Search results for: legal protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3516

Search results for: legal protection

3426 Short-Term Incarceration in South Africa and the Shaping of Legal Consciousness

Authors: Thato Masiangoako

Abstract:

While being home to one of the greatest constitutions in the world, South Africa is also notorious for brutal policing practices, endemic corruption, and an overstrained criminal justice system. This apparent gap between the normative conceptions of the law and the actual experiences of being subjected to the criminal justice system forms the crux of this study. This study explores how community activists, student activists, and migrants in Johannesburg, who rely on the law for protection and effective political expression and participation and understand the law through their experiences of arrest and short-term incarceration. This work introduces the concept of legal consciousness to the South African context, whilst also drawing very heavily from South African literature of the law and criminal justice system. This research is grounded in the experiences of arrest and pre-trial and immigration detention shared by these individuals, which are used to develop a rich account of legal consciousness in South Africa. It also sheds light on some of the ways in which the criminal justice system sustains its legitimacy within a post-apartheid framework despite the gaps between what the law ought to be and it actually is. The study argues that the ways in which these groups make sense of their experiences of the criminal justice system and the law, more broadly, are closely bound to their socio-political identities. This calls the core values of equality and dignity that undergird South Africa’s Constitution into question.

Keywords: criminal justice, immigrant detention, legal consciousness, remand detention

Procedia PDF Downloads 219
3425 Lease Contract: Concept and Types, Comparative Legal Analysis Between Bulgarian Legislation and European Countries

Authors: Veselin Konstantinov Hristov

Abstract:

In recent years, the lease contract has become more and more applicable and occupies a key place in commercial relations and business. In Bulgaria, the legal regulation of the leasing contract is relatively new and imperfectly developed. There are many legal loopholes and it is they that determine the need for a comparative legal analysis. The purpose of the study is to analyze the various European legislations regarding the leasing contract and to find effective solutions for the legal system of Bulgaria. First of all, are examined the concept of the leasing contract, which originated in the United States of America around the 1950s and spread in Europe, and the etymology of the term "leasing". After that, the main types of lease contracts – financial and operational – are examined and analyzed in detail. Their features and characteristics were studied, as well as a comparative analysis was made between them. Next, in the research, a comparative-legal analysis of the leasing contract in different European countries was made in terms of its development and distribution, as well as its legal characteristics. The mechanism of action and functioning of the leasing contract in several European countries is analyzed. Conclusions are made regarding the legal framework under which the lease contract is most effective. Types of leasing contracts specific only to certain European countries and their advantages are examined. In conclusion, recommendations are made to improve the legal framework of the leasing contract in Bulgaria.

Keywords: alternative financing, leasing contract, financing instruments, innovation

Procedia PDF Downloads 51
3424 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 21
3423 Comparative International Law and Feminist Legal Studies, Uniting to Make a Difference in Addressing the Disempowerment of Women

Authors: Isaac Kfir

Abstract:

In thinking about the role of the law and its impact on socially constructed norms and identities, scholars have come to explore a multitude of issues to do with equality, empowerment, and views. The aim of this contribution is threefold. Firstly, offer a descriptive framework of feminist legal studies (FLS) through a review of the evolution of the field in the context of equality, rights, and justice. Secondly, encourage those working on equality, rights, and justice in respect to ‘women’s issues’ to engage in international comparative legal studies. Third, to highlight that those seeking solutions to disempowerment and discrimination must recognize that they need to contend with claims that one is seeking to undermine cultural norms. Therefore, one effective way for feminists to address this situation is by relying more on the international legal mechanism, which reflects basic legal tenets as to the universality of equality, rights, and justice, that can then help shape the domestic setting.

Keywords: international comparative law, feminist legal studies, equality, rights, justice

Procedia PDF Downloads 243
3422 Ratification of the United Nations Convention for the Promotion and Protection of Their Human Rights and the Paradoxes of the Discriminatory Right to Acquire the Status of Persons with Disabilities in Cameroon

Authors: Dakeyi Athanase

Abstract:

The ratification of an international human rights legal instrument provides signatory States with an opportunity to assume a set of obligations and rights for the benefit of their citizens, offering increased possibilities, opportunities, and means to access an improved quality of life – to be, to appear, and to become. Developed nations typically experience cultural, political, social, economic, legal, and regulatory transformations in response to this transition. In a methodologically proactive approach, mechanisms undergo a visible and comprehensible process of qualitative and quantitative change. Conversely, in nations undergoing development, the response to such ratification varies. Some demonstrate positive policy changes, while others remain stagnant or regress. Cameroon falls into the second category, despite efforts, as it legally prohibits 50% of its population with disabilities from acquiring the status of a person with a disability. The overarching goal of this communication is to highlight these deficiencies and their detrimental effects on various aspects of life, fostering awareness among beneficiaries and advocating for more inclusive transformations in the country. Our project employs a popular and participatory methodological approach by involving beneficiaries and their organizations in its preparation. It is also inclusive, representing the diversity of disabilities and engaging natural and legal persons from various backgrounds. Active consultations occur at all levels of the activities. Anticipated outcomes include raising awareness globally among nations, international cooperation organizations, NGOs, and other inclusive development actors. We seek their support for local advocacy efforts to fully implement the United Nations Convention on the Rights of Persons with Disabilities (CRPD). Concurrently, we hope they express solidarity with the victims in Cameroon who have been left behind and recommend legal reforms to align domestic and international legislation with the promotion and protection of disability rights.

Keywords: droit, convention, handicap, discrimination, participation, inclusion

Procedia PDF Downloads 28
3421 Intercultural Competence in Teaching Mediation to Students of Legal English

Authors: Paulina Dwuznik

Abstract:

For students of legal English, the skill of mediation is of special importance as it constitutes part of their everyday work. Developing the skill of mediation requires developing linguistic, communicative, textual, pragmatic, interactive, social, and intercultural competencies. The study conducted at the Open University of the University of Warsaw compared the results of a questionnaire concerning the needs of legal professionals relating to mediation tasks, which they perform at work with the analysis of the content of different legal English handbooks with special stress on the development of intercultural competence necessary in interlinguistic mediation. The study found that legal English handbooks focus mainly on terminology study, but some of them extend students' intercultural competence in a way which may help them to perform tasks of mediating concepts, texts, and communication. The author of the paper will present the correlation between intercultural competence and mediation skill and give some examples of mediation tasks which may be based on comparative intercultural content of some chosen academic legal English handbooks.

Keywords: intercultural competence, legal English, mediation skill, teaching

Procedia PDF Downloads 128
3420 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq

Authors: Rozh Abdulrahman Kareem

Abstract:

The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.

Keywords: law, refugee, protection, Kurdistan

Procedia PDF Downloads 47
3419 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 258
3418 Transgenders Rights in Pakistan: From an Islamic Perspective

Authors: Zaid Haris

Abstract:

Since the beginning of time, transgender people have faced difficult circumstances, particularly in Pakistan. They have experienced discrimination, physical abuse, sexual assault, and murder in their lives. In response to their complaints, the Pakistani Supreme Court established a landmark that enables them to participate in society on an equal base. As a result, transgendered people living all around Pakistan have seen their legal, political, and cultural advocacy blossom since 2009. In order to provide and defend the human rights of Pakistan's transgender persons, this paper aims to identify and analyse the constitutional and legal framework set out there. The Supreme Court's momentous decision sparked legal reform in the nation for these rights, most notably the Transgender Persons (Protection of Rights) Act of 2017, a bill that was filed in Parliament. The implementation of the rights granted to transgender people in Pakistan, whether it relates to education, health, or any other area, requires close inspection. Additionally, for society to be accepting and inclusive, a significant and radical change in behaviour is required. This paper also includes the interviews of a few transgenders from Pakistan.

Keywords: discrimination, islam, pakistan, physical abuse, sexual assault, transgenders

Procedia PDF Downloads 93
3417 Awarding Copyright Protection to Artificial Intelligence Technology for its Original Works: The New Way Forward

Authors: Vibhuti Amarnath Madhu Agrawal

Abstract:

Artificial Intelligence (AI) and Intellectual Property are two emerging concepts that are growing at a fast pace and have the potential of having a huge impact on the economy in the coming times. In simple words, AI is nothing but work done by a machine without any human intervention. It is a coded software embedded in a machine, which over a period of time, develops its own intelligence and begins to take its own decisions and judgments by studying various patterns of how people think, react to situations and perform tasks, among others. Intellectual Property, especially Copyright Law, on the other hand, protects the rights of individuals and Companies in content creation that primarily deals with application of intellect, originality and expression of the same in some tangible form. According to some of the reports shared by the media lately, ChatGPT, an AI powered Chatbot, has been involved in the creation of a wide variety of original content, including but not limited to essays, emails, plays and poetry. Besides, there have been instances wherein AI technology has given creative inputs for background, lights and costumes, among others, for films. Copyright Law offers protection to all of these different kinds of content and much more. Considering the two key parameters of Copyright – application of intellect and originality, the question, therefore, arises that will awarding Copyright protection to a person who has not directly invested his / her intellect in the creation of that content go against the basic spirit of Copyright laws? This study aims to analyze the current scenario and provide answers to the following questions: a. If the content generated by AI technology satisfies the basic criteria of originality and expression in a tangible form, why should such content be denied protection in the name of its creator, i.e., the specific AI tool / technology? B. Considering the increasing role and development of AI technology in our lives, should it be given the status of a ‘Legal Person’ in law? C. If yes, what should be the modalities of awarding protection to works of such Legal Person and management of the same? Considering the current trends and the pace at which AI is advancing, it is not very far when AI will start functioning autonomously in the creation of new works. Current data and opinions on this issue globally reflect that they are divided and lack uniformity. In order to fill in the existing gaps, data obtained from Copyright offices from the top economies of the world have been analyzed. The role and functioning of various Copyright Societies in these countries has been studied in detail. This paper provides a roadmap that can be adopted to satisfy various objectives, constraints and dynamic conditions related AI technology and its protection under Copyright Law.

Keywords: artificial intelligence technology, copyright law, copyright societies, intellectual property

Procedia PDF Downloads 44
3416 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code

Authors: Deborah Garcia-Magna

Abstract:

The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.

Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting

Procedia PDF Downloads 171
3415 Production Structures of Energy Based on Water Force, Its Infrastructure Protection, and Possible Causes of Failure

Authors: Gabriela-Andreea Despescu, Mădălina-Elena Mavrodin, Gheorghe Lăzăroiu, Florin Adrian Grădinaru

Abstract:

The purpose of this paper is to contribute to the enhancement of a hydroelectric plant protection by coordinating protection measures and existing security and introducing new measures under a risk management process. Also, the plan identifies key critical elements of a hydroelectric plant, from its level vulnerabilities and threats it is subjected to in order to achieve the necessary protection measures to reduce the level of risk.

Keywords: critical infrastructure, risk analysis, critical infrastructure protection, vulnerability, risk management, turbine, impact analysis

Procedia PDF Downloads 512
3414 Employee Inventor Compensation: A New Quest for Comparative Law

Authors: Andrea Borroni

Abstract:

The evolution of technology, the global scale of economy, and the new short-term employment contracts make a very peculiar set of disposition of raising interest for the legal interpreter: the employee inventor compensation. Around the globe, this issue is differently regulated according to the legal systems; therefore, it is extremely fragmented. Of course, employers with transnational businesses should face this issue from a comparative perspective. Different legal regimes are available worldwide awarding, as a consequence, diverse compensation to the inventor and according to their own methodology. Given these premises, the recourse to comparative law methodology (legal formants, diachronic and synchronic methodology, common core approach) is the best equipped to face all these different national approaches in order to achieve a tidy systematic. This research, so, elaborates a map of the specific criteria to grant the compensation for the inventor and to show the criteria to calculate them. This finding has been the first step to find out a common core of the discipline given by the common features present in the different legal systems.

Keywords: comparative law, employee invention, intellectual property, legal transplant

Procedia PDF Downloads 312
3413 Professionals’ Learning from Casework in Child Protection: The View from Within

Authors: Jude Harrison

Abstract:

Child protection is a complex and sensitive practice. The core responsibility is the care and protection of children and young people who have been subject to or who are at risk from abuse and neglect. The work involves investigating allegations of harm, preparing for and making representations to the legal system, and case planning and management across a continuum of complicated care interventions. Professionals’ learning for child protection practice is evident in a range of literature investigating multiple learning processes such as university preparation, student placements, professional supervision, training, and other post-qualifying professional development experiences at work. There is, however, very limited research into how caseworkers learn in and through their daily practice. Little is known, therefore, about how learning at work unfolds for caseworkers, the dimensions in which it can be understood or the ways in which it can be best facilitated and supported. Compounding this, much of the current child protection learning literature reflects an orthodox conception of learning as mentalistic and individualised, in which knowledge is typically understood as abstract theory or as technical skill or competency. This presentation outlines key findings from a PhD research study that explored learning at work for statutory child protection caseworkers from an alternative interpretation of learning using a practice theory approach. Practice theory offers an interpretation of learning as performative and grounded in situated experience. The findings of the study show that casework practice is both a mode and site of learning. The study was ethnographic in design based and followed 17 child protection caseworkers via in-depth interviews, observations and participant reflective journaling. Inductive and abductive analysis was used to organise and interpret the data and expand analysis, leading to themes. Key findings show learning to be a sociomaterial property of doing; the social ontological character of learning; and teleoaffectivity as a feature of learning. The findings contribute to theoretical and practical understandings of learning and practice in child protection, child welfare and the professional learning literature more broadly. The findings have potential to contribute to policy directions at state, territory and national levels to enhance child protection practice and systems.

Keywords: adiult learning, workplace learning, child welfare, sociomaterial, practice theory

Procedia PDF Downloads 27
3412 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 232
3411 Revolutionizing Legal Drafting: Leveraging Artificial Intelligence for Efficient Legal Work

Authors: Shreya Poddar

Abstract:

Legal drafting and revising are recognized as highly demanding tasks for legal professionals. This paper introduces an approach to automate and refine these processes through the use of advanced Artificial Intelligence (AI). The method employs Large Language Models (LLMs), with a specific focus on 'Chain of Thoughts' (CoT) and knowledge injection via prompt engineering. This approach differs from conventional methods that depend on comprehensive training or fine-tuning of models with extensive legal knowledge bases, which are often expensive and time-consuming. The proposed method incorporates knowledge injection directly into prompts, thereby enabling the AI to generate more accurate and contextually appropriate legal texts. This approach substantially decreases the necessity for thorough model training while preserving high accuracy and relevance in drafting. Additionally, the concept of guardrails is introduced. These are predefined parameters or rules established within the AI system to ensure that the generated content adheres to legal standards and ethical guidelines. The practical implications of this method for legal work are considerable. It has the potential to markedly lessen the time lawyers allocate to document drafting and revision, freeing them to concentrate on more intricate and strategic facets of legal work. Furthermore, this method makes high-quality legal drafting more accessible, possibly reducing costs and expanding the availability of legal services. This paper will elucidate the methodology, providing specific examples and case studies to demonstrate the effectiveness of 'Chain of Thoughts' and knowledge injection in legal drafting. The potential challenges and limitations of this approach will also be discussed, along with future prospects and enhancements that could further advance legal work. The impact of this research on the legal industry is substantial. The adoption of AI-driven methods by legal professionals can lead to enhanced efficiency, precision, and consistency in legal drafting, thereby altering the landscape of legal work. This research adds to the expanding field of AI in law, introducing a method that could significantly alter the nature of legal drafting and practice.

Keywords: AI-driven legal drafting, legal automation, futureoflegalwork, largelanguagemodels

Procedia PDF Downloads 31
3410 Does Citizens’ Involvement Always Improve Outcomes: Procedures, Incentives and Comparative Advantages of Public and Private Law Enforcement

Authors: Avdasheva Svetlanaa, Kryuchkova Polinab

Abstract:

Comparative social efficiency of private and public enforcement of law is debated. This question is not of academic interest only, it is also important for the development of the legal system and regulations. Generally, involvement of ‘common citizens’ in public law enforcement is considered to be beneficial, while involvement of interest groups representatives is not. Institutional economics as well as law and economics consider the difference between public and private enforcement to be rather mechanical. Actions of bureaucrats in government agencies are assumed to be driven by the incentives linked to social welfare (or other indicator of public interest) and their own benefits. In contrast, actions of participants in private enforcement are driven by their private benefits. However administrative law enforcement may be designed in such a way that it would become driven mainly by individual incentives of alleged victims. We refer to this system as reactive public enforcement. Citizens may prefer using reactive public enforcement even if private enforcement is available. However replacement of public enforcement by reactive version of public enforcement negatively affects deterrence and reduces social welfare. We illustrate the problem of private vs pure public and private vs reactive public enforcement models with the examples of three legislation subsystems in Russia – labor law, consumer protection law and competition law. While development of private enforcement instead of public (especially in reactive public model) is desirable, replacement of both public and private enforcement by reactive model is definitely not.

Keywords: public enforcement, private complaints, legal errors, competition protection, labor law, competition law, russia

Procedia PDF Downloads 453
3409 Human-Automation Interaction in Law: Mapping Legal Decisions and Judgments, Cognitive Processes, and Automation Levels

Authors: Dovile Petkeviciute-Barysiene

Abstract:

Legal technologies not only create new ways for accessing and providing legal services but also transform the role of legal practitioners. Both lawyers and users of legal services expect automated solutions to outperform people with objectivity and impartiality. Although fairness of the automated decisions is crucial, research on assessing various characteristics of automated processes related to the perceived fairness has only begun. One of the major obstacles to this research is the lack of comprehensive understanding of what legal actions are automated and could be meaningfully automated, and to what extent. Neither public nor legal practitioners oftentimes cannot envision technological input due to the lack of general without illustrative examples. The aim of this study is to map decision making stages and automation levels which are and/or could be achieved in legal actions related to pre-trial and trial processes. Major legal decisions and judgments are identified during the consultations with legal practitioners. The dual-process model of information processing is used to describe cognitive processes taking place while making legal decisions and judgments during pre-trial and trial action. Some of the existing legal technologies are incorporated into the analysis as well. Several published automation level taxonomies are considered because none of them fit well into the legal context, as they were all created for avionics, teleoperation, unmanned aerial vehicles, etc. From the information processing perspective, analysis of the legal decisions and judgments expose situations that are most sensitive to cognitive bias, among others, also help to identify areas that would benefit from the automation the most. Automation level analysis, in turn, provides a systematic approach to interaction and cooperation between humans and algorithms. Moreover, an integrated map of legal decisions and judgments, information processing characteristics, and automation levels all together provide some groundwork for the research of legal technology perceived fairness and acceptance. Acknowledgment: This project has received funding from European Social Fund (project No 09.3.3-LMT-K-712-19-0116) under grant agreement with the Research Council of Lithuania (LMTLT).

Keywords: automation levels, information processing, legal judgment and decision making, legal technology

Procedia PDF Downloads 104
3408 Comparison of Buyback Contracts and Concession Regimes in the Regime of the Common Law System and the Islamic Legal Regime

Authors: Javid Zarei

Abstract:

International buyback contracts are a type of contract service. These kinds of contracts are the most important instrument for attracting foreign investors in accordance with Iran's laws. These contracts have been the basis of commercial and economic relations between Iran and foreign companies for about 30 years. The legal structure of this type of contract has gradually evolved, so today, an advanced generation of it under the title of Iran Petroleum Contract is being used in the industry of Iran. This article has analytically examined the issue of Iran's commercial contracts in the oil industry and contracting services and allocated sections to examine the strengths and weaknesses of these oil contracts. Also, this research is an attempt to examine and compare the Concession regime with the Buyback contracts, each of which is derived from the common law legal system and the Islamic legal system, respectively.

Keywords: buyback contracts, concession regime, ownership, common law legal system, Islamic legal system of Iran

Procedia PDF Downloads 52
3407 Designing a Legal Framework for Social Innovation

Authors: Prapin Nuchpiam

Abstract:

The importance of social innovation has become increasingly significant as the process of developing effective solutions to social problems and being a force of change for people’s better quality of life. In order to promote social innovation, active collaboration between government, business organizations, and the civil society sector is needed. A proper legal framework also plays an important role in building the social innovation ecosystem. Currently, there is no specific law designed for social innovation or a so-called “social innovation law”. One of the legal frameworks for social innovation is the development of hybrid legal forms for social enterprises such as the UK’s Community Interest Company (CIC), the US’s Low-Profit Limited Liability Company (L3C) and the US’s Benefit Corporation (B-Corp), among others. This is because social enterprise is recognized as an organizational form of social innovation with its aim for social benefit goals and the achievement of financial sustainability. Nonetheless, there has been a debate over the differences and similarities between social innovation and social enterprise. Thus, social enterprise law might not fit well with social innovation, resulting in a search for a legal framework specially designed for social innovation. This paper aims to study the interrelationship between social innovation, social enterprise, and the role of law to see whether we need a specific law for social innovation. If so, what should such a legal framework look like? The paper will provide a critical analysis of innovative legal forms for social enterprise as a type of social innovation law. A proper legal framework for social innovation could help promote the sector, which could result in finding new solutions to social problems. It will also bring about a greater common understanding of the exciting development of legal scholarship in this way, which will, in turn, serve as a productive basis or direction for further research on this increasingly important topic.

Keywords: social innovation, social enterprise, legal framework, regulation

Procedia PDF Downloads 52
3406 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 26
3405 Legal Regulation and Critical Analysis for an Effectively Treatment of Pharmaceutical Waste

Authors: Merita Dauti, Edita Alili-Idrizi, Sihana Ahmeti –Lika, Ledjan Malaj

Abstract:

The extermination and proper disposal of pharmaceutical wastes from expired and unused medications remains a disputable issue due to their specific nature and characteristics. Even though the hazards from these wastes are already well known in terms of environment and human health, people still treat them as usual wastes. At a national level, in many countries the management of pharmaceutical and medical wastes has been one of the main objectives in order to protect people’s health and the environment. Even though many legal regulations exist in this respect, there has not been a single law that would clearly explain the procedures of returning medicines, ways of selection, treatment and extermination of pharmaceutical wastes. This paper aims at analyzing the practices of pharmaceutical waste management and treatment in some European countries as well as a review of the legislation and official guidelines in managing these kinds of wastes and protecting the environment and human health. A suitable treatment and management of expired medications and other similar wastes would be in the interest of public health in the first place, as well as in the interest of healthcare institutions and other bodies engaged in environment protection.

Keywords: pharmaceutical waste, legal regulation, proper disposal, environment pollution

Procedia PDF Downloads 301
3404 SCR-Based Advanced ESD Protection Device for Low Voltage Application

Authors: Bo Bae Song, Byung Seok Lee, Hyun young Kim, Chung Kwang Lee, Yong Seo Koo

Abstract:

This paper proposed a silicon controller rectifier (SCR) based ESD protection device to protect low voltage ESD for integrated circuit. The proposed ESD protection device has low trigger voltage and high holding voltage compared with conventional SCR-based ESD protection devices. The proposed ESD protection circuit is verified and compared by TCAD simulation. This paper verified effective low voltage ESD characteristics with low trigger voltage of 5.79V and high holding voltage of 3.5V through optimization depending on design variables (D1, D2, D3, and D4).

Keywords: ESD, SCR, holding voltage, latch-up

Procedia PDF Downloads 538
3403 The Right to Data Portability and Its Influence on the Development of Digital Services

Authors: Roman Bieda

Abstract:

The General Data Protection Regulation (GDPR) will come into force on 25 May 2018 which will create a new legal framework for the protection of personal data in the European Union. Article 20 of GDPR introduces a right to data portability. This right allows for data subjects to receive the personal data which they have provided to a data controller, in a structured, commonly used and machine-readable format, and to transmit this data to another data controller. The right to data portability, by facilitating transferring personal data between IT environments (e.g.: applications), will also facilitate changing the provider of services (e.g. changing a bank or a cloud computing service provider). Therefore, it will contribute to the development of competition and the digital market. The aim of this paper is to discuss the right to data portability and its influence on the development of new digital services.

Keywords: data portability, digital market, GDPR, personal data

Procedia PDF Downloads 442
3402 Protection of the Rights of Outsourced Employees and the Effect on Job Performance in Nigerian Banking Sector

Authors: Abiodun O. Ibude

Abstract:

Several organizations have devised the strategy of engaging the services of staff not directly employed by them in their production and service delivery. Some organizations also engage on contracting another organization to carry out a part of service or production process on their behalf. Outsourcing is becoming an important alternative employment option for most organizations. This paper attempts an exposition on the rights of workers within the more specific context of outsourcing as a human resource management phenomenon. Outsourced employees and their rights are treated conceptually and analytically in a generic sense as a mere subset of the larger whole, that is, labor. Outsourced employees derive their rights, like all workers, from their job context as well as the legal environment (municipal and global) in which they operate. The dynamics of globalization and the implications of this development for labor practices receive considerable attention in this exposition. In this regard, a guarded proposition is made, to examine the practice and effect of engaging outsourcing as an economic decision designed primarily to cut down on operational costs rather than a Human Resources Management decision to improve worker welfare. The population of the study was selected from purposive and simple random sampling techniques. Data obtained were analyzed through a simple percentage, Pearson product-moment correlation, and cross-tabulation. From the research conducted, it was discovered that, although outsourcing possesses opportunities for organizations, there are drawbacks arising from its implementation of job securities. It was also discovered that some employees are being exploited through this strategy. This gives rise to lower motivation and thereby decline in performance. In conclusion, there is need for examination of Human Resource Managers’ strategies that can serve as management policy tools for the protection of the rights of outsourced employees.

Keywords: legal environment, operational cost, outsourcing, protection

Procedia PDF Downloads 108
3401 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 67
3400 Negative Sequence-Based Protection Techniques for Microgrid Connected Power Systems

Authors: Isabelle Snyder, Travis Smith

Abstract:

Microgrid protection presents challenges to conventional protection techniques due to the low-induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected modes. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid-connected or microgrid-connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are labeled as follows: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR).

Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection

Procedia PDF Downloads 39
3399 Legal Feminism, Modernity and Their Impact on Some African Countries

Authors: Umulisa Linda, Andy Cons Matata

Abstract:

The origin of legal feminism can be attributed to an attempt to provide a safe space for women such as voting, parental, and inheritance rights, among others. It was also a rebellion against male supremacy. However, with the development of technology and especially in the era of the internet, it appears that both legal feminism and the modernism are losing their luster. While these movements had their origin either in the United States of America or western Europe, their impacts have been felt as far as Africa, Asia, and Latin America. In Africa, different countries have different levels of penetration of these movements. This study, therefore, had its focus on how legal feminism and modernism have influenced legal developments in Kenya and Rwanda. The study adopted a qualitative approach with the respondents being asked about their feelings and perceptions on how the two movements had affected legal developments in their countries. In order to gauge the opinion of different categories of people such as the youth, middle-aged and the elderly people as well as being gender-sensitive, the study adopted a purpose method of sampling. The questionnaires and the focus group discussions were employed as the main tools for data gathering. From the questionnaires, the focus group discussions, and the data analysis that followed, the study concluded that both legal feminism and modernity had penetrated the legal systems of both Kenya and Rwanda so deeply. The study further found that the proponents of the two movements were mostly urban based and educated women. The men were generally opposed to the movements.

Keywords: legal development, legal feminsim, modernism, voting, parental and inheritance rights

Procedia PDF Downloads 112
3398 Tussle of Intellectual Property Rights and Privacy Laws with Reference to Artificial Intelligence

Authors: Lipsa Dash, Gyanendra Sahu

Abstract:

Intelligence is the cornerstone of humans, and now they have created a counterpart of themselves artificially. Our understanding of the word intelligence is a very perspective based and mostly superior understanding of what we read, write, perceive and understand the adversities around better. A wide range of industrial sectors have also started involving the technology to perceive, reason and act. Similarly, intellectual property is the product of human intelligence and creativity. The World Intellectual Property Organisation is currently working on technology trends across the globe, and AI tops the list in the digital frontier that will have a profound impact on the world, transforming the way we live and work. Coming to Intellectual Property, patents and creations of the AI’s itself have constantly been in question. This paper explores whether AI’s can fit in the flexibilities of Trade Related Intellectual Property Studies and gaps in the existing IP laws or rthere is a need of amendment to include them in the ambit. The researcher also explores the right of AI’s who create things out of their intelligence and whether they could qualify to be legal persons making the other laws applicable on them. Differentiation between AI creations and human creations are explored in the paper, and the need of amendments to determine authorship, ownership, inventorship, protection, and identification of beneficiary for remuneration or even for determining liability. The humans and humanoids are all indulged in matters related to Privacy, and that attracts another constitutional legal issue to be addressed. The authors will be focusing on the legal conundrums of AI, transhumanism, and the Internet of things.

Keywords: artificial intelligence, humanoids, healthcare, privacy, legal conundrums, transhumanism

Procedia PDF Downloads 93
3397 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 88