Intrusion Software Tools and Export Control Introduction. Export Control in Context

Size: px
Start display at page:

Download "Intrusion Software Tools and Export Control Introduction. Export Control in Context"

Transcription

1 Intrusion Software Tools and Export Control Introduction The purpose of this Note is to explain the controls on export of intrusion software tools that were agreed by the Wassenaar Arrangement in December 2013 and implemented across the EU in December It does this by first describing in general terms the purpose and operation of export controls, and how they are agreed and implemented. It then describes the different types of export licence and how to apply. The note then looks in detail at the specific control text and gives some practical examples of what might or might not be controlled. Where relevant there are links to sources of more detailed information. Controls on intrusion software tools were introduced because of real concerns about the use of such tools to breach human rights and the risks that they pose to national security. They do not seek to prevent exports of software or hardware for commercial applications or for legitimate law enforcement purposes; or to inhibit or restrict research into, or the sharing of information about, software vulnerabilities, bugs or malware. The application of these controls means that a licence is required to export such tools from the EU; it is not an outright prohibition on export. The controls also do not restrict the placing of information in the public domain or the subsequent transfer of information already in the public domain. Export Control in Context There are several reasons why governments aim to control the export of goods, software and technology depending on the nature and destinations of the proposed export. The control of strategic exports is the specific remit of the Export Control Organisation (ECO) within the Department for Business, Innovation and Skills. Exports are controlled for various reasons, including: Concerns about internal repression or other human rights violations Concerns about the development of weapons of mass destruction Foreign policy and international treaty commitments including as a result of the imposition of EU or United Nations trade sanctions or arms embargoes National and collective security of the UK and its allies Regional security and conflict Export controls are not unique to the UK. Most countries have some form of an export control policy, legislation and enforcement mechanisms. The UK has a welldeveloped and coherent export control system which is largely based on international agreements and implemented through EU and national legislation. The controls apply primarily to items specified in control lists, notably the UK Military List and the EU Dual-Use 1 List. In turn these lists are based on agreements 1 Dual-use items are goods, software, technology, documents and diagrams which can be used for both civil and military applications. They can range from raw materials to components and complete

2 reached in the four international export control regimes 2. The controls on the items that are the subject of this note derive from the Wassenaar Arrangement. An introductory guide to export controls can be found here: Wassenaar Arrangement Overview The Wassenaar Arrangement (WA) was formed in 1996 ( It aims to contribute to peace and security by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilising accumulations and to prevent the acquisition of such items by terrorists. It is not directed against any state or group of states, nor does it seek to interfere with the rights of states to acquire legitimate means to defend themselves, as recognised in Article 51 of the Charter of the United Nations, nor to impede bona fide civil transactions. The WA s 41 Participating States 3 convene to agree lists of items that should be subject to export control and to exchange information and share best practice in implementing controls on those items. The WA itself is not legally binding and it is for each Participating State to decide whether and under what conditions it authorises its own transfers of such items, in accordance with its national policies and with its own judgement as to the potential contribution to military capabilities and the impact on security and stability. UK Implementation of Wassenaar Arrangement Dual-Use Export Controls The UK implements the military goods controls agreed under the WA through the Export Control Order The dual-use controls are implemented through European Union legislation and can be found within Council Regulation (EC) 428/2009. The Regulation applies directly in each Member State of the EU. Annex I of the Regulation contains the EU Dual-Use List, i.e. the list of dual-use items subject to control, which combines the separate lists agreed by each of the four export control regimes. This Annex is regularly updated although there is usually a delay of around a year before changes to the regime lists are incorporated into the EU list. The most recent update was made on 31 December ; this update introduced the controls related to intrusion software tools that were agreed by the WA in December The current versions of the UK Military and EU Dual-Use Lists can be found here: such as aluminium alloys, bearings, or lasers. They could also be items used in the production or development of military goods, such as machine tools, chemical manufacturing equipment and computers. 2 The regimes are: The Nuclear Suppliers Group (NSG); Missile Technology Control Regime (MTCR); Australia Group (AG); and Wassenaar Arrangement (WA). 3 Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Croatia, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Mexico, the Netherlands, New Zealand, Norway, Poland, Portugal, the Republic of Korea, Romania, the Russian Federation, Slovenia, Slovakia, South Africa, Spain, Sweden, Switzerland, Turkey, Ukraine, the United Kingdom, and the United States. 4 The update was made by Commission Delegated Regulation (EU) 1382/2014.

3 control-lists-the-consolidated-list-of-strategic-military-and-dual-use-items-thatrequire-export-authorisation The key features of the export control regime set out in the Regulation are: A common list of items subject to control by all EU Member States, but with responsibility for licensing and enforcement remaining with the Member States national authorities No controls on movements between EU Member States of the vast majority of dual-use items A simplified procedure through an EU General Export Authorisations (EUGEA) for exports from the EU to Australia, Canada, Japan, New Zealand, Norway, Switzerland and the USA Detailed information about the EU Regulation and the Dual-Use List is available here: The ECO is the licensing authority within the UK. All licences are assessed against the Consolidated EU and National Export Licensing Criteria located here: A licence would not be granted if to do so would be inconsistent with any of the Criteria. In making licensing decisions the ECO receives expert advice from the Foreign and Commonwealth Office, the Ministry of Defence and, for applications involving information security, CESG (part of GCHQ). Her Majesty s Revenue and Customs (HMRC) working with the Border Force are responsible for enforcing the controls. Unlicensed export of controlled items may be a criminal offence with significant financial penalties and even prison for the most serious offences. Licence applications are submitted online through the SPIRE export licensing system ( There are 3 types of export licence: Standard Individual Export Licence (SIEL). This authorises the export of a specified quantity of specified items to a single named recipient. The licence allows multiple shipments up to the specified quantity and is usually valid for 2 years. Open Individual Export Licence (OIEL). This authorises the export of an unlimited quantity of specified items to recipients in multiple named destinations. It is usually valid for 5 years. An OIEL is generally granted to exporters who can provide a suitable business justification (such as a longterm supply contract) and who have a demonstrated track record of compliance with export controls. Open General Export Licences (OGELs), including the EU General Export Authorisation (EUGEA) referred to above. These are pre-published licences which allow the export of specified items to specified destinations, subject to the terms and conditions stated within the licence. They are available for use by any exporter who registers to do so on SPIRE and can comply with their conditions of use.

4 Detailed guidance on the different types of licence, how to apply, and what supporting documentation is required, is available here: The ECO has a target to process at least 70% of all SIEL applications within 20 working days, and to process 99% within 60 working days. In 2014 the ECO granted 13,341 SIELs for exports valued at around 12 billion, and refused 226 applications. The destinations with the highest number of refusals were Russia, Pakistan, China and Iran. Exceptions Before looking at the specific control text relating to intrusion software tools it is important to be aware of and understand some exemptions that apply in general, in order to understand the true impact of the controls. Where items meet these exemptions there is no need to consider control text. These exemptions are contained in the General Software Note (GSN), and General Technology Note (GTN). Throughout the control text, some items appear in double quotes. These terms have a defined meaning throughout the control text. A few terms in single quotes have a local definition in the current context. Other terms should be read according to their English dictionary definition. For a discussion of the General Technology Note in the context of the control entries for "intrusion software" tools, see later in this guidance. Here we look at the General Software Note (GSN); the full text is quoted below: Categories 0 to 9 5 of this list do not control "software" which is any of the following: a. Generally available to the public by being: 1. Sold from stock at retail selling points, without restriction, by means of: a. Over-the-counter transactions; b. Mail order transactions; c. Electronic transactions; or d. Telephone call transactions; and 2. Designed for installation by the user without further substantial support by the supplier; N.B Entry a. of the General Software Note does not release "software" specified in Category 5 - Part 2 ("Information Security"). b. "In the public domain"; or c. The minimum necessary "object code" for the installation, operation, maintenance (checking) or repair of those items whose export has been authorised. N.B Entry c of the General Software Note does not release "software" specified in Category 5 - Part 2 ("Information Security"). 5 Annex I to the EU Dual Use Regulation is divided into ten separate Categories 0 to 9. The Intrusion Software controls are located in Category 4 Computers. The other category of interest is Category 5 Part 2 Information Security. Each Category is subdivided into 5 sub-categories A to E; subcategory A contains entries for Systems, Equipment & Components, D covers Software and E covers Technology.

5 Entries a. and b. are the most relevant here. Entry a. says that software which is generally available to the public, according to the listed criteria, can only be controlled by Category 5 Part 2, which deals with "Information Security", including cryptography. Entry b. of the General Software Note further exempts anything that is "in the public domain" from all controls, where that term is defined as follows: "In the public domain" (GTN NTN GSN), as it applies herein, means "technology" or "software" which has been made available without restrictions upon its further dissemination (copyright restrictions do not remove "technology" or "software" from being "in the public domain"). Hence for large classes of open source and commercial off the shelf software there is no additional licensing requirement added by the controls related to "intrusion software" tools in Category 4. It is also important to recognise here that export controls do not put any restrictions on the placing of information into the public domain. Of course other restrictions may exist for example, confidentiality clauses in contracts or non-disclosure agreements but these are not export control-related. The Control Entries for "Intrusion Software" Tools The controls themselves are several short paragraphs, using a common definition: 4A005. Systems, equipment, and components therefor, specially designed or modified for the generation, operation or delivery of, or communication with, "intrusion software". 4D004. "Software" specially designed or modified for the generation, operation or delivery of, or communication with, "intrusion software". 4E001a. 4E001c. "Technology" according to the General Technology Note, for the "development", "production" or "use" of equipment or "software" specified in 4A or 4D "Technology" for the "development" of "intrusion software". The first important point to note is that "intrusion software" itself is not controlled. Rather, related items specially designed to interact with intrusion software in the ways specified are controlled; and "technology" for the "development" / "production" / "use" of those items, or for the "development" of intrusion software itself, is controlled. In practical terms the above means the equipment and software control entries 4A005 and 4D004 apply to items such as malware command and control servers, malware build tools, and software to use or serve exploits, rather than the actual malware binaries or exploits. As we will see, the technology portions of the controls are narrowed by the General Technology Note and only apply to "technology" that is peculiarly responsible for meeting the control characteristics.

6 The definition of "intrusion software" is as follows: "Intrusion software" (4) means "Software" specially designed or modified to avoid detection by 'monitoring tools', or to defeat 'protective countermeasures', of a computer or network-capable device, and performing any of the following: a. The extraction of data or information, from a computer or network-capable device, or the modification of system or user data; or b. The modification of the standard execution path of a program or process in order to allow the execution of externally provided instructions. Notes: 1. "Intrusion software" does not include any of the following: a. Hypervisors, debuggers or Software Reverse Engineering (SRE) tools; b. Digital Rights Management (DRM) "software"; or c. "Software" designed to be installed by manufacturers, administrators or users, for the purposes of asset tracking or recovery. 2. Network-capable devices include mobile devices and smart meters. Technical Notes: 1. 'Monitoring tools': "software" or hardware devices, that monitor system behaviours or processes running on a device. This includes antivirus (AV) products, end point security products, Personal Security Products (PSP), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) or firewalls. 2. 'Protective countermeasures': techniques designed to ensure the safe execution of code, such as Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) or sandboxing. When reading the definition first look at the initial paragraph : "Software" specially designed or modified to avoid detection by 'monitoring tools', or to defeat 'protective countermeasures', of a computer or network-capable device, and performing any of the following: Here it is clear that "intrusion software" must be specially designed / modified either to avoid detection by 'monitoring tools' or to defeat 'protective countermeasures'. So if software is neither trying to avoid 'monitoring tools' nor defeat 'protective countermeasures' then it cannot be "intrusion software". Merely avoiding detection is not the same as being specially designed to avoid detection. It is quite possible for a software program to be unnoticed or unnoticeable by a given monitoring tool without that having been a design criterion. Factors such as claiming to avoid monitoring tools in marketing material or being updated in the light of monitoring tool improvements would of course point to specific design. If software meets the conditions in either part of the initial paragraph that is not enough for it to be classed as "intrusion software": it further has to be able to steal / modify data, or to modify the standard execution path to run externally provided instructions.

7 Many tools are able to extract data, but in order for such a tool to be "intrusion software" it further has to be designed to avoid 'monitoring tools' or techniques designed to protect the safe execution of code. Even modifying the standard execution path of a program is not enough on its own to meet the definition of "intrusion software" not only does the modification have to allow externally provided instructions, but it also has to be designed to avoid 'monitoring tools' or defeat 'protective countermeasures'. Thus for example an exploit for program that runs without 'protective countermeasures' will not be intrusion software by virtue of avoiding 'protective countermeasures', so as long as such an exploit is not specially designed / modified to avoid 'monitoring tools' it will not meet the initial paragraph and hence cannot be "intrusion software". "Technology" for the "development" of "intrusion software" is also controlled. The definitions are: "Technology" (GTN NTN All) means specific information necessary for the "development", "production" or "use" of goods. This information takes the form of 'technical data' or 'technical assistance'. N.B.:1: 'Technical assistance' may take forms such as instruction, skills, training, working knowledge, consulting services and may involve transfer of 'technical data'. N.B.: 2: 'Technical data' may take forms such as blueprints, plans, diagrams, models, formulae, tables, engineering designs and specifications, manuals and instructions written or recorded on other media or devices such as disk, tape, read-only memories. "Development" (GTN NTN All) is related to all phases prior to serial production, such as: design, design research, design analyses, design concepts, assembly and testing of prototypes, pilot production schemes, design data, process of transforming design data into a product, configuration design, integration design, layouts. It is important to be aware of the General Technology Note as it narrows the scope of many of the "technology" controls. GENERAL TECHNOLOGY NOTE (GTN) (To be read in conjunction with section E of Categories 1 to 9.) The export of "technology" which is "required" for the "development", "production" or "use" of goods controlled in Categories 1 to 9, is controlled according to the provisions of Categories 1 to 9. "Technology" "required" for the "development", "production" or "use" of goods under control remains under control even when applicable to non-controlled goods. Controls do not apply to that "technology" which is the minimum necessary for the installation, operation, maintenance (checking) or repair of those goods which are not controlled or whose export has been authorised. N.B.: This does not release such "technology" specified in 1E002.e., 1E002.f., 8E002.a. and 8E002.b. Controls on "technology" transfer do not apply to information "in the public domain", to "basic scientific research" or to the minimum necessary information for patent applications.

8 Hence the "technology" controls related to "intrusion software" apply only to "technology" peculiarly necessary to meet the controlled performance levels, that is, the appropriate combination of avoidance of 'monitoring tools', defeating of 'protective countermeasures', extraction/modification of data, and the modification of the execution path to accept external instructions. "Intrusion Software" related controls examples The following examples of classes of products are written for guidance only as it is not possible to consider the specifics of individual cases. Exporters having doubts about the licensability of their goods, software or technology are encouraged to submit licence applications, or contact the ECO via You are also recommended to seek your own legal advice where necessary. These examples only consider "intrusion software" related controls. Exporters should be aware that other controls, including Category 5 Part 2 controls on cryptography, may apply to instances of the types of products considered here and certain exemptions, for example the General Software Note, apply differently to Category 5 Part 2. Commercial Malware Toolkit for Law Enforcement Consider a piece of custom malware designed to assist investigations by extracting data from a suspect s computer, undetected by any anti-virus. The toolkit for such malware would likely meet the control text of being specially designed for the generation of "intrusion software" and be controlled. Associated manuals and any training course materials would also be potentially subject to a technology control. Open Source Penetration Testing Software This would be "in the public domain" and hence would not be controlled as an "intrusion software" tool due to the General Software Note Entry 2. Commercial Off-The-Shelf Penetration Testing Software If covered by Entry 1 of the General Software Note, as would be expected for commercial off-the-shelf software, then it would not be controlled as an "intrusion software" tool. If sales restrictions or support requirements mean Entry 1 does not apply and if as is likely it interacts with "intrusion software" then it would likely attract control. There are many requirements for enterprise-class penetration testing software within the information assurance industry where the sales and support do not meet Entry 1 of the General Software Note, and we would therefore encourage prospective exporters to submit licence requests. Bug Reports to Vendors A bug report written in terms of what a bug is rather than how to write an exploit for it should not meet the "technology" control as describing a bug should not require explicitly describing how to provide external instructions, or how to defeat 'protective countermeasures' or how to avoid detection by 'monitoring tools'.

9 A minimal proof of concept (PoC), regardless of capabilities, will not be controlled as "software" even if it meets the definition of "intrusion software", as "intrusion software" itself is not controlled. A bug report that describes a defeat for 'protective countermeasures' and a modification to the standard execution path of a program would be controlled as "technology" if it allowed the execution of external instructions. If instead the only outcome described was to launch a calculator process then this is unlikely to be controlled. Bug Bounties Bug bounties are paid by software vendors or 3 rd parties for the private reporting of verified software bugs. The conditions for payment vary between bug bounty programmes. Reporting a bug by describing just the bug is unlikely to be controlled nor would be providing a proof of concept be controlled. If the terms of payment require a description of how such a proof of concept works then that description could well meet the technology control if the proof of concept met the definition of "intrusion software". Malware Samples Samples of end malware will not be controlled as "intrusion software" is not itself controlled. Analysis of malware samples should not in general be controlled, but if, for example, the analysis describes how to reimplement the aspects of the malware that meet the "intrusion software" definition then the analysis may be controlled as "technology". The exchange of samples of malware command and control components, or of exploit kits, could attract control as the components / kits are likely to meet the control text. Export of any malware sample that is not "in the public domain" and that incorporates cryptography meeting the control definitions in Category 5 Part 2 would likely already require a licence, so little additional licensing burden is anticipated on malware researchers through the "intrusion software" tools controls. Transfers within Companies In common with other Categories of controls, multinational companies whose day-today business requires collaboration by transferring items that meet control entries relating to "intrusion software" tools will require a licence. Public Domain Infosec Journals / Magazine Public domain infosec journals, even those that contain descriptions of proof of concepts for "intrusion software", are not controlled by virtue of being "in the public domain".

10 Conclusion The controls on intrusion software tools were introduced to address very real risks. The controls do not apply to intrusion software itself; instead they have been deliberately designed to apply to the tools for interacting with intrusion software and to related technology. There are exemptions for software that is generally available for retail purchase and for software and technology that is in the public domain. Where an item is controlled a licence will only be required for export outside the EU, and a special licence applies for exports to Australia, Canada, Japan, New Zealand, Norway, Switzerland and the USA. If you are uncertain whether a licence is required for a particular transfer you may seek advice from the ECO via eco.ist.help@bis.gsi.gov.uk, alternatively you may submit a licence application via SPIRE and you will be advised if a licence is not required. The ECO can also give advice on the most appropriate type of licence for you to use. The ECO would welcome comments on the impact of these controls, especially in relation to security research. If there is evidence that the controls are placing an unnecessary burden on any particular sector or legitimate activity we will consider whether any additional measures such as special licensing arrangements are appropriate. In addition, the ECO would be interested in receiving feedback on the clarity and usefulness of this note.

ACP-NEP Co-ord (Smith, Lyn C2) Military Goods: A400M Collaborative Programme OPEN GENERAL EXPORT LICENCE APRIL 2014

ACP-NEP Co-ord (Smith, Lyn C2) Military Goods: A400M Collaborative Programme OPEN GENERAL EXPORT LICENCE APRIL 2014 ACP-NEP Co-ord (Smith, Lyn C2) OPEN GENERAL EXPORT LICENCE Military Goods: A400M Collaborative Programme APRIL 2014 - This page has been left intentionally blank - - 2 - April 2014 Open General Export

More information

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.

41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50. Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information July 1 - December 31, 2014 apple Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software

More information

The Act imposes foreign exchange restrictions, i.e. performance of certain actions requires a relevant foreign exchange permit.

The Act imposes foreign exchange restrictions, i.e. performance of certain actions requires a relevant foreign exchange permit. RESPONSIBILITIES OF THE NATIONAL BANK OF POLAND RESULTING FROM THE FOREIGN EXCHANGE ACT 1. FOREIGN EXCHANGE PROVISIONS Foreign exchange regulations, which constitute part of the financial legislation,

More information

ERASMUS+ MASTER LOANS

ERASMUS+ MASTER LOANS ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students who want to take a full Masters level

More information

Foreign Obligations Notification Process

Foreign Obligations Notification Process Foreign Obligations Notification Process Santiago Aguilar Nuclear Regulatory Commission 1 Agreements for Peaceful Nuclear Cooperation Current agreements with the IAEA, 21 countries, and Taiwan. The agreements

More information

Malta Companies in International Tax Structuring February 2015

Malta Companies in International Tax Structuring February 2015 INFORMATION SHEET No. 126 Malta in International Tax Structuring February 2015 Introduction Malta is a reputable EU business and financial centre with an attractive tax regime and sound legislative framework.

More information

EU Competition Law. Article 101 and Article 102. January 2010. Contents

EU Competition Law. Article 101 and Article 102. January 2010. Contents EU Competition Law January 2010 Contents Article 101 The requirements of Article 101(1) Exemptions under Article 101(3) Article 102 Dominant position Abuse of a dominant position Procedural issues Competition

More information

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of

More information

Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments

Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments January 20, 2015 ShadEcEurope31_January2015.doc Size and Development of the Shadow Economy of 31 European and 5 other OECD Countries from 2003 to 2015: Different Developments by Friedrich Schneider *)

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information Requests January - June, Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and

More information

Greece Country Profile

Greece Country Profile Greece Country Profile EU Tax Centre March 2013 Key factors for efficient cross-border tax planning involving Greece EU Member State Double Tax Treaties With: Albania Estonia Lithuania Serbia Armenia Finland

More information

First estimate for 2014 Euro area international trade in goods surplus 194.8 bn 24.2 bn surplus for EU28

First estimate for 2014 Euro area international trade in goods surplus 194.8 bn 24.2 bn surplus for EU28 30/2015-16 February 2015 First estimate for 2014 Euro area international trade in goods surplus 194.8 bn 24.2 bn surplus for EU28 The first estimate for the euro area 1 (EA18) trade in goods balance with

More information

ERASMUS+ MASTER LOANS

ERASMUS+ MASTER LOANS Ref. Ares(2015)660570-17/02/2015 ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students

More information

Brochure More information from http://www.researchandmarkets.com/reports/1339929/

Brochure More information from http://www.researchandmarkets.com/reports/1339929/ Brochure More information from http://www.researchandmarkets.com/reports/1339929/ The 2011 World Forecasts of Machine Tools That Remove Material by Laser or Light, Photon, Ultrasonic, Electro-Discharge,

More information

World Consumer Income and Expenditure Patterns

World Consumer Income and Expenditure Patterns World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income

More information

MALTA TRADING COMPANIES IN MALTA

MALTA TRADING COMPANIES IN MALTA MALTA TRADING COMPANIES IN MALTA Trading companies in Malta 1. An effective jurisdiction for international trading operations 410.000 MALTA GMT +1 Located in the heart of the Mediterranean, Malta has always

More information

Data Transfer Policy London Borough of Barnet

Data Transfer Policy London Borough of Barnet London Borough of Barnet DATA PROTECTION 11 Document Control Document Description Data Transfer Policy Version v.2 Date Created December 2010 Status Authorisation Name Signature Date Prepared By: IS Checked

More information

Reporting practices for domestic and total debt securities

Reporting practices for domestic and total debt securities Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on

More information

FEDERATION EUROPEENNE DE LA MANUTENTION Product Group. industrial trucks. A brief guide for identification of noncompliant. - Exhaust Emission -

FEDERATION EUROPEENNE DE LA MANUTENTION Product Group. industrial trucks. A brief guide for identification of noncompliant. - Exhaust Emission - FEDERATION EUROPEENNE DE LA MANUTENTION Product Group Industrial Trucks FEM A brief guide for identification of noncompliant industrial trucks 11.2010 (E) - Exhaust Emission - I n d e x 1 Introduction...

More information

Family benefits Information about health insurance country. Udbetaling Danmark Kongens Vænge 8 3400 Hillerød. A. Personal data

Family benefits Information about health insurance country. Udbetaling Danmark Kongens Vænge 8 3400 Hillerød. A. Personal data Mail to Udbetaling Danmark Kongens Vænge 8 3400 Hillerød Family benefits Information about health insurance country A. Personal data Name Danish civil registration (CPR) number Address Telephone number

More information

EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq.

EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update. By Stephen H. LaCount, Esq. EU Data Protection Directive and U.S. Safe Harbor Framework: An Employer Update By Stephen H. LaCount, Esq. Overview The European Union Data Protection Directive 95/46/EC ( Directive ) went effective in

More information

Delegation in human resource management

Delegation in human resource management From: Government at a Glance 2009 Access the complete publication at: http://dx.doi.org/10.1787/9789264075061-en Delegation in human resource management Please cite this chapter as: OECD (2009), Delegation

More information

Preventing fraud and corruption in public procurement

Preventing fraud and corruption in public procurement Preventing fraud and corruption in public procurement CRIM, European Parliament 24 September 2012 Brussels János Bertók Head of division Public Sector Integrity OECD Data on trends in procurement Size

More information

CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES

CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES ANNEX A CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES Introduction The Civil Service Nationality Rules concern eligibility for employment in the Civil Service on the grounds of nationality and must

More information

International Factors Group Model Law of Factoring

International Factors Group Model Law of Factoring Afreximbank Conference - Lusaka Regulatory and Legal Aspects of Factoring & International Factors Group Model Law of Factoring Edward Wilde Solicitor with Squire Patton Boggs Financial Services Team London

More information

Export Controls on Intrusion Software. Collin Anderson (@CDA) Tom Cross (@_decius_)

Export Controls on Intrusion Software. Collin Anderson (@CDA) Tom Cross (@_decius_) Export Controls on Intrusion Software Collin Anderson (@CDA) Tom Cross (@_decius_) Do Export Controls on Intrusion Software Threaten Security Research? Truth is we don t know. (We re not lawyers and this

More information

GfK PURCHASING POWER INTERNATIONAL

GfK PURCHASING POWER INTERNATIONAL GfK PURCHASING POWER INTERNATIONAL 1 Agenda 1. Europe 3 2. Americas 45 3. Asia & Near East 54 4. Afrika 66 5. Australia 68 6. Overview of countries and available levels 70 2 2 EUROPE 4 GfK

More information

TRANSFERS FROM AN OVERSEAS PENSION SCHEME

TRANSFERS FROM AN OVERSEAS PENSION SCHEME PENSIONS PROFILE DECEMBER 2011 TRANSFERS FROM AN OVERSEAS PENSION SCHEME = Summary A simplified guide to the process: 1. Individual requests transfer from their overseas pension scheme to their UK registered

More information

Encryption Export Controls: A Comparative Analysis between the EU and the US

Encryption Export Controls: A Comparative Analysis between the EU and the US 2013 Annual International Trade Compliance Conference Encryption Export Controls: A Comparative Analysis between the EU and the US John F. McKenzie Baker & McKenzie San Francisco Jasper Helder Baker &

More information

ERASMUS+ MASTER LOANS

ERASMUS+ MASTER LOANS ERASMUS+ MASTER LOANS Erasmus+ Master Loan: opening up access to more affordable lending for cross-border studies The Erasmus+ programme makes it possible for students who want to take a full Master's-level

More information

COMMUNICATION FROM THE COMMISSION

COMMUNICATION FROM THE COMMISSION EUROPEAN COMMISSION Brussels, 17.9.2014 C(2014) 6767 final COMMUNICATION FROM THE COMMISSION Updating of data used to calculate lump sum and penalty payments to be proposed by the Commission to the Court

More information

Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women

Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women 75/2015-27 April 2015 Labour Force Survey 2014 Almost 10 million part-time workers in the EU would have preferred to work more Two-thirds were women Among the 44.1 million persons in the European Union

More information

TOMTOM BONUS INTERNATIONAL MAP INDONESIA PROMOTION HOW TO CLAIM

TOMTOM BONUS INTERNATIONAL MAP INDONESIA PROMOTION HOW TO CLAIM TOMTOM BONUS INTERNATIONAL MAP INDONESIA PROMOTION HOW TO CLAIM a) To be eligible to claim, individuals must purchase an eligible TomTom GPS model (as stipulated below in Clause 11) from a participating

More information

Genuine BMW Accessories. The Ultimate Driving Machine. BMW Trackstar. tracked. recovered. BMW TRACKSTAR.

Genuine BMW Accessories. The Ultimate Driving Machine. BMW Trackstar. tracked. recovered. BMW TRACKSTAR. Genuine BMW Accessories BMW Trackstar The Ultimate Driving Machine stolen. tracked. recovered. BMW TRACKSTAR. stolen vehicle TRACKING SYSTEM. stolen. tracked. recovered. BMW Trackstar Stolen Vehicle Recovery

More information

Guidelines for Applicants: Advanced Training Course

Guidelines for Applicants: Advanced Training Course Emerging Security Challenges Division Guidelines for Applicants: Advanced Training Course Introduction The NATO (SPS) seeks to enhance cooperation and dialogue with all partners through civil science and

More information

TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division

TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS Paulo Magina Public Sector Integrity Division 10 th Public Procurement Knowledge Exchange Platform Istanbul, May 2014 The Organization for Economic

More information

INTANGIBLE TRANSFER OF TECHNOLOGY (ITT) : Regulatory Perspective. Presented by Hjh Nuraffiza Ahmad Strategic Trade Division SKMM

INTANGIBLE TRANSFER OF TECHNOLOGY (ITT) : Regulatory Perspective. Presented by Hjh Nuraffiza Ahmad Strategic Trade Division SKMM INTANGIBLE TRANSFER OF TECHNOLOGY (ITT) : Regulatory Perspective Presented by Hjh Nuraffiza Ahmad Strategic Trade Division SKMM 8 January 2014 Definition Section 2, Strategic Trade Act 2010 - Interpretation

More information

Introduction. Fields marked with * are mandatory.

Introduction. Fields marked with * are mandatory. Questionnaires on introducing the European Professional Card for nurses, doctors, pharmacists, physiotherapists, engineers, mountain guides and estate agents(to competent authorities and other interested

More information

International Call Services

International Call Services International Call Services Affordable rates for business calls. Wherever you are in the world. We ve got plenty to say when it comes to staying in touch when you re overseas. We have agreements with 443

More information

On What Resources and Services Is Education Funding Spent?

On What Resources and Services Is Education Funding Spent? Indicator On What Resources and Services Is Education Funding Spent? In primary, secondary and post-secondary non-tertiary education combined, current accounts for an average of 92% of total spending in

More information

The Community Innovation Survey 2010 (CIS 2010)

The Community Innovation Survey 2010 (CIS 2010) The Community Innovation Survey 2010 (CIS 2010) THE HARMONISED SURVEY QUESTIONNAIRE The Community Innovation Survey 2010 FINAL VERSION July 9, 2010 This survey collects information on your enterprise s

More information

The European Commission s strategy on Corporate Social Responsibility (CSR) 2011-2014: achievements, shortcomings and future challenges

The European Commission s strategy on Corporate Social Responsibility (CSR) 2011-2014: achievements, shortcomings and future challenges The European Commission s strategy on Corporate Social Responsibility (CSR) 2011-2014: achievements, shortcomings and future challenges Fields marked with are mandatory. 1 Introduction - Background and

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information January 1 - June 30, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and

More information

1. Perception of the Bancruptcy System... 2. 2. Perception of In-court Reorganisation... 4

1. Perception of the Bancruptcy System... 2. 2. Perception of In-court Reorganisation... 4 Bankruptcy Systems and In-court Reorganisation of Firms, 2010 Content: 1. Perception of the Bancruptcy System... 2 2. Perception of In-court Reorganisation... 4 3. Perception of Creditor Committees, Fast

More information

THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY

THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY THE ADVANTAGES OF A UK INTERNATIONAL HOLDING COMPANY Ideal Characteristics for the Location of an International Holding Company Laurence Binge +44 (0)1372 471117 laurence.binge@woolford.co.uk www.woolford.co.uk

More information

EXECUTIVE SUMMARY. Measuring money laundering at continental level: The first steps towards a European ambition. January 2011 EUROPEAN COMMISSION

EXECUTIVE SUMMARY. Measuring money laundering at continental level: The first steps towards a European ambition. January 2011 EUROPEAN COMMISSION MONEY LAUNDERING IN EUROPE Measuring money laundering at continental level: The first steps towards a European ambition EXECUTIVE SUMMARY January 2011 EUROPEAN COMMISSION DG HOME AFFAIRS FIGHT AGAINST

More information

Electricity, Gas and Water: The European Market Report 2014

Electricity, Gas and Water: The European Market Report 2014 Brochure More information from http://www.researchandmarkets.com/reports/2876228/ Electricity, Gas and Water: The European Market Report 2014 Description: The combined European annual demand for electricity,

More information

European Research Council

European Research Council ERC Starting Grant Outcome: Indicative statistics Reproduction is authorised provided the source ERC is acknowledged ERCEA/JH. ERC Starting Grant: call Submitted and selected proposals by domain Submitted

More information

UAV Export Controls. Introduction. UAV manufacturers save time and money with a better understanding of export controls.

UAV Export Controls. Introduction. UAV manufacturers save time and money with a better understanding of export controls. UAV Export Controls UAV manufacturers save time and money with a better understanding of export controls Introduction By Howard Loewen If you are involved in Unmanned Aerial Vehicles (UAVs) then it is

More information

Employee eligibility to work in the UK

Employee eligibility to work in the UK Employee eligibility to work in the UK This document details legal requirements that apply to ALL new members of staff All employers in the UK are legally bound to comply with the Asylum and Immigration

More information

Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.

Personal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person. PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy ( Policy ) establishes the approach of Fluor to compliance with European data protection law and specifically

More information

ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States.

ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT. EU Schengen States. Non-Schengen EU States. Non-EU Schengen States. ENTERING THE EU BORDERS & VISAS THE SCHENGEN AREA OF FREE MOVEMENT An area without internal borders where EU citizens and non-eu nationals may move freely EU Schengen States Non-Schengen EU States IS Azores

More information

Funding and network opportunities for cluster internationalization

Funding and network opportunities for cluster internationalization BSR Innovation Express: Cluster- to- Cluster Conference Funding and network opportunities for cluster internationalization Jens Peter Vittrup Special Adviser Email: jpv@ai.dk Why international R&I cooperation?

More information

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL EUROPEAN COMMISSION Brussels, 25.9.2014 COM(2014) 592 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the implementation in the period from 4 December 2011 until 31 December

More information

English Version. Security service providers - Terminology

English Version. Security service providers - Terminology EUROPEAN STANDARD NORME EUROPÉENNE EUROPÄISCHE NORM EN 15602 January 2008 ICS 01.040.03; 01.040.13; 03.080.20; 13.310 English Version Security service providers - Terminology Prestataires de services de

More information

Summary of Data Protection Requirements When transferring Data Outside the UK End Users

Summary of Data Protection Requirements When transferring Data Outside the UK End Users Summary of Data Protection Requirements When transferring Data Outside the UK End Users 14 May 2010 Background to transfers of the Data outside the UK Data can be transferred in a couple of ways in relation

More information

Statewatch Briefing ID Cards in the EU: Current state of play

Statewatch Briefing ID Cards in the EU: Current state of play Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information July 1 - December 31, 2015 Apple takes our commitment to protecting your data very seriously and we work incredibly hard to deliver the most secure hardware, software and

More information

AGENDA ITEM IV: EU CITIZEN'S RIGHTS

AGENDA ITEM IV: EU CITIZEN'S RIGHTS SCREENING CHAPTER 23 Country Session: 4.1. THE RIGHT TO VOTE AND STAND FOR EP ELECTIONS Voting in diplomatic missions in Turkey is not prohibited by the Turkish legislation. Foreigners may cast their votes

More information

How To Calculate Tertiary Type A Graduation Rate

How To Calculate Tertiary Type A Graduation Rate Indicator How Many Students Finish Tertiary Education? Based on current patterns of graduation, it is estimated that an average of 46% of today s women and 31% of today s men in OECD countries will complete

More information

24 Hour Secure Operating Centre 0844 239 0035* Customer Services 0844 239 0032* (Monday-Friday 8.30am-5.30pm)

24 Hour Secure Operating Centre 0844 239 0035* Customer Services 0844 239 0032* (Monday-Friday 8.30am-5.30pm) User Guide 24 Hour Secure Operating Centre 0844 239 0035* or if calling from outside the UK +44 208 305 2026 Customer Services 0844 239 0032* (Monday-Friday 8.30am-5.30pm) * Calls charged at 3p per minute

More information

This document is a preview generated by EVS

This document is a preview generated by EVS CEN WORKSHOP CWA 16926-7 August 2015 AGREEMENT ICS 35.240.40; 35.240.15; 35.200 English version Extensions for Financial Services (XFS) interface specification Release 3.30 - Part 7: Check Reader/Scanner

More information

Appendix 1: Full Country Rankings

Appendix 1: Full Country Rankings Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable

More information

How many students study abroad and where do they go?

How many students study abroad and where do they go? From: Education at a Glance 2012 Highlights Access the complete publication at: http://dx.doi.org/10.1787/eag_highlights-2012-en How many students study abroad and where do they go? Please cite this chapter

More information

193/2014-15 December 2014. Hourly labour costs in the EU28 Member States, 2012 (in )

193/2014-15 December 2014. Hourly labour costs in the EU28 Member States, 2012 (in ) 193/2014-15 December 2014 Labour Cost Survey 2012 in the EU28 Labour costs highest in the financial and insurance sector Three times higher than in the accommodation and food sector In 2012, average hourly

More information

Equity Release Schemes in the European Union

Equity Release Schemes in the European Union Reifner Clerc-Renaud Perez-Carillo Tiffe Knobloch Equity Release Schemes in the European Union institut fur finanzdienstleistungen e.v. Contents PREFACE I EXECUTIVE SUMMARY V TABLES XXIX FIGURES XXX 1.

More information

Chapter 4A: World Opinion on Terrorism

Chapter 4A: World Opinion on Terrorism 1 Pew Global Attitudes Project, Spring 2007 Now I m going to read you a list of things that may be problems in our country. As I read each one, please tell me if you think it is a very big problem, a moderately

More information

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 2 OECD RECOMMENDATION OF THE COUNCIL FOR ENHANCED ACCESS AND MORE EFFECTIVE USE OF PUBLIC SECTOR INFORMATION ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the

More information

Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU

Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU 92/2015-27 May 2015 Energy prices in the EU Household electricity prices in the EU rose by 2.9% in 2014 Gas prices up by 2.0% in the EU In the European Union (EU), household electricity prices 1 rose by

More information

E-Seminar. E-Commerce Internet Business Solution Seminar

E-Seminar. E-Commerce Internet Business Solution Seminar E-Seminar E-Commerce Internet Business Solution Seminar E-Commerce Internet Business Solution Seminar 3 Welcome 4 Objectives 5 The Internet Revolution 6 E-Commerce Defined 7 Types of E-Commerce 8 E-Commerce

More information

- Assessment of the application by Member States of European Union VAT provisions with particular relevance to the Mini One Stop Shop (MOSS) -

- Assessment of the application by Member States of European Union VAT provisions with particular relevance to the Mini One Stop Shop (MOSS) - - Assessment of the application by Member States of European Union VAT provisions with particular relevance to the Mini One Stop Shop (MOSS) - BACKGROUND The information available on this website relates

More information

COST Presentation. COST Office Brussels, 2013. ESF provides the COST Office through a European Commission contract

COST Presentation. COST Office Brussels, 2013. ESF provides the COST Office through a European Commission contract COST Presentation COST Office Brussels, 2013 COST is supported by the EU Framework Programme ESF provides the COST Office through a European Commission contract What is COST? COST is the oldest and widest

More information

International Compliance

International Compliance YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International

More information

Review of R&D Tax Credit. Invitation for Submissions

Review of R&D Tax Credit. Invitation for Submissions Review of R&D Credit invitation for submissions Review of R&D Credit Invitation for Submissions February 2013 Economic and Fiscal Divisions Department of Finance Government Buildings, Upper Merrion Street,

More information

Replacement Migration

Replacement Migration Population Division Department of Economic and Social Affairs United Nations Secretariat Replacement Migration United Nations ST/ESA/SER.A/206 Population Division Department of Economic and Social Affairs

More information

MIT U.S. Income Tax Presentation Non US Resident Students

MIT U.S. Income Tax Presentation Non US Resident Students MIT U.S. Income Tax Presentation Non US Resident Students PwC Boston Nabih Daaboul Carol McNeil Rich Wagman 1 Basic U.S. Tax Overview for International Students A foreign national is a person born outside

More information

Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do.

Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our patent and trade mark attorneys are here to help you protect and profit from your ideas, making sure they re working every bit as hard as you do. Our people work with everyone from multi-nationals

More information

IMMIGRATION TO AND EMIGRATION FROM GERMANY IN THE LAST FEW YEARS

IMMIGRATION TO AND EMIGRATION FROM GERMANY IN THE LAST FEW YEARS IMMIGRATION TO AND EMIGRATION FROM GERMANY IN THE LAST FEW YEARS Bernd Geiss* Germany, Destination for Migrants Germany is in the middle of Europe and has common borders with nine countries. Therefore,

More information

Business Cooperation Database Profile Extraction

Business Cooperation Database Profile Extraction Business Cooperation Database Profile Extraction Produced the 23/05/2013 General Information Profile ID 20111230018 Summary Creation Date 30/12/2011 Last Update 12/01/2012 Expiration Date 02/01/2014 Intermediary

More information

The coordination of healthcare in Europe

The coordination of healthcare in Europe The coordination of healthcare in Europe Rights of insured persons and their family members under Regulations (EC) No 883/2004 and (EC) No 987/2009 Social Europe European Commission The coordination of

More information

E-Justice and E-Law Conference. Rome. 13 14 October 2014. Corte di Cassazione. Madalina Adam (Ministry of Justice, Romania)

E-Justice and E-Law Conference. Rome. 13 14 October 2014. Corte di Cassazione. Madalina Adam (Ministry of Justice, Romania) E-Justice and E-Law Conference Rome 13 14 October 2014 Corte di Cassazione Monday 13 October 2014 Cross border evidence, 16:15 17:15 Convenor: Panellists: Madalina Adam (Ministry of Justice, Romania) Joseph

More information

187/2014-5 December 2014. EU28, euro area and United States GDP growth rates % change over the previous quarter

187/2014-5 December 2014. EU28, euro area and United States GDP growth rates % change over the previous quarter 187/2014-5 December 2014 This News Release has been revised following an error in the data for Gross Fixed Capital Formation. This affects both the growth of GFCF and its contribution to GDP growth. All

More information

Waste. Copenhagen, 3 rd September 2014. Almut Reichel Project Manager Sustainable consumption and production & waste, European Environment Agency

Waste. Copenhagen, 3 rd September 2014. Almut Reichel Project Manager Sustainable consumption and production & waste, European Environment Agency Waste Copenhagen, 3 rd September 2014 Almut Reichel Project Manager Sustainable consumption and production & waste, European Environment Agency Waste and material resources MAWP Strategic Area 1.9 Objective

More information

THE LICENSING OF PENSION ENTITIES IN PRIVATE PENSION SYSTEMS

THE LICENSING OF PENSION ENTITIES IN PRIVATE PENSION SYSTEMS THE LICENSING OF PENSION ENTITIES IN PRIVATE PENSION SYSTEMS July 2007 This comparative report provides background to the OECD-IOPS Guidelines on the Licensing of Pension Entities. For further on this

More information

EUROPE 2020 TARGET: TERTIARY EDUCATION ATTAINMENT

EUROPE 2020 TARGET: TERTIARY EDUCATION ATTAINMENT EUROPE 2020 TARGET: TERTIARY EDUCATION ATTAINMENT Low tertiary or equivalent education attainment levels create skills bottlenecks in knowledgeintensive economic sectors and hamper productivity, innovation

More information

Planned Healthcare in Europe for Lothian residents

Planned Healthcare in Europe for Lothian residents Planned Healthcare in Europe for Lothian residents Introduction This leaflet explains what funding you may be entitled to if you normally live in Lothian (Edinburgh, West Lothian, Midlothian and East Lothian

More information

INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES

INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES Eurobarometer INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES REPORT Fieldwork: February 2015 Publication: September 2015 This survey has been requested by the European Commission, Directorate-General

More information

BLUM Attorneys at Law

BLUM Attorneys at Law BLUM Attorneys at Law CORPORATE TAXATION SYSTEM IN SWITZERLAND Outline of Swiss Corporate Tax System Levels of Taxation in Switzerland Resident companies are subject to: federal corporate income tax, and

More information

99/2015-9 June 2015. EU28, euro area and United States GDP growth rates % change over the previous quarter

99/2015-9 June 2015. EU28, euro area and United States GDP growth rates % change over the previous quarter 2005Q1 2005Q2 2005Q3 2005Q4 2006Q1 2006Q2 2006Q3 2006Q4 2007Q1 2007Q2 2007Q3 2007Q4 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 2012Q1

More information

UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction

UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction legislative standards on electronic communications and electronic signatures: an introduction Luca Castellani Legal Officer secretariat International harmonization of e-commerce law Model Law on Electronic

More information

PORTABILITY OF SOCIAL SECURITY AND HEALTH CARE BENEFITS IN ITALY

PORTABILITY OF SOCIAL SECURITY AND HEALTH CARE BENEFITS IN ITALY PORTABILITY OF SOCIAL SECURITY AND HEALTH CARE BENEFITS IN ITALY Johanna Avato Human Development Network Social Protection and Labor The World Bank Background study March 2008 The Italian Social Security

More information

THE ROLE, RESPONSIBILITIES AND OBLIGATIONS OF THE SHIP AGENT IN THE INTERNATIONAL TRANSPORT CHAIN

THE ROLE, RESPONSIBILITIES AND OBLIGATIONS OF THE SHIP AGENT IN THE INTERNATIONAL TRANSPORT CHAIN THE ROLE, RESPONSIBILITIES AND OBLIGATIONS OF THE SHIP AGENT IN THE INTERNATIONAL TRANSPORT CHAIN A ship agent is any person or company that carries out the functions of an agent (see the following slide),

More information

GLOSSARY OF PATENT TERMINOLOGY

GLOSSARY OF PATENT TERMINOLOGY Economic Analysis and Statistics Division Directorate for Science, Technology and Industry GLOSSARY OF PATENT TERMINOLOGY Applicant...2 Applicant country...2 Application for a patent...2 Application date...2

More information

Trends in Digitally-Enabled Trade in Services. by Maria Borga and Jennifer Koncz-Bruner

Trends in Digitally-Enabled Trade in Services. by Maria Borga and Jennifer Koncz-Bruner Trends in Digitally-Enabled Trade in Services by Maria Borga and Jennifer Koncz-Bruner Digitally-enabled are those for which digital information and communications technologies (ICT) play an important

More information

Visa Information 2012

Visa Information 2012 Visa Information This document is intended to provide you with information on obtaining the correct visa to enter Australia to attend the Global Eco Asia-Pacific Tourism Conference however it is a guideline

More information

NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE EUROPEAN UNION 1 Quarter 4 2015

NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE EUROPEAN UNION 1 Quarter 4 2015 NEW PASSENGER CAR REGISTRATIONS BY ALTERNATIVE FUEL TYPE IN THE Quarter 4 2015 Alternative fuel vehicle (AFV) registrations: +20.0% in 2015; +21.1% in Q4 In the fourth quarter of 2015, total alternative

More information

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace

DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace DSV Air & Sea, Inc. Aerospace Sector DSV Air & Sea, Inc. Aerospace Introduction to DSV DSV is a global supplier of transport and logistics services. We have offices in more than 70 countries and an international

More information

Report on Government Information Requests

Report on Government Information Requests Report on Government Information Requests November, We believe that our customers have a right to understand how their personal information is handled, and we consider it our responsibility to provide

More information