DLA Piper has made an interactive world map of data protection laws, as well as a searchable database of national data protection and data breach notification laws. Data breach notification laws ...
Illicit firearms can come from many sources and determine in part the size of the illicit traffic. The sections below summarize the key sources of illicit supply. Most types of illicit sources form ...
This module is a resource for lecturers .. The Organized Crime Convention is considered to be the principal international instrument in ...
Ultimately, though regional and international organizations and related legal frameworks play an important role in counter-terrorism efforts, States remain the principal actors including in terms of ...
The role of the criminal justice system in combatting trafficking in persons is acknowledged by Governments, United Nations agencies, NGOs and academics, and is supported by established principles of ...
This module is a resource for lecturers .. Determinations regarding whether the employment of lethal force violates the right to ...
Each of these elements is examined in detail in the above cited article. This section focuses on three strategies: effective investigation and prosecution initiatives, law reform, and cross-border ...
This module is a resource for lecturers . Role of law enforcement. Law enforcement is the next element of the criminal justice response; its purpose is to prevent, detect and inve ...
Other negative and long-term consequences of firearms that are less documented include non-physical harm such as psychological trauma and stress from being threatened or observing firearm violence.
Trafficking in Persons & Smuggling of Migrants Module 14 Key Issues: Using Technology to Prevent and Combat TIP and SOM ...
Trafficking in Persons & Smuggling of Migrants Module 7 Key Issues: Effective prevention strategies: Supply side strategies - concerns and shortcomings ...
This module is a resource for lecturers . Responses to cyberinterventions as prescribed by international law. A rule of customary international law (see Cybercrime Module 3 for mo ...