LC Paper No. CB(2)654/14-15(03) for Discussion on 3 February 2015
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Pre-Arriv Al Guide
PRE-ARRIVAL GUIDE 2013–14 II SCAD HONG KONG PRE-ARRIVAL GUIDE CONTENTS HONG KONG AND SHAM SHUI PO LIVING IN HONG KONG Hong Kong 1 Hong Kong identity card 6 Sham Shui Po district 1 Residence halls 6 Electricity 6 ARRIVAL AND DEPARTURE Water 7 Passports/visas 2 Renters insurance 7 Immigration requirements 2 Currency 7 Arrival 3 Currency exchange 7 Check-in at student residence 3 Banking 7 Departure 3 Weather 8 Clothing 8 ORIENTATION AND ENGLISH Books and art supplies 8 LANGUAGE ASSESSMENT Travel 8 Orientation 3 POLICIES ESL assessment 3 Making payments to SCAD Hong Kong 8 HEALTH AND SAFETY SCAD Card 9 Insurance 4 CONDUCT AND BEHAVIOR Health 4 Student handbook 9 Safety 4 Conduct 9 Emergencies 5 Alcohol 9 Lost passport 5 Drugs 9 LOCAL TRANSPORTATION Smoking 9 MTR 5 CONTACT INFORMATION 9 Buses, trams, taxis and ferries 5 Air 5 FACILITIES MAP 10 Octopus Card 5 COMMUNICATION Time 6 Telephones 6 Mobile phones 6 Computers/Internet 6 VoIP 6 SCAD HONG KONG PRE-ARRIVAL GUIDE III CONGRATULATIONS ON YOUR ACCEPTANCE TO SCAD! HONG KONG AND SHAM SHUI PO Hong Kong: An international gateway to Asia, Hong Kong is a bustling global metropolis accessible by several major airlines A short plane ride from metropolitan centers of Taiwan, Thailand, Malaysia, Singapore and Indonesia, Hong Kong is also in close proximity to Japan, Korea and Australia Mainland China and the city of Guangzhou, the country’s third largest city, are a short train ride away Hong Kong is a one-hour trip by boat from the island of Macau, a former Portuguese colony with a unique blend of -
Registration → Guidelines on Completing the CC Code and Name Field) for Reference
236/421 THE UNIVERSITY OF HONG KONG Guide to Online Master Registration 1. After you obtained your HKU Portal account details, you should immediately login to http://hkuportal.hku.hk, click “Self-Service” under “MyPage”, then click “Master Registration” to complete your online Master Registration. If you do not complete online Master Registration, your Student Registration Card cannot be issued and you cannot enroll on any course. 2. There are 6 pages in the Master Registration form. Pages 1 to 5 are for data input. Page 6 is the confirmation page. After completing each page, press “Save & Next” to go to the next page. When you have reviewed the information on Page 6, press “Submit” to confirm the data you have entered. After pressing the “Submit” button, you will see an acknowledgement page. Logout from the system and close all the browser windows. How to complete the online Master Registration Please take note of the following when you fill in the registration form: (a) University Number and Degree Curriculum These fields will be pre-entered for you on the basis of information extracted from your admission records. No changes will be allowed. (b) Name You should enter your name as it appears in your HKID Card, Passport or Exit-Entry Permit for Travelling to and from Hong Kong and Macau (往来港澳通行证). Do not enter a comma to separate your Christian name. Also, do not enter a name different from your HKID Card or Passport, your Student Registration Card, degree diploma and other documents from the University will be issued with an unofficial name. -
Guide to Shipping Register and Shipping Tax Regime in Hong Kong Contents
Guide to Shipping Register and Shipping Tax Regime in Hong Kong Contents The Hong Kong Shipping Register 1 Taxation of Shipping Profits in Hong Kong 8 Schedule 12 The Hong Kong Shipping Register Until 3 December 1990, the United Kingdom Merchant Shipping Acts (the “Acts”) (except for the Merchant Shipping Act 1988) applied to registration of ships and to mortgages of ships in Hong Kong. A ship registered at the Port of Hong Kong was, therefore, a British ship. Hong Kong reverted to Chinese sovereignty on 1 July 1997 and became a Special Administrative Region of the People’s Republic of China. Section VIII of Annex I to the Sino- British Joint Declaration which relates to the transfer of sovereignty states that: “The Hong Kong Special Administrative Region shall maintain Hong Kong’s previous systems of shipping management and shipping regulation, including the system for regulating conditions of seamen. The specific functions and responsibilities of the Hong Kong Special Administrative Region Government in the field of shipping shall be defined by the Hong Kong Special Administrative Region Government on its own. Private shipping businesses and shipping-related businesses and private container terminals in Hong Kong may continue to operate freely. The Hong Kong Special Administrative Region shall be authorised by the Central People’s Government to continue to maintain a shipping register and issue related certificates under its own legislation in the name of ‘Hong Kong, China’.” The Hong Kong Government appointed a Steering Committee in 1987 to advise the Government on the establishment of an independent shipping registry. The result was enacted as the Merchant Shipping (Registration) Ordinance (Cap 415) (the “Ordinance”), which came into effect on 3 December 1990. -
Cloud App Security Administration Guide For
Cloud App Security Administration Guide for Office 365 and Microsoft 365 Contents Understanding Cloud App Security 6 Understanding Email Security 6 Using Data Leak Protection 7 Understanding Anomalies 8 Understanding Click-Time Protection 8 Configuring Cloud App Security 10 Subscribing to Cloud App Security 10 Activating Cloud Applications for Cloud App Security 11 Activating Office 365 and Microsoft 365 Cloud Applications 13 Manually Configuring Office 365 and Microsoft 365 Cloud Applications During Activation 17 Managing Quarantine for Office 365 and Microsoft 365 29 Setting Up a Quarantine Mailbox for Office 365 and Microsoft 365 Email (Exchange Online) 29 Setting Up a Quarantine Folder for Office 365 and Microsoft 365 OneDrive 30 Setting Up a Quarantine Folder for Office 365 and Microsoft 365 SharePoint 30 Using the Quarantine View for Office 365 and Microsoft 365 Email (Exchange Online) 31 Using the Quarantine Page 32 Using the Quarantined File Creator Dashboard 33 Using the User Dashboard for Office 365 and Microsoft 365 34 Managing Restore Requests 35 Using the SonicWall Cloud App Security Dashboard 36 Using the Security Events Widgets 37 Changing a Security Event Widget to an Alert or Custom Query 38 Resetting a Security Event Widget 38 Hiding a Security Event Widget 39 Configuring Security Event Widget Custom Queries 39 Adjusting the Time Scale 40 Viewing the Summary of Security Events 40 Viewing Login Events 42 Viewing Secured Applications 44 Viewing the Scanned Files Summary 45 Managing Security Events 46 Using the Security -
Immigration Manual
Immigration Manual November 2006 Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a “partner” means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an “office” means an office of any such law firm. © 2006 Baker & McKenzie All rights reserved. This publication is copyright. Apart from any fair dealing for the purposes of private study or research permitted under applicable copyright legislation, no part may be reproduced or transmitted by any process or means without prior written permission. IMPORTANT DISCLAIMER. The material in this booklet is of the nature of general comment only. It is not offered as advice on any particular matter and should not be taken as such. The firm and the contributing authors expressly disclaim all liability to any person in respect of anything and in respect of the consequences of anything done or omitted to be done wholly or partly in reliance upon the whole or any part of the contents of this booklet. No client or other reader should act or refrain from acting on the basis of any matter contained in it without taking specific professional advice on the particular facts and circumstances in issue. Immigration Manual Immigration Manual INTRODUCTION This manual is designed to provide a general overview of the immigration laws and procedures of various countries. Please note that the immigration laws and procedures are constantly changing and are subject to new policies and developments. Therefore, this manual is not intended to be exhaustive and specific questions should be directed to the Executive Transfer and Immigration Department of Baker & McKenzie, Hong Kong. -
St Sar Eid Whitepaper 101007Fi
Edition1 /2007 The SECURE Application Review No portion of this publication may be is a Silicon Trust Program reproduced in part or in whole without publication, sponsored by the express permission, in writing, from Infineon Technologies AG. the publisher. All product copyrights Editorial Team and trademarks are the property of their Wendy Atkins, Rainer Bergmann, respective owners. All product names, Dr. Detlef Houdeau, Nicole Mountain specifications, prices and other infor- mation are correct at the time of going Project Development to press but are subject to change Krowne Communications GmbH, without notice. The publisher takes no Berlin, Germany responsibility for false or misleading This copy of SECURE Application information or omissions. Review is Copyright 2007 by Infineon Technologies AG. Further Information can be found at: Any comments may be addressed to www.silicon-trust.com [email protected] SECURE Application Review: CITIZEN CARDS C O NTENT S Definitions .................................................................................................................................4 Part 1 – Overview & market dynamics Change and citizen empowerment ......................................................................................7 Part 2 – Applications A smart way to deal with government applications ........................................................12 Partner Inputs: Precise Biometrics .....................................................................................21 Part 3 – Form factors Matching -
Digital Identification: a Key Identification: Todigital Inclusive Growth
Digital identification: A key to inclusive growth inclusive Digital to identification: key A Digital identification A key to inclusive growth April 2019 McKinsey Global Institute Since its founding in 1990, the McKinsey Global Institute (MGI) has sought to develop a deeper understanding of the evolving global economy. As the business and economics research arm of McKinsey & Company, MGI aims to provide leaders in the commercial, public, and social sectors with the facts and insights on which to base management and policy decisions. MGI research combines the disciplines of economics and management, employing the analytical tools of economics with the insights of business leaders. Our “micro-to-macro” methodology examines microeconomic industry trends to better understand the broad macroeconomic forces affecting business strategy and public policy. MGI’s in-depth reports have covered more than 20 countries and 30 industries. Current research focuses on six themes: productivity and growth, natural resources, labor markets, the evolution of global financial markets, the economic impact of technology and innovation, and urbanization. Recent reports have assessed the digital economy, the impact of AI and automation on employment, income inequality, the productivity puzzle, the economic benefits of tackling gender inequality, a new era of global competition, Chinese innovation, and digital and financial globalization. MGI is led by three McKinsey & Company senior partners: Jacques Bughin, Jonathan Woetzel, and James Manyika, who also serves as the chairman of MGI. Michael Chui, Susan Lund, Anu Madgavkar, Jan Mischke, Sree Ramaswamy, and Jaana Remes are MGI partners, and Mekala Krishnan and Jeongmin Seong are MGI senior fellows. Project teams are led by the MGI partners and a group of senior fellows and include consultants from McKinsey offices around the world. -
Enhanced Functionality Brings New Privacy
2018] T. Szádeczky: Enhanced Functionality Brings New Privacy ... 3 DOI 10.5817/MUJLT2018-1-1 ENHANCED FUNCTIONALITY BRINGS NEW PRIVACY AND SECURITY ISSUES – AN ANALYSIS OF EID* by TAMÁS SZÁDECZKY** As compared with traditional paper-based versions and the standard username- -password login to e-Government services, the new electronic identity and travel documents have made on-site electronic and on-line authentication of citizen more comfortable and secure. The biometric passport was introduced in Hungary in 2006. A decade later the electronic identity card (eID) was implemented. The reason for the improvement of such documents is twofold: enhancing security features and performing new functions. The development is certainly welcome, but it also generates new types of risks, with which governments and citizens must take into account. In this paper, I will first analyze the most widespread technologies of data storage cards from the passive elements to the chipcards, including the biometric passport. The objective is to provide an overview of the technical development as a background to my paper. I will then proceed to an analysis of the relevant EU and national legal background, data elements, data protection and the functions (ePASS, eID, eSIGN) of the new Hungarian and German identity card, as well as the security risks and protection properties of the eID-type documents. The paper concludes with a summary of the lessons learned from and the risks involved in the current solutions in Hungary and Germany. * The work was created in commission of the National University of Public Service under the priority project KÖFOP-2.1.2-VEKOP-15-2016-00001 titled „Public Service Development Establishing Good Governance” in the Miklós Zrínyi Habilitation Program. -
Der Personalausweis Der the German Identity Card Identity German The
The German identity card Der Personalausweis On 2 August 2021, the new design of the German Ab dem 2. August 2021 wird der Personalausweis im national identity card will be launched. The new neuen Design eingeführt. Äußerlich erkennbar ist design is distinguished by an EU flag, in line with Der Personalausweis das neue Design an der EU-Flagge, welche ab dem Regulation (EU) 2019/1157. 2. August 2021 ebenso auf allen Personalausweisen der The German identity card EU Mitgliedstaaten eingeführt wird. Damit setzt This leaflet explains the key security features of the Deutschland die Vorgaben der Verordnung (EU) new ID card. Many familiar features have been brought 2019/1157 um. into line with the latest technology and some new high-security features have been added. These In diesem Flyer werden die wesentlichen improvements continue to enable the reliable detection Sicherheitsmerkmale erläutert. Viele bekannte of misuse, counterfeiting or forgery of the ID card. Merkmale wurden auf den neuesten Stand der Technik weiterentwickelt sowie um weitere, hochsichere The online ID function (eID) remains an integral part Merkmale ergänzt. Damit können Missbrauch, of the ID card. Furthermore, two fingerprints are Verfälschung oder Totalfälschung auch weiterhin stored in the chip. As soon as the card is issued, the zuverlässig erkannt werden. fingerprints are deleted from the records of the issuing authority and the card producer, as usual. With Die Online-Ausweisfunktion (eID) bleibt unveränderter fingerprints as an additional biometric feature, it is Bestandteil des Personalausweises. Ferner werden im easier for the competent authorities to detect misuse of Chip des Ausweises zwei Fingerabdrücke gespeichert. cards by persons of similar appearance to cardholders. -
Tax ID Table
Country Flag Country Name Tax Identification Number (TIN) type TIN structure Where to find your TIN For individuals, the TIN consists of the letter "E" or "F" followed by 6 numbers and 1 control letter. TINs for Número d’Identificació residents start with the letter "F." TINs for non-residents AD Andorra Administrativa (NIA) start with the letter "E". AI Anguilla N/A All individuals and businesses receive a TIN (a 6-digit number) when they register with the Inland Revenue Department. See http://forms.gov. AG Antigua & Barbuda TIN A 6-digit number. ag/ird/pit/F50_Monthly_Guide_Individuals2006.pdf CUIT. Issued by the AFIP to any individual that initiates any economic AR Argentina activity. The CUIT consists of 11 digits. The TIN is generated by an automated system after registering relevant AW Aruba TIN An 8-digit number. data pertaining to a tax payer. Individuals generally use a TFN to interact with the Australian Tax Office for various purposes and, therefore, most individuals have a TFN. This includes submitting income tax returns, reporting information to the ATO, obtaining The Tax File Number (TFN) is an eight- or nine-digit government benefits and obtaining an Australian Business Number (ABN) AU Australia Tax File Number (TFN) number compiled using a check digit algorithm. in order to maintain a business. TINs are only issued to individuals who are liable for tax. They are issued by the Local Tax Office. When a person changes their residence area, the TIN AT Austria TIN Consists of 9 digits changes as well. TINs are only issued to people who engage in entrepreneurial activities and AZ Azerbaijan TIN TIN is a ten-digit code. -
UNIVERSITY of CALIFORNIA SANTA CRUZ EVERYDAY IMAGININGS UNDER the LION ROCK: an ANALYSIS of IDENTITY FORMATION in HONG KONG a Di
UNIVERSITY OF CALIFORNIA SANTA CRUZ EVERYDAY IMAGININGS UNDER THE LION ROCK: AN ANALYSIS OF IDENTITY FORMATION IN HONG KONG A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in POLITICS by Sarah Y.T. Mak March 2013 The Dissertation of Sarah Y.T. Mak is approved: _______________________________ Professor Megan Thomas, Chair ________________________________ Professor Ben Read ________________________________ Professor Michael Urban ________________________________ Professor Lisa Rofel ______________________________________ Tyrus Miller Vice Provost and Dean of Graduate Studies Copyright © by Sarah Y.T. Mak 2013 TABLE OF CONTENTS List of Figures ..................................................................................................................... v Abstract ...............................................................................................................................vi Acknowledgments.........................................................................................................viii CHAPTER ONE: INTRODUCTION ..............................................................................................1 I. SETTING THE SCENE .......................................................................................................1 II. THE HONG KONG CASE ............................................................................................. 15 III. THEORETICAL STARTING POINTS ........................................................................... -
Octopus Cards Limited (“OCL”) Operates the Core Business of Octopus Cards in Hong Kong As an Electronic Payment System
Report Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Report Number: R10-9866 Date issued: 18 th October 2010 The Collection and Use of Personal Data of Members under the Octopus Rewards Programme run by Octopus Rewards Limited This report in respect of investigations carried out by the Commissioner pursuant to section 38(b) of the Personal Data (Privacy) Ordinance, Cap 486 (“the Ordinance”) against Octopus Rewards Limited and its holding company, Octopus Holdings Limited is published in the exercise of the power conferred on the Commissioner by Part VII of the Ordinance. Section 48(2) of the Ordinance provides that “the Commissioner may, after completing an investigation and if he is of the opinion that it is in the public interest to do so, publish a report – (a) setting out - (i) the result of the investigation; (ii) any recommendations arising from the investigation that the Commissioner thinks fit to make relating to the promotion of compliance with the provisions of this Ordinance, in particular the data protection principles, by the class of data users to which the relevant data user belongs; and (iii) such other comments arising from the investigation as he thinks fit to make; and (b) in such manner as he thinks fit.” ALLAN CHIANG Privacy Commissioner for Personal Data Table of Contents CHAPTER ONE INTRODUCTION .................................................................................... 5 BACKGROUND ..................................................................................................