Origin verification of timber is essential to expose origin fraud and reduce illegal timber trade. A promising forensic method for origin verification is based on stable isotope ratios in wood, but large-scale studies that test local and regional variation to apply the method at a sub-country scale are lacking.
LINK
Copyright enforcement by private third parties – does it work uniformly across the EU? Since the inception of Napster, home copying of digital files has taken a flight. The first providers of software or infrastructure for the illegal exchange of files were held contributory or vicariously liable for copyright infringement. In response, they quickly diluted the chain of liability to such an extent that neither the software producers, nor the service providers could be held liable. Moving further down the communication chain, the rights holders are now requiring Internet Service Providers (ISPs) that provide access to end customers to help them with the enforcement of their rights. This article discusses case-law regarding the enforcement of copyright by Internet Access Providers throughout Europe. At first glance, copyright enforcement has been harmonised by means of a number of directives, and article 8(3) of the Copyright Directive (2001/29/EC) regulates that EU Member States must ensure the position of rights holders with regard to injunctions against ISPs. Problem solved? Case law from Denmark, Ireland, Belgium, Norway, England, The Netherlands, Austria and the Court of Justice of the EU was studied. In addition, the legal practice in Germany was examined. The period of time covered by case law is from 2003 to 2013, the case law gives insight into the differences that still exist after the implementation of the directive.
DOCUMENT
African citizens are increasingly being surveilled, profiled, and targeted online in ways that violate their rights. African governments frequently use pandemic or terrorism-related security risks to grant themselves additional surveillance rights and significantly increase their collection of monitoring apparatus and technologies while spending billions of dollars to conduct surveillance (Roberts et al. 2023). Surveillance is a prominent strategy African governments use to limit civic space (Roberts and Mohamed Ali 2021). Digital technologies are not the root of surveillance in Africa because surveillance practices predate the digital age (Munoriyarwa and Mare 2023). Surveillance practices were first used by colonial governments, continued by post-colonial governments, and are currently being digitalized and accelerated by African countries. Throughout history, surveillance has been passed down from colonizers to liberators, and some African leaders have now automated it (Roberts et al. 2023). Many studies have been conducted on illegal state surveillance in the United States, China, and Europe (Feldstein 2019; Feldstein 2021). Less is known about the supply of surveillance technologies to Africa. With a population of almost 1.5 billion people, Africa is a continent where many citizens face surveillance with malicious intent. As mentioned in previous chapters, documenting the dimensions and drivers of digital surveillance in Africa is
MULTIFILE