Friday, February 27, 2009

President promulgates ordinance to prevent electronic crimes


ISLAMABAD, Nov 6 (APP): The President has promulgated the Prevention of Electronic Crimes Ordinance, 2008 (Ordinance No. IX of 2008) to make provision for prevention of the electronic crimes. This Ordinance may be called the Prevention of Electronic Crimes Ordinance, 2008. This Ordinance extends to the whole of Pakistan and it shall apply to every person who commits an offence under this Ordinance irrespective of his nationality or citizenship whatsoever or in any place outside or inside Pakistan, having detrimental effect on the security of Pakistan or its nationals or national harmony or any property or any electronic system or data located in Pakistan or any electronic system or data capable of being connected, sent to, used by or with any electronic system in Pakistan.
It shall come into force at once and shall be deemed to have taken effect on the 29th September, 2008.
Following is the text of the Ordinance:
WHEREAS it is expedient of prevent any action directed against the confidentiality, integrity and availability of electronic system, networks and data as well as the misuse of such system, networks and data by providing for the punishment of such actions and to provide mechanism for investigation, prosecution and trial of offenses and for matters connected herewith or ancillary thereto;
AND WHEREAS THE the National Assembly is not in session and the President is satisfied that the circumstances exist which render it necessary to take immediate action;
NOW, THEREFORE, in exercise of the powers conferred by clause (1) of Article 89 of the Constitution of the Islamic Republic of Pakistan, and in exercise of all powers enabling in that behalf, the President is pleased to make and promulgate the following Ordinance:-
2. Definitions.- (1) In this Ordinance, unless there is anything repugnant in the subject or context,-
(a) “access” means gaining access to any electronic system or data held in an electronic system or by causing the electronic system to perform any function to achieve that objective;
(b) “Authority” means the Pakistan Telecommunication Authority established under section 3 of the Pakistan Telecommunication (Re-organization) Act, 1996 (XVII of 1996);
(c) “Code” means the Code of Criminal Procedure, 1898( Act V of 1898);
(d) “Constitution” means Constitution of the Islamic Republic of Pakistan;
(e) “data” means representations of information or of concepts that are being prepared or have been prepared in a form suitable for use in an electronic system
including but not limited to computer program, text, images, sound, video and information within a database or electronic system;
(f) “decision of the Authority” means decision given, determination made or order passed by the Authority under any of the provisions of the Pakistan Telecommunication (Re-organization) Act, 1996 (XVII of 1996) on any matter relating to one or more licensed operators pursuant to the powers conferred upon the Authority by any other law, rule, regulation or directive for the time being in force which includes any interim order passed by the Authority pending final decision;
(g) “Electronic Certification Accreditation Council” means the council established under section 18 of the Electronic Transaction Ordinance, 2002 (LI of 2002);
(h) “electronic” includes but not limited to electrical, digital, analogue, magnetic, optical, biochemical, electrochemical, electromechanical,electromagnetic, radio electric or wireless technology;
(i) “electronic device” means any hardware which performs one or more specific functions and operates on any form or combination of electrical energy;
(j) “electronic mail message” means any data generated by an electronic system for a unique electronic mail address;
(k) “electronic mail address” means a destination, commonly expressed as a string of characters, consisting of a unique user or group name or mailbox, commonly referred to as the local part, and a reference to an internet or intranet domain, commonly referred to as the domain part, whether or not displayed, to which an electronic mail message can be sent or delivered or originated from and includes an electronic mail address which may be permanent, dynamic or disposable;
(1) “electronic system” means any electronic device or a group of interconnected or related devices, one or more of which, pursuant to a program or manual or any external instruction, performs automatic processing of information or data and may also include a permanent, removable or any other electronic storage medium;
(m) “encrypted data” means data which has been transformed or scrambled from its plain version or text to an unreadable or incomprehensible format and is recoverable by an associated decryption or decoding technique, regardless of the technique utilized for such transformation or scrambling and irrespective of the medium in which such data occurs or can be found for the purposes of protecting such data;
(n) “function” includes logic, control, arithmetic, deletion, storage and retrieval and communication or telecommunication to, from or within an electronic system;
(o) “Interpol” means International Criminal Police Organization;
(p) “offence” includes,-
(i) an offence punishable under this Ordinance;
(ii) an offence punishable under the laws mentioned in the Schedule ; or
(iii) any other offence punishable under any other law for the time being in force if committed through or by using any computer, electronic system, electronic means or electronic device as a means or tool;
(q) “plain version” means original data before it has been transformed or scrambled to an unreadable or incomprehensible format or after it has been recovered by using any decryption or decoding technique;
(r) “rules” means rules made under this Ordinance; (s) “Schedule” means the
Schedule to this Ordinance;
(t) “sensitive electronic system” means an electronic system used directly in connection with or necessary for,-
(i) the security, defence or international relations of Pakistan;
(ii) the existence or identity of a confidential source of information relating to the enforcement of criminal law;
(iii) the provision of services directly related to communications infrastructure, banking and financial services, public utilities, courts, public transportation, public key infrastructure, payment systems infrastructure or e-commerce infrastructure ;
(iv) the protection of public safety including systems related to essential emergency services such as police, civil defence and medical services ;
(iv) the purpose declared as such by the Federal Government in accordance with the prescribed procedure ; or
(vi) containing any data or database protected as such, by any other laws.
(u) “service provider” includes but not limited to ,-
(i) a person acting as a service provider in relation to sending, receiving, storing or processing of electronic communication or the provision of other services in relation to electronic communication through any electronic system;
(ii) a person who owns, possesses, operates, manages or controls a public switched network or provides telecommunication services; or
(iii) any other person who processes or stores data on behalf of such electronic communication service or users of such service;
(v) “subscriber information” means any information contained in any form that is held by a service provider, relating to subscriber’s services other’than traffic data and by which can be established,-
(i) the type of communication service used, the technical provisions taken thereto and the period of service;
(ii) the subscriber’s identity, postal geographic, “electronic mail address, telephone and other access number, billing and payment information, available on
the basis of the service agreement or arrangement; or (iii) any other information
on the site of the installation of communication equipment, ¦ available on the basis of the service agreement or arrangement;
(w) “traffic data” means any data relating to a communication by means of an electronic system, generated by an electronic system that formed a part in the chain of communication, indicating the communication’s origin, destination, route, time, date, size, duration, or type of underlying service;
(x) “Tribunal” means the Information and Communication Technologies Tribunal constituted under section 31; and
(y) “unauthorized access” means access of any kind by any person to any electronic system or data held in an electronic system or electronic device, without authority or in excess of authority, if he is not himself entitled to control access of the kind in question to the electronic system or electronic device, or data and he does not have consent to such access from any person, so entitled.
CHAPTER-II
OFFENCES AND PUNISHMENTS
3. Criminal access .- Whoever intentionally gains unauthorized access to the whole or any part of an electronic system or electronic device with or without infringing security measures, shall be punished with imprisonment of either description for a term which may extend to two years, or with fine not exceeding three hundred thousand rupees, or with both.
4. Criminal data access,- Whoever intentionally causes any electronic system or electronic device to perform any function for the purpose of gaining unauthorized access to any data held in any electronic system or electronic device or on obtaining such unauthorized access shall be punished with imprisonment of either description for a term which may extend to three years, or with fine or with both. 5. Data damage.- Whoever with intent to illegal gain or cause harm to the public or any person, damages any data shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both.
Explanation .- For the purpose of this section the expression “data damage” includes but not limited to modifying, altering, deleting, deterioration, erasing, suppressing, changing location of data or making data temporarily or permanently unavailable, halting electronic system, choking the networks or affecting the reliability or usefulness of data.
6. System damage.- Whoever with intent to cause damage to the public or any person interferes with or interrupts or obstructs the functioning, reliability or usefulness of an electronic system or electronic device by inputting, transmitting, damaging, deleting, altering, tempering, deteriorating or suppressing any data or services or halting electronic system or choking the networks shall be punished with imprisonment of either description for a term which may extend to three years, or with fine or, with both.
Explanation .- For the purpose of this section the expression “services” include any kind of service provided through electronic system.
7. Electronic fraud.- Whoever for wrongful gain interferes with or uses any data, electronic system or electronic device or induces any person to enter into a relationship or with intent to deceive any person, which act or omission is likely to cause damage or harm to that person or any other person shall be punished with imprisonment of either description for a term which may extend to seven years, or with fine, or with both.
8. Electronic forgery.- Whoever for wrongful gain interferes with data, electronic system or electronic device, with intent to cause damage or injury to the public or to any person, or to make any illegal claim or title or to cause any person to part with property or to enter into any express or implied contract, or with intent to commit fraud by any input, alteration, deletion, or suppression of data, resulting in unauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless of the fact that the data is directly readable and intelligible or not shall be punished with imprisonment of either description for a term which may extend to seven years, or with fine or with both.
9. Misuse of electronic system or electronic device.- (1) Whoever produces, possesses, sells, procures, transports, imports, distributes or otherwise makes available an electronic system or electronic device, including a computer program, designed or adapted primarily for the purpose of committing any of the offences established under this Ordinance or a password, access code, or similar data by which the whole or any part of an electronic system or electronic device is capable of being accessed or its functionality compromised or reverse engineered , with the intent that it be used for the purpose of committing any of the offences established under this Ordinance, is said to commit offence of misuse of electronic system or electronic devices:
Provided that the provisions of this section shall not apply to the authorized testing or protection of an electronic system for any lawful purpose.
(2) Whoever commits the offence described in sub-section (1) shall be punishable with imprisonment of either description for a term which may extend to three years, or with fine, or with both.
10. Unauthorized access to code.- Whoever discloses or obtains any password, access as to code, system design or any other means of gaining access to any electronic system or data with intent to obtain wrongful gain, do reverse engineering or cause wrongful loss to any person or for any other unlawful purpose shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both.
11. Misuse of encryption.- Whoever for the purpose of commission of an offence or concealment of incriminating evidence, knowingly and willfully encrypts any incriminating communication or data contained in electronic system relating to that crime or incriminating evidence, commits the offence of misuse of encryption shall be punished with imprisonment of either description for a term which may extend to five years, or with fine, or with both.
12. Malicious code.- (1) Whoever willfully writes, offers, makes available, distributes or transmits malicious code through an electronic system or electronic device, with intent to cause harm to any electronic system or resulting in the corruption, destruction, alteration, suppression, theft or loss of data commits the offence of malicious code:
Provided that the provision of this section shall not apply to the authorized testing, research and development or protection of an electronic system for any lawful purpose.
Explanation,- For the purpose of this section the expression “malicious code” includes but not limited to a computer program or a hidden function in a program that damages data or compromises the electronic system’s performance or uses the electronic system resources without proper authorization, with or without attaching its copy to a file and is capable of spreading over electronic system with or without human intervention including virus, worm or Trojan horse.
(2) Whoever commits the offence specified in sub-section (1) shall be punished with imprisonment of either description for a term which may extend to five years, or with fine or with both.
13. Cyber stalking.- (1) Whoever with intent to coerce , intimidate, or harass any person uses computer, computer network, internet, network site ,electronic mail or any other similar means of communication to,-
(a) communicate obscene, vulgar, profane, lewd, lascivious , or indecent language, picture or image;
(b) make any suggestion or proposal of an obscene nature;
(c) threaten any illegal or immoral act;
(d) take or distribute pictures or photographs of any person without his consent or knowledge; or
(e) display or distribute information in a manner that substantially increases the risk of harm or violence to any other person, commits the offence of cyber stalking.
(2) Whoever commits the offence specified in sub-section (1) shall be punishable with imprisonment of either description for a term which may extend to seven years or with fine not exceeding three hundred thousand rupees, or with both:
Provided that if the victim of the cyber stalking under sub-section (1) is a minor the punishment may extend to ten years or with fine not less than one hundred thousand rupees, or with both.
14. Spamming.- (1) Whoever transmits harmful, fraudulent, misleading, illegal or unsolicited electronic messages in bulk to any person without the express permission of the recipient, or causes any electronic system to show any such message or involves in falsified online user account registration or falsified domain name registration for commercial purpose commits the offence of spamming. (2) Whoever commits the offence of spamming as described in sub-section (1) shall be punishable with fine not exceeding fifty thousand rupees if he commits this offence of spamming for the first time and for every subsequent commission of offence of spamming he shall be punished with imprisonment of three months or with fine, or with both.
15. Spoofing.(l) Whoever establishes a website, or sends an electronic messagewith a counterfeit source intended to be believed by the recipient or visitor or its electronic system to be an authentic source with intent to gain unauthorized access or obtain valuable information which later can be used for any unlawful purposes commits the offence of spoofing. (2) Whoever commits the offence of spoofing specified in sub-section (1) shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both.
16. Unauthorized interception.- (1) Whoever without lawful authority intercepts by technical means, transmissions of data to, from or within an electronic system including electromagnetic emissions from an electronic system carrying such data commits the offence of unauthorized interception. (2) Whoever commits the offence of unauthorized interception described in sub-section (1) shall be punished with imprisonment of either description fora term which may extend to five years, or with fine not exceeding five hundred thousand rupees, or with both.
17. Cyber terrorism.- (1) Any person, group or organization who, with terroristic intent utilizes, accesses or causes to be accessed a computer or computer network or electronic system or electronic device or by any available means, and thereby knowingly engages in or attempts to engage in a terroristic act commits the offence of cyber terrorism.
Explanation l.- For the purposes of this section the expression “terroristic intent” means to act with the purpose to alarm, frighten, disrupt, harm, damage, or carry out an act of violence against any segment of the population, the Government or entity associated therewith.
Explanation 2.- For the purposes of this section the expression “terroristic act” includes, but is not limited to,-
(a) altering by addition, deletion, or change or attempting to alter information that may result in the imminent injury, sickness, or death to any segment of the population;
(b) transmission or attempted transmission of a harmful program with the purpose of substantially disrupting or disabling any computer network operated by the Government or any public entity;
(c) aiding the commission of or attempting to aid the commission of an act of violence against the sovereignty of Pakistan, whether or not the commission of such act of violence is actually completed; or
(d) stealing or copying, or attempting to steal or copy, or secure classified information or data necessary to manufacture any form of chemical, biological or nuclear weapon, or any other weapon of mass destruction.
(2) Whoever commits the offence of cyber terrorism and causes death of anyperson shall be punishable with death or imprisonment for life, and with fine and
in any other case he shall be punishable with imprisonment of either description for a term which may extend to ten years, or with fine not less than ten-million rupees, or with both.
18. Enhanced punishment for offences involving sensitive electronic systems.-(l) Whoever causes criminal access to any sensitive electronic system in the course of the commission of any of the offences established under this Ordinance shall, in addition to the punishment prescribed for that offence, be punished with imprisonment of either description for a term which may extend to ten years, or with fine not exceeding one million rupees, or with both. (2) For the purposes of any prosecution under this section, it shall be presumed, until contrary is proved, that the accused had the requisite knowledge that it was a sensitive electronic system.
19. Of abets, aids or attempts to commits offence .- (1) Any person who knowingly and willfully abets the commission of or who aids to commit or does any act preparatory to or in furtherance of the commission of any offence under this Ordinance shall be guilty of that offence and shall be liable on conviction to the punishment provided for the offence.
(2) Any person who attempts to commit an offence under this Ordinance shall be punished for a term which may extend to one-half of the longest term of imprisonment provided for that offence.
Explanation.- For aiding or abetting an offence to be committed under this section, it is immaterial whether the offence has been committed or not.
20. Other offences.- Whoever commits any offence other than those expressly provided under this Ordinance, with the help of computer electronic system, electronic device or any other electronic means shall be punished, in addition to the punishment provided for that offence, with imprisonment of either description for a term which may extend to two years, or with fine not exceeding two hundred thousand rupees, or with both.
21. Offences by corporate body.- A corporate body shall be held liable for an offence under this Ordinance if the offence is committed on its instructions or for its benefit. The corporate body shall be punished with fine not less than one hundred thousand rupees or the amount involved in the offence whichever is the higher:
Provided that such punishment shall not absolve the criminal liability of the natural person who has committed the offence.
Explanation.- For the purposes of this section corporate body, includes a body of persons incorporated under any law such as trust, waqf, an association, a statutory body or a company.

CHAPTER-III
PROSECUTION AND TRIAL OF OFFENCES
22. Offences to be compoundable and non-cognizable.- All offences under this Ordinance shall be compoundable, non-cognizable and bailable except the offences punishable with imprisonment for seven years or more.
23. Prosecution and trial of offences.- (1) The Tribunal shall take cognizance of and try any offence under this Ordinance .
(2) In all matters with respect to which no procedure has been provided in this Ordinance or the rules made thereunder, the provisions of the Code shall, mutatis mutandis, apply for the trial.
(3) All proceedings before the Tribunal shall be deemed to be judicial proceedings within the meanings of sections 193 and 228 of the Pakistan Penal Code, 1860 (XLV of 1860) and the Tribunal shall be deemed to be a Court for the purposes of sections 480 and 482 of the Code.
24. Order for payment of compensation.- The Tribunal may, on awarding punishment of imprisonment or fine or both for commission of any offence, make an order for payment of any compensation to the victim for any damage caused to his electronic system or data by commission of the offence and the compensation so awarded shall be recoverable as arrears of land revenue:
Provided that the compensation awarded by the Tribunal shall not prejudice any right to a civil remedy for the recovery of damages beyond the amount of compensation awarded.
CHAPTER-IV
ESTABLISHMENT OF INVESTIGATION AND PROSECUTION AGENCIES
25. Establishment of investigation agencies and prosecution.- The Federal Government shall establish a specialized investigation and prosecution cell within Federal Investigation Agency to investigate and prosecute the offences under this Ordinance:
Provided that till such time any agency is so established, the investigation and prosecution of an offence shall be conducted in accordance with the provisions of the Code:
Provided further that any police officer investigating an offence under this Ordinance may seek assistance of any special investigation agency for any technical in-put, collection and preservation of evidence.
26. Powers of officer.- (1) Subject to obtaining search warrant an investigation officer shall be entitled to,-
(a) have access to and inspect the operation of any electronic system;
(b) use or cause to be used any such electronic system to search any data contained in or available to such electronic system;
(c) have access to or demand any information, code or technology which has the capability of retransforming or unscrambling encrypted data contained or available to such electronic system into readable and comprehensible format or plain version;
(d) require any person by whom or on whose behalf, the investigating officer has reasonable cause to believe, any electronic system has been used;
(e) require any person having charge of, or otherwise concerned with the operation of such electronic system to provide him reasonable technical and other assistance as he may require for the purposes of clauses (a), (b) and (c); and (f) require any person who is in possession of decryption information of under investigation electronic system , device or data to grant him access to such decryption information necessary to decrypt data required for the purpose of investigating any such offence.
Explanation.- Decryption information means information or technology that enables a person to readily retransform or unscramble encrypted data from its unreadable and from cipher text to its plain text.
(2) The police officer may, subject to the proviso, require a service provider to submit subscriber information relating to such services in respect of a person under investigation in that service provider’s possession or control necessary for the investigation of the offence:
Provided that the investigating officer shall get prior permission to investigate any service provider from the licensing authority where prior permission of the licensing authority is required under any law to investigate the licensed service provider.
(3) Any person who obstructs the lawful exercise of the powers under sub-sections (1) or (2) shall be liable to punishment with imprisonment of either description for a term which may extend to one year, or with fine not exceeding one hundred thousand rupees, or with both.
27. Real-time collection of traffic data.- (1) The Federal Government may require a licensed service provider, within its existing or required technical capability, to collect or record through the application of technical means or to co-operate and assist any law enforcement or intelligence agency in the collection or recording of traffic data or data, in real-time, associated with specified communications transmitted by means of an electronic system. (2) The Federal Government may also require the service provider to keep confidential the fact of the execution of any power provided for in this section and any information relating to it.
28. Retention of traffic data,- (1) A service provider shall, within its existing or required technical capability, retain its traffic data minimum for a period of ninety days and provide that data to the investigating agency or the
investigating officer when required. The Federal Government may extend the period to retain such date as and when deems appropriate.
(2) The service providers shall retain the traffic data under sub-section (1) by fulfilling all the requirements of data retention and its originality as provided under sections 5 and 6 of the Electronic Transaction Ordinance, 2002 (LI of 2002).
(3) Any person who contravenes the provisions of this section shall be punished with imprisonment for a term of six months, or with fine, or with both.
29. Trans-border access.- For the purpose of investigation the Federal Government or the investigation agency may, without the permission of any foreign
Government or international agency access publicly available electronic system or data notwithstanding the geographically location of such electronic system or data, or access or receive, through an electronic system, data located in foreign country or territory, if it obtains the lawful and voluntary consent of the person who has the lawful authority to disclose it:
Provided that such access is not prohibited under the law of the foreign Government or the international agency:
Provided further that the investigating agency shall inform in writing the Ministry of Foreign Affairs of Government of Pakistan and other relevant agencies as the case may be about the investigation conducted under this section.
CHAPTER - V
INTERNATIONAL COOPERATION
30. International cooperation.- (1) The Federal Government may cooperate with any foreign Government, Interpol or any other international agency with whom
it has, or establishes, reciprocal arrangements for the purposes of investigations or proceedings concerning offences related to electronic system and data, or for the collection of evidence in electronic form of an offence or obtaining expeditious preservation and disclosure of traffic data or data by means of an electronic system or real-time collection of traffic data associated with specified communications or interception of data.
(2) The Federal Government may, without prior request, forward to such foreign Government, Interpol or other international agency, any information obtained from its own investigations if it considers that the disclosure of such
information might assist the other Government or agency in initiating or carrying out investigations or proceedings concerning any offence.
(3) The Federal Government may require the foreign Government, Interpol or other international agency to keep the information provided confidential or use it subject to some conditions.
(4) The investigating agency shall, subject to approval of the Federal Government, be responsible for sending and answering requests for mutual assistance, the execution of such requests or their transmission to the authorities competent for their execution.
(5) The Federal Government may refuse to accede to any request made by such foreign Government, Interpol or international agency if the request concerns an offence which is likely to prejudice its sovereignty, security, public order or other essential interests.
(6) The Federal Government may postpone action on a request if such action would prejudice investigations of proceedings conducted by its investigation agency.
Chapter - VI
INFORMATION AND COMMUNICATION TECHNOLOGIES TRIBUNAL
31. Information and Communication Technologies Tribunal .- (1) As soon as possible after the commencement of this Ordinance , the Federal Government shall, by notification in the official Gazette, constitute the Information and Communication Technologies Tribunal whose principal seat shall be at Islamabad.
(2) The Tribunal may hold its sittings at such place or places as the Federal Government may decide.
(3) The Tribunal shall consist of a chairman and as many members as the Federal Government may determine but not more than seven members.
(4) The Chairman may constitute Benches of the Tribunal and unless otherwise directed by him a Bench shall consist of not less than two members. A Bench shall exercise such powers and discharge such functions as may be prescribed. There shall be established at least one Bench in each province.
(5) The Federal Government shall appoint the Chairman and members of the Tribunal.

32. Qualifications for appointment.- (1) A person shall not be qualified for appointment as Chairman unless he is, or has been, or is qualified for appointment as a judge of a High Court.

(2) A person shall not be qualified for appointment as a member unless he -
(a) has for two years served as a District and Sessions Judge;
(b) has for a period of not less than ten years been an advocate of a High Court; or
(c) has special knowledge of legislation and professional experience of not less than ten years in the field of telecommunication and information technologies.

33. Salary, allowances and other terms and conditions of services.- The salary, allowances, privileges and the other terms and conditions of service of the Chairman and members of the Tribunal shall be such as the Federal Government may, by notification in official Gazette, determine.
34. Resignation and removal.- (1) The Chairman or a member of the Tribunal may, by writing under his hand addressed to the Federal Government, resign his office:
Provided that the Chairman or a member shall, unless he is permitted by the Federal Government to relinquish his office sooner, continue to hold office until the expiry of three months from the date of receipt of such resignation or until a person duly appointed as his successor enters upon his office whichever is earlier.
(2) The Chairman or a member of the Tribunal shall not be removed from his office before expiry of the term determined under section 33, by the Federal Government except as may be prescribed.
(3) The Federal Government may, by rules, regulate the procedure for the investigation of misconduct or physical or mental incapacity of the Chairman and a member of the Tribunal.
35. Saving Tribunal’s proceedings.- No act or proceedings of the Tribunal shall be called in question in any manner on the ground merely of any defeat in the constitution of the Tribunal.
36. Employees of the Tribunal.- (1) The Federal Government shall provide the Tribunal with such employees as the Government may deem appropriate in consultation with the Chairman of the Tribunal.

(2) The employees of the Tribunal shall perform their duties under general superintendence of the Chairman of the Tribunal.

(3) The salaries, allowances and other conditions of service of the employees of the Tribunal shall be such as may be prescribed by the Federal Government.

37. Right to legal representation.- The parties in appeal may either appear in person or authorize one or more legal practitioners, and in case of a corporate body any of its officers, to present the case before the Tribunal.
38. Amicus curiae. - (1) The Tribunal may, if it so requires, be assisted in technical aspects in any case by an amicus curiae having knowledge and experience in information communication technologies, finance and economics.

(2) The Federal Government shall maintain a list of amicus curiae having relevant qualifications and experience.
(3) The Tribunal in consultation with the Federal Government shall determine the remuneration of the amicus curiae and the Tribunal may decide the party or parties to pay such remuneration, keeping in view the circumstances of each case.
39. Procedure and powers of Tribunal.- (1) Subject to the provisions of this Ordinance and the rules made thereunder, the Tribunal,--

(i) may, where it deems necessary, apply the procedures as provided in the Code or, as the case may be, in the Code of Civil Procedure, 1908 (Act V of 1908);
(ii) in the exercise of its civil jurisdiction, shall have powers vested in the civil court under the Code of Civil Procedure, 1908; and
(iii) in the exercise of its criminal jurisdiction, shall have the same powers as are vested in the Court of Session under the Code.

40. Appeal to Tribunals.- (1) Any person aggrieved by any of the following orders may, within fifteen days from the date of such order, prefer an appeal to the Tribunal, namely :--

(a) any decision of the Authority; or
(b) any decision of the Electronic Certification Accreditation Council:
Provided that no appeal shall lie to the Tribunal from an order passed by the Authority or the Electronic Certification Accreditation Council with the consent of the parties.
(2) Any appeal against a decision of the Authority shall be accompanied by a court fee,-
(a) ten thousand rupees where the valuation of the subject matter in issue is not more than five million rupees;
(b) fifty thousand rupees where the valuation of the subject matter in issue is more than five million rupees but not more than ten million rupees; and
(c) one hundred thousand rupees where the valuation of the subject matter in issue is more than ten million rupees. if,

(3) The appeal filed before the Tribunal under sub-section (1) shall be dealt with by it as expeditiously as possible and the Tribunal shall dispose of the appeal finally within ninety days from the date of receipt of the appeal.

41. Powers of Tribunal.- The Tribunal while hearing an appeal under section 40 shall have all the powers as are vested in the court of first appeal under the Code in exercise of its civil jurisdiction in respect of appeal against any decision or order of the Authority or the Electronic Certification Accreditation Council,
42. Limitation”.- The provisions of the Limitation Act, 1908 (IX of 1908), shall, mutatis mutandis , apply to the proceedings of Tribunal. 43. Appeal to High Court. - (1) Any person aggrieved by -

(1) any decision or order of the Tribunal made under section 40 may prefer second appeal to the respective High Court within thirty days from the date of the decision or order of the Tribunal:
Provided that appeal under this clause shall lie only if the High Court grants leave to appeal;
(ii) an order of conviction passed by the Tribunal in respect of any offence under this Ordinance may prefer an appeal to the respective High Court within thirty days of the decision or order of the Tribunal.
(2) An appeal against an order of the Tribunal under section 40 or an order of sentence exceeding ten years shall be heard by the Division Bench of the High Court.
44. Civil court not to have jurisdiction.- No court shall have jurisdiction to entertain any suit or proceeding in respect of any matter which the Tribunal constituted under this Ordinance is empowered by or under this Ordinance to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to betaken in pursuance of any power conferred by or under this Ordinance.
45. Transitory proceedings.- (1) Until the establishment of the Tribunal all cases, proceedings and appeals, subject matter of which is within jurisdiction of the Tribunal, shall continue to be heard and decided by the competent forum existing under any law for the time being in force.
(2) On the constitution of the Tribunal all cases, proceedings and appeals shall stand transferred to and be heard and disposed of by the Tribunal.
(3) On transfer of cases, proceedings and appeals under sub-section (2), the Tribunal shall proceed from the stage the proceedings had reached immediately prior to the transfer and shall not be bound to recall any witness or again record any evidence mat may have been recalled.
CHAPTER - VII MISCELLANEOUS
46. Ordinance to override other laws.- The provisions of this Ordinance shall have effect notwithstanding anything to the contrary contained in any other law for the time being in force.
47. Power to amend Schedule.- The Federal Government may. by notification in the official Gazette, amend the Schedule so as to add any entry thereto or modify or omit any entry therein.
48. Powers to make rules. - (1) The Federal Government may , by notification in the official Gazette, make rules for carrying out purposes of the Tribunal.
49. Removal of difficulties. - If any difficulty arises in giving effect to the provisions of this Ordinance, the Federal Government may, by order published in the official Gazette , make such provisions not inconsistent with the provisions of this Ordinance as may appear to be necessary for removing the difficulty.

Thursday, February 26, 2009

Wireless Mobile Processing


The Lipman Nurit 8010 is one of the most popular credit card processing terminals on the market today! Power Pay Services is able to offer our clients with very low pricing on our terminals and equipment. The Lipman Nurit 8010 Wireless Palmtop is the smallest and most flexible handheld payment terminal available. It offers fast enabling and secure and error free transactions. It is the perfect payment solution for retailers that are on the move who bring their products and services directly to their customers. With a global payment platform, the Nurit 8010 provides a host of operating advantages throughout the transaction process bringing increased profits at lower operating costs. It doubles as a cellular phone by offering voice and data transfer in real time. The electronic signature capture providing an optional touch screen.

Conversion2 Excellence in Electronic Component Distribution


Looking for cost savings and immediate delivery on your military, commercial, clectronic and optical components? We have thousands of military and commerical components new and in stock. We purchased the entire inventory from an Optical Networking company, including DWDM Optical Components, Laser Optical, Network Transmission, Optical Attenuator, Integrated Circuits, Connectors and more.
Want a copy of our entire stock list? Click on the excess inventory tab to request the list. Most of our components offer a tremendous cost savings to give you favorable PPV.
Same Day Shipment
We only sell from stock, so can ship same day if order is received by 1PM PST. We stock thousands of components that report to a PCBA (printed circuit board assembly) including IC's, connectors, capacitors, resistors, inductors and much more.
Ordering Information
We accept Visa and Mastercard and American Express. Overseas Customers can pay by TT Wire transfer or credit card. Credit terms available for Customers who qualify. Minimum order $100 US and $400 overseas, or agree to pay a handling charge.
We offer a limited 90 day warranty. Warranty limited to part replacement if we have stock, or refund with documentation of component failure.
Interested in getting cash our of your excess or obsolete electronic components?We manage the excess and obsolete inventory of many first tier OEMs and Contract Manufacturers, providing them with material stocking, sales and disposition services while protecting their privacy and maintaining their anonymity. Our Goal is to maxmize the return, while turning components back into cash, fast, for our consignment Customer.
Name change
We recently changed our name to Conversion2. The name change is a reflection of our belief that there is an opportunity to expand our position in the marketplace and further improve the way electronic component distribution is done. Our growth will provide you with a larger offering of components from our stock, to assure our mutual success.

Wednesday, February 25, 2009

Welcome to the DFAS Electronic Commerce Tool Box Web Site.


The DFAS Electronic Commerce (EC) Tool Box contains resources designed to assist in using the current financial-related Department of Defense (DoD) EC tools.
Electronic Commerce is a big focus, which is the result of the current law as stated in the 2001 National Defense Authorization Act (DFARS 252.232-7003 & 252.232.7003 Electronic Submission of Payment Requests - January 2004) that requires claims for payment under a DoD contract to be submitted in electronic form.
A major component of DFAS' business excellence is the expanded use of Electronic Commerce (e-Commerce). As a trusted financial partner, DFAS is leading the way in integrating technological advances in finance and accounting practices so that we can better support the warfighter. Our DFAS - Commerce Business Goals are as follows:
Reducing the Cost of Defense Business Operations
Improving Financial Stewardship to the American People Improving Service to our Customers
Performing the DFAS Mission at Best Value for DoD
Attaining Operational Excellence in Finance and Accounting Services
DFAS is dedicated to expanding e-Commerce capabilities, recognizing that to improve accuracy and timeliness of transaction processing, a paper-based environment must be replaced by electronic processing to provide single-source entry, electronic transmission of data and electronic storage of data.
This web site provides an overview of the e-Commerce applications available to our customers, and access to helpful reference and educational tools. Please discover the many ways DFAS is serving customers via e-Commerce business applications

FEATURES OF NOKIA N73


The Nokia n73 cell phone woks as a multimedia computers, but it also provides all essential features like; it phone book can store links in 42 MB memory space with additional numbers such as; date of birth, email address, and more others, so you can also systematize your contact into caller’s groups and you can also assign a exclusive Nokia n73 ring tones to separate caller’s ID.Economical Nokia n73 also supports to voice command, speed dial, vibrate mode, text and multimedia messaging, speakerphone, Bluetooth 2.0 for wireless headsets and car kits, to-do list, notes, calculator, calendar, Nokia n73 themes, currency converter, an HTML/XHTML Web browser, voice recorder, Quick office allows you just view Microsoft Word, Excel, and PowerPoint files; plus, Adobe Reader is there for PDF files; , IMAP4, SMTP and POP3 accounts with full attachment viewing, a modem to send or receive e-mail, or to attach to the Web with a compatible PC.The Nokia N73 evaluates for its 3.2 mega pixel camera is that is supported a flash, digital zoom, 20X huge range of photo customization and editing opportunities, ranging from portrait to sports to night portrait; eight scene modes, four image qualities (large, medium, small, and multimedia messages); and five different resolutions (2,048 by 1,536, 1,600 by 1,200, 1,280 by 960, and 800 by 600, 640 by 480) options are accessible in Nokia N73 cell phone. You are also able to modify the white balance, color tone, brightness, contrast, and exposure value; moreover self-timer, sequence mode for up to six pictures in a row, and flash with red eye lessening options are also available for making your snaps handsome. Additionally you can also records video with sound in MP4 and 3GP formats by using the two shooting modes (auto and night) and three excellence settings (normal, high, and sharing).After capturing snaps throughout Nokia N73 cellular phone you can modify them with built in preloaded editors, so you can include clipart or text, resize the photographs, reduce red eye, and others. In favor of video clips, your altering selections consist of changing sound, trimming clips for multimedia messages, and supplementary; and you can share these clips with others by email or Bluetooth connectivity.Nokia N73 cell phone also provides a built in media player, which can play MP3, AAC, WMA, m4a, and eAAC+ files, furthermore you can also add more songs into mobile memory or SD card through USB data cables, by simply drag and drop. Economical Nokia n73 also give FM radio capability, for the activation of the radio you should have to use headset. More pleasant Nokia n73 games are extremely easy to play in 3D graphics mode and you can download additional games via internet browsing

KIOSK SOFTWARE & HARDWARE


Kiosks are changing the face of self service and bringing engaging multimedia interaction with your brand to your customers. Adoption of kiosks by retailers, government, and the hospitality industry (to name a few) are a reaction to consumer demand for a better experience. Since the explosion of the internet in the mid 1990’s consumers are increasingly willing to embrace technology when it’s easy, meaningful and makes a difference to them. How can you benefit by empowering your customer? That’s where Electronic Art comes into the picture… we enable you to empower your customer.
We are not just a software company, nor are we simply here to sell you the sexiest hardware we can stock. Instead, we bring a holistic approach to your unique campaign needs, looking at software, user experience, graphic design, business rules, integration, appropriate hardware, signage, rollout and ongoing support. Yeah, that’s a lot to do, but if you need the complete picture, we are a full interactive agency and can give your brand the appropriate resources needed to make you look good. If you only need some of these things, we can help in the role you’d like us to play, and work with your other vendors, or internal staff to ensure success.
That said, the most common things people want to know on our website are details about software and hardware, and then they engage us for consulting on all of the other details. Browse the links below and then contact us about how to get started.

electronic check services


Electronic Check Services, Inc. is an industry leader, providing electronic check recovery, check conversion, check processing software and prepaid cellular to businesses Nationwide. Electronic Check Services, is a privately held company making our corporate office in Springfield, Missouri. Since our start in 1997, we continue to steadily increase our position in the check processing industry without compromising our core values.
We pride ourselves in being open and honest with businesses to provide them with the best products and services to fit their needs. To date Electronic Check Services, provides service to thousands of locations and growing. We continue to remain committed to providing our clients with the latest in check processing and collection services.

Electronic Benefit Transfer Project


Electronic Benefit Transfer (EBT) is the electronic method for distributing the federal Food Stamp Program benefits and, when selected by California counties, cash benefit programs. The EBT system automates the delivery, redemption, and reconciliation of issued benefits. California EBT is the result of federal and state legislation. The federal Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (PRWORA) mandated the replacement of the paper-based food stamp issuance method with electronic fund technology (debit cards). In August 1997, California Assembly Bill 1542 authorized the EBT Project and provided counties with the option of issuing cash benefits via EBT. Statewide implementation of EBT began in July 2001 and was successfully completed in all 58 counties by May 2005. Today EBT cardholders access their benefits using the California “Golden State Advantage” card. The EBT card provides faster service; the cardholder simply slides his/her card through a point-of-sale (POS) device or an automated teller machine (ATM). The card is convenient, secure, in line with commercial banking practices of automated payment, and reduces the stigma associated with receiving public assistance.The positive effects of California EBT extend beyond the cardholder. Others who benefit include: federal, state, and county governments; retailers; financial institutions; and the taxpayers. As of January 2007, there are over 30,000 retailers processing food stamp and/or cash POS transactions and over 32,000 ATMs dispensing cash benefits. EBT is a success in California.

Electronic Medical Records



At mmpc, our physicians and staff are committed to “putting patients first.” As of July 1, 2008, our offices are transitioning to an electronic medical records system, called "Epic". We appreciate your patience and understanding during this transition period. Our goal is to provide quality care in a timely fashion, and it is our hope that with your help we will meet that goal.Important Notes to Patients During the Transition to Epic
During this transition, we strongly encourage all of our patients to arrive early for appointments, and to make sure that you have insurance information or additional paperwork for your doctor with you at the time of your appointment.
In some cases, patients may notice that they are receiving two statements, each with a different account number, from mmpc. This is because patients may still owe money for services rendered prior to July 1st. If that is the case, patients will receive a statement, on light green paper, which is generated from our previous billing system. For all services rendered as of July 1, 2008, patients will receive a statement with a new account number on gray paper, generated from the Epic System. You may receive two separate statements from mmpc for a period of time.
What is Epic?
mmpc’s Epic System, once implemented, will revolve around two sets of applications – one of which, Electronic Practice Management (EPM), focuses on the business aspects of running a successful medical practice; and the other, EpicCare/Electronic Medical Records (EMR), concerns the care and management of patients and their records. Electronic Practice Management (EPM) centers on scheduling, registration, and billing applications. EpicCare/EMR supports the electronic management of a patient’s medical records. A replacement for the traditional paper chart, it has numerous features that streamline care processes, improve community-wide health initiatives, and strengthen the patient-provider relationship. The electronic chart is designed to assist the provider with core efficiencies, such as making sure that all necessary information is complete. All aspects of patient care are managed through EMR, including prescriptions, diseases, health maintenance, and imaging records. Since it is inherently flexible, EpicCare/EMR can accommodate both primary care and specialty providers in a seamless, ambulatory care record. An active clinical decision support system works at every point of the care process to minimize medical errors, encourage compliance, and ensure that patients receive recommended disease and health maintenance services.
There will be both immediate and future benefits of implementing Epic to mmpc’s patients.
What are the benefits of implementing Epic to the patient?Immediate benefits to the patient include:
• Ease of appointment scheduling, including referrals to mmpc specialists.• Providers can access your medical records quickly, including your history and your medications.Future benefits to the patient include:Once we have completely transitioned all of our medical records to Epic - a process that will take several months - mmpc patients may look forward to the following benefits:• Complete integration of your medical records.• Access to “My Chart.”
What is “MyChart”?“MyChart”is an exciting aspect of the Epic/EMR System that will be available for mmpc’s patients within the next couple of years. It isn’t available to mmpc patients yet, but we would like you to know that it is coming in the future. From the patient’s perspective, one of the most interesting aspects of implementing the Epic/EMR System will be “MyChart.” MyChart is a customizable Web application that gives patients quick and easy access to their medical records. Patients can perform a variety of tasks using MyChart, including schedule appointments, view and graph lab results, review their health maintenance topics, request medication renewals, and view their children’s medical records. MyChart also gives patients easy access to Web sites and other links that are pertinent to their personal health situations. All of the information in MyChart is confidential and private - it is between the patient and his or her physician. No one else can access your medical records in MyChart without your permission, and you can rest assured that the information in MyChart is secure. mmpc will notify you when access to MyChart becomes available.
Thank you for your patience and understanding as we transition to the new EpicCare/Electronic Medical Records System!We appreciate your consideration, and we value you as an mmpc patient!

EFA concerned about movie industry lawsuit against iinet


Electronic Frontiers Australa (EFA) today expressed concern about a lawsuit filed against Internet Service Provider iiNet in the Federal Court. A consortium of media companies have sued the ISP for allegedly allowing its users to download infringing movies and TV shows by failing to terminate their accounts after allegations of infringement by the copyright industry.“This lawsuit is the latest attempt by the movie industry to bully Internet Service Providers into becoming copyright police,” said EFA spokesperson Nicolas Suzor. “ISPs are not in a position to monitor and terminate internet access to users based upon unsubstantiated threats from copyright owners, and should not be asked to do so.”Recognising the need for immunity from copyright infringement suits such as these, the Australian Government introduced safe harbours for Internet Service Providers as part of the Australia - United States Free Trade Agreement (AUSFTA). These safe harbours provide that ISPs will not be liable to copyright owners for merely routing internet traffic as long as they “adopt and reasonably implement a policy that provides for termination, in appropriate circumstances, of the accounts of repeat infringers.” iiNet has publicly stated that it will not disconnect customers on mere allegations of infringement, and that it will comply with its obligations to terminate a customer’s internet access after such allegations have been properly proved in a court of law. EFA strongly supports iiNet’s position on this issue, and believes that Internet Service Providers cannot and should not be required to pass judgments on the legitimacy of their customers’ actions.“Copyright infringement is a complicated area of law with numerous exceptions. ISPs are simply not equipped and certainly should not be asked to play the role of judge, jury, and executioner upon allegations of infringement,” Suzor continued. “Every citizen has a right of due process under the law, and when faced with having their internet service terminated, every citizen has the right to ask that the case against them be proven first.”Experience in the United States of America has shown that allegations of infringement are often made without basis. There have been documented cases in which copyright owners have even alleged that a simple laser printer has illicitly downloaded and shared copyright movies, for example. There have also been allegations of infringement for uses which are clearly permissible under US fair-use law, such as the case of a short home movie in which a baby was filmed dancing to a song on the radio.Suzor expressed concern that the approach taken by the movie industry will unjustly punish users without due process: “To shift the burden of proof, and require that ISPs terminate access to users upon mere allegations of infringement, would be incredibly harmful to individual internet users in Australia. With the mistakes we have seen in the past overseas, where innocent users have been mercilessly and incorrectly targeted by copyright owners, a regime which requires disconnection without proof goes against all notions of fairness.” EFA is also highly concerned that ISPs are being asked to violate the privacy of internet users by spying on their online activities.EFA believes that if this case were to erode the utility of Australia’s safe harbour provisions, it would be extremely stifling to internet innovation and new technology in this country. The existence of safe harbours provide the certainty that operators of communications networks need in order to provide their services to the public. The public benefits greatly from technologies such as BitTorrent, and platforms such as YouTube and MySpace. These services are used for much more than simply exchanging material that infringes copyrights. However, without safe harbours, these services would be likely to be too difficult or risky to operate, or would be so restricted as to lose the majority of their value.The safe harbours in Australian copyright law exist to protect providers of innovative new technologies from copyright infringement claims which would shut them down. The way the safe harbours are designed also protects users from having their accounts terminated without due process. EFA believes that any weakening of either of these two protections is likely to have disastrous effects for Australian internet users.In fighting this lawsuit, iiNet will be defending the rights of all Australian Internet users and we wish them luck.

Benefits of the Internet for Electronic Commerce


1. Ease of access and global reach:- World Wide Web (www) is an ideal mechanism for providing relevant information to the public globally. It allows organizations an opportunity for publicizing their products and services at minimal cost. By putting information on routinely asked questions on the home pages, organizations are saving costs by reducing the no. of customer service representatives. Customers can place orders through the Internet once security issues are worked out. The WWW holds the potential to increase the market share and helps expand new markets by virtue of its global reach. Additionally, easy access to information through the Internet gives the opportunity to compare the costs and characteristics of product and services. 2. Low-cost advertising medium:- There is no doubt that Internet has become an inexpensive advertising medium for organizations and is being effectively used by some firms for commerce. The comments made by the vice-president of IT of a large multinational firm allude to this issue: “The purpose of the Internet offerings are to open our products and services to a new customer base who prefer to use the internet for their shipping needs and to maintain a leading-edge technology position and image in the market place and against our competitors.” 3. Low barriers to entry:- Small & large firms alike have the opportunity to be on the WWW and conduct business on the internet. The barriers to entry to the Internet are minuscule. This point was noted by the President of a consulting and staffing agency who was interviewed:” home pages give equal footing to small organizations with large national firms”. 4. Perceived image enhancer:- Several executives mentioned that they have to have presence on the Internet as their competitors are already on the Internet. Without it their reputation can be tarnished and they will be perceived as laggards in employing stat-of-art technologies. Many executives admitted that on the issue of determining the value and direct benefits of Internet to their bottom line, the ‘jury is still out’ but they must keeping moving forward for the reasons above. ternet Commerce stands at a critical juncture. After an exhilarating start-up, further development hinges on bridging the chasm between early adopter and a true mass market. We envision Eco System ad the foundation of that bridge.

Computer Electronics


Computer electronics is a two-year program which prepares men and women to repair computers, set-up and administer a computer network, and do electronics repair. The first year provides training in Windows XP Professional operating systems, DC and AC circuits, semiconductor devices, electronic circuits, digital electronics, 8-bit microprocessors, and networking hardware. The labs are hands-on, learning the proper use of test equipment such as multimeters, power supplies, oscilloscopes, function generators, and frequency counters.
Seniors receive training in network administration, computer operating systems, printer repair, monitor repair, peripheral configuration, microprocessor interfacing and computer diagnostics and repair, along with dot matrix, inkjet and laser printers. The networking classes feature Microsoft operating systems - Windows 2000 Professional, Windows 2003 Server and Windows XP Professional. The labs for seniors are hands-on trouble-shooting with diagnostic test equipment and diagnostic software.
Students are required to test for the following: Microsoft Certified Professional (MCP), Microsoft Certified System Administrator (MCSA), A+ Certification, and Network+ Certification. Upon successful completion of the exams, certification will be achieved. These are certifications expected of computer technicians.
Male and female graduates of the program will be qualified for positions as computer electronics technicians, computer network technicians, electronic technicians, and office equipment technicians. Opportunities for certified computer electronic technicians exist in both the public and private sectors, and these opportunities are expected to grow much faster than average for all occupations

TV's electronic assault on the brain


Television addicts may be driven demented by the goggle box, according to an Israeli researcher. Excessive viewing may increase your chances of developing Alzheimer's disease in later life, says Moshe Aronson of the Sackler Faculty of Medicine at Tel-Aviv University.
In the current edition of Medical Hypotheses, Aronson argues that television places unique psychological strains on the brain. TV viewers are bombarded with a relentless succession of sights and sounds with little chance of relating to what they have experienced. Commercials compound this passivity by 'obliterating any serious human emotion experienced in connection with the foregoing stimuli', says Aronson.
Reading, by contrast, gives individuals a chance to pause and reflect on what they have read. Even listening to the radio is preferable to watching television, Aronson considers, because the wireless bombards its audience with fewer sensory stimuli. It is television's drive for variety and novelty, its 'trivia inextricably mixed with more serious matters', that is so psychologically damaging, he claims. No other cultural occupation past or present comes near it.
The stressful nature of much of television news and drama adds to the danger, claims Aronson, as the passive viewer is unable to release the tension built up by watching sex and violence. At high levels, stress hormones are known to be capable of damaging nerve cells in a part of the brain - the hippocampus - crucial to the memory, and this region is also damaged in Alzheimer's disease.
To test his theory, Aronson urges doctors to record the TV-viewing habits of patients with suspected dementia. Already, there are faint signs that those who eschew the box may safeguard their brains: dementia among Talmudic scholars in Israel is extremely rare, Aronson reports

The Uniform Real Property Electronic Recording Act

Welcome to the Uniform Real Property Electronic Recording Act (URPERA) website, maintained by the National Conference of Commissioners on Uniform State Laws (NCCUSL). Over the past decade, NCCUSL has been at the forefront of developing law with regard to electronic transactions. In 2004, the NCCUSL completed more than two years of study, discussion, and drafting, and promulgated URPERA. The act was first brought to the states for passage in 2005, and twenty states have enacted the legislation since that time.
URPERA builds upon existing electronic transactions laws, in particular the Uniform Electronic Transactions Act (UETA) and the federal Electronic Signatures in Global and National Commerce Act (ESIGN). The act authorizes, but does not mandate, local land records officials to begin accepting records in electronic form, store electronic records, convert existing records into electronic form, and set up systems for searching for and retrieving these land records. Equally important, URPERA designates a state authority to set general and technical standards for the practice and process of electronic recording in the enacting state.
Thank you for your interest in URPERA. This site contains the full text of the act with its notes and commentary, the latest information on the Act’s enactment status, and other materials that should prove useful to parties interested in URPERA. As chair of the URPERA Drafting Committee, I hope you will find this website to be a valuable resource as we continue to develop it and as states continue to consider and adopt URPERA
source http://electronicrecording.org/DesktopDefault.aspx

Electronic Chess Computers


A chess computer works by pressing the chess piece down on the "from" and "to" squares for your move and then for the computer's move. The computer will show it's move by LED's or LCD and sometimes by speaking it.Some computers are autosensory, so you can just slide the piece without pressing each square. Many portable computers have LCD touch screen move input.We offer Beginner to Advanced chess computers to help you get started or give you a tough challenge.You can choose from three leading brands, Mephisto, Excalibur, and Novag. We also keep each computer handy in the ChessHouse showroom for demonstration and so staff can be familiar with them.Compare and shop for your electronic chess computers at Chess House. Right here are three of your best electronic chess options. We have been recommending chess computers for many years and have a good handle on what people are looking for.

Fair-Use Guidelines For Electronic Reserve Systems


Many college, university, and school libraries have established reserve operations for readings and other materials that support the instructional requirements of specific courses. Some educational institutions are now providing electronic reserve systems that allow storage of electronic versions of materials that students may retrieve on a computer screen, and from which they may print a copy for their personal study. When materials are included as a matter of fair use, electronic reserve systems should constitute an ad hoc or supplemental source of information for students, beyond a textbook or other materials. If included with permission from the copyright owner, however, the scope and range of materials is potentially unlimited, depending upon the permission granted. Although fair use is determined on a case-by-case basis, the following guidelines identify an understanding of fair use for the reproduction, distribution, display, and performance of materials in the context of creating and using an electronic reserve system.
Making materials accessible through electronic reserve systems raises significant copyright issues. Electronic reserve operations include the making of a digital version of text, the distribution and display of that version at workstations, and downloading and printing of copies. The complexities of the electronic environment, and the growing potential for implicating copyright infringements, raise the need for a fresh understanding of fair use. These guidelines are not intended to burden the facilitation of reserves unduly, but instead offer a workable path that educators and librarians may follow in order to exercise a meaningful application of fair use, while also acknowledging and respecting the interests of copyright owners.
These guidelines focus generally on the traditional domain of reserve rooms, particularly copies of journal articles and book chapters, and their accompanying graphics. Nevertheless, they are not meant to apply exclusively to textual materials and may be instructive for the fair use of other media. The guidelines also focus on the use of the complete article or the entire book chapter. Using only brief excerpts from such works would most likely also be fair use, possibly without all of the restrictions or conditions set forth in these guidelines. Operators of reserve systems should also provide safeguards for the integrity of the text and the author's reputation, including verification that the text is correctly scanned.
The guidelines address only those materials protected by copyright and for which the institution has not obtained permission before including them in an electronic reserve system. The limitations and conditions set forth in these guidelines need not apply to materials in the public omain--such as works of the U.S. government or works on which copyright has expired--or to works for which the institution has obtained permission for inclusion in the electronic reserve system. License agreements may govern the uses of some materials. Persons responsible for electronic reserve systems should refer to applicable license terms for guidance. If an instructor arranges for students to acquire a work by some means that includes permission from the copyright owner, the instructor should not include that same work on an electronic reserve system as a matter of fair use.
These guidelines are the outgrowth of negotiations among diverse parties attending the Conference on Fair Use ("CONFU") meetings sponsored by the Information Infrastructure Task Force's Working Group on Intellectual Property Rights. While endorsements of any guidelines by all conference participants is unlikely, these guidelines have been endorsed by the organizations whose names appear at the end. These guidelines are in furtherance of the Working Group's objective of encouraging negotiated guidelines of fair use.
This introduction is an integral part of these guidelines and should be included with the guidelines wherever they may be reprinted or adopted by a library, academic institution, or other organization or association. No copyright protection of these guidelines is claimed by any person or entity, and anyone is free to reproduce and distribute this document without permission

ELECTRONIC MUSIC


Writing electronic music may seem like an easy task at first. All who have tried have realised that there is a difference between writing a piece that sounds either amateurish or too commercial and creating something truly unique. Electronic music is supposed to be opening new horizons towards melodic and rhythmic structures that are not limited by physical properties of natural instruments and its musicians.
One can argue though, that the removal of all such intermediaries brings the composer a step closer to the ultimate barrier. Of course, we’re talking about inspiration. There are a plenty of audio samples and software packages out there, in fact maybe too many. Machines are increasingly fast and humans increasingly impatient which inevitably leads to a path where machines will be able to interface with the composer on almost an organic level and reward the musician with an instant result.
Unfortunately we’re not quite there yet and it will be some time until we reach that level. But let’s reflect on this exciting time where technology and science flourish and draw our inspiration from this dynamic and uplifting era.

Electronic Cigarette Review


Electronic cigarettes have now been on the market for a few years, which may surprise many who have never heard of them. However, e-cigarettes as they are often known, have become very popular in Europe and are just now starting to catch on in other parts of the World, including the United States.
There are many companies getting in on the action, branding their own electronic smoking devices to sell to the public. All devices use the same technology; when inhaled on, the battery activates the atomizer, which in turn vaporizes a small amount of liquid nicotine and propylene glycol into a mist that can be inhaled by the user. It mimics traditional smoking, but doesn’t contain many of the toxins found in the burning of tobacco.
If you have tried an electronic cigarette, we encourage you to write a review for Electronic Cigarette Review so others can benefit from your experience. You can do this by adding a comment to our site on the appropriate page

Electronic Supplement


Welcome to the electronic supplement to Eos, Transactions, American Geophysical Union, AGU’s online supplement to the Union’s weekly newspaper. AGU has initiated this supplement as a way to extend Eos coverage in areas of growing importance to geophysical scientists. With this supplement, Eos will be able to cover more information in greater detail—reaching a worldwide electronic audience.
This Eos electronic supplement provides more information about subjects that appear in the printed version of Eos. The supplement is a fully integrated part of Eos and is fully archived and referenceable. The high peer-review and editorial standards for which Eos is known also apply to the material in the supplement. Brief material in the printed component of Eos will reference the longer, more detailed information on the same topic in the supplement.

SafeCharge Re-balancing e-Commerce Industry in the Midst of Financial Recession


Leading internet payment service provider SafeCharge announces today the unconditional need to protect online businesses from the global financial crisis by offering them more than one merchant account with several acquiring banks through the same payment service provider.
The financial recession has created new economic breakdowns. Nowadays, relying solely on one acquiring bank is risky. "What would you do, for example, if with very short notice were you informed that your bank would no longer process online transactions that are industry-specific coded? What if they announced bankruptcy?" stated Sharon Gal-Franko, Marketing Director at SafeCharge Ltd.
"What would happen" she continued "is you would not only lose revenue, but you would have to find a new acquiring bank to apply for a new merchant account with most likely new and different requirements."
Online operators, no matter if their traffic is local or international, should be aware of the risks they are facing these days when only working with one bank. Finding the connected payment-service provider (PSP) that has an array of acquiring banks in their portfolio and can fit the best one at the right time for the specific processing needs of e-commerce operators is what makes the crucial difference. And most of all that processor has to be prepared so that if one bank suddenly falls or has to change industry requirements, the payment provider is able to replace that bank with another acquirer without troubling online merchants in another wearisome application process.
"SafeCharge is exactly that connected PSP that is trusted by the leading and most reputable acquiring banks in the industry. We are able to switch merchants' online processing to a different acquiring bank ensuring them incessant processing activity by only one system integration, no additional handling and administrative fees, hence no hassle of bureaucratic hardships." says Gal-Franko.
About SafeChargeCommencing activities in 2000, SafeCharge is an international leading payment service provider with subsidiaries worldwide, integrating high-end payment gateway services with one of the most powerful online fraud prevention solutions available today.
Being PCI certified, SafeCharge provides e-merchants of all online industries with a complete set of secure payment solutions and services. Through SafeCharge’s well-established banking relations with leading acquiring banks worldwide, merchants are able to acquire numerous direct merchant accounts within minimal time at globally competitive rates.

Brooklyn Law School study highlights net censorship problems


A recent study entitled “Filtering in Oz: Australia’s Foray Into Internet Censorship” by Derek Bambauer of the Brooklyn Law School in New York examines the Rudd Government’s upcoming Internet filtering plan and provides a thorough analysis of its legitimacy. This report is important - not only is it authored by a reputable and neutral foreign observer but it focuses more on the legitimacy of the scheme than the technical or other concerns, and highlights some serious problems.
The study’s author applies a process-based methodology to determining the legitimacy of such a scheme by asking four questions. Is the country open about its censorship plans and the reason behind them? Is it transparent about what is to be restricted? How narrow is the filtering? And finally, are the processes and decision makers behind the scheme accountable? While the Government earns praise for openness (Internet filtering was a central campaign promise), serious issues are highlighted in the other three areas.
Electronic Frontiers Australia has consistently called for clarity on the aims of the censorship scheme and which material is to be targeted. Yet phrases like “other unwanted material” still represent the best information we have received from the Government. Whether or not this is a deliberate attempt to hobble debate or merely represents confusion within the DBCDE we cannot say, but the situation was not lost on Bambauer:
To date, Australia’s transparency regarding its filtering has been poor. The country has vacillated on what material it will target for blocking. This uncertainty makes it difficult for citizens to assess whether the scope of material blocked is appropriate, and whether the set of targeted sites comports with the underlying rationales for censorship. The Labor government is opaque about the types of sites that will be blocked, how a site will be evaluated for filtering, and how those decisions map to larger social and political goals.
Indeed, in another part of the study the author examines the hypothetical 10,000-site blacklist floated by the Government, and wonders whether this proves they have an idea of the scope or are merely guessing. “The latter seems more likely,” he concludes.
This confusion has the net effect of robbing Australians of the ability to make decisions about the merits of the scheme, but also makes it hard to measure the scheme against its stated goal - protecting children. If the target of the filter is now primarily web sites accessed by adults, this suggests that the rationale for Net censorship has changed since the election promises were made. “In short, the Rudd government’s inability, or unwillingness, to elucidate a consistent set of content categories that will be off-limits, either to all Australians or to minors, undermines citizens’ ability to compare concrete plans for filtering to the reasons for implementing it initially.”
On the issue of narrowness, the author examines the state of dynamic filters as tested by the Government, and comes to similar conclusions to other commentators that such filters come with inherent under- and over-blocking. Furthermore, since commercial software products are developed and administered by third-parties, discretion for what is blocked may be lost to the potentially over-broad, built-in lists provided by independent software vendors. “If the country’s filtering employs vendor-supplied block lists, or allows ISPs to choose which product to implement… then Australia’s controls will inevitably be both under- and overbroad, with implications for access to legitimate information, transparency, and accountability.”
Although the study largely refrains from a technical analysis, it makes the point that Australia’s network was designed for openness and transparency, in contrast to other nations such as China and Iran where bottlenecks were deliberately engineered into the network from the beginning.
Technologically, the Rudd government seeks to mandate that ISPs retrofit filtering to a heterogeneous network architecture designed to avoid network blockages of exactly the type that on-line censorship creates. The cost, difficulty, and performance drop that the country’s Internet access suffers as a result of filtering will guide other nations that consider implementing broad, mandatory content restrictions on-line.
The study does take note of one of EFA’s major concerns, that any filtering system, no matter how narrow, “makes later expansion of censorship easier by reducing the cost of blocking additional content.”
Finally, the study looked at the accountability issues surrounding expanded Internet censorship powers, and it is, unsurprisingly, hard to avoid the conclusion that the Government has not made Government accountability a centrepiece of their cyber-safety platform. The lack of clarity on who controls the blacklist undermines the ability of the citizenry to ensure the scheme is fairly administered.
The planned outsourcing of filtering decisions to unaccountable and overseas third parties such as the Internet Watch Foundation also raises severe issues and may in some instances contravene existing laws by bypassing the ACMA’s complaints-based mechanism. What are the implications of installing filters, by Government mandate, that make filtering decisions based on software algorithms rather than accountable human judgement?
If filtering is implemented based on software vendors’ decisions about whether content is sexually explicit, rather than on the Classification Board’s judgments, this will decrease the Australian citizens’ ability to have a voice in what they can access on-line.
Some of these concerns could be remedied, perhaps, if the Government could lay out their plans in sufficient detail. Instead, we are left waiting for clarity until after the ISP trial. (What end is served by a trial conducted in such a policy vacuum we cannot say.) The author notes that the Minister’s rhetoric has not helped assuage concerns. His habit of tarring opponents as supporters of illegal material has not gone unnoticed overseas: “While hyperbolic rhetoric is common in democracies, attempts to silence dissenters or to conflate policy differences with support for unlawful behavior undermine accountability.”
Overall, the study concludes that
Accountability problems are inherent in censorship achieved through computer technology. These challenges increase when some voices are magnified, and others silenced, in policy debates, and when content categorization is done by unaccountable (and perhaps foreign) entities. How Australia implements filtering will influence the control its citizens have over on-line content restrictions.
The (draft) study is quite comprehensive and the Ministry would be well served to study it. The study does err, we think, in the amount of power it ascribes to Senator Steve Fielding of Family First in driving the policy. Nevertheless, it reinforces the position of the many stakeholders in Australia who have opposed the filter, not solely on technical grounds or from some misguided sense of cyber-anarchism, but from solid and fundamental legal/democratic principles. We are not the only ones who question the ability of our Government to anticipate, understand and manage the many complex issues surrounding such a radical Internet policy.
In his conclusion, the study’s author makes the following observation:
Filtering looks easy and cheap, and calls to block access to material that is almost universally condemned – such as child pornography, extreme violence, or incitements to terrorism – are hard to resist. But this focus confuses means with ends.
Electronic Frontiers Australia concurs, and awaits clarity on both means and ends from the Government. The Government cannot claim a mandate for such a poorly-defined policy. If it is to have any legitimacy, the public and industry must be informed well in advance of the next stages of the plan.