11 research outputs found

    The "Right to Privacy" v. telecommunications interception and access: International regulations and implementation in the Arab Region

    Get PDF
    The right to privacy is a complex and controversial issue. Concerns pertaining to the 'Right to Privacy' have often become a stumbling block when preparing draft laws on telecommunication, specifically those that relate to governmental interception and access, and can prompt governments to cancel the drafting of the law. Governments attempting to defend the right to invade citizens' privacy in communication, whilst at the same time adhering to international obligations, habitually have to face opposition. Recently though, the dual concerns of national security and public security have repeatedly been used as tools to shift away from privacy protection toward allowing telecommunications interception and access by governments when needed. Some Arab states have enacted interception and access laws, but only in an intermittent fashion, making it difficult to refer to it as a complete template for implementing an interception and access law. It is accepted that new, hi-tech systems are required to regulate the use of telecommunication tools so as to be in line with developed countries. The Arab states seem to be behind in introducing telecommunication legislations, or at least have not amended their laws to comprise interception and access in telecommunication. These states should be directed to securing a balanced approach between the rights of citizens and the necessary security needs. This paper seeks to outline the gaps in existing legislative order in Arab countries. It also attempts to draw some guidelines towards introducing effective regulatory systems for telecommunications interception and access law in the Arab world.qscienc

    A legal analysis of the Air Defense Identification Zone with special reference to the East China Sea air defense identification zone = Uma análise legal da Zona de Identificação de Defesa Aérea (ADIZ), com referência especial à zona de identificação de defesa aérea do Mar da China Oriental

    Get PDF
    DOI: 10.5102/rdi.v19i3.8455Discute o estabelecimento da Zona de Identificação de Defesa Aérea do Mar da China Oriental. Traça sua origem e justificativa, examinando sua base legal sob o Direito Internacional

    Designing a new regulatory framework for telecommunications (interception and access) in Jordan

    No full text
    2 page(s

    Social media: Adoption and legal issues impact on business innovation

    No full text
    Copyright © 2015 Inderscience Enterprises Ltd. This study explored the impact of the social media adoption, and the related legal issues on the business innovation within the Gulf Cooperation Council (GCC), particularly in Qatar. Qualitative and quantitative approaches have been used to gain a better understanding of these issues, and testing the impacts and relationships between factors. So, the current study mainly used both exploratory and explanatory techniques (qualitative and quantitative approaches). The study questions and hypotheses have been tested using the structural equation model (SEM). As a conclusion, the social media adoption by enterprises in Qatar has a positive influence on business innovation. In addition, some of the factors in business innovation, such as PBP, inventory management, new product invention and new market invention appear to be more important to success than other factors. Results also concluded that it is very believable that the social media adoption will condition legal issues, e.g., privacy law and security

    The Proportionality principle in telecommunications interception and access law in an environment of heightened security and technological convergence

    No full text
    As nations expand the telecommunications interception and access powers of their law enforcement agencies to address heightened threats to national security and accelerating technological convergence, the proper application of the proportionality principle is becoming an increasingly contentious issue. The 'proportionality principle' in telecommunications law mandates the weighing of a likely threat to public security against the potential violation of individual rights so as to ensure that the intrusive impact of a particular interception and access activity is reasonable proportionate to the potential outcome sought. The reform discourse of recent years has largely focused on expanding investigative powers, to the possible detriment of the protection of individual rights. Whilst the present environment makes such a focus wholly understandable, the present paper considers potential legislative and policy measures that could strengthen the proportionality principle in the telecommunications regulatory framework to support a more precise calibration of the relevant competing public and private interests. As Australia has recently undertaken a comprehensive review of its telecommunications access and interception laws, commencing with a 2013 referral to its Senate Committee and culminating in a 2015 law reform report, the article focuses on that nation's experience. The analysis is, however, placed within an overarching public policy framework to ensure that the discussion is of relevance to nations around the world who are similarly engaged in telecommunications law reform.18 page(s

    Application of electronic signatures in business and their influence on electronic commerce implementation

    No full text
    The internet has changed how participants around the world view telecommunications, buying, selling and transactions. Electronic Commerce (EC) and Electronic Signatures (ES) make it possible for enterprises to expand their business activities locally and globally. Quayle (2002) suggested that implementing ES leads to enhanced opportunities to increase competitiveness, to reach new partners, suppliers and markets, and to develop seller/buyer relationships. This paper will outline the nature of an electronic contract to explain that electronic signatures are built on digital signatures that are meant to guarantee authentication, integrity, privacy and nonrepudiation

    Strengthening data privacy: the obligation of organisations to notify affected individuals of data breaches

    No full text
    The Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth) introduced a new Part IIIC into the Privacy Act to strengthen the existing information privacy laws by requiring the designated organisations to notify the Information Commissioner and affected individuals of data breaches that are likely to cause serious harm. The objective of this article is to consider the proper public policy basis for data breach notification laws, the likely ambit of operation of the new provisions and the merits of the law in enhancing data security. Whilst the article focuses on the Australian legislative framework, the provisions European Union’s new General Data Protection Regulation 2016/679, 27 April 2016, will also be considered to extend the discussion of appropriate law in this area. The article will conclude by identifying continuing areas of concern and suggesting initiatives to further strengthen the data privacy of individuals

    The integration of social media in the delivery of unit materials: A comparative examination of the experience of Macquarie University and Qatar University

    No full text
    Social media is an important technological and cultural development with which the new generation of students are intimately familiar and use on a daily basis. As a communications tool social media has vast and varied potential and capabilities. That potential should also be unlocked in the educational space. The social media platforms of Facebook and Twitter were used in undergraduate units at Qatar University (Doha, Qatar) and Macquarie university (Sydney, Australia) as a means to engage students. Social media was used to disseminate course announcements into the social media space and encourage students to more fully participate in all aspects of the learning experience. The main online portals for LAWC 217 (QU) remained Blackboard and for BUSL250 (MQ) it remained iLearn (moodle). Social media was used in a supporting manner in both contexts. The response from students at Qatar university was strong in relation to twitter in comparison with the utilisation of Twitter by students at Macquarie university. This difference raised important pedagogical questions as well as considerations in relation to the institutional infrastructre in place at both institutions. Qatar University is developing its social media strategy for online teaching. It has a policy framework in place but it is not widely disseminated among the faculty. By comparison Macquarie University has a strong social media presence, a robust guidelines and policy framework and a managerial predisposition to supporting and educating the faculty regarding these types of innovation. Three main points emerge from this comparison and require further research. 1. This preliminary comparison shows that cultural differences may contribute to the type of social media platforms students will engage in. What is the nature of this correlation and how can it be accounted for?2. Institutional differences in relation to policy and strategic support for the use of social media exist across institutions. To what extent does institutional support help of hinder the greater use of social media in unit delivery? 3. At both institutions, students were unaware how pervasisve their social media presence was and sometimes used the medium in an unproffessional or questionable manner. Is there scope for enhancing student proffessionalism in preparation for their 'working life' through the use of social media?
    corecore