...Knowledge Commission Working Group on Legal Education REPORT OF THE WORKING GROUP ON LEGAL EDUCATION Background 1. The National Knowledge Commission (“NKC”) was established by the Prime Minister of India in 2005 to recommend and undertake reforms in order to make India a knowledge-based economy and society. An important constituent of the NKC’s functions is professional education, particularly in the field of legal education. In light of its significance, the NKC constituted a Working Group on legal education in the country. The members nominated by the Chairperson of the NKC, Mr. Sam Pitroda, to the Working Group are Justice Jagannadha Rao (Chair), Justice Leila Seth, Dr. Madhav Menon, Dr. B.S. Chimni, Dr. Mohan Gopal, Mr. P.P. Rao and Mr. Nishith Desai. The Terms of Reference of the Working Group are as follows: a. Identify constraints, problems and challenges relating to curriculum, teaching, infrastructure, administration and access. b. Recommend changes and reforms to address the problems and challenges relating to curriculum, teaching, infrastructure, administration, and access. c. Explore methods of attracting and retaining talented faculty members. d. Suggest measures to develop a research tradition in faculties of law and law schools. e. Suggest innovative means of raising standards and promoting excellence in legal education situated in the wider social context. f. Suggest ways of incorporating emerging fields of legal education in teaching and curricula. g...
Words: 11338 - Pages: 46
...GUJARAT UNIVERSITY SYLLABI OF THREE YEARS LL.B. PROGRAMME WITH CREDIT BASED SYSTEM (As prescribed b y the BAR CO UNCIL OF INDI A and as per the Rules of Legal Education, 2008) Effective from the academic year 2011-12 THREE YEARS’ LL.B. POGRAMME First LL. B. Semester – I FIRST LL.B. - S EMES TER 1 (MONSOON ) PE R WE EK S UBJEC TS LEC TURE S OT HER S T OT AL C RED IT S (SE M)29 CORE COURSE 101 L aw of T ort i ncludi ng MV A cci dent And C on sum er Pr ot ecti on Law s 4 1 5 5 CORE COURSE 102 Crim in al Law P aper – I (General P rinci pl es of P en al Law ) 4 1 5 5 4 1 5 5 4 1 5 5 4 1 5 5 1 1 2 2 1 1 2 2 CORE COURSE 103 CORE COURSE 104 CORE COURSE 105 FOUNDATIO N 106 F SOFT S KILL 107 K Crim in al Law P aper – II (S pec ific Off enc es) L aw of C ont ract S peci al C ontr act C on sti tuti on al Hist ory of I ndi a Use of Law J ournal s and L egal S oftw ar e 1 Semester – I Monsoon Semester CORE CO URSE 101 : LAW OF TO RT I NCLUDI NG M V ACCI DENT AND CO NS UM ER P ROTECTION LAWS Objectives of the Course : Wit h rap id industrializat ion, to rt actio n came to u sed again st manu factu rers and industrial un it fo r p roducts injurious to human beings. Present ly the emphas is is o n extend ing th e principles no t only to acts, which are h armfu l, bu t also to failu re to co mply with stand ards that are continuously...
Words: 16483 - Pages: 66
...Harvard Journal of Law & Technology Volume 21, Number 2 Spring 2008 WHAT CAN INFORMATION TECHNOLOGY DO FOR LAW? Johnathan Jenkins∗ TABLE OF CONTENTS I. INTRODUCTION ..............................................................................589 II. INCENTIVES FOR BETTER INTEGRATION OF INFORMATION TECHNOLOGY AND LAW ............................................................591 III. THE CURRENT STATE OF INFORMATION TECHNOLOGY IN LEGAL PRACTICE .......................................................................594 IV. THE DIRECTION OF LEGAL INFORMATICS: CURRENT RESEARCH .................................................................................597 A. Advances in Argumentation Models and Outcome Prediction ..............................................................................597 B. Machine Learning and Knowledge Discovery from Databases ..............................................................................600 C. Accessible, Structured Knowledge ...........................................602 V. INFORMATION TECHNOLOGY AND THE LEGAL PROFESSION: BARRIERS TO PROGRESS ......................................604 VI. CONCLUSION ..............................................................................607 I. INTRODUCTION MUCH CURRENT LEGAL WORK IS EMBARRASSINGLY, ABSURDLY, WASTEFUL. AI-RELATED TECHNOLOGY OFFERS GREAT PROMISE TO 1 IMPROVE THAT SITUATION. Many professionals now rely on information technology (“IT”) to simplify, automate, or better...
Words: 9086 - Pages: 37
...defining the intangible assets of a company. These assets may include special skills or talents, inventions, technologies such as software, relationships with customers or vendors, and brand identity. These examples of IP, and many more, are often among a company’s most valuable resources, and there are specific laws designed to protect them. Trade secrets, patents, trademarks, and copyrights define and control ownership rights to IP, and businesses further protect those rights by drafting IP clauses when they enter into contracts with individuals or other businesses. (Reed, Pagnattaro, Cahoy, Shedd, & Morehead, 2013). The purpose of an IP clause is to identify IP as it pertains to the respective contract, define authorized and/or unauthorized use(s), and incorporate this information into the original contract, which makes it legally binding (Connock, 1994). The following is an example of an IP clause: “Intellectual Property,” or “IP,” refers to the trade secrets, copyrights, trademarks, patents, and patentable ideas relating thereto of Developer, including but not limited to the know-how, inventions, technologies and technical data relating thereto, processes and methods of business operation, reports, manuals, other documentation and all information relating thereto, databases, pre-existing and future relationships with customers and suppliers, software, new product research, and marketing plans (Reed, et al., 2013). Developer grants to Company the right to use all IP...
Words: 1104 - Pages: 5
...Article Tile: Specific legal issues affecting the implementation of computer-based information systems in the developing countries: a critical review of literature A paper presented to the Journal of library and information science for consideration for publication. Date: November 2015 Author: Daniel Kinyanjui (Bsc-Information Science-Moi University-Eldoret, Kenya and Currently Studying Masters of Library and Information Science at Kenyatta University-Kenya) Daniel is also the editor of institutional in-house publications at Oshwal College-Nairobi and the College Head of Library Services. Abstract Implementation of computer-based information systems (CBIS) has become increasingly important due to the growing reliance on new technologies by organisations in their operations and service delivery. There has also been realisation by individuals and businesses of the inevitability of delivering value-added services without computerized systems. Despite this awareness and the apparent growing readiness to deploy computer-based systems, there still exists a myriad of perennial challenges inhibiting the implementation of these systems. Using insights from previous studies, the paper sums up the legal issues that have been acknowledged by various scholars as major obstacles to the implementation of CBIS in developing countries. Drawing from the understanding of these challenges, the author finally attempts to advance possible strategies that can be used to overcome these...
Words: 3108 - Pages: 13
...BAR COUNCIL OF INDIA and as per the Rules of Legal Education, 2008) Effective from the academic year 2011-12 THREE YEARS’ LL.B. POGRAMME First LL. B. Semester – I FIRST LL.B. - SEMESTER 1 (MONSOON) PER WEEK CORE COURSE 101 SUBJECTS Law of Tort including MV Accident And Consumer Protection Laws Criminal Law Paper – I (General Principles of Penal Law) Criminal Law Paper – II (Specific Offences) Law of Contract Special Contract Constitutional History of India Use of Law Journals and Legal Software LECTURES 4 OTHERS 1 TOTAL 5 CREDITS (SEM)29 5 CORE COURSE 102 CORE COURSE 103 CORE COURSE 104 CORE COURSE 105 FOUNDATION 106 F SOFT SKILL 107 K 4 4 4 4 1 1 1 1 1 1 1 1 5 5 5 5 2 2 5 5 5 5 2 2 1 Semester – I Monsoon Semester CORE COURSE 101 : LAW OF TORT INCLUDING MV ACCIDENT AND CONSUMER PROTECTION LAWS Objectives of the course : With rapid industrialization, tort action came to used against manufacturers and industrial unit for products injurious to human beings. Presently the emphasis is on extending the principles not only to acts, which are harmful, but also to failure to comply with standards that are continuously changing due to advancement in science and technology. Product liability is now assuming a new dimension in developed economics. In modern era of consumer concern of goods and services, the law of torts has an added significance with this forage into the emerging law of consumer protection. It operates in disputes...
Words: 6024 - Pages: 25
...infringement of four patents owned by Mirror Worlds. Mirror Worlds’ patents cover intellectual property; namely that of digital and visual media and the consolidation and sorting thereof. The jury’s verdict in this case awarded Mirror Worlds a substantial amount of money for damages caused by the supposed willful infringement of Apple, Inc. In addition, Apple, Inc.’s arguments, namely involving the claim of willful infringement, evolving into a counterclaim against Mirror Worlds will also be discussed. Keywords: intellectual property, patents, infringement, software, documents, counterclaim, willful infringement MIRROR WORLDS VERSUS APPLE, INC. 3 Mirror Worlds versus Apple, Inc. Willful Infringement In February of 2010, the United States Patent and Trademark Office, USPTO, granted Apple Inc. a design patent on Cover Flow, which covers the design and display of specific documents, but not the functionality. “A patent is a legal right, for a limited term, to exclude others from using, selling or making an invention or discovery.” (Kay, Millonzi and Passannante, 2001). Patent D609715 regards an “animated graphical user interface for a display screen or portion thereof. The process or period in which an image transitions to another forms no part of the claimed design.” (U.S. Patent D609715 description). Users of the upgraded iTunes, iPhone iPod Touch and iPad products will recognize this patented design when sorting through digital pictures of album covers in either system. However...
Words: 2081 - Pages: 9
...Technology-Mediated Learning Environment -- TutorPro Patrizia S. Jackson IS535ON_C January 30, 2010 Professor McElyea Example used with permission from the student 2/18/2010. TABLE OF CONTENTS I. Executive Summary 3 II. Definition/History of Technology-Mediate Learning Environment 3 III. Background of Law Firm X 4 IV. Discussion of Current Business Issues 4 V. Proposed Solution 6 VI. Recommendations for the Executive Committee 8 VII. Attachments 11 VIII. References 13 I. Executive Summary This research paper examines the technology-mediated learning environment and the advantages of using online technology to facilitate staff training. Additionally, this paper discusses Law FirmX's implementation of desktop tutorial software program "TutorPro" with the purpose of increasing secretarial skill competency levels. This paper illustrates how FirmX can increase employee commitment, minimize resistance by effectively communicating the firm’s expectations. Lastly, this paper outlines recommendations on how FirmX's implementation of TutorPro will assist the firm's short and long-term goals in meeting their strategic goals and objectives. II. Definition/History of Technology-Mediate Learning Environment Definition TML is defined as an “environment in which the learners' interactions with learning materials (readings, assignments, exercises, etc.), peers and/or instructors are mediated through advanced information technologies.” (Alavi, M., &...
Words: 2568 - Pages: 11
...International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes...
Words: 5129 - Pages: 21
...includes the full-text of 24 journals published by SAGE and participating societies. It covers such subjects as Criminal Justice, Juvenile Delinquency, Juvenile Justice, Corrections, Penology, Policing, Forensic Psychology, and Family and Domestic Violence. EbscoHost (all) Ebsco databases provide access to numerous publications. Select this link to search all databases simultaneously. To search each database separately, use the specific links to the named databases. EbscoHost Academic Search Elite Search academic journals for topics in all areas of academic study; many peer-reviewed titles are included. EbscoHost Business Source Premier Search periodicals covering a wide variety of business topics. EbscoHost CINAHL Plus with Full Text Search nursing and allied health journals. EbscoHost MasterFile Premier Search periodicals covering a wide variety of topics including general reference, business, education, health, and science. EbscoHost Regional Business News Search regional business publications from major metropolitan areas. EbscoHost SocIndex with Full Text Search for articles related to sociology, criminal justice, criminology, and ethnic and gender studies. Full Text Electronic Journals Use this portal to locate full-text magazines, journals, and newspapers in the various periodical databases. Gale Computer Database Search this database to find computer-related product introductions, news and reviews in areas such as hardware, software, electronics, engineering...
Words: 676 - Pages: 3
...BANGLADESH RESEARCH PUBLICATIONS JOURNAL ISSN: 1998-2003, Volume: 6, Issue: 1, Page: 12-21, September-October, 2011 PROTECTING INTELLECTUAL PROPERTY RIGHTS IN BANGLADESH: AN OVERVIEW S. M. Atia Naznin1 S. M. Atia Naznin (2011). Protecting Intellectual Property Rights in Bangladesh: an overview. Bangladesh Res. Pub. J. 6(1): 12-21. Retrieve from http://www.bdresearchpublications.com/admin/journal/upload/09251/09251.pdf Abstract In this era of globalization and rapid expansion of world economy, intellectual property and the corresponding rights over intellectual property are crucial to the economic, social and technological development of any country beyond doubt. Globalization also has made the Intellectual property rights a subject matter of international concern. All nations who want to promote and project their development in all aspects must protect the rights over intellectual property by granting legal veil through exclusive enactments. Realizing this fact, all industrialized nations and by now most developing countries of the world have enacted laws for the protection of ‘works of mind’. To comply with the international obligations Bangladesh also has introduced intellectual property rights protection system. This research paper explores to seek how enforcement mechanisms in Bangladesh are intrinsically precious, effective and thenceforth, worth in protecting the rights of IP holders. As an obvious flow of discussion the paper reiterates to look beyond the constraint and...
Words: 5031 - Pages: 21
...Principle of Software Engineering Table of Contents Abstract 3 Introduction 4 Boehm's First Law 4 Boehm's Second law 5 Conway's law 5 Parnas Law 6 Corbató Law 7 Observation 8 Theory 9 Law 9 Question 3 10 Law 11 References 12 Abstract The purpose of the study is to show the capability to understand the set of laws that are the part of principles of the software engineering. In this paper, it is discussed that there are many laws related to the software engineering but only few of them are to be addressed. Boehm first and second law, Conway’s laws, Parnas laws & Corbato law were discussed with examples. There are two relationship processes that are also discussed, related to the software Engineering. Law method and tools which are depended on each other and they are performing the task with the help of principle and process by following the rules. Same scenario is followed in other relation too, where observation, law and theory are depended on each other. Observation is repeatable to law and law is explained by theory. Theory should be confirmed by the law and it predict by the observation before further proceeding. Introduction Question No 1 Boehm's First Law Errors are more regular in the middle of fundamentals and configuration exercises and are more abundant when they are displaced. In this law, some basic configuration errors do outnumber code blunders. However, cost stays smooth...
Words: 1641 - Pages: 7
...What Impact Does Technology Laws Have On Business In America? Tracy Bennett Herzing University 02/13/2015 What impact does technology laws have on business in America? We live in a world where laws control how America operates and how our society functions (Arndt, n.d.). We also live in a world where technology has taken over and for many it would be inconceivable to imagine living in a world without technology. Technology has changed the way we live and communicate (Winston & Edelbach, 2014, p. 2). Technology has also changed the way companies conduct business. It has opened up new opportunities for companies to gain more business but at the same time has also created new ethical problems and therefore lawmakers have had to design new technology laws that have had a major impact on American businesses. Technology laws can impact American businesses in a variety of ways from software licensing agreements, privacy issues, and the use of electronic signatures. In order to keep up the pace with changing technology businesses continuously change their operating software (Information Technology Law, n.d.). Continuously changing software programs has the benefit of greater profitability for the company but at the same time it can also create some major problems. Business managers and owners can run into legal issues if they do not fully understand the rules and laws of the licensing agreement which could result in a huge lawsuit against...
Words: 1009 - Pages: 5
...IMPORTANCE OF ONLINE LEGAL DATABASES Submitted by: Rhea Srivastava Division B (BBA LLB) Roll No – 11 Class 2016 of Symbiosis Law School, NOIDA Symbiosis International University, PUNE In February 2012 Under the guidance of: Ms. Harjinder Kaur and Mr. Nilesh Aeer Course in Charge, Use of Legal Database Symbiosis Law School, NOIDA 201301 D E C L A R A T I O N I Rhea Srivastava, student of BBA LLB Semester II of Symbiosis Law School, Noida hereby declare that the Advanced ICT Training research paper titled “IMPORTANCE OF ONLINE LEGAL DATABASES ” is submitted by me in the line of partial fulfillment of course objectives for the BBA LLB degree. I assure that this synopsis is the result of my own efforts and that any other institute for the award of any degree or diploma has not submitted it. C E R T I F I C A T E The project entitled “IMPORTANCE OF ONLINE LEGAL DATABASES” submitted to the Symbiosis Law School, Noida for Use of Legal Databases as part of internal assessment is based on my original work carried out under the guidance of Ms. Harjinder Kaur and Mr. Nilesh Aeer. The research work has not been submitted elsewhere for award of any degree. The material borrowed from other sources and incorporated in the thesis has been duly acknowledged. I understand that I myself could be held responsible and accountable for plagiarism, if any, detected later on. RHEA SRIVASTAVA Date: 23rd March, 2012 A C K...
Words: 3243 - Pages: 13
...Global Journal of Computer Science and Technology Interdisciplinary Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Ethical Issues in Computer use: A Study from Islamic Perspective By Abdul Kadar Muhammad Masum International Islamic University, Bangladesh Abstract - Computer users are continuously facing ethical challenges as society adopts new and increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review...
Words: 5242 - Pages: 21