Violence Against Women Journalists, Its Causes and Consequences
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Sexual Aggression and the Civil Response, Annual Review of Civil
ANNUAL REVIEW OF CIVIL LITIGATION 2018 THE HONOURABLE MR.JUSTICE TODD L. ARCHIBALD SUPERIOR COURT OF JUSTICE (ONTARIO) # 2018 Thomson Reuters Canada NOTICE AND DISCLAIMER: All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher (Thomson Reuters Canada, a division of Thomson Reuters Canada Limited). Thomson Reuters Canada and all persons involved in the preparation and sale of this publication disclaim any warranty as to accuracy or currency of the publication. This publication is provided on the understanding and basis that none of Thomson Reuters Canada, the author/s or other persons involved in the creation of this publication shall be responsible for the accuracy or currency of the contents, or for the results of any action taken on the basis of the information contained in this publication, or for any errors or omissions contained herein. No one involved in this publication is attempting herein to render legal, accounting or other professional advice. If legal advice or other expert assistance is required, the services of a competent professional should be sought. The analysis contained herein should in no way be construed as being either official or unofficial policy of any governmental body. A cataloguing record for this publication is available from Library and Archives Canada. ISBN 978-0-7798-8457-5 Scan the QR code to the right with your smartphone to send your comments regarding our products and services. Free QR Code Readers are available from your mobile device app store. -
Mauritius's Constitution of 1968 with Amendments Through 2016
PDF generated: 26 Aug 2021, 16:39 constituteproject.org Mauritius's Constitution of 1968 with Amendments through 2016 This complete constitution has been generated from excerpts of texts from the repository of the Comparative Constitutions Project, and distributed on constituteproject.org. constituteproject.org PDF generated: 26 Aug 2021, 16:39 Table of contents CHAPTER I: THE STATE AND THE CONSTITUTION . 7 1. The State . 7 2. Constitution is supreme law . 7 CHAPTER II: PROTECTION OF FUNDAMENTAL RIGHTS AND FREEDOMS OF THE INDIVIDUAL . 7 3. Fundamental rights and freedoms of the individual . 7 4. Protection of right to life . 7 5. Protection of right to personal liberty . 8 6. Protection from slavery and forced labour . 10 7. Protection from inhuman treatment . 11 8. Protection from deprivation of property . 11 9. Protection for privacy of home and other property . 14 10. Provisions to secure protection of law . 15 11. Protection of freedom of conscience . 17 12. Protection of freedom of expression . 17 13. Protection of freedom of assembly and association . 18 14. Protection of freedom to establish schools . 18 15. Protection of freedom of movement . 19 16. Protection from discrimination . 20 17. Enforcement of protective provisions . 21 17A. Payment or retiring allowances to Members . 22 18. Derogations from fundamental rights and freedoms under emergency powers . 22 19. Interpretation and savings . 23 CHAPTER III: CITIZENSHIP . 25 20. Persons who became citizens on 12 March 1968 . 25 21. Persons entitled to be registered as citizens . 25 22. Persons born in Mauritius after 11 March 1968 . 26 23. Persons born outside Mauritius after 11 March 1968 . -
LANDMINE MONITOR REPORT 2002: Toward a Mine-Free World
LANDMINE MONITOR REPORT 2002: Toward a Mine-Free World www.icbl.org/lm/2002 KEY DEVELOPMENTS SINCE MARCH 2001 STATES PARTIES ALBANIA: On 4 April 2002, Albania completed the destruction of its stockpile of 1,683,860 antipersonnel mines. No mines are being retained for training or development purposes. Albania has identified a total of 85 contaminated areas, totaling 14 million square meters of land. Lack of funding has hampered clearance efforts. During 2001, a total of 302,000 square meters of land was cleared, including 744 antipersonnel mines. There were nine new mine and UXO casualties in 2001, a significant reduction from the previous year. Albania submitted its initial Article 7 Report in April 2002. ALGERIA: Algeria ratified the Mine Ban Treaty on 9 October 2001, and the treaty entered into force for Algeria on 1 April 2002. An interministerial commission responsible for the landmine issue is being established. ANGOLA: Angola ratified the Mine Ban Treaty on 5 July 2002. There have been no reports of new use of antipersonnel mines since the April 2002 peace agreement. The government created a new Inter-Sectoral Commission on Demining and Humanitarian Assistance to be responsible for policy-making, coordination of mine action and victim assistance, and the design of a new National Mine Action Plan. According to the mine action NGOs operating in Angola, 6.8 million square meters of land were cleared during 2001. A total of 339 mine and UXO accidents, resulting in 660 casualties, were reported in 2001, a significant decline from the year 2000. ARGENTINA: Argentina told Landmine Monitor that of the 13,025 mines it had officially declared as retained for training purposes, 12,025 will be emptied of their explosive content to make inert “exercise mines.” Argentina also reported for the first time that the Army will keep 1,160 FMK-1 antipersonnel mines to use as fuzes for antivehicle mines, apparently for training purposes. -
Criminal Background Check Procedures
Shaping the future of international education New Edition Criminal Background Check Procedures CIS in collaboration with other agencies has formed an International Task Force on Child Protection chaired by CIS Executive Director, Jane Larsson, in order to apply our collective resources, expertise, and partnerships to help international school communities address child protection challenges. Member Organisations of the Task Force: • Council of International Schools • Council of British International Schools • Academy of International School Heads • U.S. Department of State, Office of Overseas Schools • Association for the Advancement of International Education • International Schools Services • ECIS CIS is the leader in requiring police background check documentation for Educator and Leadership Candidates as part of the overall effort to ensure effective screening. Please obtain a current police background check from your current country of employment/residence as well as appropriate documentation from any previous country/countries in which you have worked. It is ultimately a school’s responsibility to ensure that they have appropriate police background documentation for their Educators and CIS is committed to supporting them in this endeavour. It is important to demonstrate a willingness and effort to meet the requirement and obtain all of the paperwork that is realistically possible. This document is the result of extensive research into governmental, law enforcement and embassy websites. We have tried to ensure where possible that the information has been obtained from official channels and to provide links to these sources. CIS requests your help in maintaining an accurate and useful resource; if you find any information to be incorrect or out of date, please contact us at: [email protected]. -
Preventing and Fighting the Rise of Online Sextortion and Gender Based Digital Violence
European Crime Prevention Award (ECPA) Annex I – new version 2014 Please complete the template in English in compliance with the ECPA criteria contained in the RoP (Par.2 §3). General information 1. Please specify your country. Spain 2. Is this your country’s ECPA entry or an additional project? It is Spain’s ECPA entry 3. What is the title of the project? Preventing and fighting the rise of online Sextortion and Gender Based Digital Violence 4. Who is responsible for the project? Contact details. Jorge Flores, Founder and Director of PantallasAmigas. E-mail: [email protected] mobile:+34 605 72 81 21 5. Start date of the project (dd/mm/yyyy)? Is the project still running (Yes/No)? If not, please provide the end date of the project. 07/05/2009. The project is still running and is comprised of several of the following elements: awareness campaigns, interactive games, booklets and guides for teachers and educators, intervention protocols for victims, blogs and complaint forms. 6. Where can we find more information about the project? Please provide links to the project’s website or online reports or publications (preferably in English). A chapter for Harvard and UNICEF’s Digitally Connected ebook was written to explain the work on this ongoing project. The chapter is titled “Sexting: Teens, Sex, Smartphones and the Rise of Sextortion and Gender Based Digital Violence” and is available in the following link: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2585686 The full project is at the moment available only in Spanish -
Digital Blackmail As an Emerging Tactic 2016
September 9 DIGITAL BLACKMAIL AS AN EMERGING TACTIC 2016 Digital Blackmail (DB) represents a severe and growing threat to individuals, small businesses, corporations, and government Examining entities. The rapid increase in the use of DB such as Strategies ransomware; the proliferation of variants and growth in their ease of use and acquisition by cybercriminals; weak defenses; Public and and the anonymous nature of the money trail will only increase Private Entities the scale of future attacks. Private sector, non-governmental organization (NGO), and government cybersecurity experts Can Pursue to were brought together by the Office of the Director of National Contain Such Intelligence and the Department of Homeland Security to determine emerging tactics and countermeasures associated Attacks with the threat of DB. In this paper, DB is defined as illicitly acquiring or denying access to sensitive data for the purpose of affecting victims’ behaviors. Threats may be made of lost revenue, the release of intellectual property or sensitive personnel/client information, the destruction of critical data, or reputational damage. For clarity, this paper maps DB activities to traditional blackmail behaviors and explores methods and tools, exploits, protection measures, whether to pay or not pay the ransom, and law enforcement (LE) and government points of contact for incident response. The paper also examines the future of the DB threat. Digital Blackmail as an Emerging Tactic Team Members Name Organization Caitlin Bataillon FBI Lynn Choi-Brewer -
Sentencing Guidelines Offense Table (Updated 11/2/20)
Appendix A Sentencing Guidelines Offense Table (Updated 11/2/20) Appendix A contains a table of guidelines offenses including their CJIS code, statutory source, seriousness category, and penalties. If an offense is not listed in Appendix A and the offense has a maximum penalty of one year or less, the offense should be identified as a category VII offense. If an offense is not listed in Appendix A and the maximum penalty is greater than one year, the individual completing the worksheet should use the seriousness category for the closest analogous offense and the sentencing judge and the parties should be notified. If there are any questions about how to categorize or score an offense, please call the Maryland State Commission on Criminal Sentencing Policy staff at (301) 403-4165. November 2020 121 INDEX OF OFFENSES Abuse & Other Offensive Conduct ......................... 1 Kidnapping & Related Crimes .............................. 33 Accessory After the Fact ......................................... 2 Labor Trafficking ................................................... 33 Alcoholic Beverages ................................................ 2 Lotteries ................................................................. 33 Animals, Crimes Against ......................................... 3 Machine Guns ........................................................ 34 Arson & Burning ...................................................... 3 Malicious Destruction & Related Crimes ............. 34 Assault & Other Bodily Woundings ....................... -
Handbook for the Judiciary on Effective Criminal Justice
Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls Cover photo: ©iStock.com/Berezko UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls UNITED NATIONS Vienna, 2019 © United Nations Office on Drugs and Crime, 2019. All rights reserved. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitations of its frontiers or boundaries. Mention of firm names and com- mercial products does not imply the endorsement of the United Nations. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements The Handbook for the Judiciary on Effective Criminal Justice Responses to Gender-based Violence against Women and Girls has been prepared for the United Nations Office on Drugs and Crime (UNODC) by Eileen Skinnider, Associate, International Centre for Criminal Law Reform and Criminal Justice Policy. A first draft of the handbook was reviewed and discussed during an expert meeting held in Vienna from 26 to 30 November 2018. UNODC wishes to acknowledge the valuable suggestions and contri- butions of the following experts who participated in that meeting: Ms. Khatia Ardazishvili, Ms. Linda Michele Bradford-Morgan, Ms. Aditi Choudhary, Ms. Teresa Doherty, Ms. Ivana Hrdličková, Ms. Vivian Lopez Nuñez, Ms. Sarra Ines Mechria, Ms. Suntariya Muanpawong, Ms. -
Revenge Porn and Tort Remedies for Public Figures
William & Mary Journal of Race, Gender, and Social Justice Volume 24 (2017-2018) Issue 1 William & Mary Journal of Women and the Law: 2017 Special Issue: Enhancing Article 9 Women's Effect on Law Enforcement in the Age of Police and Protest November 2017 When Fame Takes Away the Right to Privacy in One's Body: Revenge Porn and Tort Remedies for Public Figures Caroline Drinnon Follow this and additional works at: https://scholarship.law.wm.edu/wmjowl Part of the Law and Gender Commons, Privacy Law Commons, and the Torts Commons Repository Citation Caroline Drinnon, When Fame Takes Away the Right to Privacy in One's Body: Revenge Porn and Tort Remedies for Public Figures, 24 Wm. & Mary J. Women & L. 209 (2017), https://scholarship.law.wm.edu/wmjowl/vol24/iss1/9 Copyright c 2017 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmjowl WHEN FAME TAKES AWAY THE RIGHT TO PRIVACY IN ONE’S BODY: REVENGE PORN AND TORT REMEDIES FOR PUBLIC FIGURES INTRODUCTION I. A COMMON PHENOMENON—EXAMPLES OF INVASION OF PRIVACY OF PUBLIC FIGURES A. Harms Suffered by Victims of the Distribution of Nonconsensual Pornography B. Legal Remedies Imposed in the “Celebgate” Hacking and Leak Incident II. CIVIL REMEDIES FOR NON–PUBLIC FIGURE VICTIMS OF REVENGE PORN A. Intentional Infliction of Emotional Distress B. Invasion of Privacy Based on Public Disclosure of Private Facts III. HISTORY OF DENYING PRIVACY REMEDIES FOR PUBLIC FIGURES A. What Is a “Public Figure”? B. Distinction Between Public and Private Figures in Privacy-Related Causes of Actions C. -
Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section). -
Revenge Pornº: an Evaluation of the Elements That Make an Effective Nonconsensual Pornography Statute
DECONSTRUCTING THE STATUTORY LANDSCAPE OF ªREVENGE PORNº: AN EVALUATION OF THE ELEMENTS THAT MAKE AN EFFECTIVE NONCONSENSUAL PORNOGRAPHY STATUTE Jonathan S. Sales and Jessica A. Magaldi* INTRODUCTION Changes in social mores and technology have yielded the phenomenon of sext- ing, which includes the capturing and forwarding of intimate images through the Internet.1 Research reveals that nearly ®fty percent of adults in the United States have sent or received intimate digital content. 2 At the same time, the con¯uence of these changes has spawned new violations of privacy and predatory actions when these images are made available on the Internet without the subject's consent.3 The re-distribution or dissemination of these intimate images without the consent of the subject and without a legitimate purpose (such as a law enforcement investigation) is referred to as nonconsensual pornography (ªNCPº). 4 NCP has caused victims to suffer substantial harm.5 In some cases, NCP inci- dents have precipitated a victim's suicide.6 Prior generations might have concluded that a person who allowed such images to be captured and placed in the possession of another person assumed the risk of re-distribution; in essence, a negligence, recklessness, or constructive consent argument. In contrast, in the twenty-®rst cen- tury, capturing or sharing of intimate images is often regarded as an acceptable * Jonathan S. Sales, J.D., Northeastern University School of Law, Lecturer, Bentley University; Jessica A. Magaldi, J.D., New York University School of Law, Associate Professor, Pace University. The authors gratefully acknowledge the research support of Clifton M. Chow, Ph.D., Research Consultant at Bentley University; Peng Zhang and Piotr Kolodzie, Graduate Assistants at Bentley University; and Primrose Zvinavashe, LL.B, LL.M, Graduate Assistant at Pace University. -
Mauritius - United States Department of State
Mauritius - United States Department of State https://www.state.gov/reports/2020-trafficking-in-persons-report/mauritius/ The Government of Mauritius does not fully meet the minimum standards for the elimination of trafficking but is making significant efforts to do so. The government demonstrated overall increasing efforts compared to the previous reporting period; therefore Mauritius remained on Tier 2. These efforts included convicting two traffickers, providing protective services to all identified victims, and conducting nationwide campaigns to raise awareness of trafficking. The government established and allocated funds for its first shelter for adult trafficking victims during the reporting period. The government continued to screen migrant workers for trafficking indicators upon their arrival to the country and through inspections of migrant worker employment sites. However, the government did not meet the minimum standards in several key areas. The government continued to lack standard operating procedures to identify and refer adult victims to comprehensive protection services, and no government ministry took responsibility for leading efforts to combat adult sex trafficking. While the government established a shelter for adult victims, authorities’ lack of expertise hindered shelter operations. Coordination between law enforcement and prosecutors slightly improved; however, the judicial process continued to be prohibitively slow, discouraging some victims from pursing legal redress. The government did not adopt a national action plan for the sixth consecutive year. Improve comprehensive protection services for adult trafficking victims by developing and implementing standardized procedures for proactive victim identification and referral to protective services—especially among at-risk populations including individuals in commercial sex and migrant workers—and by ensuring provision of adequate assistance once identified.