Résultats 10 ressources
-
This article seeks to examine the extent to which users of e-banking services are protected in Cameroon. Over the past decades financial transactions have gradually emerged from traditional methods to modern forms of banking. The Information and Communication Technology (ICT) has transformed the banking system into a digital arena. With e-banking, customers can access their bank accounts, transfer funds, pay bills, and check their accounts balances. Banks serve as the backbone of every modern economy and should be protected. The development of e-banking in the 1980s with the aid of ICT has rendered banks and their customers vulnerable to cybercrimes. As an effort to combat cybercrimes and ensure cyber security in Cameroon, the 2010 Cyber Law provides both substantive and procedural rules. It is rather unfortunate that, the measures put in place to ensure cyber security and protect bank customers against cybercrimes are to a greater extent ineffective. The main objective of this article is to determine the protection accorded to banks and their customers against cybercrimes. The method adopted in the course of this work is doctrinal wherein, both primary and secondary sources of data were collected. The findings reveal among others that, the measures put in place to combat cybercrimes within the banking sphere in Cameroon are not effective. There is lack of explicit definitions for cyber offences. Most of the offences provided by the 2010 Cyber Law are vague and ambiguous. We therefore recommend that, the 2010 Cyber Law should be amended to address the current issues of ICT. This amendment should include explicit definitions for the different forms of cybercrimes with severe sanctions. Banks are advised to put in place effective monitoring machineries to mitigate cybercrimes.
-
PURPOSE : Financial institutions such as Bureaux de Change are susceptible to money laundering, posing a significant risk to a nation’s financial stability and security if not properly regulated and supervised. Botswana is a member of the Financial Action Task Force (FATF), a global organisation that sets standards, promotes policies to prevent money laundering, terrorist financing and arms proliferation, all to safeguard the global financial system. Efforts have been made to incorporate FATF recommendations on money laundering into the fiscal laws of Botswana. However, some deficiencies still remain. Although there are no recorded cases of money laundering in Botswana, Bureaux de Change entities are susceptible to it as their business involves cash transactions and rapid money transactions. This paper aims to analyse the challenges faced by Bureaux de Change entities in combating money laundering in Botswana. This will be done by assessing the effectiveness of the current regulatory framework and role of the regulatory authorities in combating money laundering within Bureaux de Change entities. DESIGN/METHODOLOGY/APPROACH : This paper provides a comprehensive examination of the obstacles faced by Bureaux de Change entities in Botswana when it comes to combating money laundering. A qualitative research method and doctrinal research method are both used in this context. FINDINGS : It is hoped that policymakers and other relevant persons will adopt the recommendations provided in the paper to enhance the curbing of money laundering in Botswana. RESEARCH LIMITATIONS/IMPLICATIONS : This paper is only limited to the regulation of money laundering within the Bureaux de Change entities in Botswana and does not provide empirical research. PRACTICAL IMPLICATIONS : This paper is useful to policymakers, lawyers, law students and regulatory bodies especially in Botswana. SOCIAL IMPLICATIONS : This paper suggests changes to the Bank of Botswana (Bureaux de Change) Regulations of 2004 to improve their effectiveness, robustness and competitiveness in combating money laundering. ORIGINALITY/VALUE : This paper is original research on the challenges of combating money laundering within Bureaux de Change entities in Botswana.
-
Data gatekeepers (data controllers and processors) that use blockchain for data transfer effectively enjoy limited liability for violations of the GDPR. This is due to the fact that applying the GDPR’s data gatekeeper system of liability to a decentralized technology such as blockchain is difficult for three reasons. Firstly, identifying data gatekeepers on the blockchain can only be done by either assigning data gatekeeper roles to actors on the blockchain, or structuring the blockchain as private or permissioned one, so as to fit with GDPR requirements. Neither of these approaches provides a universally applicable and satisfactory method for privacy protection. Secondly, because of their knowledge and investment in infrastructure, large data gatekeepers such as IBM, Amazon and Microsoft have an informational advantage over data protection authorities (DPAs) and an additional protective layer against liability, as their blockchain infrastructure is used by other businesses and corporations that are primarily liable for data processing. Finally, administrative fines and reputational damages for non-compliance with the GDPR are insufficient deterrents for large data gatekeepers, whereas damages awarded to individual data subjects for data gatekeepers’ violations of GDPR are extremely low and too costly to obtain.
-
Although Zimbabwe has established several institutions to combat money laundering and related crimes, there is a perception that inadequate measures are taken to apprehend offenders responsible for financial crimes. Institutions such as the Financial Intelligence Unit (FIU), the Zimbabwe Anti-Corruption Commission (ZACC), the Zimbabwe Republic Police (ZRP), the National Prosecuting Authority (NPA) and the Reserve Bank of Zimbabwe (RBZ) have done little to prove that the government of Zimbabwe is resolute in combatting money laundering. On the contrary, it increasingly appears that these institutions are poorly equipped and lack the necessary capacity to enforce and uphold anti-money laundering (AML) measures in Zimbabwe. Further, there appears to be a selective application of the law, with one set of rules for individuals or institutions that are perceived as political adversaries of the incumbent establishment and a different set of rules for the political elite. Consequently, the selective application of the law projects Zimbabwe as a jurisdiction that is somehow tolerant to money laundering, corruption and related financial crimes, thereby lowering and tarnishing the standing of the country in the global economic community of nations. This paper provides a regulatory analysis of the AML role-players in Zimbabwe in order to assess their functions in combatting financial crimes. It also analyses whether these role-players are effective and substantively executing their responsibilities therein. The authors argue that while Zimbabwe is well able to effectively combat money laundering through the even application of the law to all persons regardless of their political or economic standing, it is imperative that its AML institutions operate without fear, favour or prejudice. This is crucial in combatting money laundering and instilling confidence in the general public's perception of AML institutions in Zimbabwe.
-
-
Compliance with the GDPR while using blockchain technology for data processing results in compliance issues, due to the fact that the blockchain and the GDPR employ different methods to ensure privacy-by-design and privacy-by-default. The blockchain is built on disintermediation and relative decentralization, whereas the GDPR aims for re-intermediation and relative centralization of the data protection process. This paper provides an overview of and suggestions on how to secure compliance with the GDPR while processing data using the blockchain. A focus is placed on the data protection impact assessment on the blockchain network, issues in identifying and determining the role(s) of sole and joint data controllers and data processors, obstacles to exercising the right to rectification and right to be forgotten when the data is recorded on the blockchain, GDPR data transfer requirements as applied to the blockchain, and the protection of privacy in the process of creating blockchain-based smart contracts.
-
This thesis addresses the problem of individuals’ lack of control over personal data in the digital world. It sheds light on market and regulatory failures that lie behind the status quo and proposes a framework to improve regulatory responses. The two regulatory regimes that are at the core of this thesis are EU data protection regulation, which protects individuals’ fundamental rights over data, and EU competition law, which safeguards the sound functioning of the market and consumers’ economic interests. Despite the existence of these two regulatory regimes, individuals do not have sufficient control over personal data collected by digital firms, whose control over large datasets is a factor contributing to market monopolisation. The thesis argues that one reason for the shortcomings of today’s regulatory framework is that the market failure is composed of a combination of factors, which are currently addressed by the different regimes relatively independently. This dichotomy hinders the development of an effective strategy to tackle the market failure in its entirety. The approach taken in this thesis is that by integrating the two regimes, it might be possible to close the gaps deriving from a narrow perception of their regulatory spaces. Hence, the thesis formulates a holistic approach, encompassing data protection regulation and competition law, designed to increase the effectiveness of the regulatory framework as a whole. Different dimensions of the regimes’ interrelation are analysed, to uncover new ways to harness their complementarity and minimise their inconsistencies and overlaps. The thesis looks at how the regimes can incorporate elements from each other to inform their policies and application of their rules, as well as developing a complementary enforcement strategy. The holistic framework ultimately allows both regimes to better tailor their regulatory responses to the functioning of the digital market and take account of the diverse elements that constitute the market failure they seek to correct.
-
The aim of this research is to determine how the application of Big Data and Data Analytics techniques influences the external audit. The impact on the working methods and the audit quality is discussed. Furthermore, the technological maturity of the Belgian and Luxembourgish audit industry is analysed. Therefore, the following research questions are asked: How do Big Data and Data Analytics influence the audit working method? What is the impact of Big Data and Data Analytics on the audit quality? How is the audit risk identification and assessment phase influenced? Which audit risks can be identified? Which tools and techniques do the Belgian and Luxembourgish auditors use and where do they stand? In order to answer the research question, scientific articles were analysed in the context of the literature review. Subsequently, a case study was carried out. Interviews with experts in Belgium and Luxembourg were conducted. The results of the research show that there is high potential to use these technologies in audit. Nevertheless, it is also connected with initial investments and a certain agreement of the clients. There is high potential to enhance the auditor’s effectiveness and efficiency, but the complete impact cannot yet be analysed. The audit quality can be enhanced when qualitative analyses generates audit evidence based on high quality data. The Belgian and Luxembourgish audit industry has just started implementing the technologies.
-
We have arrived at crossroads in the debates about the future of the internet governance. It is high time to address the reasons why policy choices have not been sufficient to preserve the internet\'s promise to bring about development, democratic engagement, and social justice. The network neutrality is central to this debate since it intersects all internet layers and is related to most contemporary issues that will shape future of the internet. My assumption is that network neutrality\'s failures are not an unintended consequence of the regulatory system, but part of the problem. My core hypothesis is that network neutrality\'s limits mainly occur because of, first, its inability to secure all envisioned goals and, second, its decontextualized focus on innovation on the last mile of the internet distributional chain. The network neutrality debate has produced a wide variety of work embedded within economic and legal studies regarding what would be necessary to guarantee a free and innovative internet. Although this work has been often disguised under the mask of technique, it is widespread influenced by the evolutionary economics and denies the network neutrality's effects on ongoing struggles for social and economic justice. My proposition is that network neutrality debate has failed because it proved unable to address the problems related to concentrated power structures on the internet and increasing inequalities. To achieve this objective, this dissertation investigates the network neutrality debate over the last decades to identify processes and mechanisms by which its sterile arrangements came to take specific form in time and place, focusing on what such arrangements might inform about contemporary policy efforts. In Chapter 1, prevalent internet governance myths are deconstructed, presenting how specific architecture design and the corresponding network neutrality outcomes came to prevail in particular periods. Drawing upon and integration of distinct source materials, Chapters 2 and 3 identify the specific contingencies over the past decades by which a dynamic set of evolving actors, events, and institutions converged (or not) and gave rise to current network neutrality rules and dissent in the United States and Brazil. At the center of the analysis is the identification of structures and power struggles. Finally, Chapter 4 aims at presenting a new framework towards the network neutrality debate and its potential distributive effects in the global economy, taking technology not as deterministic but embedded and being embedded in all the building blocks of what we term the social.
-
With citizens’ movements mediated by many technologies that aid our navigation the potential for omnipresent surveillance may potentially institute fundamental changes to the human condition. Locational privacy is pivotal in developing inter-personal associations and relational ties with others and its function is therefore complex, rather than solely affording a degree of independence from the observations made by others. In this respect, a more nuanced understanding of the utility of location data is required; the current hierarchy that delineates personal data from special categories of personal data does not adequately appreciate the capacity for location data to act as a proxy for other sensitive personal data. Furthermore, the binary distinction that reflects the conceptualisation of the right to privacy as a negative right, with related concepts such as identity and personality formation viewed as positive constructs, is increasingly difficult a notion to preserve. The classification and terminology of technologies can illustrate how terms and legal metaphors are developed and applied so as to bridge gaps in applying existing context and precedent. Though the designation ‘location data’ once constituted a reasonable accommodation in nomenclature as an intelligible and easily comprehensible term, even while constituting a significant oversimplification of the data it represented, technological advances have rendered the term increasingly problematic. This study asks whether the existing legal framework at the regional level in Europe is apt to provide sufficiently cogent and coherent regulation given recent developments in technologies. The review analyses the risks associated with this predilection in data processing activities that allows for the identification of ever more intimate and nuanced details of a citizen’s life, behaviours and convictions through the analysis of their location data; in turn, it shall discern the necessity of considering the resulting impacts on citizens’ fundamental rights to privacy and personal data protection.
Explorer
Thématiques
Thèses et Mémoires
Type de ressource
- Article de revue (6)
- Thèse (4)
Année de publication
-
Entre 2000 et 2025
(10)
- Entre 2010 et 2019 (3)
- Entre 2020 et 2025 (7)
Langue de la ressource
Ressource en ligne
- oui (10)