Revolvy Trivia Quizzes Revolvy Lists Revolvy Topics

Privacy law in Denmark

Privacy law in Denmark is supervised and enforced by the independent agency Datatilsynet (The Danish Data Protection Agency) based mainly upon the Act on Processing of Personal Data.

History of Danish Privacy Law

Privacy law in Denmark was originally determined by 2 acts: the Private Registers Act of 1978, and the Public Authorities’ Registers Act of 1978, which governed the private sector and the public sector respectively. These 2 acts were replaced by the Act on Processing of Personal Data July 1, 2000, thereby implementing the European Union’s Data Protection Directive (1995/46/EC). The Danish constitution also mentions privacy, in the form of paragraph 72 that stipulates that the confiscation and examination of letters and other papers; as well the interception of postal-, telegraph- and telephone communication cannot be done without a judicial order.[1] September 28, 2006 The declaration of providers of electronic communication networks and electronic communication services registration and storage of information regarding teletraffic (Bekendtgørelse om udbydere af elektroniske kommunikationsnets og elektroniske kommunikationstjenesters registrering og opbevaring af oplysninger om teletrafik) was publicised, thereby implementing the European Union’s Data Retention Directive (2006/24/EC), on "the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC”.[2]

The Main Acts

In Danish privacy law, there are several acts that provides the basis for the collecting and storing private date. These are the Act on Processing of Personal Data and the Data Retention Executive Order.

Act on Processing of Personal Data

The Act on Processing of Personal Data is the main law regarding when and how personal data can be processed, in an electronic system, as well as manual handling of the data, when it is contained in a register. The act applies to all private companies, associations, organisations and to the public authorities. In the private sector, the law also applies to systematic processing of personal data, even if it does not happen electronically.[3] The act differentiates between 3 different kinds of personal data, as they have to be treated differently, depending on the sensitivity of the data:

  1. Sensitive information
  2. Information regarding other purely private conditions
  3. Ordinary non-sensitive information

The different kinds of personal data have different requirements for when they can be requested from a citizen, as to avoid that too much unnecessary sensitive data will be given to organisations that does not need them. The act also gives the citizens a series of rights, designed to help give more control of what information is being stored about him or her:

  1. Right to insight into the information, that is being handled about the citizen
  2. Right to be informed that information is being collected about the citizen
  3. Right to have incorrect information deleted or corrected
The Data Retention Executive Order

The Danish Surveillance law is the ratification of the European Union’s Directive 2006/24/EC, which requires all providers of communication like telephones and internet to log certain data regarding the communication through their systems.[4] §4 of the law require phone companies to log:

  1. The caller’s phone number (A-number) as well as the name and address of the subscriber or registered user
  2. The called phone number (B-number) as well as the name and address of the subscriber or registered user
  3. The redirected phone number (C-number) as well as the name and address of the subscriber or registered user
  4. The receipt for receiving a message
  5. The identity of the used communications equipment (IMSI- and IMEI-numbers)
  6. The cell or cells a mobile phone was connected to by the communications start and end, and the exact geographical or physical location of the used cell masts used during the time of the communication
  7. The exact time of the start and end of the communication
  8. The time of the first activation of anonymous services (Prepaid mobile phones)

§5 of the law require Internet Service Providers to log the following information about the initiating and the terminating packets:

  1. The senders IP-address
  2. The receivers IP-address
  3. The transport protocol used
  4. The senders port number
  5. The receivers port number
  6. The exact time of the start and end of the communication

§5 section 2 of the law require Providers of Internet access to end users to log the following information about user:

  1. The allocated user identity
  2. The user identity and the phone number that have been allocated communications, which is a part of a public communicationsnetwork
  3. The name and address of the subscriber or registered user, to whom an IP-address, a user identity or a phone number was allocated at the time of the communication
  4. The exact time of the start and end of the communication

The European Union’s Directive 2006/24/EC do not require the member counties to record and store all of these items,[5] but the Danish government decided to expand upon the European directive, to include collection of more data. This led to a drop in Denmark’s Privacy index of 0.5, from 2.5 to 2.0[6] [7]

The Data Protection Agency

The Data Protection Agency is the central independent authority that makes sure the Act on Processing of Personal Data is obeyed in Denmark. Amongst other things it provides counselling, advice, treat complaints and perform inspections of authorities and companies. It comprises The Data Council and a secretariat. Anyone can complain to The Data Protection Agency if they feel Act on Processing of Personal Data is not obeyed in Denmark, The Agency will then launch a formal investigation into the matter and if required, it can issue fines and/or injunctions. It is possible to appeal the decisions of The Agency to a Danish court of law

The Data Council

The Data Council is composed of a chairperson and six board members. Its main task is to evaluate and make rulings:

  1. Of a principal nature
  2. Of significant common interest or with significant consequences for a public authority or private company
  3. That due to special circumstances should be decided by the council
  4. That a council member wish to discuss during a council meeting

The current chairperson and 6 board members are:

  • Chairperson, High Court Judge Henrik Waaben
  1. Lawyer Janne Glæsel
  2. Professor, dr. jur. Peter Blume
  3. CEO of the Danish Consumer Council Rasmus Kjeldahl
  4. Manager of concern IT-Security Kim Aarenstrup
  5. City manager Niels Johannesen
  6. Chief physician Hans Henrik Storm
Important Cases
The Preben Randløv case

The goldsmith Preben Randløv was robbed February 8. 2008 where the robber not only got away with approximately 1.3 million DKR (€173.333) worth of jewelry, but also assaulted 2 employees, including Preben Randløv's wife. He then proceeded to upload a video from his shop surveillance camera of the masked robber, and issued a 25.000 DKR (€3.333) reward for any information that would lead to the arrest of the robber. The Data Protection Agency decided to initiate an administrative proceeding against Preben Randløv as he had not “asked the robber to consent” to the uploading of the video, and he was fined by 10.000 DKR (€1.333) by the police, as only the police have the authority to release videos of this nature. The video did lead to an arrest of 2 individuals who claimed they had bought the jewelry, but neither of them were convicted for the robbery. In October 2008, another one of Preben Randløv stores was robbed, and he told reporters during an interview, that he would upload a video of the new robbery as well.[8]

The Shell case

In March 2009 it was discovered a Shell petrol station had a wall with pictures of petrol thieves in the shop of the petrol station. The Data Protection Agency decided to prosecute them because it was not legal according to the Act on Processing of Personal Data.[9]

Privacy Problems in Denmark

According to Privacy International’s study: Leading surveillance societies in the EU and the World 2007, the main concerns in Denmark regarding privacy is the following:

  • Constitutional right to privacy depends on section 71 on personal liberty and section 72 on search and seizure
  • Comprehensive privacy law, and exempts security and defence services
  • Data privacy authority is appointed by the minister of justice, and the ministry is also responsible for the budget
  • Data privacy authority may enter any premise without a court order to investigate under the privacy law
  • Extensive interception of communications; and use of bugs on computers to monitor activity and keystrokes; and plans are in place to minimise notification
  • Police require list of all active mobile phones near the scene of a crime
  • DNA samples may be required from applicants for residency based on family ties
  • Implemented retention of communications data well before EU mandate, for one year
  • Police took the DNA of 300 youth protestors in 2007
  • Implementing air travel surveillance program
  • Parliament is over-keen to implement surveillance programs
  • Ratified Cybercrime convention

These issues have cause Denmark to receive a very low rating on their Privacy index, a 2.0 (Extensive surveillance societies) compared to a 2.5 in 2006 (Systemic failure to uphold safeguards). This places Denmark on a 34th place of the 45 included counties in the study (although United States and United Kingdom are placed on 40th and 43rd place respectively, with scores of 1.5 and 1.4)

Notes and references
External links
Continue Reading...
Content from Wikipedia Licensed under CC-BY-SA.

F-Secure

topic

Company offices in Helsinki , Finland F-Secure Corporation (formerly Data Fellows ) is a Finnish cyber security and privacy company based in Helsinki , Finland . The company has 20 country offices and a presence in more than 100 countries, with Security Lab operations in Helsinki, Finland and in Kuala Lumpur, Malaysia. The company develops and sells antivirus, password management, endpoint security, and other cyber security products and services. With Radar Managed Services vulnerability scanning and Rapid Detection Service as flagship products, the company continues to expand into the corporate market with enterprise-grade offerings. History F-Secure was first established under the name Data Fellows by Petri Allas and Risto Siilasmaa in 1988. Data Fellows trained computer users and built customized databases. Three years later, the company launched its first major software project and developed the first heuristic scanner for antivirus products. F-Secure’ first antivirus product for Windows PCs was launched ...more...



Convention on Cybercrime

topic

The Convention on Cybercrime, also known as the Budapest Convention on Cybercrime or the Budapest Convention, is the first international treaty seeking to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. It was drawn up by the Council of Europe in Strasbourg, France, with the active participation of the Council of Europe's observer states Canada, Japan, South Africa and the United States. The Convention and its Explanatory Report was adopted by the Committee of Ministers of the Council of Europe at its 109th Session on 8 November 2001. It was opened for signature in Budapest, on 23 November 2001 and it entered into force on 1 July 2004. As of December 2016, 52 states have ratified the convention, while a further four states had signed the convention but not ratified it. Since it entered into force, important countries like Brazil and India have declined to adopt the Convention on the grounds that they did not pa ...more...



Freedom of speech

topic

Eleanor Roosevelt and the Universal Declaration of Human Rights (1949)—Article 19 states that "Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers" Orator at Speakers' Corner in London, 1974 Freedom of speech is a principle that supports the freedom of an individual or community to articulate one's opinions and ideas without fear of retaliation, censorship, or sanction. The term "freedom of expression" is sometimes used synonymously, but includes any act of seeking, receiving and imparting information or ideas, regardless of the medium used. Freedom of expression is recognized as a human right under article 19 of the Universal Declaration of Human Rights and recognized in international human rights law in the International Covenant on Civil and Political Rights (ICCPR). Article 19 of the UDHR states that "everyone shall hav ...more...



Sophie, Countess of Wessex

topic

Sophie, Countess of Wessex , GCVO (Sophie Helen; née Rhys-Jones ; born 20 January 1965), is the wife of Prince Edward, Earl of Wessex , the youngest son of Queen Elizabeth II and Prince Philip, Duke of Edinburgh . Married in 1999, she worked in public relations until 2002 and now assists her husband in his various activities. The Earl and Countess have two children: James, Viscount Severn , and Lady Louise Windsor , who are respectively tenth and eleventh in line to the British throne . Early life Sophie Helen Rhys-Jones was born at Radcliffe Infirmary , Oxford , on 20 January 1965, the second child and first daughter of Christopher Bournes Rhys-Jones (born 1931), a retired tyre salesman, and his wife, Mary ( née O'Sullivan; 1934–2005), a secretary. She has an elder brother, David, and was named after her father's sister, Helen, who died in a riding accident in 1960. Her godfather, actor Thane Bettany , is her father's stepbrother ; both men spent their early life in Sarawak , North Borneo, then a British P ...more...



Defamation

topic

Defamation, calumny, vilification, or traducement is the communication of a false statement that harms the reputation of an individual person, business, product, group, government, religion, or nation. Under common law, to constitute defamation, a claim must generally be false and must have been made to someone other than the person defamed. Some common law jurisdictions also distinguish between spoken defamation, called slander, and defamation in other media such as printed words or images, called libel. False light laws protect against statements which are not technically false, but which are misleading. In some civil law jurisdictions, defamation is treated as a crime rather than a civil wrong. The United Nations Human Rights Committee ruled in 2012 that the libel law of one country, the Philippines, was inconsistent with Article 19 of the International Covenant on Civil and Political Rights, as well as urging that "State parties [to the Covenant] should consider the decriminalization of libel". In Sa ...more...

Member feedback about Defamation:

Folder: My Items

(Misteral)



Child corporal punishment laws

topic

The legality of corporal punishment of children varies by country. Corporal punishment of minor children by parents or adult guardians, which is any punishment intended to cause physical pain, has been traditionally legal in nearly all countries unless explicitly outlawed. According to a 2014 estimate by Human Rights Watch , "Ninety percent of the world’s children live in countries where corporal punishment and other physical violence against children is still legal". Many countries' laws provide for a defence of "reasonable chastisement" against charges of assault and other crimes for parents using corporal punishment. This defence is ultimately derived from English law . As of July 2016, corporal punishment of children by parents is banned in 49 countries. Prohibition Countries as of February 2017 that have outlawed all forms of corporal punishment of children. Countries (or territories) that have completely prohibited corporal punishment of children are listed below (in chronological order):   Sweden (19 ...more...



Sophia Magdalena of Denmark

topic

Sophia Magdalena of Denmark ( Danish : Sofie Magdalene ; 3 July 1746 – 21 August 1813) was Queen of Sweden as the spouse of King Gustav III . Early life Princess Sofie Magdalene was born on 3 July 1746 at Christiansborg Palace in Copenhagen as the eldest surviving child of King Frederick V of Denmark and his first consort, the former Princess Louise of Great Britain . She was the heir presumptive to the throne of Denmark from the death of her elder brother in 1747 until the birth of her second brother in 1749, and retained her status as next in line to the Danish throne after her brother until her marriage. She was therefore often referred to as Crown Princess of Denmark. Portrait by Carl Gustaf Pilo , c. 1765 In the spring of 1751, at the age of five, she was betrothed to Gustav, the heir apparent to the throne of Sweden, and she was brought up to be the Queen of Sweden. The marriage was arranged by the Riksdag of the Estates , not by the Swedish royal family. The marriage was arranged as a way of creating ...more...



National Security Agency

topic

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become one of the largest U.S. intelligence organizations in terms of personnel and budget. The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end. The NSA has ...more...



Prince Ernst August of Hanover (born 1954)

topic

Ernst August, Prince of Hanover, Duke of Brunswick and Lüneburg ( German : Ernst August Albert Paul Otto Rupprecht Oskar Berthold Friedrich-Ferdinand Christian-Ludwig Prinz von Hannover Herzog zu Braunschweig und Lüneburg Königlicher Prinz von Großbritannien und Irland ; born 26 February 1954) is head of the deposed royal House of Hanover which held the thrones of the United Kingdom until 1901, of the former Kingdom of Hanover until 1866 and of the sovereign Duchy of Brunswick (1913 to 1918). As the husband of Princess Caroline of Monaco , he is the brother-in-law of Albert II, Prince of Monaco . Ancestry and Name Ernst August was born in Hanover , the eldest son of Ernst August, Hereditary Prince of Brunswick (1914–1987) and his first wife, Princess Ortrud of Schleswig-Holstein-Sonderburg-Glücksburg (1925–1980). He was christened, Ernst August Albert Paul Otto Rupprecht Oskar Berthold Friedrich-Ferdinand Christian-Ludwig. As the senior male-line descendant of George III of the United Kingdom , Ernst Aug ...more...



You Can't Read this Book

topic

You Can't Read This Book: Censorship in an Age of Freedom (2012) is a book by Nick Cohen about modern censorship , plutocratic power and privacy laws, freedom of speech , and free expression. In this book, author Nick Cohen argues that unrestricted access to online information and social media may expedite the fall of dictators, but does not mean we live in an unprecedented era of freedom. He goes on to state that we are subject to ever-tightening structures on what we say, think or do. According to Cohen, privacy laws let the wealthy censor the press; protest against oppression is slammed as bigotry and voices of dissent can't be heard over "the clamour hailing the internet as the saviour of democracy." While we seem more informed than ever before, states Cohen, his book aims to show that if we want to preserve free speech, we ignore history at our peril. Reviews The book's epigraph is from Christopher Hitchens , to whom the book is also dedicated: “ There is an all-out confrontation between the ironic and t ...more...



DNA database

topic

A DNA database or DNA databank is a database of DNA profiles which can be used in the analysis of genetic diseases, genetic fingerprinting for criminology, or genetic genealogy. DNA databases may be public or private, but the largest ones are national DNA databases. When a match is made from a national DNA database to link a crime scene to a person whose DNA profile is stored on a database, that link is often referred to as a cold hit. A cold hit is of particular value in linking a specific person to a crime scene, but is of less evidential value than a DNA match made without the use of a DNA database. Research shows that DNA databases of criminal offenders reduce crime rates. Types Forensic A centralised DNA database for storing DNA profiles of individuals that enables searching and comparing of DNA samples collected from a crime scene against stored profiles. The most important function of the forensic database is to produce matches between the suspected individual and crime scene bio-markers, and th ...more...



Skype

topic

Skype ( ) is a telecommunications application software product that specializes in providing video chat and voice calls between computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet and to regular telephones . Skype additionally provides instant messaging services. Users may transmit both text and video messages , and may exchange digital documents such as images, text, and video. Skype allows video conference calls . Skype implements a freemium business model. Much of the service is free, but Skype Credit or a subscription is required to call a landline or a mobile phone number. At the end of 2010, there were over 660 million worldwide users, with over 300 million estimated active each month as of August 2015. At one point in February 2012, there were 34 million users concurrently online on Skype. First released in August 2003, Skype was created by the Swede Niklas Zennström and the Dane Janus Friis , in cooperation with Ahti Heinla , Priit Kasesalu , and Jaan Tallinn ...more...



Night owl (person)

topic

A night owl , evening person or simply owl , is a person who tends to stay up until late at night. The opposite of a night owl is an early bird , a lark as opposed to owl, someone who tends to begin sleeping at a time that is considered early and also wakes early. In several countries, especially in Scandinavia , early birds are called "A-people" and night owls are called "B-people". Researchers traditionally use the terms "morningness" and "eveningness" for the two chronotypes or diurnality and nocturnality in animal behavior. Origins of term The term is derived from the primarily nocturnal habits of the owl . Usually, people who are night owls stay awake past midnight and extreme night owls may stay awake until just before or after dawn. Night owls tend to feel most energetic just before they go to sleep at night. Some night owls have a preference or habit for staying up late, or stay up to work the night shift . Night owls who work the day shift often have difficulties adapting to standard day-time wor ...more...



Rome II Regulation

topic

The Rome II Regulation (EC) No 864/2007 is a European Union Regulation regarding the conflict of laws on the law applicable to non-contractual obligations. From 11 January 2009, the Rome II Regulation creates a harmonised set of rules within the European Union to govern choice of law in civil and commercial matters (subject to certain exclusions) concerning non-contractual obligations , including specific rules for tort / delict and specific categories of tort/delict, unjust enrichment, negotiorum gestio and culpa in contrahendo. Additionally, in certain circumstances and subject to certain conditions, the parties may choose the law applicable to a non-contractual obligation. Analogous rules were established for contractual obligations by the Rome Convention of 1980. The Rome Convention has, in turn, been replaced by the Rome I Regulation on the law applicable to contractual obligations (Reg. (EC) No. 593/2008). The regulation applies to all EU member states except Denmark. Background Initially submitted ...more...



Five Eyes

topic

The Five Eyes , often abbreviated as FVEY , is an intelligence alliance comprising Australia , Canada , New Zealand , the United Kingdom and the United States . These countries, with a similar common law legal inheritance, are parties to the multilateral UKUSA Agreement , a treaty for joint cooperation in signals intelligence . The origins of the FVEY can be traced back to the post- World War II period, when the Atlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War , the ECHELON surveillance system was initially developed by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc , although it is now used to monitor billions of private communications worldwide. In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress . As part of efforts in the ongoing War on Terror since 2001, the FVEY further ...more...



Internet censorship

topic

Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences. The extent of Internet censorship varies on a country-to-country basis. While most democratic countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the Arab Spring . Other areas of censorship include copyrights, defamation, harassment, and obscene material. Support for and opposition to Internet censorship also varies. In a 2012 Internet Society survey 71% of respondents a ...more...



Private placement life insurance

topic

Private placement life insurance is a form of cash value universal life insurance that is offered privately, rather than through a public offering. Overview Chart of a life insurance Variable or indexed life insurance is a form of life insurance that has cash value linked to the performance of one or more investment accounts within the policy. Because of its investment features, insurance carriers in the United States typically register offerings of variable life insurance with federal and state securities regulators. To register the offering, carriers typically need to provide some level of detail of the investment selections within the policy. Without knowing the specifics of each potential client's investment profile, carriers often settle for registering a uniform offering that includes a selection of mutual funds or hedge funds as investment options within the policy. Not all investments are suitable for placement within these policies. They are better suited to absolute return and hedged strate ...more...



Criminal record

topic

A criminal record or police record is a record of a person's criminal history, generally used by potential employers, lenders, and others to assess his or her trustworthiness. The information included in a criminal record and the existence of a criminal record varies between countries and even between jurisdictions within a country. In most cases it lists all non-expunged criminal offences and may also include traffic offences such as speeding and drunk-driving. In some countries the record is limited to actual convictions (where the individual has pleaded guilty or been declared guilty by a qualified court), while in others it also includes arrests, charges dismissed, charges pending and charges of which the individual has been acquitted. Australia Individuals in Australia can obtain a national criminal history to check themselves, and certain organisations can apply for one on their behalf. A person may be required to undergo a criminal record check as part of employment screening, as a prerequisite fo ...more...



Schengen Information System

topic

The Schengen Information System (SIS) is a governmental database maintained by the European Commission . The SIS is used by twenty-six European countries to find information about individuals and entities for the purposes of national security, border control and law enforcement. A second technical version of this system, SIS II, went live on 9 April 2013. Participating nations Information in SIS is shared among the institutions of countries participating in the Schengen Agreement Application Convention (SAAC). The five original participating countries were France , Germany , Belgium , the Netherlands , and Luxembourg . Twenty-one additional countries have joined the system since its creation: Spain , Portugal , Italy , Austria , Greece , Finland , Sweden , Switzerland , Denmark , Iceland , Norway , Estonia , the Czech Republic , Hungary , Latvia , Lithuania , Malta , Poland , Slovakia , Slovenia and Liechtenstein . Among the current participants, Iceland , Liechtenstein , Norway , and Switzerland are not memb ...more...



Carter-Ruck

topic

Carter-Ruck is a British law firm founded by Peter Carter-Ruck. The firm specialises in libel, privacy, international law and commercial disputes. The leading legal directories (Legal 500 and Chambers and Partners) rank Carter-Ruck in the top tier of media, defamation and privacy lawyers in the UK. The firm is described by Legal 500 as being "a force to be reckoned with" and by Chambers and Partners as "acclaimed for its depth of quality expertise" routinely acting in "ground-breaking cases for high-flyers in the fields of business and entertainment". Carter-Ruck's public international law team is described by Chambers as "excellent, very knowledgeable and [as having] a flourishing sanctions practice" and as being "Renowned for its distinct expertise in sanctions against states and targeted asset freezing against individuals, and for its involvement in highly sensitive cases." The firm's banking litigation practice is also ranked by both directories. In December 2010 a new edition of the leading textbook ...more...



Prince Philip, Duke of Edinburgh

topic

Prince Philip, Duke of Edinburgh (born Prince Philip of Greece and Denmark , 10 June 1921) is the husband and consort of Queen Elizabeth II of the United Kingdom and the other Commonwealth realms . A member of the House of Schleswig-Holstein-Sonderburg-Glücksburg , Philip was born into the Greek and Danish royal families . He was born in Greece, but his family was exiled from the country when he was an infant. After being educated in France, Germany, and the United Kingdom, he joined the British Royal Navy in 1939, aged 18. From July 1939, he began corresponding with the 13-year-old Princess Elizabeth, his second cousin once removed, whom he had first met in 1934. During the Second World War he served with the Mediterranean and Pacific fleets. After the war, Philip was granted permission by King George VI to marry Elizabeth. Before the official announcement of their engagement in July 1947, he abandoned his Greek and Danish royal titles and became a naturalised British subject , adopting the surname Mountba ...more...

Member feedback about Prince Philip, Duke of Edinburgh:

Folder: My Items

(james01)

...low interest rate as low as 3%? We offer business loan, personal loan, home loan, auto loan,student loan, debt consolidation loan e.t.c. no matter your credit score. We are guaranteed in giving out financial services to our numerous clients all over world. With our flexible lending packages, loans can be processed and transferred to the borrower within the shortest time possible, contact our specialist for advice and finance planning. If you need a quick loan contact us via Email@ heartlandfinancialsgroup@gmail.com


Age of majority

topic

The age of majority is the threshold of adulthood as recognized or declared in law. It is the moment when minors cease to be considered children and assume legal control over their persons, actions, and decisions, thus terminating the control and legal responsibilities of their parents or guardian over them. Most countries set the age of majority at 18. The word majority here refers to having greater years and being of full age as opposed to minority, the state of being a minor. The law in a given jurisdiction may not actually use the term "age of majority". The term typically refers to a collection of laws bestowing the status of adulthood. The age of majority does not necessarily correspond to the mental or physical maturity of an individual. Age of majority should not be confused with the age of sexual consent, marriageable age, school leaving age, drinking age, driving age, voting age, smoking age, gambling age, etc., which each may be independent of and set at a different age from the age of majority. ...more...



Prince Edward, Earl of Wessex

topic

Prince Edward, Earl of Wessex, KG, GCVO, CD, ADC(P) (Edward Antony Richard Louis; born 10 March 1964) is the youngest of four children and the third son of Queen Elizabeth II and Prince Philip, Duke of Edinburgh. At the time of his birth, he was third in line of succession to the British throne; as of 2018, he is ninth in line. Early life and education Prince Edward was born on 10 March 1964, at Buckingham Palace, as the third son, and the fourth and youngest child of Queen Elizabeth II and Prince Philip, Duke of Edinburgh. He was baptised on 2 May 1964 in the private chapel at Windsor Castle by the then-Dean of Windsor, Robin Woods. As with his older siblings, a governess was appointed to look after Edward and was responsible for his early education at Buckingham Palace. At the age of seven, Edward was sent to Gibbs School before attending, in September 1972, Heatherdown School, near Ascot in Berkshire. He then, as his father and elder brothers had done before him, moved to Gordonstoun, in northern Scot ...more...



Hijab by country

topic

The word hijab refers to both the head-covering traditionally worn by some Muslim women and modest Islamic styles of dress in general. The garment has different legal and cultural status in various countries. Muslim women are legally required to wear hijab in public in Saudi Arabia and the Indonesian Aceh province, and all women are required to do so in Iran. France has banned overt religious symbols, including religious head covering, in public schools and universities or government buildings. Kosovo (since 2009), Azerbaijan (since 2010 ), Tunisia (since 1981, partially lifted in 2011) and Turkey (gradually lifted) are the only Muslim-majority countries which have banned the hijab in public schools and universities or government buildings, while Syria banned face veils in universities from July 2010. In other Muslim states such as Morocco , there have been complaints of restriction or discrimination against women who wear the hijab. The hijab in these cases is seen as a sign of political Islam or fun ...more...



IPhone X

topic

iPhone X ("X" pronounced "ten" ) is a smartphone designed, developed, and marketed by Apple Inc. It was announced on September 12, 2017, alongside the iPhone 8 and iPhone 8 Plus at the Steve Jobs Theater in the Apple Park campus. The phone was released on November 3, 2017. This device marks the iPhone series' tenth anniversary, with "X" being the symbol for "ten" in Roman numerals. The iPhone X is intended to showcase what Apple thinks is technology of the future, specifically adopting OLED screen technology for the first time in iPhone history, as well as using a glass and stainless-steel form factor, offering wireless charging, and removing the home button in favor of introducing Face ID, a new authentication method using advanced technologies to scan the user's face to unlock the device, as well as for the use of animated emojis called Animoji. The new, nearly bezel-less form factor marks a significant change to the iPhone user interaction, involving swipe-based gestures to navigate around the operating ...more...



Automatic number-plate recognition

topic

License-plate recognition process Automatic number-plate recognition (ANPR; see also other names below) is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task. ANPR is used by police forces around the world for law enforcement purposes, including to check if a vehicle is registered or licensed. It is also used for electronic toll collection on pay-per-use roads and as a method of cataloguing the movements of traffic, for example by highways agencies. Automatic number plate recognition can be used to store the images captured by the cameras as well as the text from the license plate, with some configurable to store a photograph of the driver. Systems commonly use infrared lighting to allow the camera to take the picture at any time of day or night. ANPR technology must take into account plate variat ...more...



Uber

topic

Uber Technologies Inc. is a global taxi technology company headquartered in San Francisco , California , United States , operating in 633 cities worldwide. It develops, markets and operates the Uber car transportation and food delivery mobile apps . Uber drivers use their own cars although drivers can rent a car to drive with Uber. The name "Uber" is a reference to the common (and somewhat colloquial) word " uber ", meaning "topmost" or "super", and having its origins in the German word über , meaning "above". Uber has been a pioneer in the sharing economy , so much so that the changes in industries as a result of it have been referred to as Uberisation . Uber has also been the subject of protests and legal actions and is the subject of a criminal investigation. Operations Icon for Uber rider app as of May 2017 The Uber app software requires the drivers to have a smartphone , and users must have access to either a smartphone or the mobile website. Pricing and payments An Uber ride in Bogotá, Colombia run ...more...



Freedom of speech by country

topic

Freedom of speech is the concept of the inherent human right to voice one's opinion publicly without fear of censorship or punishment. "Speech" is not limited to public speaking and is generally taken to include other forms of expression. The right is preserved in the United Nations Universal Declaration of Human Rights and is granted formal recognition by the laws of most nations. Nonetheless the degree to which the right is upheld in practice varies greatly from one nation to another. In many nations, particularly those with relatively authoritarian forms of government, overt government censorship is enforced. Censorship has also been claimed to occur in other forms (see propaganda model) and there are different approaches to issues such as hate speech, obscenity, and defamation laws even in countries seen as liberal democracies. International law Wikisource has original text related to this article: Universal Declaration of Human Rights The United Nations Universal Declaration of Human Rights, adopt ...more...



E-services

topic

The concept of e-service (short for electronic service) represents one prominent application of utilizing the use of information and communication technologies (ICTs) in different areas. However, providing an exact definition of e-service is hard to come by as researchers have been using different definitions to describe e-service. Despite these different definitions, it can be argued that they all agree about the role of technology in facilitating the delivery of services which make them more of electronic services. It seems compelling to adopt Rowley's (2006) approach who defines e-services as: “…deeds, efforts or performances whose delivery is mediated by information technology. Such e-service includes the service element of e-tailing, customer support, and service delivery”. This definition reflect three main components- service provider, service receiver and the channels of service delivery (i.e., technology). For example, as concerned to public e-service, public agencies are the service provider and c ...more...



Society for Worldwide Interbank Financial Telecommunication

topic

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides a network that enables financial institutions worldwide to send and receive information about financial transactions in a secure, standardized and reliable environment. SWIFT also sells software and services to financial institutions, much of it for use on the SWIFTNet Network, and ISO 9362. Business Identifier Codes (BICs, previously Bank Identifier Codes) are popularly known as "SWIFT codes". The majority of international interbank messages use the SWIFT network. As of 2015, SWIFT linked more than 11,000 financial institutions in more than 200 countries and territories, who were exchanging an average of over 15 million messages per day (compared to an average of 2.4 million daily messages in 1995). SWIFT transports financial messages in a highly secure way but does not hold accounts for its members and does not perform any form of clearing or settlement. SWIFT does not facilitate funds transfer: rather, it sends payment ord ...more...



Bellotti v. Baird (1979)

topic

Bellotti v. Baird , 443 U.S. 622 (1979) is a United States Supreme Court case that ruled 8-1 that teenagers do not have to secure parental consent to obtain an abortion . The Court elaborated on its parental consent decision of 1976. It implies that states may be able to require a pregnant, unmarried minor to obtain parental consent to an abortion if the state law provides an alternative procedure to parental approval, such as letting the minor seek a state judge's approval instead. The plurality opinion declined to extend the full right to minors to seek and obtain an abortion, which was granted to adult women in Roe v. Wade . The Court rejected the extension to minors by placing emphasis on the especially vulnerable nature of children, their "inability to make critical decisions in an informed and mature manner; and the importance of the parental role in child rearing." See also Bellotti v. Baird (1976) List of United States Supreme Court cases, volume 443 References Wharton, Linda (2009). "Roe at Thirty-S ...more...



Smart meter

topic

Newer retrofitted U.S. domestic digital electricity meter Elster REX with 900MHz mesh network topology for automatic meter reading and "EnergyAxis" time-of-use metering. Each local mesh networked smart meter has a hub such as this Elster A3 Type A30 which interfaces 900MHz smart meters to the metering automation server via a landline. A very old and rusted box housing a smart meter as found near a Circle K supermarket along the main road in South Bali near Gianyar . A smart meter is an electronic device that records consumption of electric energy in intervals of an hour or less and communicates that information at least daily back to the utility for monitoring and billing. Smart meters enable two-way communication between the meter and the central system. Unlike home energy monitors, smart meters can gather data for remote reporting. Such an advanced metering infrastructure (AMI) differs from traditional automatic meter reading (AMR) in that it enables two-way communications with the meter. Communications f ...more...



Sexual and reproductive health and rights

topic

Sexual and reproductive health and rights or SRHR is the concept of human rights applied to sexuality and reproduction. It is a combination of four fields that in some contexts are more or less distinct from each other, but less so or not at all in other contexts. These four fields are sexual health, sexual rights, reproductive health and reproductive rights. In the concept of SRHR, these four fields are treated as separate but inherently intertwined. Distinctions between these four fields are not always made. Sexual health and reproductive health are sometimes treated as synonymous to each other, as are sexual rights and reproductive rights. In some cases, sexual rights are included in the term sexual health, or vice versa. Not only do different non-governmental organisations (NGOs) and governments use different terminologies, but different terminologies are often used within the same organization. Some of the notable global NGOs that fight for sexual and reproductive health and rights include IPPF (Inter ...more...



List of national identity card policies by country

topic

This is a list of identity document policies by country. A national identity document ("ID" or "identity card") is defined as an identity card with photo, usable as an identity card at least inside the country, and which is issued by an official authority. Regional government issued driver's licenses and other cards indicating certain permissions are not counted here as national identity cards. So for example, by this criteria, the United States drivers license is excluded, as these are local (state) government issued (although these or the state ID are all-but required as nation-wide identification). Identity card policies by country Countries with compulsory identity cards According to a 1996 publication by Privacy International, around 100 countries had enacted laws making identity cards compulsory. In these countries, the card must be shown on demand by authorised personnel under specified circumstances. In some countries alternative proof of identity, such as a driving licence is acceptable. Priva ...more...



History of abortion

topic

The practice of abortion —the termination of a pregnancy—has been known since ancient times. Various methods have been used to perform an abortion, including the administration of abortifacient herbs, the use of sharpened implements, the application of abdominal pressure, and other techniques. Abortion laws and their enforcement have fluctuated through various eras. In many western countries during the 20th century various pro-abortion groups, were successful in having abortion bans repealed. While abortion remains legal in most of the West, this legality is regularly challenged by anti-abortion groups. Premodern era Bas relief at Angkor Wat , c.  1150 , depicting a demon performing an abortion upon a woman who has been sent to the underworld. The Vedic and smrti laws of India reflected a concern with preserving the male seed of the three upper castes; and the religious courts imposed various penances for the woman or excommunication for a priest who provided an abortion. The only evidence of the death penal ...more...



Abortion law

topic

Abortion law permits, prohibits, restricts, or otherwise regulates the availability of abortion . Abortion has been a controversial subject in many societies through history on religious, moral, ethical, practical, and political grounds. It has been banned frequently and otherwise limited by law. However, abortions continue to be common in many areas, even where they are illegal. According to the World Health Organization (WHO), abortion rates are similar in countries where the procedure is legal and in countries where it is not, due to unavailability of modern contraceptives in areas where abortion is illegal. Also according to the WHO, the number of abortions worldwide is declining due to increased access to contraception. Almost two-thirds of the world's women currently reside in countries where abortion may be obtained on request for a broad range of social , economic , or personal reasons. Abortion laws vary widely by country. Three countries in Latin America ( Dominican Republic , El Salvador , and Ni ...more...



National identification number

topic

A national identification number , national identity number , or national insurance number is used by the governments of many countries as a means of tracking their citizens , permanent residents , and temporary residents for the purposes of work, taxation, government benefits , health care, and other governmentally-related functions. The number appears on identity documents issued by several of the countries. The ways in which such a system is implemented vary among countries, but in most cases citizens are issued an identification number upon reaching legal age, or when they are born. Non-citizens may be issued such numbers when they enter the country, or when granted a temporary or permanent residence permit. Many countries issued such numbers for a singular purpose, but over time, they become a de facto national identification number. For example, the United States developed its Social Security number system as a means of organizing disbursing of Social Security benefits. However, due to function creep , ...more...



Legal drinking age

topic

The legal drinking age is the age at which a person can legally consume or purchase alcoholic beverages . These laws cover a wide range of issues and behaviors, addressing when and where alcohol can be consumed. The minimum age alcohol can be legally consumed can be different from the age when it can be purchased in some countries. These laws vary among different countries and many laws have exemptions or special circumstances. Most laws apply only to drinking alcohol in public places, with alcohol consumption in the home being mostly unregulated (an exception being the UK, which has a minimum legal age of five for supervised consumption in private places). Some countries also have different age limits for different types of alcoholic drinks. Some Islamic nations prohibit Muslims , or both Muslims and non-Muslims, from drinking alcohol at any age. In other countries, it is not illegal for minors to drink alcohol, but the alcohol can be seized without compensation. In some cases, it is illegal to sell or give ...more...



European Court of Justice

topic

The European Court of Justice ( ECJ ), officially just the Court of Justice ( French : Cour de Justice ), is the highest court in the European Union in matters of European Union law . As a part of the Court of Justice of the European Union it is tasked with interpreting EU law and ensuring its equal application across all EU member states . The Court was established in 1952 and is based in Luxembourg . It is composed of one judge per member state – currently 28 – although it normally hears cases in panels of three, five or 15 judges. The court has been led by president Koen Lenaerts since 2015. History The court was established in 1952, by the Treaty of Paris (1951) as part of the European Coal and Steel Community . It was established with seven judges, allowing both representation of each of the six member States and being an unequal number of judges in case of a tie. One judge was appointed from each member state and the seventh seat rotated between the "large Member States" (West Germany, France and Ital ...more...



Catherine, Duchess of Cambridge

topic

Catherine, Duchess of Cambridge (Catherine Elizabeth "Kate"; née Middleton; born 9 January 1982 ) is a member of the British royal family. Her husband, Prince William, Duke of Cambridge, is second in line to become King of the United Kingdom and 15 other Commonwealth realms, making Catherine a likely future queen consort. Catherine grew up in Chapel Row, a village near Newbury, Berkshire, England. She studied art history in Scotland at the University of St Andrews, where she met William in 2001. Their engagement was announced in November 2010 before they married on 29 April 2011 at Westminster Abbey. The Duke and Duchess's children, Prince George and Princess Charlotte of Cambridge, are third and fourth in the line of succession respectively, and the couple are expecting their third child. Catherine's impact on British and American fashion has been called the "Kate Middleton effect" in the media, and in 2012 and 2013, she was selected as one of the "100 Most Influential People in the World" by Time magazi ...more...



Transport Layer Security

topic

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now prohibited from use by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, Internet faxing, instant messaging, and voice over IP (VoIP). Websites are able to use TLS to secure all communications between their servers and web browsers. The TLS protocol aims primarily to provide privacy and data integrity between two communicating computer applications. When secured by TLS, connections between a client (e.g., a web browser) and a server (e.g., wikipedia.org) have one or more of the following properties: The connection is private (or secure) because symmetric cryptography is used to encrypt the data transmitted. The keys for this symmetric encryption are generated uniquely for each connection and are based on a shared secret negotiated a ...more...



Convention on the Rights of the Child

topic

The United Nations Convention on the Rights of the Child (commonly abbreviated as the CRC or UNCRC) is a human rights treaty which sets out the civil, political, economic, social, health and cultural rights of children. The Convention defines a child as any human being under the age of eighteen, unless the age of majority is attained earlier under national legislation. Nations that ratify this convention are bound to it by international law. Compliance is monitored by the UN Committee on the Rights of the Child, which is composed of members from countries around the world. Once a year, the Committee submits a report to the Third Committee of the United Nations General Assembly, which also hears a statement from the CRC Chair, and the Assembly adopts a Resolution on the Rights of the Child. Governments of countries that have ratified the Convention are required to report to, and appear before, the United Nations Committee on the Rights of the Child periodically to be examined on their progress with regards ...more...



International Covenant on Civil and Political Rights

topic

The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty adopted by the United Nations General Assembly with resolution 2200A (XXI) on 19 December 1966, and in force from 23 March 1976 in accordance with Article 49 of the covenant. Article 49 allowed that the covenant will enter into force three months after the date of the deposit of the thirty-fifth instrument of ratification or accession. The covenant commits its parties to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedom of assembly, electoral rights and rights to due process and a fair trial. As of February 2017, the Covenant has 169 parties and six more signatories without ratification. The ICCPR is part of the International Bill of Human Rights, along with the International Covenant on Economic, Social and Cultural Rights (ICESCR) and the Universal Declaration of Human Rights (UDHR). The ICCPR is monitored by the United Nations Human R ...more...



Cops (TV series)

topic

Cops (stylized as COPS ) is an American half-hour documentary / reality legal series that follows police officers , constables , sheriff 's deputies, federal agents , and state troopers during patrols and other police activities including prostitution and narcotics stings. It is one of the longest-running television programs in the United States and in May 2011 became the longest-running show on Fox with the announcement that America's Most Wanted was being canceled after 23 years (that show's host, John Walsh also appeared many times on Cops). In 2013, the program moved from Fox to the cable network Spike, now known as Paramount Network . Cops follows the activities of police officers by assigning television camera crews to accompany them as they perform their duties. The show's formula follows the cinéma vérité convention, which does not consist of any narration or scripted dialog, depending entirely on the commentary of the officers and on the actions of the people with whom they come into contact. Each ...more...



Sousveillance

topic

Surveillance as compared with sousveillance Sousveillance ( soo-VAY-ləns) is the recording of an activity by a participant in the activity, typically by way of small wearable or portable personal technologies. The term "sousveillance", coined by Steve Mann, stems from the contrasting French words sur, meaning "above", and sous, meaning "below", i.e. "surveillance" denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings), or hierarchically (ordinary people doing the watching, rather than higher authorities or architectures doing the watching). While surveillance and sousveillance both generally refer to visual monitoring, the terms also denote other forms of monitoring such as audio surveillance or sousveillance. In the audio sense (e.g. recording of phone conversations) sousveillance is referred to as "one party consent". Undersight ...more...



Open-source hardware

topic

The RepRap general-purpose 3D printer with the ability to make copies of most of its own structural parts Open-source hardware ( OSH ) consists of physical artifacts of technology designed and offered by the open design movement. Both free and open-source software (FOSS) and open-source hardware are created by this open-source culture movement and apply a like concept to a variety of components. It is sometimes, thus, referred to as FOSH (free and open-source hardware). The term usually means that information about the hardware is easily discerned so that others can make it – coupling it closely to the maker movement . Hardware design (i.e. mechanical drawings, schematics , bills of material , PCB layout data, HDL source code and integrated circuit layout data), in addition to the software that drives the hardware, are all released under free/ libre terms. The original sharer gains feedback and potentially improvements on the design from the FOSH community. There is now significant evidence that such sharin ...more...



Age of consent

topic

The age of consent is the age at which a person is considered to be legally competent to consent to sexual acts and is thus the minimum age of a person with whom another person is legally permitted to engage in sexual activity. The distinguishing aspect of the age of consent laws is that the person below the minimum age is regarded as the victim and his or her sex partner is regarded as the offender, unless both are underage. The purpose of setting an age of consent is to protect an underage person from sexual advances. The term age of consent rarely appears in legal statutes . Generally, a law will instead establish the age below which it is illegal to engage in sexual activity with that person. It has sometimes been used with other meanings, such as the age at which a person becomes competent to consent to marriage , but the meaning given above is the one now generally understood. It should not be confused with the age of majority , age of criminal responsibility , the voting age , the drinking age , the ...more...



Terrorist Finance Tracking Program

topic

The Terrorist Finance Tracking Program (TFTP) is a United States government program to access financial transactions on the international SWIFT network that was revealed by The New York Times, The Wall Street Journal and The Los Angeles Times in June 2006. It was part of the Bush administration's War on Terrorism. After the covert action was disclosed, the so-called SWIFT-agreement was negotiated between the United States and the European Union. Overview A series of articles published on June 23, 2006, by the New York Times, the Wall Street Journal and the Los Angeles Times revealed that the United States government, specifically the Treasury and the CIA, had a program to access the SWIFT transaction database after the September 11th attacks. According to the June 2006 New York Times article, the program helped lead to the capture of an al-Qaeda operative known as Hambali in 2003, believed to be the mastermind of the 2002 Bali bombing, as well as helped identify a Brooklyn man convicted in 2005 for laund ...more...



Origin (digital distribution software)

topic

Origin is an online gaming , digital distribution and digital rights management (DRM) platform developed by Electronic Arts that allows users to purchase games on the internet for PC and mobile platforms, and download them with the Origin client (formerly EA Download Manager, EA Downloader and EA Link). Origin for Mac has been available since February 8, 2013. Origin contains social features such as profile management, networking with friends with chat and direct game joining along with an in-game overlay, streaming via TwitchTV and sharing of game library and community integration with networking sites like Facebook , Xbox Live , PlayStation Network , and Nintendo Network . Electronic Arts has stated that it wanted Origin to match Valve 's Steam service , Origin's leading competitor, by the end of March 2012, by adding cloud game saves, auto-patching, achievements and rewards, and cross-platform releases. Origin has over 50 million registered users. Components Origin store Origin web store as of February 2 ...more...



Identity document

topic

An identity document (also called a piece of identification or ID, or colloquially as papers) is any document which may be used to prove a person's identity. If issued in a small, standard credit card size form, it is usually called an identity card (IC, ID card, Citizen Card), or Passport Card. Some countries issue formal identity documents, while others may require identity verification using informal documents. When the identity document incorporates a person's photograph, it may be called photo ID. In the absence of a formal identity document, a driver's license may be accepted in many countries for identity verification. Some countries do not accept driver's licenses for identification, often because in those countries they do not expire as documents and can be old or easily forged. Most countries accept passports as a form of identification. Some countries require all people to have an identity document available at any time. Many countries require all foreigners to have a passport or occasionally a ...more...




Next Page
Javascript Version
Revolvy Server https://www.revolvy.com