Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García Nov 2010

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García

Bruno L. Costantini García

De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …


Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman Sep 2010

Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman

Julio Rojas-Mora

The evolution of the Internet has come to a point where almost at the same time, governments all around the world feel the need for legislation to regulate the use of the Internet. In preparing the legislation, consultations were called by various governments or by the corresponding regulation bodies. We describe in this paper the various consultations as well as the background related to the Net Neutrality question in each case. Rather than describing the answers to each consultation, which are available and which have already been analyzed, we focus on comparing the consultations and the statistical figures related to …


A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer Sep 2010

A Fair Use Project For Australia: Copyright Law And Creative Freedom, Matthew Rimmer

Matthew Rimmer

This essay provides a critical assessment of the Fair Use Project based at the Stanford Center for Internet and Society. In evaluating the efficacy of the Fair Use Project, it is worthwhile considering the litigation that the group has been involved in, and evaluating its performance. Part 1 outlines the history of the Stanford Center for Internet and Society, and the aims and objectives of the Fair Use Project. Part 2 considers the litigation in Shloss v. Sweeney over a biography concerning Lucia Joyce, the daughter of the avant-garde literary great, James Joyce. Part 3 examines the dispute over the …


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García Jul 2010

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


Data Protection: The Challenges Facing Social Networking, Rebecca Wong Dr Jul 2010

Data Protection: The Challenges Facing Social Networking, Rebecca Wong Dr

Dr Rebecca Wong

The popularity of social networking sites has increased dramatically over the past decade. A recent report indicated that thirty-eight percent of online users have a social networking profile. Many of these social networking site users (SNS users) post or provide personal information over the internet every day. According to the latest OfCom study, the average adult SNS user has profiles on 1.6 sites and most check their profiles at least once every other day. However, the recent rise in social networking activity has opened the door to the misuse and abuse of personal information through identity theft, cyber stalking, and …


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García Jun 2010

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas May 2010

New Rules On Consumer Protection Against Personal Data Breaches And Spam, Panagiotis Kitsos, Paraskevi Pappas

Panagiotis Kitsos

On 25 November 2009, the European Parliament and Council adopted a new legislation to revise the regulatory framework for the electronic communications sector. This new “package” of Directives includes Directive 2009/136/EC, which amends earlier Directive 2002/58/EC in the fields of 1. mandatory notification of personal data security breaches 2. consent requirements for cookies and 3. anti-spamming measures by ISPs. The scope of the Directive is to enhance the protection of consumers privacy and personal data in the electronic communications sector, through strengthened security-related provisions and improved enforcement mechanisms by the NRAs. In particular Τhe provisions of the new directive require …


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez Apr 2010

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Derecho De La Seguridad Social En México, Bruno L. Costantini García Feb 2010

Derecho De La Seguridad Social En México, Bruno L. Costantini García

Bruno L. Costantini García

Breve presentación del Derecho de la Segurida Social en México.

¿Qué es?

¿Cómo funciona?

¿Su aplicación?


False Imprisonment As A Tort In India, Hari Priya Jan 2010

False Imprisonment As A Tort In India, Hari Priya

Hari Priya

The tort of false imprisonment is one of the most severe forms of human rights violation, and this paper aims to define and to understand the concept of false imprisonment as a tort in India. It also seeks to know about the evolution of the notion of false imprisonment as a tort, with reference to Indian and foreign cases, and understand who and when can one be held liable for the tort of false imprisonment. It further deals with the remedies available for the said tort.


The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer Jan 2010

The Copenhagen Accord And Climate Innovation Centres, Matthew Rimmer

Matthew Rimmer

After much hue and cry, the Copenhagen negotiations over intellectual property and climate change ended in a stalemate and an impasse. There was a gulf between the views of intellectual property maximalists who demanded strong protection of intellectual property rights in respect of clean technologies; and nation states and civil society groups calling for special measures to facilitate technology transfer. As a result, the Copenhagen Accord did contain any text on intellectual property and climate change. Nonetheless, the Copenhagen Accord does, though, contain an important compromise. The text provides for a technology mechanism, which envisages a network of Climate Innovation …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


Fixing Ram Copies, Aaron K. Perzanowski Jan 2010

Fixing Ram Copies, Aaron K. Perzanowski

Aaron K. Perzanowski

Scholars, litigants, and courts have debated the status of so-called “RAM copies” - instantiations of copyrighted works in the random access memory of computing devices - for decades. The Second Circuit’s decision in Cartoon Network v. CSC Holdings has recently reignited the controversy over these putative copies. There the court held that CSC did not create copies within the meaning of the Copyright Act when it buffered fleeting segments of television programs. In many respects, the Second Circuit’s holding is a straightforward application of the Act’s nested definitions of “copies” and “fixed.” But because the court declined to apply the …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …


An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson Jan 2010

An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson

Gregory M Dickinson

Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.

This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …


Tribal Land Laws In Andhra Pradesh, Hari Priya Jan 2010

Tribal Land Laws In Andhra Pradesh, Hari Priya

Hari Priya

No abstract provided.


Section 4 Of The Hindu Succession Act Of 1956, Hari Priya Jan 2010

Section 4 Of The Hindu Succession Act Of 1956, Hari Priya

Hari Priya

A brief write up in the form of a comprehensive article aiming to critically evaluate the Section 4 of the Hindu Succession Act of 1956. The law, as it stands amended, has not only brought about changes in the succession laws of Hindus, but has also paved the way for some positive modifications in the law of partition, alienation of property, inheritance and adoption, and the paper is an effort to evaluate this provision of the law.