The goal of this project is to give you an opportunity to determine, analyze and assess the role of various police department units, their relationship to other units, and how their skills can be applied to counter criminal activity.
Therefore, each unit you discuss, must be supported by an appropriate reference, in APA format.
Type of service-Academic paper writing Type of assignment-Research Paper Subject-Law Pages / words-4 / 1100 Number of sources-6 Academic level-Junior (College 3rd year) Paper format-APA Line spacing-Double Language style-US English
This is a fictious case study, that seeks to identify the 5WH, and what gaps in the statements and evidence exist, allowing a defence team to utilise in trying to gain an acquittal for the defendant.
The aim of this piece is to produce a 1000 word (+/- 10%) essay with approximately four references:
Summary of evidence on the Stephen WOLFERTON case of theft.
This essay will attempt to summarise the statements and evidence in a chronological order within the Stephen WOLFERTON case study, identifying and analysing the key evidential information and intelligence to support the Crown Prosecution Service (CPS) in making a full code test decision. (43 words)
Statement 1: Joan Andrews – 15/05/2020 12:55hrs at WARWICK ROAD
Statement 2: PC John CAMPBELL 5719 – 15/05/2020 13:30hrs at WARWICK ROAD
Statement 3: Chloe ANDREWS 16/05/2020 12:45hrs at NEWTOWN POLICE STATION.
Statement 4: PC Annie McCARTHY 5438 – 18/05/2020 07:45hrs at 2 APPIAN WAY NEWTOWN
Statement 5: Mrs Joan ANDREWS 18/05/2020 14:00hrs at NEWTOWN POLICE STATION
The main pieces of evidence linking Steven WOLFERTON to the offence is the black leather jacket (Ref AMM5) located at his property confirmed to be Steven WOLFERTONS and the Huawei mobile phone (Ref ).
Extract from ACPO (2005) Core Investigative Doctrine
Florida inmates use criminal skills to rescue baby from car
Type of service-Academic paper writing Type of assignment-Essay Subject-Law Pages / words-4 / 1000 Number of sources-4 Academic level-Undergraduate Paper format-Harvard Line spacing-Double Language style-UK English
Georgia and Massachusetts Bay Colonies both had deeply religious founders who included both spiritual and practical goals in their writings. Use James Oglethorpe’s Rational for Founding the Colony of Georgia and John Winthrop’s “A Modell of Christian Charity” to compare and contrast the founding of the two colonies as well as any similarities and differences the two may have developed due to their early roots. Cite these two primary sources as well as your textbook and one or more other secondary sources within your Discussion Essay of 650 to 750 words using MLA in-text citation. Place the Word Count at the end of your paper and include a separate MLA Works Cited.
Your Discussion Essay will be a 600-750 word essay with a separate Works Cited written in MLA style and format. The essay will discuss the similarities and differences of the early Georgia and Massachusetts Bay colonies you found in your research. Your essay will mention the sources (proof) used within the Essay with in-text citations and your Works Cited will contain a list of all of the sources (evidence) you used to support (prove) your statements.
Each paragraph must be supported by at least one source. If you have quoted your source using exact words, place quotation marks around your quote and follow it immediately with the parenthetical in-text citation. If you just use and reword information from the source or sources you use within the paragraph, place the parenthetical intext citation at the end of the paragraph. When your source is a book, the in-text citation will be the author’s last name and the page number where you found the information. If your source is a speech or writing by someone, use the speaker/writer’s last name in the parenthesis. Click on this Link (Links to an external site.)for more instructions on in-text citations. Link (Links to an external site.)
Type of service-Academic paper writing Type of assignment-Essay Subject-History Pages / words -3 / 700 Number of sources-0 Academic level-Freshman (College 1st year) Paper format-MLA Line spacing-Double Language style-US English
Topic: The concept of asset/liability management and interest rate risk
Each student will research a current topic involving financial institutions, marketing, and money and write and present a paper on topic of interest. The topic selected should be discussed with me during the weeks one and two. It is hoped that the topic will be an-up-to-date, even cutting edge one that you are particularly interested in.
The paper needs to be between eight and ten pages in length; it must be typed and double-spaced. Please include a bibliography of the reference used in the paper. The bibliography should follow the APA reference style. The APA style refers to references in the text by author and year; i.e. (Jones, 1995) or (Smith, 1996; Rizzo, 1994). If you need more details, please refer to the style manual provided by National University. You may also refer to the EXAMPLE OF PAPER FORMATING included in this Outline.
Type of service-Academic paper writing Type of assignment-Essay Subject-Finance Pages / words-7 / 1925 Number of sources-5 Academic level-Freshman (College 1st year) Paper format-APA Line spacing-Double Language style-US English
This is a rhetorical analysis. In this paper, I should include a reference page, it should be 750/1000 words.
The chosen video to analyze and write about is a music video called “We don’t talk anymore” for Charli Puth and Selena Gomez. https://www.youtube.com/watch?v=3AtDnEC4zak
Type of service-Academic paper writing Type of assignment-Essay Subject-English Pages / words-3 / 800 Number of sources-1 Academic level-Freshman (College 1st year) Paper format-APA Line spacing-Double Language style-US English
Using at least 3 clauses in the standard terms, explain which terms are more advantageous from the cloud customer’s point of views and why.
In your answer, please identify the specific clauses that you are comparing.
Give an overview or summary about the difference between the two contracts, even though the task involved a comparison of two contracts. The crucial difference between the two contracts is that Salesforce’s terms are generally more balanced and customer-friendly. In particular, generally Salesforce accepts more liability for its service and gives more warranties or indemnities including for service availability and SLAs, whereas Amazon excludes liability.
The idea is to be able to compare and give a view on which was better, as if you were advising a client or your company about which cloud provider to choose
Point out that generally some of the differences between the terms arise from Amazon providing IaaS and Salesforce SaaS
READING Task 2:
Chapters 3 and 4 of the Cloud Computing Law book:
· Simon Bradshaw, Christopher Millard and Ian Walden ‘Standard Contracts for Cloud Services’ in Christopher Millard (ed), Cloud Computing Law, (OUP, Oxford 2013).
· W Kuan Hon, Christopher Millard and Ian Walden ‘Negotiated contracts for Cloud Services’ in Christopher Millard (ed), Cloud Computing Law, (OUP, Oxford 2013).
Further optional reading:
K.Burden “Cloud bursts: Emerging trends in contracting for Cloud services” (2014) 30 Computer Law and Security Review 196-198.
Your client wishes to store its employee data in an HR database it has created using a PaaS service. What are the key issues that you would consider in this situation and what are the key questions that you would ask your client or advise it to ask the PaaS provider? Discuss only issues and questions relevant to data protection law compliance.
This task involved applying the General Data Protection Regulation (GDPR) to personal data processing using a cloud service that potentially involves a sub-provider, particularly Article 28 General Data Protection Regulation
here are two parts to the question:
Identifying the key data protection law issues arising in this fact situation, and
Identifying relevant questions you would ask client (or the client should ask the provider) arising from the key issues identified.
It is not enough to know the law. State the basic issues, for example, why and how DP law applies in this fact scenario (EU jurisdiction issue, whether personal data or not, who was a processor and who was a data controller).
Please note that the term ‘personally identifiable information’ is used mainly in the US. In the EU, we use the term ‘personal data’ instead.
Second, a relevant question is whether the client is a controller subject to EU data protection law and whether the provider is the processor, etc. It helped to show that you’ve gone through the thought process logically and systematically in applying the law.
Key questions (based on above issues) – These are a range of the types of questions that are relevant. It was not necessary to ask all of these questions but this shows the range of potential questions that you could cover in your answer.
Has client conducted due diligence re provider, notably:
Pen testing possible, independent third party audit certifications available?
Does it encrypt?
Identity and location of sub-providers?
Data centre locations?
What do the provider’s contract terms provide, do they enable DP law compliance by the client, if not can the client negotiate them? In particular:
Obliging encryption by provider?
Rights of provider to access/use/disclose data [Note: for operational reasons the provider is very likely to have technical access to clients’ data unless encrypted by the user before upload; contractual terms restricting what it can do with that data are more important]
Cf confidentiality obligation or other measures to restrict unauthorised access/use/disclosure by provider staff
Audit rights against provider? Difficult with shared infrastructure.
Restrictions on ability to disclose to Law Enforcement Agencies?
Deletion on termination? Return of data – formats – availability period
Logging of accesses to data, availability of logs?
Sub-provider contract – similar requirements. (Back to back terms or direct contract between client and sub-provider unlikely to be obtainable in practice.) [Remember, in most cloud services the user is very unlikely to have a direct contract with any sub-providers, only with its immediate provider]
Liability/indemnities for data protection breaches?
Can client protect data before upload to cloud by:
Encryption? (NB key management). Not feasible in many use cases eg HR database; consider encryption/tokenisation gateway services [Note: encryption can be said to be a form of pseudonymisation]
NB regulators don’t think encrypted data are anonymous. Some people seemed to confuse the two terms and argued that ‘encrypted’ data would no longer be considered as ‘personal’ data.
Anonymisation unlikely to be feasible with an HR database – may render the database useless to the client!
To comply with its security obligations, has the client implemented secure programming techniques to ensure the security of the application and database? (the client is itself creating the database on the PaaS service, ie the client is programming the HR database application which it wishes to deploy and run on the PaaS service, so the client is responsible for the application code – no one picked up on this)
Can/will client backup data internally or to another cloud for integrity and availability (ie again security obligations)? (even encrypted data may be lost or destroyed so a controller should keep more one copy)
Can the client:
restrict personal data locations to EEA, contractually or through the service option it chooses when it signs up for or uses the service?
Has client performed risk assessment/privacy impact assessment based on its due diligence?
READING TASK 3:
Cloud Computing Law, chapters 7-10 (but note that this is prior to the GDPR coming into force so needs to be read with additional material).
W. Kuan Hon, Christopher Millard Ian Walden‘Policy, legal and regulatory implications of a Europe-only cloud Europe-only cloud-implications’ Int J Law Info Tech (2016) 24 (3): 251 and on SSRN: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2527951
Mark Webber ‘The GDPR’s impact on the cloud service provider as a processor’ Privacy and Data Protection ( 2016), Volume 16, Issue 4, March PDP 16 4 (11)
Updates on GDPR – adopted guidance from Article 29 WP:
Guidelines on Data Protection Impact Assessment (DPIA) and determining whether processing is “likely to result in a high risk” for the purposes of Regulation 2016/679, wp248rev.01
Guidelines on the right to data portability, wp242rev.01
Suggested further reading:
Dimitra Kamarinou, Christopher Millard & W Kuan Hon, “Privacy in the Clouds: An Empirical Study of the Terms of Service and Privacy Policies of 20 Cloud Service Providers”(August 18, 2015). Queen Mary School of Law Legal Studies Research Paper No. 209/2015. Available at SSRN: http://ssrn.com/abstract=2646447
Millard, Christopher, “Forced Localization of Cloud Services: Is Privacy the Real Driver?”(April 1, 2015). Forthcoming in IEEE Cloud Computing, 2015. Available at SSRN: http://ssrn.com/abstract=2605926
There is also a video by Professor Millard on cloud localisation:
Kuan Hon “Cloud Computing: Geography or Technology – Virtualisation and Control” published by the Society Computer Law (21 January 2014).
Discuss the forensic challenges for law enforcement in a cloud environment. In your answer consider the questions of vires raised by the exercise of Law Enforcement Agency (LEA) powers in cloud computing and discuss the mechanisms have been adopted, or are proposed, to address the needs of LEAs in a cloud environment
Say or define what ultra vires meant in relation to an LEA working in cloud. Although it may be simple, or seem too obvious, this needed to be stated to answer or address the issues of vires.
Narrow the scope – The issues about law enforcement concerned cloud, rather than the wealth of issues surrounding cybersecurity and law enforcement online in general.
The question could be answered in three parts:
Part 1 – Forensic challenges in the cloud
Part 2 Vires for LEAs and cloud
Part 3 – Mechanisms for dealing with the legal challenges
Clearly stating and explaining the main mechanisms (MLA, the Cybercrime Convention and informal request to cloud provider) was necessary. YOU CAN questione the effectiveness of these mechanisms, which IS good. OR discuss the balance between the European Convention on Human Rights, Data Protection and the exercise of these powers. This was an added bonus but difficult to cover in the wordcount in this answer. The answer need to define the mechanisms and make them relevant to cloud computing
READINGs Task 4
Cloud Computing Law, chapters 11-12
Competition law reading
Niamh Gleeson and Ian Walden ‘It’s a jungle out there’? Cloud computing, standards and the law’ European Journal of Law and Technology Vol 5, No 2 (2014), a working paper is available on SSRN at:
SSRN ‘It’s a Jungle Out There’?: Cloud Computing, Standards and the Law
Sylvia Song ‘Competition law and Interoperability in Cloud Computing’ Computer law and security review 33 (2017) 659-671.
Björn Lindqvist ‘Cloud services as the ultimate gate(keeper)’ Journal of Antitrust Enforcement, 2019, 7, 220-248
Law enforcement reading
Peter Swire ‘From real-time intercepts to stored records: why encryption drives the government to seek access to the cloud’ International Data Privacy Law 2012, Vol 2, No.4. 200-206.
US CLOUD Act
Additional optional reading
Sara Gabriella Hoffman, Regulation of Cloud Services under US and EU Antitrust, Competition and Privacy Laws (1st ed Peter Lang, Oxford 2017).
What are the risks and legal challenges under consumer law faced by cloud service providers with consumers in the EU? In your answer, identify the characteristics of cloud services or products that raise problems under consumer law.
Two main parts to this question.
The first is about identifying the relevant risks and legal challenges arising in consumer law and
the second refers to how the specific characteristics of the cloud services cause, affect or impact those legal challenges.
READING FOR TASK 5
Cloud Computing Law, chapters 6 and chapters 13 and 14
UK Competition and Markets Authority (CMA) has published its review of on consumer law and cloud ‘Consumer law compliance review: cloud storage’ (1 December 2015) at https://www.gov.uk/government/consultations/cloud-storage-consumer-law-compliance-review
Elisabeth Kennedy and Christopher Millard ‘Post-mortem digital assets’ (Unpublished 2017,forthcoming). Sections relevant to cloud (pp 14 – 22).
Oracle America Inc v Google Inc case concluded in 2016 with the trial jury agreeing that Google’s use of the Java API was fair use. Please see here: https://www.eff.org/cases/oracle-v-google
This case updates Chapter 6 pages 162-163.
Recent relevant judgments on Cloud and IP by the Court of Justice of the European Union:
Court of Justice judgment Case C-265/16 Vcast Limited v RTI SpA, 29 November 2017.
Opinion of Advocate General Szpunar in Case C-265/16 Vcast Limited v RTI SpA, 7 September 2017.
3-5 page research essay that analyzes the issue at hand, by first identifying it, determining what the relevant question is regarding the issue. It should be written in the following outline order: Introduction to the topic Discuss the history and background of issue Discuss all sides of the issue Discuss political and governmental issues Refer back to any passed legislations and the traditional AP gov lessons. Recommend an approach on what to do about Vladimir (key: I do not like or trust this man at ALL)
Type of service-Academic paper writing Type of assignment-Research Paper Subject-Not defined Pages / words-3 / 825 Number of sources-3 Academic level-Senior (College 4th year) Paper format-MLA Line spacing-Double Language style-US English
The essay calls for the ideas of Michel Foucault to be applied to any contemporary event.
Intended show the effectiveness of using Foucault to analyse contemporary events. choose The event analysed.
The essay should mention any limitations in the work if there are any, but should still come to the conclusion that Foucault’s works still helpful in dissecting why certain events happen in the modern world.
Type of service-Academic paper writing Type of assignment-Essay Subject-Political Science Pages / words-12 / 3150 Number of sources-25 Academic level-Undergraduate Paper format-Harvard Line spacing-Double Language style-UK English
Amia Srinivasan argued that critical genealogy can itself be an exercise in ‘worldmaking,’ which she describes as ‘the transformation of the world through a transformation of our representational practices.’
critically discuss this quotation with reference to the legal writings of HLA Hart and Devlin.
the scaffold to be on LGBTIQ
looking for 550 detailed scaffold for my 4.5k paper
Type of service-Academic paper writing Type of assignment-Research summary Subject-Law Pages / words-2 / 550 Academic level-Junior (College 3rd year) Paper format-MLA Line spacing-Double Language style-AU English
Purpose: This assignment will enhance your communication skills and help you advance a personal health policy agenda on an issue of interest to you. .
Directions: Conduct an interview of an individual who influences/interprets health care policy (legislator, legislative aide, council person, commissioner, member of a health care organization board, lobbyist, judge, etc.)
(In person face to face interview is highly recommended)
** NOTE: Papers should be no longer than 10 double spaced pages in length (excluding Title Page and References
Headings are expected please use the grading criteria items for headings.
Papers must be typed and in APA format 7th edition.
Type of service-Academic paper writing Type of assignment-Research Paper Subject-Nursing Pages / words-10 / 2750 Number of sources-8 Academic level-High School Paper format-APA Line spacing-Double Language style-US English