense political discussions about Internet regulation. Net neutrality is the principle that all content on the Internet should be equally available to users without discrimination by service providers. Establishing legal protections for net neutrality is a necessary component to providing equitable access to online educational materials and services.
Korpisaari how to combat hate speech without sacrificing freedom of speech?Päivi Korpisaari
This is a presentation I gave at an international virtual hate speech seminar in South Korea, organised by TAIEX. Because there were five presentations on this theme, I only cover some aspects, in order to avoid overlapping with other presentations.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
With the move to a more digital, mobile, and platform-dominated media environment people increasingly find and access news and information via platforms like search engines and social media. These have empowered citizens in many ways and are important drivers of attention to established publishers but have also enabled the distribution of disinformation from a range of different actors. In a context where citizens are often increasingly sceptical of both platforms, publishers, and public authorities, what do we know about the scale and scope of disinformation problems and what can different actors do to counter the problems we face?
https://www.scl.org/articles/10662-interoperability-an-answer-to-regulating-ai-and-social-media-platforms
"Information Compliance - Freedom of Information, Data Protection and Librari...Terry O'Brien
"Information Compliance - FoI, data protection and libraries". Presentation given by Terry O'Brien at Joint English / Irish IIUG Conference, Institute of Technology, Blanchardstown, Dublin, Ireland, June 2009
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
Network neutrality has been at the center of intense political discussions about Internet regulation. Net neutrality is the principle that all content on the Internet should be equally available to users without discrimination by service providers. Establishing legal protections for net neutrality is a necessary component to providing equitable access to online educational materials and services.
Korpisaari how to combat hate speech without sacrificing freedom of speech?Päivi Korpisaari
This is a presentation I gave at an international virtual hate speech seminar in South Korea, organised by TAIEX. Because there were five presentations on this theme, I only cover some aspects, in order to avoid overlapping with other presentations.
Presented by EndCoder Denise Fouche, this presentation describes South Africa's legal response to cyber security threats, particularly in the banking industry.
SAU-GROWTH METER:This growth meter is a broad invent in agriculture sector and can prove very much useful in agriculture throughout the world. Now we can measure growth speed of wheat crop plant per second, per minute, per hour, per day and per month as well, which helps us to estimate and maximize yield through proper use of input resources.
Before Chris Bruno purchased Fiddler’s Restaurant (which later would become Chris’s American Restaurant) in Brookfield, Connecticut, the location had housed everything from a hotdog stand to a speakeasy. The name change to Chris’s American Restaurant in 2003 reflected not only a change in menu but a significant remodel, including doubling the parking lot size.
Where Social Meets Collaboration: Building, Managing and Optimizing the Colla...OpenKnowledge srl
Where Social Meets Collaboration: Building, Managing and Optimizing the Collaborative Enterprise - Leon Baranovsky (Cisco), Keynote Speaker @Social Business Forum 2013
Collaboration in the cognitive era - Katrina TroughtonOpenKnowledge srl
The speech will be about how work and collaboration platforms are evolving in the face of unprecedented change. As personal social networks become more ubiquitous, collaboration in the workplace is coming into its own. The ability to share information, find resources, work on projects, using social platforms makes life easier, faster and more productive and creates a more engaged workforce. See how your business can be more productive, respond to customers faster, and beat off competitive threats by allowing people to work together better.
European Data Protection and Social NetworkingDavid Erdos
These slides explore significant issues arising under data protection for both users and platforms as a result of the publication of third party personal data on such sites. Although the GDPR’s new wording of the household exemption could potentially exclude non-intrusive processing (e.g. sharing innocuous pictures taken in public), the Court of Justice of the EU (CJEU) is increasingly insistent that users acquire responsibilities when the publish such data to an indeterminate number. In principle, most EU Data Protection Authorities (DPAs) accept this although others including the UK and Irish have been very resistant. Many users could therefore have weighty data protection obligations here, although if contributing to a collective public debate they may be covered by the journalistic/special expression derogation and in any case there is a need for a balance with freedom of expression. CJEU ʻjoint controllerʼ case law also points to social networking sites have their own duties here, a proposition which has been backed by Working Party, the UK DPA and the UK courts. Whilst the e-Commerce ʻhostʼ shield should significantly limit ex ante responsibility here, this must be tempered by the ʻduty of careʼ which is inherent in being a ʻcontrollerʼ under data protection. In sum, data protection in principle remains central to the regulation of ʻonline harmsʼ here although ensuring effective and well-balanced regulation in practice remains a formidable challenge.
See further:
“Intermediary Publishers and European data protection: Delimiting the ambit of responsibility for third-party rights through a synthetic interpretation of the EU acquis”, International Journal of Law and Information Technology (Vol. 26(3), pp. 189-225) (2018) - https://academic.oup.com/ijlit/article/26/3/189/5033541
“Beyond ʻHaving a Domesticʼ? Regulatory Interpretation of European Data Protection Law and Individual Publication”, Computer Law and Security Review (Vol. 33 (3), pp. 275-297) (2017) - Pre-print https://www.repository.cam.ac.uk/handle/1810/263883
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
Adam Thierer & Berin Szoka of The Progress & Freedom Foundation are attempting to articulate the core principles of cyber-libertarianism to provide the public and policymakers with a better understanding of this alternative vision for ordering the affairs of cyberspace. We invite comments and suggestions regarding how we should refine and build-out this outline. We hope this outline serves as the foundation of a book we eventually want to pen defending what we regard as “Real Internet Freedom.”
Social Media and Law Enforcement - Presentation by Central Bureau of Investi...Nagarajan M
Social Media and Law Enforcement - Opportunities and Challenges is a presentation by Central Bureau of Investigation. It explains the concepts and dynamics of social media in dealing with crimes. It give a broad overview of the possible scenarios with real life examples from across the world.
A brief look into the politics applied by the Spanish government (Partido Popular) in Spain after the Global Financial Crisis and their attemps to limit Internet freedom, through repression and censorship, as a way to impose a common discourse through controlled and ideologically aligned media groups and channels.
Among these strategies and tactics, we can include new legislation on the Internet and limiting civil rights, and a fear campaign directed toward anyone proposing a different narrative.
Done as part of an exposition for Internet Governance for the University of Sydney.
Is it legal or illegal to use american cloud services in Europe?
Patricia Ayojedi presentation about the controversial between USA an Europe regarding cloud business.
Artificial Intelligence and Copyright: How to Find Balances between Human Cr...Giovanni Maria Riccio
Kozminski University - Warsaw
"Legal Challenges of Disruptive Technologies"
FROM BLOCKCHAIN TO AI: INTELLECTUAL PROPERTY IN DISRUPTIVE TECHNOLOGICAL TIMES
May an AI machine be considered as author of a copyrighted work?
Which remuneration?
Who pays whom?
Should we consider different fees for different works?
What can we learn from the past?
Quando è possibile che un'opera, creata dall'intelligenza artificiale, sia tutelata dal diritto d'autore?
Quali sono le regole da rispettare nella tutela dei dati personali?
Lezione su Proprietà intellettuale e metaverso tenuta presso l'European School of Economics di Roma il 10 marzo 2023.
Il metaverso è inizialmente ideato come uno scenario distopico, dove la “vita elettronica” è altro rispetto alla vita reale?
Il metaverso, se è altro rispetto alla realtà, è innanzi tutto una modifica del piano antropologico e sociale in cui viviamo?
Il metaverso ha, o dovrebbe avere, regole, evidentemente anche giuridiche, sue proprie?
Le regole tradizionali in materia di diritto d'autore e marchi sono sufficienti a rispondere alle sfide poste dal metaverso?
Presentazione sulla dematerializzazione dei contratti alla luce del CAD, della riforma del Codice del consumo e del Provvedimento del Garante privacy sulla biometria
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Abdul Hakim Shabazz Deposition Hearing in Federal Court
International Summer School on Cyber Law - Moscow - July 2014
1. SOCIAL NETWORKS AND
CIVIL LIABILITY
INTERNATIONAL SUMMER SCHOOOL ON CYBER
LAW – MOSCOW (JULY 2014)
Giovanni Maria Riccio
Università di Salerno (Italy)
gmriccio@unisa.it
1
2. Main issues
2
Market Analysis
Legal Framework
Main Legal Issues for SNSs
Application to SNSs of the e-commerce directive
Jurisdiction / Legal Imperialism
Soft-Law vs. Hard Law / Private vs. Public
enforcement
3. New Economy Peculiarities
3
Start-up costs can be extremely low (e.g. eBay;
Facebook) and generate huge profits.
Internet creates monopolies (If a web service is
efficient, then everybody will use it: e.g.
Google)
Large internet companies are aware of the
“evanescence” of some internet creations (e.g.
Second Life), so they try to acquire other
portion of the new economy market (e.g. eBay
bought PayPal and Skype; Google bought
YouTube; Microsoft was interested in Facebook;
etc.)
11. Let’s talk about law
If I publish a picture
of a model snapped
on a private beach
who’s liable?
The editor of the
website?
The ISP?
Both?
12. E-Commerce Directive
12
Principles
ISPs are not liable if their activity is limited to a
mere technical role
If they don’t transmit information on digital networks
and don’t select contents or recipients of the
information transmitted
ISPs don’t have a general monitoring obligations on
contents published by third parties
13. 13
The e-commerce directive has imitated, almost verbatim,
the DMCA and the German TeledienstGesetz
Unlike DMCA, EU directive does not regulate NTD
procedures
It covers all the offences (criminal and civil), not limited
to copyright law
A world wide law? Or a new legal imperialism?
Il doesn’t cover search engines, linking and social
network platforms
Do we need an update of the directive?
14. Hosting
14
Article 14 ECD – Host provider is not liable if
it does not have actual knowledge of illegal activity
or information
as regards claims for damages, is not aware of facts
or circumstances from which the illegal activity or
information is apparent
upon obtaining such knowledge or awareness, acts
expeditiously to remove or to disable access to the
information
15. Monitoring obligations
15
Article 15: Member States can not impose a
general obligation on providers to monitor the
information which they transmit or store, or a
general obligation to search actively for evidence
of illegal activity
Doe v. MySpace Inc., 2008 WL 2068064 (5th Cir.
May 16, 2008) – Does MySpace have a duty to
police its website to prevent online communications
that lead to offline crimes?
16. Two Options
Strict Liability Rule
Application of the
enterprise liability
standard (press law)
ISPs are liable for the
information transmitted
It doesn’t matter if
they are in the position
to check these contents
or not
Negligence Rule
ISPs are liable only if
they act with
negligence
Professional
negligence (e.g. if
they don’t use filters;
if informed of an
illicit content they do
not act to remove it)
16
17. EU Directive – Fault liability standard
17
The application of the strict liability regime could cause:
o Reduction of the quantity of ISPs: only the ISPs which can
bear the cost of accidents will stand on the market
o Reduction of the quality of information: if they are liable in
any case, ISPs will choose to publish exclusively safe
information (e.g. they will publish a web site on Greek
recipes instead of a blog on the war on Iraq)
o Lack of the deterrence effect: if I am liable in any case, I
have no interest in developing instruments for preventing
violations (e.g. filters)
18. Definition of Social Network
18
No legal definition (laws, courts decisions, etc.)
A dedicated website or other application which
enables users to communicate with each other by
posting information, comments, messages, images,
etc.
SNSs are “information society services” pursuant to
art. 1 par. 2 of Directive 98/34/EC
19. Main Legal Issues
19
Is the e-commerce directive applicable to SNS?
Private enforcement / Soft (?) Law
Jurisdiction/Applicable Law
Copyright infringements
Privacy
Defamation
20. 20
The issue of the applicability of the ECD to SNS is
not often addressed to the Courts yet
21. Applicable Law
21
Twitter: “You may use the Services only if you can
form a binding contract with Twitter and are not a
person barred from receiving services under the
laws of the United States or other applicable
jurisdiction”
High Court of Berlin, Feb. 2014, Facebook
provided no evidence that the processing of
personal data was made from Ireland – FB is
subject to German DP Law
22. Facebook’s TOS
22
Special Provisions Applicable to Users Outside the United States
We strive to create a global community with consistent standards for
everyone, but we also strive to respect local laws. The following
provisions apply to users and non-users who interact with Facebook
outside the United States:
You consent to having your personal data transferred to and processed in
the United States.
If you are located in a country embargoed by the United States, or are
on the U.S. Treasury Department's list of Specially Designated Nationals
you will not engage in commercial activities on Facebook (such as
advertising or payments) or operate a Platform application or website.
You will not use Facebook if you are prohibited from receiving products,
services, or software originating from the United States.
All applicable laws – reference to Video Privacy Protection Act
(VPPA) / necessity of an opt-in consent
23. Jurisdiction
23
Former TOS held the jurisdiction of the Court of the
California
Cour d’Appel Pau (FRA), March 23, 2012: the
clause of TOS has no effect as it hasn’t been
specifically approved by the user
Necessity of TOS in the language of the user
25. Who is the data controller?
25
The subject which determines the purposes and means of
the processing of personal data
The SNSs?
Users?
“Household exemption”: activities which are carried out
in the course of private or family life (see ECJ, Lindqvist)
The exemption doesn’t cover cases where the data
collected are accessible to an unrestricted number of
people (see ECJ, Satamedia)
See ARTICLE 29 DATA PROTECTION WORKING PARTY,
Opinion 5/2009 on online social networking
26. Third parties’ contents
26
Users should be advised by SNS that pictures or
information about others, should only be uploaded
with their consent (WP Art. 29)
Facebook’s TOS: “If you collect information from
users, you will: obtain their consent, make it clear
you (and not Facebook) are the one collecting their
information, and post a privacy policy explaining
what information you collect and how you will use
it”
27. Effective protection
27
Privacy by design approach
SNS should offer privacy-friendly default settings
(WP Art. 29)
SNSs TOS and privacy policies are generally
extremely long, with several links to other pages
Users should, in general, be allowed to adopt a
pseudonym – Facebook doesn’t accept pseudonyms
(direct marketing)
28. Disclosure of personal data
28
Twitter has been ordered by two French courts to
disclose personal data of users in case of fake
profiles (TGI Paris, April 4, 2013) or antisemitic
statements (24 janvier 2013)
Twitter argued that an international rogatory would
have needed
Courts refused this argument
29. Access to Personal Data
29
District Court Virginia [8 (E.D. Va. Nov. 10, 2011]:
government may obtain Twitter users’ Internet
Protocol addresses without notice to the users
Is it an application of the Fourth Amendment?
30. Ownership of tweets
30
New York City District Attorney's Office requested
Twitter information about Malcolm Harris
He was one of the protesters arrested on the Brooklyn
Bridge in October 2011 during the “Occupy Wall
Street” protest
Twitter, pursuant to its TOS, refused to disclose the
tweets, stating that any user is the owner of his tweets
According to the Court of NYC, which authorized a
subpoena to Twitter, there is no proprietary interest in
the case
32. Main Issues on Defamation
32
Jurisdiction
Involvement of SNS
Disclosure of personal data
33. Defamation /ECJ eDate Advertising
GmbH and Martinez (2011)
33
Art. 3 (2) Council Regulation (EC) 44/2001
“A person domiciled in a Member State may, in an
other Member State, be sued in matters relating to
a tort, delict, or quasi-delict, in the courts for the
place where the harmful event occurred or may
occur”
34. 34
According to the Court a person who has suffered a
defamation “may bring an action in one forum in
respect of all of the damage caused, depending on
the place in which the damage caused in the
European Union by that infringement occurred”
“Given that the impact which material placed online
is liable to have on an individual’s personality rights
might best be assessed by the court of the place
where the alleged victim has his centre of interests”
35. 35
Christopher Boffoli sued Twitter for its refusal to
remove infringing copies of his photos from users'
accounts despite being notified of takedown
requests
Settlement between the counterparts
36. How SNS remove contents
36
YouTube: based on the DMCA’s notification of the
complaining party
Copyright claims are used even for other
infringements
Facebook: makes some investigations before
removing (eg: trademark infringement)
38. Facebook
38
When something gets reported to Facebook, we'll
review it and remove anything that doesn't follow
the Facebook Community Standards
Is it compliant with the ECD’s neutrality principle?
40. Virginia v. Black
40
Virginia's statute against cross burning is
unconstitutional
Cross burning done with an intent to intimidate can
be limited
Would Facebook allow such topics, such as the
predominance of a race on another or racist
statements
42. What does Facebook consider
to be hate speech?
42
Content that attacks people based on their actual or
perceived race, ethnicity, national origin, religion,
sex, gender, sexual orientation, disability or disease
is not allowed. We do, however, allow clear
attempts at humor or satire that might otherwise be
considered a possible threat or attack. This includes
content that many people may find to be in bad
taste (ex: jokes, stand-up comedy, popular song
lyrics, etc.).
43. 43
The need of uncomfortable contents in order to
promote a strong public debate (see Sunstein,
Republic.com)
What’s the real “political” power of SNSs or over-
the-top (OTT) players?
ECJ – Google case and right to be forgotten
44. DO KEEP IN TOUCH!
Via dei Barbieri, 6
00186 Rome
Italy
gmriccio@e-lex.it
www.e-lex.it