Friday, 17 July 2020

Roscoe Pound and the Social Engineering Theory:1


Social Engineering: 
In America, the law school and the jurist enjoy a status superior to that of their counterparts in Great Britain. These factors have combined to produce an American movement in sociological jurisprudence lead by Roscoe Pound of the Harvard Law School. “The aim of Social Engineering is to build an efficient structure of the society as far as possible which involves the balancing of competing interests.” said Pound.
Functional approach to Law:
Pound’s approach was for a functional approach to law. Also, his approach harmonizes with that of the utilitarian school which propounds the greatest happiness of the greatest number of people. All he was mostly concerned about was the need for the legal order to influence societal needs so that the law would not appear foreign or alien to the people. He was, therefore, desirous of bridging the gap between the law in textbooks and the law in action.
In any case, lists of interests are only the products of personal opinion. Different writers have presented them differently. As Pound himself says, in most cases it is preferable to transfer individual interests on to the plane of social interests when considering them. It is the ideal with reference to which any interest is considered that matters, not so much the interest itself.
Pound concentrates more on the functional aspect of law, that is why some writers name his approach as ‘functional school’. For Pound, the law is an ordering of conduct so as to make the goods of existence and the means of satisfying claims go round as far as possible with the least friction and waste. According to him, the end of law should be to satisfy a maximum of wants with a minimum of friction.

Short Q n A: High voltage AC circuit breakers - 1

1. What are circuit breakers?
Answer. Circuit breakers are atomatic switches.

2. What is the function of circuit breakers?
Answer. prediction of the power system circuit or power supply circuit  or electrical equipment.

3. Which thing can be done by a circuit breaker?
Answer. Circuit breakers can interrupt fault currents.

4. What is pole?
Answer. The part of circuit breaker connected in one phase is called the pole.

5. What are single pole and triple pole circuit breakers?
Answer. single pole circuit breaker is suitable for single phase system triple pole circuit breaker is suitable for 3-phase system.

Wednesday, 1 July 2020

Inter Alia

Word or phrase Inter alia in a dictionary. — Stock Photo ...

Image Credit: depositphotos.com

1.    Inter Alia is a Latin phrase for "among other things."

2.    The phrase inter alia is used in sentences in place of the phrase “among other things,” to indicate that what is being discussed is just one of a number of items or possibilities.

3.    You use inter alia, meaning 'among other things', when you want to say that there are other things involved apart from the one you are mentioning.

4.    This phrase is often found in legal pleadings and writings to specify one example out of many possibilities. Example: "The judge said, inter alia, that the time to file the action had passed."

5.    This phrase is used in Pleading to designate that a particular statute set out therein is only a part of the statute that is relevant to the facts of the lawsuit and not the entire statute.

6.    Inter alia is also used when reporting court decisions to indicate that there were other rulings made by the court but only a particular holding of the case is cited.

7.    It is used to indicate that something is one out of a number of possibilities. For example, "he filed suit against respondents in state court, alleging, inter alia, a breach of contract."

8.    It was very firstly used in 1665.


Monday, 22 June 2020

Short Q & A: Big data ecosystem.


Hello law knowledge seekers. In this blog again there are short Q and A for you based on data protection.

cyber security and data protection
Image credit: www.tibco.com

Q. Enlist parts of Big Data Ecosystem?
Ans. Other technological developments such as artificial intelligence, machine learning, the Internet of Things are all part of the Big Data ecosystem and their use is becoming increasingly commonplace.

Q. What are the two different models of the data protection?
Ans. 1) European Union (EU) model and 2) American Marketplace Model

Q. What are the tree main perspectives of Data protection?
Ans. Protection of personal data -
1. Everyone has the right to the protection of personal data concerning him or her.
2. Such data must be processed fairly for specified purposes and on the basis of the consent of the person concerned or some other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it rectified.
3. Compliance with these rules shall be subject to control by an independent authority.

Q. What is main base of EU model?
Ans. The EU model or European Union Model of Data protection is completely based on the principle that right to privacy and right to protection of personal data are fundamental rights recognised by Article 765 and Article 866 of European charter of Fundamental Rights (EU charter).

Q. Enlist the sensitive personal data?
Ans. racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, and data concerning health and sex life etc. are sensitive personal data and should be collected in limit.

Q. Which principles must be complied for lawful and fair processing of personal data by an entity?
Ans. For processing to be lawful and fair, the entity collecting personal data must comply with an extensive range of principles such as that of purpose specification, data minimisation, data quality, security safeguards, etc.

Q. What are the individual participation rights guaranteed under law?
Ans. a) the right to confirm if data about oneself is being collected, b) the right to access data, c) the right to rectification of data, d) the right to data portability, e) the right to restrict processing, f) the right to erasure, g) the right to object to processing, h) the right to object to processing for the purpose of direct marketing, i) the right to object to automated decisions.

Q. What is the base of United States privacy policy?
Ans. In United States, privacy protection is essentially a liberty protection i.e. protection of the personal space from government.

Q. What are two trends in US model of data protection?
Ans. The US approach to data protection thus has two discernible trends— stringent norms for government processing of personal information; and notice and choice based models for private sector data processing.


Thanks for reading. On which subject you want notes - please comment. For more law notes please follow and share this blog.

Monday, 15 June 2020

Short Q & A: OECD


Hello law professionals and legal knowledge seekers. In this blog I am sharing some short Q & A about FIPPS and OECD. Both of them are the base of data protection law and information technology law across the globe.

Back to the Future in Device Security: Leveraging FIPPs to ...
Image Credit: www.isaca.org

Q. Enlist important FIPPS?
Ans. The FIPPS are as follows:
1. There must be no personal-data record-keeping systems whose very existence is secret.
2. There must be a way for an individual, to find out what information about him is in a record and how it is used.
3. There must be a way for an individual to prevent information about him obtained for one purpose from being used or made available for other purposes without his consent.
4. There must be a way for an individual to correct or amend a record of identifiable information about him.

Q. What is OECD?
Ans. Organisation for Economic Cooperation and Development who followed FIPPS in 1980s to create Privacy guidelines known as OECD guidelines.

Q. What is intention of OECD guidelines?
Ans. The OECD Guidelines were significantly inspired by the FIPPS and were intended to provide a framework for harmonising national privacy legislations amongst OECD members, while upholding human rights, and preventing interruptions in international flows of data.

Q. What is the base of data protection framework around the world?
Ans. The OECD guidelines are the base of any data protection framework around the world and are deemed to be the first internationally agreed upon statement of core information privacy principles.

Q. When did OECD guidelines updated?
Ans. OECD guidelines were updated in 2013 so that it handles the excessive use of personal data.

Q. What are the core privacy principles in 2013 OECD guidelines?
Ans. The 2013 OECD Guidelines keep the core privacy principles such as collection limitation, data quality and purpose specification etc. intact, several new elements to strengthen data safeguards have been introduced. These include: privacy management programs to enhance accountability of the data controller, data security breach notification which oblige data controllers to.

Q. What are the characteristics of Big Data?
Ans. Big Data is usually characterised by 3 Vs, namely 1) volume as in massive datasets, 2) velocity which relates to real time data, and 3) variety which relates to different sources of data.

Thanks for reading. Please comment the subject on which you want notes. Kindly share and follow this blog for more such law notes.

Tuesday, 9 June 2020

Short Q & A: Aadhaar Act


Here are some short Q and A on Aadhaar Act.

How, What, Why, UIDAI: Aadhaar verdict throws up as many questions ...

Q. What is full name of Aadhaar Act?
Ans. The Aadhaar (Targeted Delivery of Financial and other Subsidies, Benefits and Services) Act, 2016 (Aadhaar Act)
Q. What is purpose of Aadhaar Act?
Ans. The Aadhaar Act enables the Government to collect identity information from citizens including their biometrics, issue a unique identification number or an Aadhaar Number on the basis of such biometric information, and thereafter provide targeted delivery of subsidies, benefits and services to them.
Q. What is Aadhaar based authentication?
Ans. The Aadhaar Act also provides for Aadhaar based authentication services wherein a requesting entity (government / public and private entities / agencies) can request the Unique Identification Authority of India (UIDAI) to verify / validate the correctness of the identity information submitted by individuals to be able to extend services to them.
Q. Which type of consent is required in Aadhaar based authentication?
Ans. For Aadhaar Based Authentication the requesting entity is required to obtain the consent of the individual before obtaining his / her identity information for the purpose of authentication and must use his / her identity information only for the purpose of authentication.
Q. Which authority is established by Aadhaar Act?
Ans. The Aadhaar Act establishes an authority, namely, the UIDAI, which is responsible for the administration of the said Act.
Q. Which database is governed by Aadhaar Act?
Ans. It also establishes a Central Identities Data Repository (CIDR) which is a database holding Aadhaar Numbers and corresponding demographic and biometric information.

Thanks for reading till the end. Please share this blog and follow it for more law notes. Please comment the subject on which you want notes below.

Monday, 8 June 2020

Short Q & A: Privacy


Hello my law professionals and law knowledge seekers. This is short Q & A collection on Privacy law. Privacy is deeply related to data protection.

20 Important Data Privacy Questions You Should be Asking Now.jpg
Image Credit: cipher.com

Q. Does data protection affects all types of privacy?
Ans. Basically data protection is linked with informational privacy but also indirectly has impact on decisional privacy and physical privacy.

Q. How information privacy is a freedom to an individual?
Ans. Informational privacy is often understood as the freedom of individuals ―to determine for themselves when, how, and to what extent information about them is communicated to others and this freedom allows for individuals to protect themselves from harm.

Q. What is a key difference between defamation law and privacy law?
Ans. Laws on defamation generally prohibit disclosure of personal information only if it is false. Privacy, on the other hand, would even protect against disclosure of truthful personal information.

Q. What is a subjective harm to an individual?
Ans. A subjective harm is one where an individual has not actually suffered any tangible loss but anticipates such loss after personal information is collected. The uncertainty, anxiety and fear of potential observation are the identified harms in this situation.

Q. What is an objective harm to an individual?
Ans. Objective harms are separately identified when the use of one’s personal information actually results in some damage, whether through loss of reputation or through some other change in the treatment of the individual by society. Data protection must account for both these kinds of harms which arise as a result of unregulated collection and use of personal information.

Q. Which committee initialised the data protection need in United States?
Ans. Advisory Committee in the Department of Health, Education and Welfare (HEW Committee) of United States examined the various legal and technological issues raised vis-a-vis increasingly automated processing of data during 1970s.

Q. Name the landmark report of HEW committee of United States?
Ans. Records, Computers and the Rights of Citizens: Report of the Secretary’s Advisory Committee on Automated Personal Data Systems

Q. What are FIPPS?
Ans. The HEW committee’s report suggested Code of Fair Information Practices based on Fair Information Practices Principles (FIPPS). The FIPPS are a set of principles which prescribe how data should be handled, stored and managed to maintain fairness, privacy and security in a rapidly growing global technology environment. FIPPS are now deemed to be the bedrock of modern data protection laws across the world.


Thanks for reading. Please comment the subject on which you want notes. Please share and follow this blog for more law notes.