...Introduction The event was organised to discuss the Advisory Opinion of the International Court of Justice (ICJ) and its implications for international law, for Kosovo and for other situations. Participants included representatives of government, embassies, NGOs, academics, and practising lawyers. Opening remarks STEFAN TALMON This is likely to be the only Advisory Opinion known by at least three different names. The case was originally known as Accordance with International Law of the Unilateral Declaration of Independence by the Provisional Institutions of Self-Government of Kosovo, as specified in the ICJ Order of 17 October 2008, the verbatim records of the Public Hearing and all Press Releases up to 14 July 2010. The official name of the Advisory Opinion of 22 July 2010 was Accordance with International Law of the Unilateral Declaration of Independence in Respect of Kosovo. Finally, in his separate opinion, Judge Cançado Trindade used the name Accordance with International Law of Kosovo’s Declaration of Independence. In terms of length, the Kosovo Advisory Opinion is not out of line with other Advisory Opinions. What is remarkable is how little substance it has. Only 14 of the 44 pages deal with substantive legal questions, and only two pages are devoted to the question of whether general international law contains an applicable prohibition of declarations of independence. Conversely, the Advisory Opinion is extremely well referenced, giving the impression the...
Words: 4718 - Pages: 19
... i n p L a i n L a n g u a g e This is the sixty-ninth in the series Hot Topics: legal issues in plain language, published by the Legal Information Access Centre (LIAC). Hot Topics aims to give an accessible introduction to an area of law that is the subject of change or public debate. International law 1 overview What is international law? – difference between international law and domestic law – Why do States obey international law? – subjects of international law – How do international law and domestic law interact? 4 sources of international law Jus cogens – international conventions and treaties – Australian treaty practice – custom – general principles of law – judicial decisions and writings of publicists – ‘hard law’ and ‘soft law’. 8 states What is a State? – rights of States – self-determination – creation and recognition of new States – case studies. AUTHOR NOTE: Jane Stratton currently leads corporate social responsibility programs in a leading Sydney law firm, teaches law students at a Sydney university and independently, undertakes community development projects in Western Sydney. Her work has included legal and policy roles in the Public Interest Advocacy Centre, the Australian Human Rights Commission, UN High Commission for Refugees and the ICTY. She has experience in litigious and political advocacy. Jane holds qualifications in law (Honours) and in Arts (Honours) from ANU and a Masters of Law from New York ...
Words: 23627 - Pages: 95
...HONOUR KILLING: MURDER IN THE NAME OF HONOUR CHAPTER 1 INTRODUCTION Honour killing is a deep rooted brutal and burning human rights issue in India and other countries. Women particularly are the victims of the gross violation. They exist all over the world but no religion stipulates them. Outdated traditions and alleged honour violating behaviour are the motive for these crimes. The victims are almost always female. Young, unmarried women can "dishonour" their families easily. Every year hundreds of women are killed in India in the name of honour and many cases go unreported and almost all of them go unpunished. The criminal justice system is unable to combat it though it is claimed that the criminal justice system is the most legitimate institution to control this practice in the country. Honour is the most precious moral attribute of mankind. It is deeply ingrained in its nature. Defence of honour even at the cost of life has been prevalent in human beings since ages. It is a commonwealth of close blood relatives. Defilement of honour is taken as the most atrocious social crime and its redemption becomes a joint and sacred duty of close-knit people. Debased groups have a soft approach towards transgression of honour. The sentimental chord dormant in them may react at times; its degree may vary from group to group. Tradition-bound rural societies invariably react violently for the redemption of their honour. To them honour is dearer than life. Honour killings...
Words: 30961 - Pages: 124
...International Law Name: UDAYA.R.S Enrolment Number: MBA1/JUN15N/71101434345916F Roll Number: N15NOV/7110 Question 1. Explain the different international organizations Answer: 1. Introduction This section reviews the complete range of international organizations. The conventional categories used are first examined, then various ways of distinguishing between the many kinds of organization and degrees of "internationality" are considered. The problem of borderline cases is discussed, together with non-organizational substitutes for organizations and possible alternative forms of organization. Quantitative information on the growth of international institutions and indicative data on regional organizations are also presented. A major difficulty in obtaining some understanding of international organizations is the variety of organizational forms which need to be considered. Abstract classification schemes, particularly when simplified for convenience, tend to conceal the existence of well-developed groups of organizations with distinct features. The approach employed here has been to use several different ways of breaking up the range of organizations and to cite several examples of organizations of any particular type. The intent is not to put forward a new systematic classification of international organizations but rather to facilitate an appreciation of the variety of bodies which could be incorporated into any...
Words: 16790 - Pages: 68
...Jump to navigation Search Cornell Search About LII / Get the law / Lawyer Directory / Get Legal Forms / Legal Encyclopedia / Help Out • • Wex • all pages • articles • español • Inbox Project • search • FAQ Legal systems Introduction: profusion and variety There are hundreds of legal systems in the world. At the global level, international law is of great importance, whether created by the practice of sovereign states or by agreement among them in the form of treaties and other accords. Some transnational entities such as the European Union have created their own legal structures. At the national level there are over 180 sovereign states in the United Nations Organization. Many of these are federal or confederal, and their constituent parts may well have their own law. But, despite this great variety, it is important to begin by emphasizing one great division: that into religious and secular legal systems. Each side of this split holds quite different views as to law, in its source, scope, sanctions, and function. The source of religious law is the deity, legislating through the prophets. Secular law is made by human beings, and one of its most famous examples begins with the words 'We, the people'. It follows from this difference in their source that religious laws are perceived to be eternal and immutable, while secular rules can be changed by their makers. Religious law tells people what to believe as well as how to behave, whereas secular law deals...
Words: 8159 - Pages: 33
...RIGA GRADUATE SCHOOL OF LAW THE IMPLEMENTATION OF INTERNATIONAL STATE RESPONSIBILITY NATIONAL SPACE LEGISLATION IN THE EU (title) INTO MASTER’S THESIS AUTHOR: DMYTRO CHYBISOV LL.M 2007/2008 year student student number LLM00703 JANE SMITH________________ (name, surname) TUTOR: Professor____________________ (academic title) DECLARATION OF HONOUR: I declare that this thesis is my own work, and that all references to, or quotations from, the work of others are fully and correctly cited. (Signed) …………………………………. RIGA, 2008 2 SUMMARY In Part I the general provisions of space treaties and principles of public international law briefly summarized. An overview of “appropriate state”, “launching state” terms and international responsibility and liability issues also discussed there. Part I is supposed to introduce current international legal tools available for the regulation of space activities. It explains what is international space law, why it is important and how does it work. Moreover, certain aspects of legal treatment of governmental and non-governmental entities are comprehensively discussed. The analogy between international space law and maritime law was also reiterated. Part I particularly examines each of three main space treaties and the problematic points arising from their interpretation. The enforcement mechanism is also analyzed. It was the idea to pick up an issue and then to analyze it using the common sense and legal logic with the view...
Words: 28333 - Pages: 114
...[pic] Frank G. Madsen Queens’ College University of Cambridge International Monetary Flows of Non-Declared Origin This dissertation is submitted to the University of Cambridge to Fulfil the Requirements for the Degree of Doctor of Philosophy April 2008 Ambrogio Lorenzetti, Effetti del Buon Governo Siena, Palazzo Pubblico Sala dei Nove 1337-1340 Declaration This dissertation is the result of my own work and includes nothing, which is the outcome of work done in collaboration. Chapter 3, “Complexity, TOC and Terrorism”, was presented in an embryonic form at the ISA conference in Chicago, USA, March 2007. Chapter 4, “Organised Crime”, is the further elaboration of a chapter of the same title published in 2007 in the Oxford Handbook on the United Nations Statement of Length The dissertation does not exceed the word limit of 80,000 words Fieldwork Thailand (money laundering); Indonesia and Burma (deforestation); New York (US money supply); Washington DC and Fort Worth, Texas (Organised Crime linked to terrorist funding); Australia (Sydney, (APG) and Canberra (money laundering, South Pacific); and Rome, Italy (Chinese organised crime). Contact Frank.Madsen@cantab.net Abstract Through an analysis of the presence and nature of international monetary flows of non-declared origin and their relation to deviant knowledge, the thesis...
Words: 99119 - Pages: 397
...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...
Words: 24175 - Pages: 97
...Challenges to Criminal Law Making in the New Global Information Society: A Critical Comparative Study of the Adequacies of Computer-Related Criminal Legislation in the United States, the United Kingdom and Singapore Warren B. Chik* Introduction Computer and Internet usage is on the rise due to lower costs of computer ownership and connectivity as well as faster and easier accessibility. As it is another mode of commercial and personal transaction and one that is heavily dependent on interaction through computers and automatic agents rather than face-to-face meetings, which increases distance and allows anonymity, it is another avenue for crimes to perpetuate. “Computer Crime” encompasses crimes committed against the computer, the materials contained therein such as software and data, and its uses as a processing tool. These include hacking, denial of service attacks, unauthorized use of services and cyber vandalism. “Cyber Crime” describes criminal activities committed through the use of electronic communications media. One of the greatest concerns is with regard to cyber-fraud and identity theft through such methods as phishing, pharming, spoofing and through the abuse of online surveillance technology. There are also many other forms of criminal behaviour perpetrated through the use of information technology such as harassment, defamation, pornography, cyber terrorism, industrial espionage and some regulatory offences. The existing criminal laws in most countries...
Words: 24175 - Pages: 97
...CQ Researcher Published by CQ Press, a division of Congressional Quarterly Inc. thecqresearcher.com Human Trafficking and Slavery Are the world’s nations doing enough to stamp it out? F rom the villages of Sudan to the factories, sweatshops and brothels of India and South Asia, slavery and human trafficking still flourish. Some 27 million people worldwide are held in some form of slavery, forced prostitution or bonded labor. Some humanitarian groups buy captives’ freedom, but critics say that only encourages slave traders to seize more victims. Meanwhile, nearly a million people Abducted from her village in southern Sudan when she was 6 years old, Akuac Malong was enslaved in northern Sudan until she was freed at age 13. are forcibly trafficked across international borders annually and held in captivity. Even in the United States, thousands of women and children from overseas are forced to become sex workers. Congress recently strengthened the Trafficking Victims Protection Act, but critics say it is still not tough enough, and that certain U.S. allies that harbor traffickers are treated with “kid gloves” for political reasons. I N S I D E THIS ISSUE THE ISSUES ......................275 BACKGROUND ..................282 CHRONOLOGY ..................283 CURRENT SITUATION ..........287 AT ISSUE ..........................289 OUTLOOK ........................291 The CQ Researcher • March 26, 2004 • www.thecqresearcher.com Volume...
Words: 15833 - Pages: 64
...McGill Law Journal ~ Revue de droit de McGill JUSTIFYING FIDUCIARY DUTIES Paul B. Miller* Fiduciary duties are critical to the integrity of a remarkable variety of relationships, including those between trustee and beneficiary, director and corporation, agent and principal, lawyer and client, doctor and patient, parent and child, and guardian and ward. Notwithstanding their variety, all fiduciary relationships are presumed to enjoy common characteristics and to attract a core set of demanding legal duties, most notably a duty of loyalty. Surprisingly, however, the justification for fiduciary duties is an enigma in private law theory. It is unclear what makes a relationship fiduciary and why fiduciary relationships attract fiduciary duties. This article takes up the enigma. It assesses leading reductivist and instrumentalist analyses of the justification for fiduciary duties. Finding them wanting, it offers an alternative account of the juridical justification for fiduciary duties. The author contends that the fiduciary relationship is a distinctive kind of legal relationship in which one person (the fiduciary) exercises power over practical interests of another (the beneficiary). Fiduciary power is a form of authority derived from the legal capacity of the beneficiary or a benefactor. The duty of loyalty is justified on the basis that it secures the exclusivity of the beneficiary’s claim over fiduciary power so understood. Les obligations fiduciaires sont essentielles pour...
Words: 25852 - Pages: 104
...This week's graded topics relate to the following Terminal Course Objectives (TCOs): A | Given an organizational requirement to conform business practices to both the law and best ethical practices, apply appropriate ethical theories to shape a business decision. | I | Given specified circumstances of a business decision to expand to international markets, determine what international legal requirements or regulatory controls apply. | Topics for This Week's Discussion * Introduce yourself to your professor and the rest of the class. (not graded) * Thread over TCO A/I (graded) * Ethics and Patent Rights Post 9/11 (graded) * Q & A Forum for your questions and comments (not graded) | | There is a drop down arrow next to the "Select a Topic" box. Click on this arrow to select topics for discussion. | ------------------------------------------------- Top of Form Select a Topic: Bottom of Form The World Bank Situation (graded) | Class, please read Chapter 2, problem 5 from the Jennings text, p. 72. This week, we will discuss the Wolfowitz situation at the World Bank. Consider the questions at the end of the problem as you make comments in the threads this week. What are the ethics here? Was Wolfowitz trying to do the right thing? Does that make a difference ethically? Throughout the week, I will bring in further questions. Be sure to read the lecture and the international ethics article stated in your reading for the week as well. | ...
Words: 201281 - Pages: 806
...Advance Edited Version Distr. GENERAL A/HRC/12/48 15 September 2009 Original: ENGLISH HUMAN RIGHTS COUNCIL Twelfth session Agenda item 7 HUMAN RIGHTS IN PALESTINE AND OTHER OCCUPIED ARAB TERRITORIES Report of the United Nations Fact Finding Mission on the Gaza Conflict ∗ ∗ Late submission A/HRC/12/48 page 2 Paragraphs Page EXECUTIVE SUMMARY PART ONE INTRODUCTION I. II. III. METHODOLOGY CONTEXT EVENTS OCCURRING BETWEEN THE “CEASEFIRE” OF 18 JUNE 2008 BETWEEN ISRAEL AND THE GAZA AUTHORITIES AND THE START OF ISRAEL’S MILITARY OPERATIONS IN GAZA ON 27 DECEMBER 2008 IV. APPLICABLE LAW PART TWO OCCUPIED PALESTINIAN TERRITORY: THE GAZA STRIP Section A V. VI. THE BLOCKADE: INTRODUCTION AND OVERVIEW OVERVIEW OF MILITARY OPERATIONS CONDUCTED BY ISRAEL IN GAZA BETWEEN 27 DECEMBER 2008 AND 18 JANUARY 2009 AND DATA ON CASUALTIES ATTACKS ON GOVERNMENT BUILDINGS AND POLICE VIII. OBLIGATION ON PALESTINIAN ARMED GROUPS IN GAZA TO TAKE FEASIBLE PRECAUTIONS TO PROTECT THE CIVILIAN POPULATION VII. A/HRC/12/48 page 3 IX. OBLIGATION ON ISRAEL TO TAKE FEASIBLE PRECAUTIONS TO PROTECT CIVILIAN POPULATION AND CIVILIAN OBECTS IN GAZA X. INDISCRIMINATE ATTACKS BY ISRAELI ARMED FORCES RESULTING IN THE LOSS OF LIFE AND INJURY TO CIVILIANS XI. DELIBERATE ATTACKS AGAINST THE CIVILIAN POPULATION XII. THE USE OF CERTAIN WEAPONS XIII. ATTACKS ON THE FOUNDATIONS OF CIVILIAN LIFE IN GAZA: DESTRUCTION OF INDUSTRIAL INFRASTRUCTURE, FOOD PRODUCTION, WATER INSTALLATIONS, SEWAGE...
Words: 227626 - Pages: 911