LEGAL DEVELOPMENTS TECHNOLOGICAL PROTECTION MEASURES IN MALAYSIA. Table of Contents

Size: px
Start display at page:

Download "LEGAL DEVELOPMENTS TECHNOLOGICAL PROTECTION MEASURES IN MALAYSIA. Table of Contents"

Transcription

1 e-copyright Bulletin October - December 2004 LEGAL DEVELOPMENTS TECHNOLOGICAL PROTECTION MEASURES IN MALAYSIA Dr. Ida Madieha bt. Abdul Ghani Azmi * Table of Contents I. Introduction...2 II. Copyright Infringement...2 III. TPMs and Fair Use Exceptions...7 IV. Offences...8 V. Conclusion...9 * Assoc. Prof., Private Law Department, International Islamic University Malaysia. Original : English

2 I. Introduction After the setting up of the Multimedia Super Corridor ( MSC ) 1 in 1995, Malaysia has overhauled its copyright law to provide a legal landscape that would support the growth of the information and communication industry. Soon after the conclusion of the World Copyright Treaty in December 1996, though not being member state, Malaysia has incorporated a major part of the treaty in early 1997, in particular a number of provisions concerning technological protection measures (hereinafter referred to as TPM ). 2 The main concern at that time was to extend copyright protection to the on-line environment. Two types of TPMs are provided under the Act, namely technological protection tools and rights information management. As Malaysia was among the first countries to come up with provisions on technological protection measures, the country has not benefited from the debates on these issues in other regions, in particular in the United States of America, in the EU and in Australia. As a result, the provisions are largely unexplored and undeveloped. II. Copyright Infringement The main provision that deals with copyright infringement in the amended Copyright Act is Section 36. Section 36(1) covers primary and contributory infringement whilst Subsection (2) covers secondary infringement. Two additional Subsections have been added to make way for the protection of digital locks used to control access to protected works: Subsection (3) prohibits the circumvention of TPMs, while Subsection (4) deals with rights information management. 1 2 The Multimedia Super Corridor (MSC) is Malaysia s equivalent to the Silicon Valley. This multibillion dollar project is assisted by the International Advisory Panel consisting of leading CEO's and International experts who provide counsel to the Malaysian Government in shaping Malaysia s Multimedia Super Corridor (MSC). The Bill of Guarantees assured by the MSC is to provide a world-class physical and information infrastructure and a world class set of cyber laws sufficient to support the growth of information communication technology industry within the Corridor. The 1997 Amendment Act has revised the 1987 Copyright Act. It came into force on the 1st April The objective of the amendments is espoused in the explanatory statement: Technological development, especially technology, has challenged traditional concepts of copyright protection. The proposed establishment of the Multimedia Super Corridor (MSC) will generate both challenges and opportunities for Malaysia. The success of the MSC will, to a certain extent, be determined by the contents that move through it. These include educational works, entertainment products and information that are protected under the copyright law. For the MSC to realize its full potential, it is essential that adequate legal protection be made available to these works. The Act is proposed to be amended towards this end, taking into account recent international developments in respect of certain copyright works

3 1. Circumvention of Technological Protection Measures Section 36(3) of the Act provides: e.copyright Bulletin Copyright is infringed by any person who circumvents or causes any other person to circumvent any effective technological measures that are used by authors in connection with the exercise of their rights under the Act and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law. This provision essentially makes it an infringement for those who circumvent or cause someone else to circumvent effective technological measures. The Subsection can be further broken down into several elements: a) Both the primary act of circumventing and the contributory act of causing others to circumvent will fall within the scope of the provision. The term circumvent has however not been defined in the Act. b) The technological measures adopted must be effective. Yet there is no definition for the term effective nor for the term TPM. c) The measures in question must be adopted by the authors, and not by the copyright owners; therein lies the weakness of this provision. d) The use of the circumvention devices must be for the purpose of restricting acts which are not authorized by the authors concerned or permitted by law. Because of this, arguably, the provision will cover copy control but not access control as the latter is not within the power of the copyright authors. As stated earlier, the main dissatisfaction with the provision is the absence of a clear definition for all the key terms, unlike the situation in other countries. This renders Section 36(3) rather vague in its scope. In comparison, in the UK, under the recent Copyright and Related Rights Regulations 2003, technological measures have been defined as any technology, device or component, which is intended in the normal course of its operation to protect a copyrighted work other than a computer program. 3 This definition is the broadest possible as TPM can be developed in any form of digital locks to keep copyright materials secure from unauthorized copying and access, including digital watermarking and copy bots, secure digital music initiative, serial copy management systems, encryption, and content scramble systems for DVDs. As for the circumvention of devices, the position in Malaysia is clear. In Creative Purpose Sdn. Bhd. & Anor v Integrated Trans Corp Sdn Bhd & Ors, 4 Kamalanathan J found the liability of the defendant for the circumvention of a dongle, a piece of hardware that is used by the plaintiff to secure the work from unauthorized access. An equally broad definition can be found in the United States of America. The term, to circumvent a technological measure has been defined to mean to de-scramble 3 4 Section 296ZF(1) of the Copyright and Related Rights Regulations [1997] 2 MLJ 429. This case was decided following the Australian case Autodesk Inc & Anor v Dyson & Ors [1992] RPC

4 a scrambled work, to decrypt an encrypted work or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without authority of the copyright owner. 5 Another concern relates to the term effective. Would the technological measures be considered effective if the use of the work is controlled either by access control or copy control mechanisms? Must the technological measures be specifically targeting towards copy control in order to be considered effective? Need the devices be used solely for the purpose of circumventing technological measures? Or should they be designed primarily for the purpose of circumventing technological measures? These are some of the issues that arise as a result of the uncertainty of the law in the matter. In the United States for example, a technological measure controls effectively access to a work, if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work. 6 In the United Kingdom, such measures are effective if the use of the work is controlled by the copyright owner through a) an access control or protection process such as encryption, scrambling or other transformation of the work, or b) a copy control mechanism, c) which achieves the intended protection. 7 Thus, it is clear that the UK have provided for both copy and access control. 8 Some lessons on this can be learnt from the Australian decision Kabushiki Kaisha Sony Computer Entertainment And Others v Stevens. 9 In this case the court was mindful of the definition of technological protection measures under the Australian law and noted that there were two particular means of preventing or inhibiting the infringement of copyright, that is by: a) ensuring that access to the work is available solely by use of an access code or process with the authority of the owner or licensee; or b) a copy control mechanism. Thus the judge argues: The definition, so it seems to me, contemplates that but for the operation of the device or product, there would be no technological or perhaps mechanical barrier to a person gaining access to the copyright work, or making copies of the work after Section 1201(3)(A), Digital Millennium Copyright Act Section 1201(3)(B) of the Digital Millennium Copyright Act Section 296ZF(2) of the Copyright and Related Rights Regulations For a deeper analysis of the United Kingdom position, read Brian W. Ester, Technological Self Help: Its Status under European Law and Implications for U.K. Law, 17 th BILETA Annual Conference, April 5 th 6 th I.P.R

5 access has been gained, thereby putting himself or herself in a position to infringe copyright in the work. The definition is intended to be confined to devices or products that utilise technological processes or mechanisms to prevent or curtail specific actions in relation to a work, which actions would otherwise infringe or facilitate infringement of copyright in that work. In other words, a "technological protection measure", as defined, must be a device or product which utilises technological means to deny a person access to a copyright work, or which limits a person's capacity to make copies of a work to which access has been gained, and thereby "physically" prevents or inhibits the person from undertaking acts which, if carried out, would or might infringe copyright in the work. It is in this sense that the device or product must be designed, in the ordinary course of its operation, to prevent or inhibit the infringement of copyright in a work. I do not think the definition is concerned with devices or products that do not, by their operations, prevent or curtail specific acts infringing or facilitating the infringement of copyright in a work, but merely have a general deterrent or discouraging effect on those who might be contemplating infringing copyright in a class of works, for example by making unlawful copies of a CD-ROM. There may be devices which are not necessarily designed, in the ordinary course of their operation, to prevent the infringement of copyright, but to inhibit such infringement. A copy control mechanism, for example, might not prevent all copying that infringes copyright, but might limit the extent of unlawful copying that can take place, for example by reducing the quality of copies that can be made of the copyright work. Such a device could properly be said to be designed, in the ordinary course of its operation, to "inhibit" the infringement of copyright in a work, rather than to prevent such infringement. It may be that access to only part of a work is restricted by a process requiring decryption or unscrambling. In this situation, too, it might be more appropriate to say that the process is designed to inhibit rather than prevent the infringement of copyright in the work. The observations by the learned judge depict the current debate whether the technological protection measures provisions should target only copy control mechanism or should extend to access control mechanism. The Australian ruling seems to indicate that their legislative provisions only target the former and not the latter. Especially so when the devices are designed for the purpose of price discrimination and control of the geographical distribution of works. In the case of the measures taken by Playstation, it was conceded that it did not discriminate between infringing and non-infringing copies. The measures, it seems, were designed to act as regional codes only and thus were not effective technological measures. 10 It is also the stand in the other countries that liability should only attach to devices that are specifically designed or adapted to circumvent copy protection measures. Devices may have other legitimate uses or act as both access and copy restriction (dual use tools). This is the position in US, 11 New Zealand 12 and the UK New Zealand shares the same stand. According to the Government s position paper on the Digital Technology and the Copyright Act 1994, it is not the role of the law to protect access control technology. Such control is referred to other legal measures such as the law of contract. See Section 1201 (2)(A) of the Digital Millennium Copyright Act See fn

6 2. Manufacture of Devices Capable of Overriding Technological Protection Measures In some countries, the act of manufacturing devices or systems capable of overriding technological protection measures is prohibited. This prohibition would also cover the possession or distribution of circumvention devices or technology. This is in particular 14 the position in the United States of America 15, the United Kingdom 16 and New Zealand. 17 By contrast, the position in Malaysia is unclear. Reading Section 36(3) literally would mean that it does not cover the manufacture of devices capable of being used to override technological protection measures. Would those who manufacture such devices or systems run the risk of being liable for contributory infringement for causing others to circumvent technological protection measures? Taking the cue from the common law cases on the liability of manufacturers of devices capable of infringing copyright, 18 this seems possible. In the US, by contrast, it has been expressly provided that the prohibition against technological protection measures does not enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof Section 296(6) that provides: In this section references to a technical device in relation to a computer program are to any device intended to prevent or restrict acts that are not authorized by the copyright owner of that computer program and are restricted by copyright. In other countries, litigation involving digital tools is in the increase. One such classic example is in the US the case Universal City Studios, Inc, Et Al., v. Shawn C. Reimerdes, Et Al., United States District Court For The Southern District of New York (2000). In this case, the defendants distributed through the Internet a software called the DECSS which decoded the scrambled signal on plaintiffs motion picture studios digital versatile disks (DVDs) so that owners of DVDs could reproduce flawless copies of those movies in violation of copyright laws. The plaintiffs filed a suit in order to enjoin the defendants from distributing such DECSS programming. One of the issues raised was whether the defendants have offended the TPM provisions by circumventing the technological tools adopted by the copyright owner to secure access to his works, in this case the CSS-tool. The CSS requires the application of information or a process, with the authority of the copyright owner, to gain access to their works. Without the scrambling of the CSS, one would not ordinarily have access to the works. On this issue, the United States District Court for the Southern District of New York found that there was a clear-cut transgression of the TPM provisions. One point to be noted of the case is that the digital locks were used for access control, and not copy control. Yet, they have been held to be offending the TPM provisions. Section 1201(2) of the Digital Millennium Copyright Act Section 296ZB(1) of the Copyright and Related Rights Regulations In fact, in New Zealand, only the act of manufacture is prohibited while the act of circumvention is not. As made explicit in the position paper (op. cit.), liability to actual circumvention would only make sense where circumvention occurs on a commercial scale. RCA Corporation v John Fairfax & Sons Ltd & Ors [1981] 1 NSWLR 251, A & M Records Inc v Audio Magnetics Inc [1979] FSR 1 and CBS Songs v Amstrad [1988] RPC 567. Section 1201(c)(2) of the Digital Millennium Copyright Act

7 3. Rights Management Information Another digital tool that is provided for under the amended Copyright Act is the rights management information. The term rights management information has been defined in Section 36(5) as to mean: information which identifies the works, the author of the work, the owner of any right in the work, or information about the terms and conditions of use of the work, any numbers or codes that represent such information, when any of these items of information is attached to a copy of a work or appears in connection with the communication of a work to the public. Rights management information does not only serve the purpose of encoding information concerning copyright ownership, but can also be employed to track subsequent uses of the work. The technology is designed to convey, record and transmit information regarding the licence, authenticity and payment for the use. Rights information management, thus, plays an important role in controlling and tracking down uses of a work for the collection of license royalties. It is no wonder that the tampering of the rights information management must be curbed to enable the copyright owner to have a full control over his work. Whilst the prohibition against technological measures targets the tampering of digital locks, the provision relating to rights information management relates to the tampering with digital codes that are added to a digital work. Subsection (4), which deals with rights management information, provides: Copyright is infringed by any person who knowingly performs any of the following acts knowing or having reasonable grounds to know that it will induce, enable, facilitate or conceal an infringement of any right under this Act: the removal or alteration of any electronic rights management information without authority; the distribution, importation for distribution or communication to the public, without authority, of works or copies of works knowing that electronic rights management information has been removed or altered without authority. As made explicit by Subsection (4) itself, the element of knowledge of committing the act must be present; required is either actual or constructive knowledge. This provision prohibits not only removing and altering the electronic rights management information, but also the dealing with works which have been tampered with. Similar to the liability for circumvention, this provision is tied directly to the existence of a valid underlying right, therefore, the removal or alteration of such rights management information should be allowed when the legal protection for the underlying work has lapsed or is non existent. III. TPMs and Fair Use Exceptions The WIPO Copyright Treaty (1996) in its article 10 is permissive in the extension of copyright limitations to the use of works in the digital environment. Taking this stand, many countries have drawn a number of exceptions to the technological protection measures provisions. For example in the United States of America, there are wide - 7 -

8 exceptions for non-profit libraries, archives and educational institutions. 20 For example, those who have lawfully obtained the right to use a copy of a computer program may reverse engineer technological protection measures for lawful purposes. Likewise, for the purpose of encryption research, security-testing activities are tolerated. 21 The concern that broad prohibition of the circumvention of technological measures might inhibit lawful and legitimate uses of work, such as fair dealing or fair use or reverse engineering, has been raised in many jurisdictions. Many are, rightly so, worried that such broad prohibitions may lead to more restricted access to copyright material and hinder educational use of copyright material as well as hamper research in the field of cryptography. That is why in many countries, wide exceptions are crafted to ensure that the balance between the interests of the right holders on the one hand and the public users on the other is maintained. It is unfortunate that all these debates have not reached this part of the world, otherwise valuable insights and lessons can be drawn from them. In Malaysia, as there have not been many active debates on the issue, the feasibility and the need for exceptions to the technological protection measures provisions is largely ignored. IV. Offences Certain activities pertaining to the circumvention of technological measures have been made criminal offences. For example, Section 41(i) and (j) criminalises the removal and distribution of works that have been altered. Section 41 reads: Any person who during the subsistence of copyright in a work or performers right [ ] (i) removes or alters any electronic rights management information without authority; or (j) distributes, imports for distribution or communicates to the public, without authority, works or copies of works in respect of which electronic rights management information has been removed or altered without authority shall, unless he is able to prove that he had acted in good faith and had no reasonable grounds for supposing that copyright or performers rights would or might thereby be infringed, be guilty of an offence and shall on conviction be liable [ ] to a fine not exceeding two hundred and fifty thousand ringgit or to imprisonment for a term not exceeding three years or to both and for any subsequent offence, to a fine not exceeding five hundred thousand ringgit or to imprisonment for a term not exceeding five years or to both. From the above provision, it seems clear that both the primary act of tampering with electronic rights management information and the distribution of tampered works entail criminal liability. The fine imposed is nothing minimal, ranging from RM 250,000 to RM 500,000 and the imprisonment term is equally harsh from 3 to 5 years See Section 1201(d) of the Digital Millennium Copyright Act Section 1201(f) of the Digital Millennium Copyright Act

9 The criminalisation of such conduct can be seen as an ancillary measure to supplement the civil liability of the alteration of rights information management. Such criminalisation has, unfortunately, made the Malaysian provision one of the harshest by comparison to other jurisdiction and goes beyond the mandate of the World Copyright Treaty of V. Conclusion The language of both Sections 36(3) and (4) follows closely to that of Article 11 and 12 of the World Copyright Treaty This similarity is unavoidable as it is the latter that has influenced and shaped the Malaysian Copyright Act. The situation in Malaysia, however, remains unclear as many issues have not been considered in the decision making process. Though we are among the first countries to incorporate the WCT provisions, we have not had the advantage of taking into account the ongoing debates on the international level. Looking at the divergent approaches in other countries, it is questionable which path Malaysia would ultimately choose to follow

No. 03 Civ. 2183(NRB). Feb. 23, 2004. * * * MEMORANDUM AND ORDER

No. 03 Civ. 2183(NRB). Feb. 23, 2004. * * * MEMORANDUM AND ORDER 307 F.Supp.2d 521 United States District Court, S.D. New York. I.M.S. INQUIRY MANAGEMENT SYSTEMS, LTD., Plaintiff, v. BERKSHIRE INFORMATION SYSTEMS, INC., Defendant. BUCHWALD, District Judge. No. 03 Civ.

More information

PUBLIC LAW 105 304 OCT. 28, 1998 DIGITAL MILLENNIUM COPYRIGHT ACT

PUBLIC LAW 105 304 OCT. 28, 1998 DIGITAL MILLENNIUM COPYRIGHT ACT PUBLIC LAW 105 304 OCT. 28, 1998 DIGITAL MILLENNIUM COPYRIGHT ACT 112 STAT. 2860 PUBLIC LAW 105 304 OCT. 28, 1998 Oct. 28, 1998 [H.R. 2281] Digital Millennium Copyright Act. 17 USC 101 note. Public Law

More information

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape

AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and

More information

THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998 U.S. Copyright Office Summary

THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998 U.S. Copyright Office Summary THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998 U.S. Copyright Office Summary INTRODUCTION December 1998 1 The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton on October 28,

More information

Standing Committee on Copyright and Related Rights

Standing Committee on Copyright and Related Rights E SCCR/24/5 ORIGINAL: ENGLISH DATE: JULY 2, 2012 Standing Committee on Copyright and Related Rights Twenty-fourth Session Geneva, July 16 to 25, 2012 DRAFT TREATY ON THE PROTECTION OF BROADCASTING ORGANIZATIONS

More information

copyright reform Bill C - 11

copyright reform Bill C - 11 intellectual property bulletin June 2012 copyright reform Bill C - 11 After several failed attempts, the federal government has finally passed copyright reform legislation, namely Bill C-11, the Copyright

More information

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe

In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe In the Technology-Driven, File Sharing Era, Copyright Protection Remains Alive and Well As a Tool to Combat Active Inducements to Infringe On June 27, 2005, the Supreme Court in Metro-Goldwyn-Mayer Studios

More information

Copyright Law An Introduction

Copyright Law An Introduction Copyright Law An Introduction The following pages outline some basic facts about copyright law and answer various questions, such as 'how long does copyright last?' 'When does infringement occur?'... and

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

The vast majority of the comments submitted suggest just that the anticircumvention cause of action a whole should be suspended.

The vast majority of the comments submitted suggest just that the anticircumvention cause of action a whole should be suspended. Good morning. My name is Paul Hughes, and I am Public Policy Advisor at Adobe Systems Incorporated. On behalf of Adobe I would like express my appreciation for the opportunity to appear before you today

More information

Request for Comments on Section 1201(g) of the Digital Millennium Copyright Act COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA)

Request for Comments on Section 1201(g) of the Digital Millennium Copyright Act COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA) DEPARTMENT OF COMMERCE National Telecommunications and Information Administration LIBRARY OF CONGRESS Copyright Office [Docket No. 990428110-9110-01] RIN 0660-ZA09 Request for Comments on Section 1201(g)

More information

Geo-blocking, VPNs & Copyright

Geo-blocking, VPNs & Copyright INFORMATION SHEET G127v02 July 2015 Geo-blocking, VPNs & Copyright In this information sheet we give a brief overview of the law as it relates to geo-blocking, virtual private networks (VPNs) and copyright.

More information

GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective

GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective Abstract This document highlights some of the South African rules and regulations that require the effective management of email. It looks

More information

UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online?

UCO Copyright Compliance Starting Point for Al Copyright Concerns: 1. Is the work Copyrighted? 2. Is the class traditional or Online? UCO Copyright Compliance As members of the UCO community, all faculty and staff members are expected to comply with federal copyright law. Unauthorized use of copyrighted material is illegal and may result

More information

[Brought into force by appointed day notice on 16 th June 2003.]

[Brought into force by appointed day notice on 16 th June 2003.] [Brought into force by appointed day notice on 16 th June 2003.] AN ACT TO PROVIDE FOR THE LEGAL RECOGNITION OF ELECTRONIC WRITING, ELECTRONIC CONTRACTS, ELECTRONIC SIGNATURES AND ORIGINAL INFORMATION

More information

The Government of The Bahamas - Home

The Government of The Bahamas - Home Page 1 of 5 CHAPTER 325 THE BAHAMAS FREE TRADE ZONE ARRANGEMENT OF SECTIONS SECTION 1. Short title. 2. Interpretation. 3. Minister to designate areas in which zones may be established. 4. Establishment

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Digital locks and Canadian research library collections

Digital locks and Canadian research library collections Canadian Association of Research Libraries ad hoc Digital Locks Working Group Digital locks and Canadian research library collections Implications for scholarship, accessibility, and preservation Project

More information

THE BAHAMAS FREE TRADE ZONE [CH.325 1 FREE TRADE ZONE CHAPTER 325

THE BAHAMAS FREE TRADE ZONE [CH.325 1 FREE TRADE ZONE CHAPTER 325 [CH.325 1 LIST OF AUTHORISED PAGES 1-2 LRO 1/2008 3-8 Original 9-11 LRP 1/2008 FREE TRADE ZONE CHAPTER 325 ARRANGEMENT OF SECTIONS SECTION 1. Short title. 2. Interpretation. 3. Minister to designate areas

More information

DEFINITIONS. "this web site" means www.vericredonline.com. "user" means any person accessing any part of this web site DISCLAIMER

DEFINITIONS. this web site means www.vericredonline.com. user means any person accessing any part of this web site DISCLAIMER DEFINITIONS VeriCred Collections means VeriCred Credit Bureau (Pty) Ltd, a private company, with limited liability, duly registered and incorporated as such in accordance with the laws of the Republic

More information

Act 5 Foreign Exchange Act 2004

Act 5 Foreign Exchange Act 2004 ACTS SUPPLEMENT No. 3 3rd December, 2004. ACTS SUPPLEMENT to The Uganda Gazette No. 64 Volume XCVII dated 3rd December, 2004. Printed by UPPC, Entebbe, by Order of the Government. Act 5 Foreign Exchange

More information

CONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA

CONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA CONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA The U.S. proposal for an Internet chapter in the Anti-Counterfeiting Trade Agreement (ACTA) has been leaked to the press and widely disseminated on the

More information

Criminal Law Consolidation (Identity Theft) Amendment Act 2003

Criminal Law Consolidation (Identity Theft) Amendment Act 2003 No 60 of 2003 assented to 11.12.2003 South Australia Criminal Law Consolidation (Identity Theft) Amendment Act 2003 An Act to amend the Criminal Law Consolidation Act 1935 and to make a related amendment

More information

Balancing IP Protection and Antitrust

Balancing IP Protection and Antitrust Balancing IP Protection and Antitrust Xianlin WANG Shanghai Jiao Tong University KoGuan School of Law 2013 年 5 月 24 日 北 京 Main Points I. Relationship between IP protection and antitrust II. Interpreting

More information

Understanding copyright: the theory

Understanding copyright: the theory Understanding copyright: the theory Andrew Braid Licensing and Copyright Compliance The British Library OUTLINE Brief introduction to copyright How copies can be made Recent changes How The British Library

More information

EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010

EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 EDUCATION ISSUES IN BILL C- 32 Submission to Canadian Parliament Canadian School Boards Association December 2010 2 Table of Contents 1. INTRODUCTION... 3 2. EDUCATION ISSUES IN BILL C- 32... 3 3. EDUCATIONAL

More information

GNU LIBRARY GENERAL PUBLIC LICENSE. Preamble

GNU LIBRARY GENERAL PUBLIC LICENSE. Preamble GNU LIBRARY GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1991 Free Software Foundation, Inc. 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute

More information

Pakistan (Punjab) Legislation

Pakistan (Punjab) Legislation 1 of 10 18.07.2012 15:08 [Home] [Databases] [WorldLII] [Search] [Feedback] Pakistan (Punjab) Legislation You are here: CommonLII >> Databases >> Pakistan (Punjab) Legislation >> Punjab Private Security

More information

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy

2015docs\INSLM02. 1 See Intelligence Services Act 1994, s 5(1): No entry on or interference with property or with wireless telegraphy Professor Clive Walker School of Law, University of Leeds Inquiry into section 35P of the Australian Security Intelligence Organisation Act 1979 Submission to the Independent Security Law Monitor 3 April

More information

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER

More information

CELL PHONE UNLOCKING: A LEGAL PRIMER. of the Librarian of Congress not to allow consumers to unlock their cell phones to access

CELL PHONE UNLOCKING: A LEGAL PRIMER. of the Librarian of Congress not to allow consumers to unlock their cell phones to access Jonathan Band jband@policybandwidth.com On March 4, 2012, the White House announced that it disagreed with the decision of the Librarian of Congress not to allow consumers to unlock their cell phones to

More information

The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq.

The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq. The Rosenthal Fair Debt Collection Practices Act California Civil Code 1788 et seq. 1788. This title may be cited as the Rosenthal Fair Debt Collection Practices Act. 1788.1 (a) The Legislature makes the

More information

CC255 C O R P O R A T E. Altus FCPA Policy. Last revised: 12 October 2010

CC255 C O R P O R A T E. Altus FCPA Policy. Last revised: 12 October 2010 CC255 Altus FCPA Policy Last revised: 12 October 2010 C O R P O R A T E Foreign Corrupt Practices Act Policy Purpose The purpose of this Policy is to ensure compliance by Altus and its directors, officers,

More information

Health Administration Act 1982 No 135

Health Administration Act 1982 No 135 New South Wales Health Administration Act 1982 No 135 Status information Currency of version Historical version for 1 July 2011 to 13 May 2013 (generated 21 May 2013 at 13:52). Legislation on the NSW legislation

More information

Chapter 14:14 MONEYLENDING AND RATES OF INTEREST ACT. Acts 9/1930, 25/1948,59/1961,6/1967, 7/1972, 5/1981, 30/1984, 22/2001; 16/2004. R.G.N. 554/1962.

Chapter 14:14 MONEYLENDING AND RATES OF INTEREST ACT. Acts 9/1930, 25/1948,59/1961,6/1967, 7/1972, 5/1981, 30/1984, 22/2001; 16/2004. R.G.N. 554/1962. Section Chapter 14:14 MONEYLENDING AND RATES OF INTEREST ACT Acts 9/1930, 25/1948,59/1961,6/1967, 7/1972, 5/1981, 30/1984, 22/2001; 16/2004. R.G.N. 554/1962. ARRANGEMENT OF SECTIONS 1. Short title. 2.

More information

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS These terms of use govern your use of our site. Please read the whole of these terms in full before you use this Website. If you do not accept these terms, please do not use this Website. Your continued

More information

ASSOCIATION OF CANADIAN COMMUNITY COLLEGES SUBMISSION TO THE LEGISLATIVE COMMITTEE ON BILL C-32

ASSOCIATION OF CANADIAN COMMUNITY COLLEGES SUBMISSION TO THE LEGISLATIVE COMMITTEE ON BILL C-32 ASSOCIATION OF CANADIAN COMMUNITY COLLEGES SUBMISSION TO THE LEGISLATIVE COMMITTEE ON BILL C-32 January 31, 2011 Association of Canadian Community Colleges 200 1223 Michael Street North Ottawa, Ontario

More information

The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators

The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators The Society for Cinema and Media Studies Statement of Best Practices for Fair Use in Teaching for Film and Media Educators Introduction. The field of film and media studies in the United States was shaped

More information

SECURE LAB BREACHES PENALTIES POLICY

SECURE LAB BREACHES PENALTIES POLICY SECURE LAB BREACHES PENALTIES POLICY.. PUBLIC VERSION 2 JANUARY 2014... T +44 (0)1206 872251 E rwelpton@essex.ac.uk ukdataservice.ac.uk... UK DATA ARCHIVE UNIVERSITY OF ESSEX WIVENHOE PARK COLCHESTER ESSEX,

More information

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act

HP0868, LD 1187, item 1, 123rd Maine State Legislature An Act To Recoup Health Care Funds through the Maine False Claims Act PLEASE NOTE: Legislative Information cannot perform research, provide legal advice, or interpret Maine law. For legal assistance, please contact a qualified attorney. Be it enacted by the People of the

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

Internet Service Providers Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law

Internet Service Providers Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law Internet Service Providers Liability in the Field of Copyright: A Review of Asia-Pacific Copyright Law WIPO International Seminar on Copyright Jointly organized by WIPO and the Ministry of Culture of Brazil

More information

27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of 25.11.2009 No.266-FZ) Chapter 1.

27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA. (as amended by Federal Law of 25.11.2009 No.266-FZ) Chapter 1. 27 July 2006 No.152-FZ RUSSIAN FEDERATION FEDERAL LAW PERSONAL DATA (as amended by Federal Law of 25.11.2009 No.266-FZ) Article 1. Scope of This Federal Law Chapter 1. GENERAL Adopted by The State Duma

More information

Criminal Code (Child Pornography and Abuse) Amendment Bill 2004

Criminal Code (Child Pornography and Abuse) Amendment Bill 2004 1 Criminal Code (Child Pornography and Abuse) Explanatory Notes General Outline Short Title The short title of the Bill is the Criminal Code (Child Pornography and Abuse). Policy Objectives of the Legislation

More information

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656

CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 CALIFORNIA FALSE CLAIMS ACT GOVERNMENT CODE SECTION 12650-12656 12650. (a) This article shall be known and may be cited as the False Claims Act. (b) For purposes of this article: (1) "Claim" includes any

More information

Commentary. By Gregory Nylen

Commentary. By Gregory Nylen Commentary Perfect 10, Inc. v. Visa International Service, Association, 494 F.3d 788 (9th Cir. 2007): A Free Pass For Merchant Account Providers For Secondary Liability In Trademark Counterfeiting Cases?

More information

Legal Digest. Money Laundering Offences In Singapore. Naina Parwani. An online repository of various articles published by our lawyers

Legal Digest. Money Laundering Offences In Singapore. Naina Parwani. An online repository of various articles published by our lawyers An online repository of various articles published by our lawyers Money Laundering Offences In Singapore Naina Parwani 1 Rajah & Tann 4 Battery Road #26-01 Bank of China Building Singapore 049908 Tel:

More information

CORPORATE LEGAL FRAMEWORK IN JORDAN. Legal reference: The Companies Law No. 27 of 2002 and its amendments

CORPORATE LEGAL FRAMEWORK IN JORDAN. Legal reference: The Companies Law No. 27 of 2002 and its amendments CORPORATE LEGAL FRAMEWORK IN JORDAN Legal reference: The Companies Law No. 27 of 2002 and its amendments Under the Jordanian different types of companies offer different advantages and have different requirements

More information

The Copyright and Innovation Consultation in Adobe Systems Inc.

The Copyright and Innovation Consultation in Adobe Systems Inc. Adobe Systems Incorporated Response to the Copyright and Innovation Consultation paper for the Department of Jobs, Enterprise and Innovation About Adobe Systems Incorporated Adobe is the global leader

More information

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple. ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,

More information

The office of the County Attorney Bill, 2014

The office of the County Attorney Bill, 2014 THE OFFICE OF THE COUNTY ATTORNEY BILL, 2014 ARRANGEMENT OF CLAUSES Section PART I PRELIMINARY 1 Short title and commencement. 2 Interpretation. 3 Application. PART II: ESTABLISHMENT OF THE OFFICE OF THE

More information

Internet: Copying & Downloading

Internet: Copying & Downloading INFORM ATION SHEET G056v 09 May 2015 Internet: Copying & Downloading This information sheet is for people who want to copy or download material from the Internet or swap and share files online. The purpose

More information

The case for a private copying levy

The case for a private copying levy The case for a private copying levy Australian Mechanical Copyright Owners Society (AMCOS) & Screenrights October 2001 1: Background Most private copying of recorded music and television programs infringes

More information

MEMORANDUM ON COPYRIGHT LAW AND COMPLIANCE

MEMORANDUM ON COPYRIGHT LAW AND COMPLIANCE MEMORANDUM ON COPYRIGHT LAW AND COMPLIANCE As educators, authors and creators of copyrightable works, members of the University community have a duty to respect the copyright interests of third parties.

More information

MEMBER FIRM OF BAKER & MCKENZIE INTERNATIONAL. Directors' Duties and Liabilities under Malaysian Law

MEMBER FIRM OF BAKER & MCKENZIE INTERNATIONAL. Directors' Duties and Liabilities under Malaysian Law MEMBER FIRM OF BAKER & MCKENZIE INTERNATIONAL Directors' Duties and Liabilities under Malaysian Law December 2010 This memorandum has been prepared for clients and professional associates of Wong & Partners.

More information

Small Pond Web Hosting Terms and Conditions

Small Pond Web Hosting Terms and Conditions Small Pond Web Hosting Terms and Conditions Small Pond Web Hosting (referred hereinafter as 'Small Pond Web Hosting ', 'SmallPond ', 'our', 'we' and 'us') is a web hosting business. All accounts on our

More information

STANFORD UNIVERSITY TO: John Etchemendy, Provost FROM: DATE: Fall 2005. Copyright Reminder SUBJECT:

STANFORD UNIVERSITY TO: John Etchemendy, Provost FROM: DATE: Fall 2005. Copyright Reminder SUBJECT: STANFORD UNIVERSITY TO: FROM: Members of the Faculty, Hoover Institution Fellows, Senior Fellows, Department Administrators, Academic Staff (teaching and research), Library Directors, Students and Administrative

More information

Equalities briefing five: Perceived discrimination : the scope of the definition of disability

Equalities briefing five: Perceived discrimination : the scope of the definition of disability Equalities briefing five: Perceived discrimination : the scope of the definition of disability Rachel Crasnow, a leading member of the Cloisters employment and discrimination team examines to what extent

More information

Joint Ownership in Intellectual Property Rights

Joint Ownership in Intellectual Property Rights - 1. Introduction...1-1.1 What is "joint ownership"?...1-1.2 What are the rules relating to joint ownership?...1-2. Joint ownership with regard to copyright...2-2.1 When does joint ownership exist?...2

More information

Coffee Regional Medical Center FALSE CLAIMS EDUCATION

Coffee Regional Medical Center FALSE CLAIMS EDUCATION Policy/Procedure Department Administration Effective 08/15/2008 Scope Organization Cross Reference Review Date 08/14/2008,12/18/2013 Revision History Signatures Date 12/18/2013 Prepared by Lavonda Cravey

More information

Art Institute Intellectual Property Policy (MAY 2013)

Art Institute Intellectual Property Policy (MAY 2013) I. Purpose or Scope Art Institute Intellectual Property Policy (MAY 2013) The unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject students and

More information

TAX TREATY CHARACTERISATION ISSUES ARISING FROM E-COMMERCE

TAX TREATY CHARACTERISATION ISSUES ARISING FROM E-COMMERCE TAX AND COMMERCE @ OECD TAX TREATY CHARACTERISATION ISSUES ARISING FROM E-COMMERCE REPORT TO WORKING PARTY NO. 1 OF THE OECD COMMITTEE ON FISCAL AFFAIRS 1 February 2001 By the Technical Advisory Group

More information

ENGROSSED ORIGINAL A BILL 20-409 IN THE COUNCIL OF THE DISTRICT OF COLUMBIA

ENGROSSED ORIGINAL A BILL 20-409 IN THE COUNCIL OF THE DISTRICT OF COLUMBIA 0 0 A BILL 0-0 IN THE COUNCIL OF THE DISTRICT OF COLUMBIA To make the possession or transfer without remuneration of ounce or less of marijuana a civil violation subject to a fine and to make technical

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

ELECTRONIC TRANSACTIONS ACT

ELECTRONIC TRANSACTIONS ACT ELECTRONIC TRANSACTIONS ACT CHAPTER 22:05 Act 6 of 2011 Amended by *4 of 2014 *See Note on page 2 Current Authorised Pages Pages Authorised (inclusive) by L.R.O. 1 10.. 11 24.. 25 32.. L.R.O. 2 Chap. 22:05

More information

Chapter No. 367] PUBLIC ACTS, 2001 1 CHAPTER NO. 367 HOUSE BILL NO. 779. By Representatives Briley, Hargett, Pleasant

Chapter No. 367] PUBLIC ACTS, 2001 1 CHAPTER NO. 367 HOUSE BILL NO. 779. By Representatives Briley, Hargett, Pleasant Chapter No. 367] PUBLIC ACTS, 2001 1 CHAPTER NO. 367 HOUSE BILL NO. 779 By Representatives Briley, Hargett, Pleasant Substituted for: Senate Bill No. 261 By Senator Cohen AN ACT to amend Tennessee Code

More information

Copyright Compliance and Peer-to-Peer File Sharing Policy

Copyright Compliance and Peer-to-Peer File Sharing Policy University of Scranton Division of Information Resources Copyright Compliance and Peer-to-Peer File Sharing Policy Executive Sponsor: Sr Vice President for Finance and Administration Responsible Office:

More information

THE CABLE TELEVISION NETWORKS

THE CABLE TELEVISION NETWORKS Cable TV act THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 CHAPTER I Preliminary 1. Short title, extent and commencement 137 2. Definitions 137 CHAPTER II Regulation of cable television network

More information

Terms & Conditions MYJOB Website

Terms & Conditions MYJOB Website Terms & Conditions MYJOB Website MY WEB LTD AND myjob.mu website. 1. My Web Ltd (a company duly registered in the Republic of Mauritius and hereinafter also referred in as the Company) is the maker and

More information

www.yourchoicecounselling.co.uk (the "Website") is provided by Your Choice Counselling.

www.yourchoicecounselling.co.uk (the Website) is provided by Your Choice Counselling. Your Choice Counselling. Website Legal Notice Important - this is a legal agreement between you and Your Choice Counselling. Registered office: 2 Seaford Close, Burseldon, Southampton, Hampshire SO31 8GL

More information

Card Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd.

Card Account means your Card account that is in relation to your Visa Wallet maintained and operated by Tune Money Sdn Bhd. VERIFIED BY VISA TERMS AND CONDITIONS OF USE Important: The Verified by Visa service is designed to provide you with improved security when your BIG Card- Prepaid Visa is used to make purchases online.

More information

17. Computer Programs and Back-ups

17. Computer Programs and Back-ups 17. Computer Programs and Back-ups Contents Summary 365 Back-ups and fair use 365 Exceptions for computer programs 369 Summary 17.1 This chapter discusses exceptions to copyright for computer programs

More information

1 L.R.O. 2001 Electronic Transactions CAP. 308B ELECTRONIC TRANSACTIONS

1 L.R.O. 2001 Electronic Transactions CAP. 308B ELECTRONIC TRANSACTIONS 1 L.R.O. 2001 Electronic Transactions CAP. 308B CHAPTER 308B ELECTRONIC TRANSACTIONS ARRANGEMENT OF SECTIONS SECTION PART I Preliminary 1. Short title. 2. Interpretation. 3. Non-application of Parts II

More information

Retirement Fund (Amendment) 1 A BILL. i n t i t u l e d. An Act to amend the Retirement Fund Act 2007.

Retirement Fund (Amendment) 1 A BILL. i n t i t u l e d. An Act to amend the Retirement Fund Act 2007. Retirement Fund (Amendment) 1 A BILL i n t i t u l e d An Act to amend the Retirement Fund Act 2007. [ ] ENACTED by the Parliament of Malaysia as follows: Short title and commencement 1. (1) This Act may

More information

CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 [Act No. 7 of Year 1995, dated 25-3-1995] (as amended upto 31.8.07)

CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 [Act No. 7 of Year 1995, dated 25-3-1995] (as amended upto 31.8.07) CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 [Act No. 7 of Year 1995, dated 25-3-1995] (as amended upto 31.8.07) An Act to regulate the operation of cable television networks in the country and for

More information

ADVISORY White Collar

ADVISORY White Collar ADVISORY White Collar March 31, 2010 THE CURRENT STATUS OF THE UK BRIBERY BILL Summary This memorandum summarises the current status of the UK Bribery Bill (the Bill ) and describes the bribery offences

More information

INSOLVENCY CODE OF PRACTICE

INSOLVENCY CODE OF PRACTICE THE INSOLVENCY ACT, 2003 (as amended) SECTION 487 INSOLVENCY CODE OF PRACTICE (the Code ) TABLE OF CONTENTS Page CHAPTER I: INTRODUCTION - - - - - - - 1 CHAPTER II: INTERPRETATION - - - - - - 2 CHAPTER

More information

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE. RAPID CONNECT SERVICES(sm) and SPECIFICATION LICENSE AGREEMENT THIS RAPID CONNECT SERVICES AND SPECIFICATION LICENSE AGREEMENT IS BETWEEN FIRST DATA MERCHANT SERVICES CORPORATION ( FDMS ) FDMS AND YOU,

More information

PIRATES OF THE DIGITAL MILLENNIUM

PIRATES OF THE DIGITAL MILLENNIUM PIRATES OF THE DIGITAL MILLENNIUM By John Gantz and Jack B. Rochester Upper Saddle River, NJ, Financial Times Prentice Hall, 2005, ISBN0-13-246315-2 (Price $25.95) pp. 294. Reviewed by Rachel S. Leeds

More information

QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY

QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY QUESTERRE ENERGY CORPORATION (the Corporation ) INSIDER TRADING AND REPORTING POLICY The purpose of this insider policy is to summarize the insider trading restrictions to which directors, officers, consultants

More information

Website Terms and Conditions

Website Terms and Conditions Website Terms and Conditions In these terms and conditions, "we", "us" and "our" means Southern Cross Austereo Pty Limited ACN 109 243 110 and its related bodies corporate and any successors or assigns..

More information

LEAKED ACTA DIGITAL ENFORCEMENT CHAPTER

LEAKED ACTA DIGITAL ENFORCEMENT CHAPTER LEAKED ACTA DIGITAL ENFORCEMENT CHAPTER Frequently Asked Questions 1. Is the Anti-Counterfeiting Trade Agreement (ACTA) only about counterfeiting? No. Counterfeiting involves the production of fake goods

More information

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN

LOS ANGELES UNIFIED SCHOOL DISTRICT POLICY BULLETIN TITLE: Compliance with the1976 United States Copyright Law Computer Software ROUTING All Employees All Locations NUMBER: BUL 716.2 ISSUER: Margaret A. Klee, Chief Information Officer Information Technology

More information

Information Security Holger Schlingloff Jan 30th, 2002 1 Information security and copyright Why is there a connection? Remember definition from the very beginning: Similar to material objects, some informations

More information

ENTERPRISE EDITION INSTALLER END USER LICENCE AGREEMENT THIS AGREEMENT CONSISTS OF THREE PARTS:

ENTERPRISE EDITION INSTALLER END USER LICENCE AGREEMENT THIS AGREEMENT CONSISTS OF THREE PARTS: ENTERPRISE EDITION INSTALLER END USER LICENCE AGREEMENT THIS AGREEMENT CONSISTS OF THREE PARTS: A. VNC SERVER ENTERPRISE EDITION END USER LICENCE AGREEMENT B. VNC VIEWER ENTERPRISE EDITION END USER LICENCE

More information

POLICY STATEMENT TO REGULATION 55-103 RESPECTING INSIDER REPORTING FOR CERTAIN DERIVATIVE TRANSACTIONS (EQUITY MONETIZATION)

POLICY STATEMENT TO REGULATION 55-103 RESPECTING INSIDER REPORTING FOR CERTAIN DERIVATIVE TRANSACTIONS (EQUITY MONETIZATION) POLICY STATEMENT TO REGULATION 55-103 RESPECTING INSIDER REPORTING FOR CERTAIN DERIVATIVE TRANSACTIONS (EQUITY MONETIZATION) The members of the Canadian Securities Administrators (the CSA) that have adopted

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

XYZ Co. shall pay $200 per hour to each of Lawyer A and Lawyer B for additional time (including travel) spent beyond the initial eight hours.

XYZ Co. shall pay $200 per hour to each of Lawyer A and Lawyer B for additional time (including travel) spent beyond the initial eight hours. LEGAL ETHICS OPINION 1715 SETTLEMENT AGREEMENT; FUTURE CONFLICTS; RESTRICTION OF LAWYER'S PRACTICE. This responds to your letter dated December 15, 1997, requesting an advisory opinion that addresses a

More information

THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995

THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 [St.-135] THE CABLE TELEVISION NETWORKS (REGULATION) ACT, 1995 CHAPTER I PRELIMINARY 1. Short title, extent and commencement 137 2. Definitions 137 CHAPTER II REGULATION OF CABLE TELEVISION NETWORK 3.

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

Special Purpose Reports on the Effectiveness of Control Procedures

Special Purpose Reports on the Effectiveness of Control Procedures Auditing Standard AUS 810 (July 2002) Special Purpose Reports on the Effectiveness of Control Procedures Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation

More information

REVISITING DIRECTOR AND OFFICER INDEMNIFICATION: PROVISIONS IN THE NEW D.C. NONPROFIT ACT

REVISITING DIRECTOR AND OFFICER INDEMNIFICATION: PROVISIONS IN THE NEW D.C. NONPROFIT ACT Updated July 2015 REVISITING DIRECTOR AND OFFICER INDEMNIFICATION: PROVISIONS IN THE NEW D.C. NONPROFIT ACT 1. Initial Considerations The District of Columbia has recently modernized its statute dealing

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Open Source Announcement

Open Source Announcement Open Source Announcement A software component of this product incorporates source code covered under the GNU Lesser General Public License (LGPL). Acknowledgement: The software included in this product

More information

Architects and Intellectual Property: Protecting Your Building Plans and Designs

Architects and Intellectual Property: Protecting Your Building Plans and Designs Architects and Intellectual Property: Protecting Your Building Plans and Designs Michael Bampton, Partner 1 Introduction Architects are engaged to provide a wide range of services including preparing drawings,

More information

A Guide to Copyright. for Canadian Hospitals 2013: An Instructional Resource

A Guide to Copyright. for Canadian Hospitals 2013: An Instructional Resource A Guide to Copyright for Canadian Hospitals 2013: An Instructional Resource By: Jan Figurski Mary McDiarmid Ontario Health Libraries Association (OHLA), 2013 CONTENTS PURPOSE AND USE OF THIS GUIDE 3 WHAT

More information

A PRIMER ON LAWS APPLICABLE TO PHOTOGRAPHERS

A PRIMER ON LAWS APPLICABLE TO PHOTOGRAPHERS A PRIMER ON LAWS APPLICABLE TO PHOTOGRAPHERS by William L. Schuette, Esq. Jones, Walker 8555 United Plaza Blvd. 225.248.2056 225.773.1308 985.237.4078 wschuette@joneswalker.com wlschuette@yahoo.com William

More information

Regular Session, 2008. ACT No. 858. To amend and reenact R.S. 9:3573.1, 3573.2(A), 3573.3(1), (8), (9) and (10), 3573.4,

Regular Session, 2008. ACT No. 858. To amend and reenact R.S. 9:3573.1, 3573.2(A), 3573.3(1), (8), (9) and (10), 3573.4, Regular Session, 0 SENATE BILL NO. ACT No. BY SENATOR MARIONNEAUX 0 AN ACT To amend and reenact R.S. :.,.(A),.(), (), () and (0),.,.(A)(),.0(C),.(B) and (C),.(B) and (C), and., and to repeal R.S. :.(),.,

More information

SENATE FILE NO. SF0083. Senator(s) Peterson and Representative(s) Harvey A BILL. for. AN ACT relating to Medicaid; creating the Wyoming Medicaid

SENATE FILE NO. SF0083. Senator(s) Peterson and Representative(s) Harvey A BILL. for. AN ACT relating to Medicaid; creating the Wyoming Medicaid 0 STATE OF WYOMING LSO-0 SENATE FILE NO. SF00 Medicaid fraud recovery. Sponsored by: Senator(s) Peterson and Representative(s) Harvey A BILL for AN ACT relating to Medicaid; creating the Wyoming Medicaid

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information