Home

Results 31 - 40 of 140,483 for removing. Search took 7.165 seconds.  
Sort by date/Sort by relevance
The document, “IATA/CAWG Guidelines for the Removal of Inadmissible Persons” (“Inadmissible Removal Guidelines”), was first adopted in 2004, and has most recently been reviewed and updated with its third revision released on 12 May 2012. 1.3 Although the IATA/CAWG “Inadmissible Removal Guidelines” are largely aligned with existing SARPs, the document makes references to additional processes/concepts that are not contained in Annex 9 (Chapter 5 or elsewhere). (...) The Appendix to this Working Paper contains proposed language to amend existing Standard 5.5. 2.2 The “Inadmissible Removal Guidelines” includes a statement that the Public Authorities in Contracting States should consult with Aircraft Operators regarding the removal of an inadmissible person, and allow the Aircraft Operator reasonable time to effect the removal of that individual. (...) DISCUSSION 2.1 The IATA/CAWG’s “Inadmissible Removal Guidelines” recommend that Contracting States should provide the aircraft operator which transported the Inadmissible Person to its territory with a removal order containing sufficient information so as to permit t 2.2 The “Inadmissible Removal Guidelines” includes a statement that the Public Authorities in Contracting States should consult with Aircraft Operators regarding the removal of an inadmissible person, and allow the Aircraft Operator reasonable time to effe 2.3 The IATA/CAWG “Inadmissible Removal Guidelines” supports the concept for the issuance of an ICAO-compliant Covering Letter to facilitate the removal of an inadmissible passenger not holding a valid travel document, or for whom an invalid travel docume 2.4 Existing Standards 5.6 and 5.7 speak to the requirement that States ordering the removal of persons found inadmissible and who are not in possession of a required travel document (5.6), or whose travel documents have been seized (5.7) issue the ICAO-co 2.5 As there are already a number of existing Standards that address the issue of States issuing and accepting covering letters issued by another, IATA/CAWG does not believe that additional provisions are required or would resolve the issues relating to no
Language:English
Score: 509331.35 - https://www.icao.int/Meetings/...alp7-2012/WP8/FALP7.WP8.FR.pdf
Data Source: un
(Draft incorporating comments from Canada Germany, United Kingdom, Switzerland, The Netherlands, Japan and QANTAS) Guidelines for the Removal of Deportees Version 3.0 - 6 May 2010 IATA/CONTROL AUTHORITIES WORKING GROUP Guidelines for the Removal of Deportees Version 3.0 06 May 2010 Guidelines for the Removal of Deportees Version 3.0 - 6 May 2010 IATA/CONTROL AUTHORITIES WORKING GROUP Guidelines for the Removal of Deportees Version 3.0 - Revised 06 May 2010 The IATA/Control Authorities Working Group (IATA/CAWG) was established as an IATA initiative in 1987 as a means of bringing together Airlines and States on the issue of inadmissible and inadequately documented persons. (...) The Air Transport Association of America, National Airline Council of Canada and the Association of Asia Pacific Airlines are also represented. GUIDELINES FOR THE REMOVAL OF DEPORTEES 1 INTRODUCTION 1.1 This document provides a guide to best practice for the removal of deportees on commercial air services. (...) Due regard has been given to the Guidelines for the Removal of Deportees Version 3.0 - 6 May 2010 International Standards and Recommended Practices set forth in Annex 9, 12th Edition (July 2005), Chapter 5 Section C to the Convention on International Civil Aviation.
Language:English
Score: 509302.3 - https://www.icao.int/ESAF/Docu...20Removal%20of%20Deportees.pdf
Data Source: un
(Draft incorporating comments from Canada Germany, United Kingdom, Switzerland, The Netherlands, Japan and QANTAS) Guidelines for the Removal of Deportees Version 3.0 - 6 May 2010 IATA/CONTROL AUTHORITIES WORKING GROUP Guidelines for the Removal of Deportees Version 3.0 06 May 2010 Guidelines for the Removal of Deportees Version 3.0 - 6 May 2010 IATA/CONTROL AUTHORITIES WORKING GROUP Guidelines for the Removal of Deportees Version 3.0 - Revised 06 May 2010 The IATA/Control Authorities Working Group (IATA/CAWG) was established as an IATA initiative in 1987 as a means of bringing together Airlines and States on the issue of inadmissible and inadequately documented persons. (...) The Air Transport Association of America, National Airline Council of Canada and the Association of Asia Pacific Airlines are also represented. GUIDELINES FOR THE REMOVAL OF DEPORTEES 1 INTRODUCTION 1.1 This document provides a guide to best practice for the removal of deportees on commercial air services. (...) Due regard has been given to the Guidelines for the Removal of Deportees Version 3.0 - 6 May 2010 International Standards and Recommended Practices set forth in Annex 9, 12th Edition (July 2005), Chapter 5 Section C to the Convention on International Civil Aviation.
Language:English
Score: 509302.3 - https://www.icao.int/MID/Docum...Rev3%200_%206%20May%202010.pdf
Data Source: un
The Chamber hereby issues the public version thereof. I. FAILURE TO REMOVE FROM WEBSITE CONFIDENTIAL MATERIALS FROM CASE NO. (...) IT-03-67-R77.2-A, Urgent Motion to Remove Protected Witness Information from the Internet, 6 October 2009; Prosecutor v. (...) IT-03-67-R77.3 filed confidentially the “Prosecutor’s Motion to Remove Document from Website”, requesting the Chamber to, inter alia, issue an order requiring Vojislav [e{elj to remove the Book in Case IT-03- 67-R77.3 from the Website.
Language:English
Score: 509277.7 - https://www.icty.org/x/cases/c...empt_seselj3/ind/en/110524.pdf
Data Source: un
The Chamber hereby issues the public version thereof. I. FAILURE TO REMOVE FROM WEBSITE CONFIDENTIAL MATERIALS FROM CASE NO. (...) IT-03-67-R77.2-A, Urgent Motion to Remove Protected Witness Information from the Internet, 6 October 2009; Prosecutor v. (...) IT-03-67-R77.3 filed confidentially the “Prosecutor’s Motion to Remove Document from Website”, requesting the Chamber to, inter alia, issue an order requiring Vojislav [e{elj to remove the Book in Case IT-03- 67-R77.3 from the Website.
Language:English
Score: 509277.7 - https://www.icty.org/x/cases/c...mpt_seselj3/tdec/en/110524.pdf
Data Source: un
Title Commodity Group Start Date Expiry Date EOI Details EOIUNIFIL19306 Long Term Agreement (LTA) for the provision of accommodation items to UNIFIL Facility Management 18 January 2022 02 February 2022 Download PDF file Express Interest EOIUNON19307 Rehabilitation of damaged houses in Maghrib and Sikak Neighborhoods, West Mosul City, Ninewa Governorate - Iraq Engineering Design and Construction 19 January 2022 02 February 2022 Download PDF file Express Interest EOIMINUSCA19317 Supply and Delivery of Paints & Painting Materials to MINUSCA DAP MINUSCA Central Warehouse Bangui, Central African Republic Engineering Design and Construction 19 January 2022 02 February 2022 Download PDF file Express Interest EOIUNPD19302 Expression of Interest to provide the Audio/Sound Engineering and Consulting services for assisting UNHQ with a study of key sound parameters related to the use of platforms supporting virtual/remote participation and interaction Professional Services 18 January 2022 02 February 2022 Download PDF file Express Interest EOIUNON19311 Debris and Rubble Removal in Hadaeq Neighourhood, Harasta city, Rural Damascus Governorate - Syria Engineering Design and Construction 19 January 2022 02 February 2022 Download PDF file Express Interest EOIUNOG19305 Fourniture et livraison de gaz technique et m%u00e9dical au Palais des Nations %u00e0 Gen%u00e8ve Supply and delivery of technical and medical gas to the Palais des Nations in Geneva Professional Services 18 January 2022 03 February 2022 Download PDF file Express Interest EOIUNECA19318 Provision for vehicle Repair and Maintennce Services Vehicle Fleet 20 January 2022 04 February 2022 Download PDF file Express Interest EOIUNPD19266 5 year contract to furnish all labour and materials required to remove and install AC filters in UN complex Iin New York City. (...) Rations 14 January 2022 04 February 2022 Download PDF file Express Interest EOIUNAMI19338 Provision of Garbage Removal Services at UNAMI HQ Compounds at Green Zone (Diwan/D2, UNGU (Tamimi) Camp, & Transport Workshop) and UNFSB at Baghdad International Airport (BIAP), in Baghdad, Iraq, for an initial period of One (1) year with an option of ex Solid Waste Management 23 January 2022 06 February 2022 Download PDF file Express Interest EOIUNAMI19339 Provision of Garbage Removal Services at UNAMI HQ Compounds at Green Zone (Diwan/D2, UNGU (Tamimi) Camp, & Transport Workshop) and UNFSB at Baghdad International Airport (BIAP), in Baghdad, Iraq, for an initial period of One (1) year with an option of ex Solid Waste Management 23 January 2022 06 February 2022 Download PDF file Express Interest EOIUNAMI19340 Provision of Garbage Removal Services at UNAMI HQ Compounds at Green Zone (Diwan/D2, UNGU (Tamimi) Camp, & Transport Workshop) and UNFSB at Baghdad International Airport (BIAP), in Baghdad, Iraq, for an initial period of One (1) year with an option of ex Solid Waste Management 23 January 2022 06 February 2022 Download PDF file Express Interest EOIUNAMI19337 Provision of Garbage Removal Services at UNAMI HQ Compounds at Green Zone (Diwan/D2, UNGU (Tamimi) Camp, & Transport Workshop) and UNFSB at Baghdad International Airport (BIAP), in Baghdad, Iraq, for an initial period of One (1) year with an option of ex Solid Waste Management 23 January 2022 06 February 2022 Download PDF file Express Interest EOIUNIFIL19322 Long Term Agreement (LTA) for the provision of Special Supplies (Movement Control & Aviation) to UNIFIL Staff Security & Safety 20 January 2022 07 February 2022 Download PDF file Express Interest EOIUNECA19371 Request for Reporting Coverage Services for the Africa Regional Forum on Sustainable Development (ARFSD) for three years (2022, 2023 and 2024) in the Democratic Republic of the Congo.
Language:English
Score: 509009.6 - https://www.un.org/Depts/ptd/eoi
Data Source: un
UNDP removes quarter million tons of rubble in Gaza - UNDP press release - Question of Palestine Skip to content Welcome to the United Nations عربي 中文 English Français Русский Español Search for: Home About The Committee on Palestinian Rights Division for Palestinian Rights Key Topics Key issues at stake The Quartet History Fast facts The Committee Background Bureau Membership Mandate and Objectives Areas of Activities Working Group Reports Statements Newsletters Events Upcoming Events Committee Meetings International Conferences and Side Events Delegation visits Solidarity Day Capacity Building Programme UNISPAL About UNISPAL Search Document Collection Map Collection Civil Society Overview Responsibilities of Civil Society Partners NGO Action News Get accredited Benefits of accreditation Civil Society Partners UN System FAQ Search for: Home / UNDP removes quarter million tons of rubble in Gaza – UNDP press release UNDP removes quarter million tons of rubble in Gaza – UNDP press release UNDP Removes Quarter Million Tons of Rubble in Gaza 07 May 2015 Gaza, 07 May 2015  – A quarter of a million tons of rubble have been removed by UNDP’s Rubble and Debris Removal project in the Gaza Strip has removed since the beginning of 2015, generating over 9,669 workdays. Rubble was removed from 270 locations and buildings enabling the reconstruction to begin in different areas of Shujayia, Gaza City, Middle Area, Rafah and Khan Younis. The project, which is funded by Sweden, Japan and USAID for USD 14 million, aims at removing one million tons of the rubble generated by the 2014 conflict in the Gaza Strip.
Language:English
Score: 508443.4 - https://www.un.org/unispal/document/auto-insert-200002/
Data Source: un
Marco Gercke CYBERCRIME Page: 2 CYBERCRIME GUIDE • Aim: Providing a guide that is focussing on the demands of developing • Including recent developments Content • Phenomenon of Cybercrime • Challenges of Fighting Cybercrime • Elements of an Anti-Cybercrime Strategy • Explanation of legal solutions - Substantive Criminal Law - Procedural Law - International Cooperation ITU GUIDE Picture removed in print version CYBERCRIME Page: 3 CYBERCRIME GUIDE • Phenomenon ITU GUIDE Picture removed in print version CYBERCRIME Page: 4 CLASSIC IT-CRIMES • Illegal access to a computer system was one of the dominating crimes in the early days of computer crimes • Incredible technical development since that times • Hacking attacks are still an important phenomenon - especially with regard to the automation of attacks • But in addition a number of other offences were discovered HACKING Picture removed in print version CYBERCRIME Page: 5 Example (http:wslabi.com) Picture removed in print version EXPLOIT AUCTION • Information about system vulnerabilities are published on websites • In addition these information are offered for sale by some businesses • Information can be used to increase security as well as to commit computer- related offences CYBERCRIME Page: 6 RECENT DEVELOPMENT • New scams related to online-games • Closer relations between virtual worlds and the real world (exchange of virtual currencies) • Highly sophisticated phishing-scams ONLINE GAMES (SECONDLIFE.COM) Picture removed in print version CYBERCRIME Page: 7 RECENT DEVELOPMENT • Current analysis proof that up to a quarter of all computer connected to the internet could be used by criminals as they belong to “botnets” Souce: BBC report “Criminals 'may overwhelm the web“ • Some analysis go even beyond that number • Botnets can for example be used to send out Spam or carry out a DoS attack • Use of Botnets makes the identification of the offender difficult Botnets (www.shadowserver.org) Picture removed in print version CYBERCRIME Page: 8 RECENT DEVELOPMENT • Increasing activities of terrorist organisations • Not concentrating on attacks against critical infrastructure - information, recruitment, communication, ... • Continuing improvement of methods protecting communication from lawful interception • Integration of the Internet in terrorist financing activities CYBERTERRORISM Picture removed in print version CYBERCRIME Page: 9 RECENT DEVELOPMENT • Intensive discussion about new investigation instruments • Remote forensic software tools • In 2001 reports pointed out that the FBI developed a keystroke logger hat can be remotely installed on the computer system of a suspect • In 2007 the FBI requested an order to use a software (CIPAV (Computer and Internet Protocol Address Verifier) to identify an offender that used measures to hide his identity while posting threatening messages CIPAV Picture removed in print version CYBERCRIME Page: 10 LEGAL CONCERNS • Well balanced adjustment Freedom Security „Amount“ of Freedom taken „Result “ of Security achieved Fundamental Rights CYBERCRIME Page: 11 CYBERCRIME GUIDE • Challenge ITU GUIDE Picture removed in print version CYBERCRIME Page: 12 CHALLENGES • Dependence of the society on information technology • Availability and power of devices that can be used to commit a crime • Availability of Information • Languages • Missing control instruments • International dimension • Speed of information exchange • Speed of the technological development, power and vulnerability of devices • Anonymous communication • Encryption CYBERCRIME Page: 13 POSSIBILITIES • There are no doubts that the ongoing improvement of information technology enables the law enforcement agencies to carry out investigations that were not possible previously • Automated search for key-words / hash-values • Great chance for public private partnership (Microsofts CETS) EXAMPLE CHILD PORNOGRAPHY Picture removed in print version CYBERCRIME Page: 14 AVAILABILITY OF INFORMATION • Secret Information are available in the Internet • Available especially through search engines • “Google hacking” EXAMPLE Picture removed in print version CYBERCRIME Page: 15 AVAILABILITY OF INFORMATION • Robots used by Search-engines can lead the disclose of secret information • Handbooks on how to build explosives and construct chemical and even nuclear devices are available • Internet sources have been used by the offenders in a number of recent attacks TERRORIST HANDBOOK Picture removed in print version CYBERCRIME Page: 16 RAGNAR’S ENCYCLOPEDIA Picture removed in print version AVAILABILITY OF INFORMATION • Information regarding the construction of weapons were available long time before the Internet was developed • Ragnar‘s Action Encyclopaedia of Practical Knowledge and Proven Techniques • Approaches to criminalise the publication of information that can be used to CYBERCRIME Page: 17 ENCRYPTION • Encryption is the process of obscuring information to make it unreadable without special knowledge • Encryption can be used to ensure secrecy • Encryption can be used to hide the fact that encrypted messages are exchanged • Encryption used by criminals can lead to difficulties collecting the necessary evidence • E-Mails, VoIP comminication, files PGP Picture removed in print version CYBERCRIME Page: 18 GLOBAL PHENOMENON • Availability of encryption technology is a global challenge • Powerful software tool that enable are available on a large scale in the Internet • Some of the latest versions of operating systems contain encryption technology MICROSOFT BITLOCKER Picture removed in print version CYBERCRIME Page: 19 BREAKING A KEY • Brute Force Attack: Method of defeating a cryptographic scheme by trying a large number of possibilities; for example, exhaustively working through all possible keys n order to decrypt a message • Gaps in the encryption software • Dictionary-based attack • Social Engineering • Classic search for hints • Need for legislative approaches? How long it takes to break a key Picture removed in print version CYBERCRIME Page: 20 SOLUTION Technical solutions (with legal component) • Magic Lantern (US) • Remote Forensic Software (Germany) Legal solution • Various restrictions on import/export and use of encryption technology • UK: Obligation to disclose password (Sec. 49 of the UK Investigatory Powers Act 2000) MAGIC LANTERN Picture removed in print version CYBERCRIME Page: 21 STEGANOGRAPHY • Steganography is a technique used to hide information in some other information • Example: Hiding a message in picture • Technique can be used to keep the fact that the exchange of encrypted messages is taking place secret Steganography Picture removed in print version CYBERCRIME Page: 22 CONCLUSION • Developing countries and Industrialised countries are facing similar challenges • Does this implicate that existing Cybersecurity strategies developed by industrialised countries can simply be copied by the developing countries? (...) • One argument against regional and national solutions is the fact that the internet does not know any boarders and boundaries and therefore international solutions are necessary • International dimension requires harmonisation to effectively fight Cybercrime • It does not necessary exclude additional regional and national approaches EU COUNTRIES Picture removed in print version CYBERCRIME Page: 33 REGIONAL & NATIONAL • Geo-tracking enables to keep geographic borders in times of the Internet • It enables to exclude users with certain IP addresses from services • The fact that the possibility to circumvent virtual or real border exists does not mean that there are no borders BORDER Picture removed in print version CYBERCRIME Page: 34 THANK YOU FOR YOUR ATTENTION gercke@cybercrime.de
Language:English
Score: 508109.5 - https://www.itu.int/ITU-D/cyb/...-guide-buenos-aires-oct-07.pdf
Data Source: un
Last Updated: 24 September 2021 Published: 24 September 2021   (/) Scale up carbon dioxide removal to achieve climate targets, urge United Nations regional leaders. (...) Second, carbon dioxide removal is essential if the world is to achieve its universally agreed sustainable development goals. (...) By working together, carbon dioxide removal has the potential to become a critical component of viable climate policy options for regions now and in the decades to come.
Language:English
Score: 506619.04 - https://www.cepal.org/sites/de..._nations_regional_leaders_.pdf
Data Source: un
Microsoft Word - FALP7.WP10.RemovalofDeportee.IATA-CAWG.doc (4 pages) FALP7.WP10.RemovalofDeportee.IATA-CAWG.doc FACILITATION PANEL (FALP) SEVENTH MEETING Montréal, 22-26 October 2012 Agenda Item 5: Amendments to Annex 9 THE REMOVAL OF DEPORTEES: PROPOSALS TO AMEND ANNEX 9 – FACILITATION (Presented by Canada on behalf of IATA CAWG) SUMMARY Although Annex 9, Chapter 5, provides Standards and Recommended Practices for Contracting States to make arrangements for the removal of a deportee, aircraft operators continue to experience complications with the removal of deportees, resulting in the denial of their entrance at in-transit and/or final destination State(s). (...) International Civil Aviation Organization WORKING PAPER FALP/7-WP/10 10/9/12 FALP/7-WP/10 - 2 - 1.2 Based on analysis of existing national policies relating to deportation and removal processes adopted by the various Contracting States that began in 1998, IATA/CAWG identified significant inconsistencies in the processes employed to support deportee removals. In an effort to respond to these inconsistencies, and to provide best practice guidance to both aircraft operators and public authorities, IATA/CAWG developed and adopted its Guidelines for the Removal of Deportees (“Removal Guidelines”) in October, 1999.
Language:English
Score: 506476 - https://www.icao.int/Meetings/...p7-2012/WP10/FALP7.WP10.EN.pdf
Data Source: un