Premium Essay

Use of Law Journal and Legal Software

In:

Submitted By Ronak143
Words 11338
Pages 46
National Knowledge Commission

Working Group on Legal Education

REPORT OF THE WORKING GROUP ON LEGAL EDUCATION Background

1.

The National Knowledge Commission (“NKC”) was established by the Prime Minister of India in 2005 to recommend and undertake reforms in order to make India a knowledge-based economy and society. An important constituent of the NKC’s functions is professional education, particularly in the field of legal education. In light of its significance, the NKC constituted a Working Group on legal education in the country. The members nominated by the Chairperson of the NKC, Mr. Sam Pitroda, to the Working Group are Justice Jagannadha Rao (Chair), Justice Leila Seth, Dr. Madhav Menon, Dr. B.S. Chimni, Dr. Mohan Gopal, Mr. P.P. Rao and Mr. Nishith Desai. The Terms of Reference of the Working Group are as follows: a. Identify constraints, problems and challenges relating to curriculum, teaching, infrastructure, administration and access. b. Recommend changes and reforms to address the problems and challenges relating to curriculum, teaching, infrastructure, administration, and access. c. Explore methods of attracting and retaining talented faculty members. d. Suggest measures to develop a research tradition in faculties of law and law schools. e. Suggest innovative means of raising standards and promoting excellence in legal education situated in the wider social context. f. Suggest ways of incorporating emerging fields of legal education in teaching and curricula. g. Identify problems implicit in regulatory structures that constrain the quality and spread of legal education. h. Examine any other issue that may be relevant in this context.

2.

3. The Working Group met on the following dates: September 24, 2006, October 5, 2006, November 12, 2006, January 15, 2007 and January 30, 2007 4. The members of the Working Group circulated several

Similar Documents

Premium Essay

107-K—Use of Law Journal and Legal Software

...GUJARAT UNIVERSITY SYLLABI OF THREE YEARS LL.B. PROGRAMME WITH CREDIT BASED SYSTEM (As prescribed b y the BAR CO UNCIL OF INDI A and as per the Rules of Legal Education, 2008) Effective from the academic year 2011-12 THREE YEARS’ LL.B. POGRAMME First LL. B. Semester – I FIRST LL.B. - S EMES TER 1 (MONSOON ) PE R WE EK S UBJEC TS LEC TURE S OT HER S T OT AL C RED IT S (SE M)29 CORE COURSE 101 L aw of T ort i ncludi ng MV A cci dent And C on sum er Pr ot ecti on Law s 4 1 5 5 CORE COURSE 102 Crim in al Law P aper – I (General P rinci pl es of P en al Law ) 4 1 5 5 4 1 5 5 4 1 5 5 4 1 5 5 1 1 2 2 1 1 2 2 CORE COURSE 103 CORE COURSE 104 CORE COURSE 105 FOUNDATIO N 106 F SOFT S KILL 107 K Crim in al Law P aper – II (S pec ific Off enc es) L aw of C ont ract S peci al C ontr act C on sti tuti on al Hist ory of I ndi a Use of Law J ournal s and L egal S oftw ar e 1 Semester – I Monsoon Semester CORE CO URSE 101 : LAW OF TO RT I NCLUDI NG M V ACCI DENT AND CO NS UM ER P ROTECTION LAWS Objectives of the Course : Wit h rap id industrializat ion, to rt actio n came to u sed again st manu factu rers and industrial un it fo r p roducts injurious to human beings. Present ly the emphas is is o n extend ing th e principles no t only to acts, which are h armfu l, bu t also to failu re to co mply with stand ards that are continuously...

Words: 16483 - Pages: 66

Free Essay

What Can Information Technology Do for Law?

...Harvard Journal of Law & Technology Volume 21, Number 2 Spring 2008 WHAT CAN INFORMATION TECHNOLOGY DO FOR LAW? Johnathan Jenkins∗ TABLE OF CONTENTS I. INTRODUCTION ..............................................................................589 II. INCENTIVES FOR BETTER INTEGRATION OF INFORMATION TECHNOLOGY AND LAW ............................................................591 III. THE CURRENT STATE OF INFORMATION TECHNOLOGY IN LEGAL PRACTICE .......................................................................594 IV. THE DIRECTION OF LEGAL INFORMATICS: CURRENT RESEARCH .................................................................................597 A. Advances in Argumentation Models and Outcome Prediction ..............................................................................597 B. Machine Learning and Knowledge Discovery from Databases ..............................................................................600 C. Accessible, Structured Knowledge ...........................................602 V. INFORMATION TECHNOLOGY AND THE LEGAL PROFESSION: BARRIERS TO PROGRESS ......................................604 VI. CONCLUSION ..............................................................................607 I. INTRODUCTION MUCH CURRENT LEGAL WORK IS EMBARRASSINGLY, ABSURDLY, WASTEFUL. AI-RELATED TECHNOLOGY OFFERS GREAT PROMISE TO 1 IMPROVE THAT SITUATION. Many professionals now rely on information technology (“IT”) to simplify, automate, or better...

Words: 9086 - Pages: 37

Premium Essay

Intellectual Property Clause

...technologies such as software, relationships with customers or vendors, and brand identity. These examples of IP, and many more, are often among a company’s most valuable resources, and there are specific laws designed to protect them. Trade secrets, patents, trademarks, and copyrights define and control ownership rights to IP, and businesses further protect those rights by drafting IP clauses when they enter into contracts with individuals or other businesses. (Reed, Pagnattaro, Cahoy, Shedd, & Morehead, 2013). The purpose of an IP clause is to identify IP as it pertains to the respective contract, define authorized and/or unauthorized use(s), and incorporate this information into the original contract, which makes it legally binding (Connock, 1994). The following is an example of an IP clause: “Intellectual Property,” or “IP,” refers to the trade secrets, copyrights, trademarks, patents, and patentable ideas relating thereto of Developer, including but not limited to the know-how, inventions, technologies and technical data relating thereto, processes and methods of business operation, reports, manuals, other documentation and all information relating thereto, databases, pre-existing and future relationships with customers and suppliers, software, new product research, and marketing plans (Reed, et al., 2013). Developer grants to Company the right to use all IP provided, solely for the purposes outlined by this Agreement. Any unauthorized use of the IP, including...

Words: 1104 - Pages: 5

Free Essay

Librarian

...Article Tile: Specific legal issues affecting the implementation of computer-based information systems in the developing countries: a critical review of literature A paper presented to the Journal of library and information science for consideration for publication. Date: November 2015 Author: Daniel Kinyanjui (Bsc-Information Science-Moi University-Eldoret, Kenya and Currently Studying Masters of Library and Information Science at Kenyatta University-Kenya) Daniel is also the editor of institutional in-house publications at Oshwal College-Nairobi and the College Head of Library Services. Abstract Implementation of computer-based information systems (CBIS) has become increasingly important due to the growing reliance on new technologies by organisations in their operations and service delivery. There has also been realisation by individuals and businesses of the inevitability of delivering value-added services without computerized systems. Despite this awareness and the apparent growing readiness to deploy computer-based systems, there still exists a myriad of perennial challenges inhibiting the implementation of these systems. Using insights from previous studies, the paper sums up the legal issues that have been acknowledged by various scholars as major obstacles to the implementation of CBIS in developing countries. Drawing from the understanding of these challenges, the author finally attempts to advance possible strategies that can be used to overcome these...

Words: 3108 - Pages: 13

Premium Essay

Guj Sylabus

...BAR COUNCIL OF INDIA and as per the Rules of Legal Education, 2008) Effective from the academic year 2011-12 THREE YEARS’ LL.B. POGRAMME First LL. B. Semester – I FIRST LL.B. - SEMESTER 1 (MONSOON) PER WEEK CORE COURSE 101 SUBJECTS Law of Tort including MV Accident And Consumer Protection Laws Criminal Law Paper – I (General Principles of Penal Law) Criminal Law Paper – II (Specific Offences) Law of Contract Special Contract Constitutional History of India Use of Law Journals and Legal Software LECTURES 4 OTHERS 1 TOTAL 5 CREDITS (SEM)29 5 CORE COURSE 102 CORE COURSE 103 CORE COURSE 104 CORE COURSE 105 FOUNDATION 106 F SOFT SKILL 107 K 4 4 4 4 1 1 1 1 1 1 1 1 5 5 5 5 2 2 5 5 5 5 2 2 1 Semester – I Monsoon Semester CORE COURSE 101 : LAW OF TORT INCLUDING MV ACCIDENT AND CONSUMER PROTECTION LAWS Objectives of the course : With rapid industrialization, tort action came to used against manufacturers and industrial unit for products injurious to human beings. Presently the emphasis is on extending the principles not only to acts, which are harmful, but also to failure to comply with standards that are continuously changing due to advancement in science and technology. Product liability is now assuming a new dimension in developed economics. In modern era of consumer concern of goods and services, the law of torts has an added significance with this forage into the emerging law of consumer protection. It operates in disputes...

Words: 6024 - Pages: 25

Premium Essay

Cyber Forensics

...International Journal on New Computer Architectures and Their Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes...

Words: 5129 - Pages: 21

Free Essay

Business in Virtual Library

...includes the full-text of 24 journals published by SAGE and participating societies. It covers such subjects as Criminal Justice, Juvenile Delinquency, Juvenile Justice, Corrections, Penology, Policing, Forensic Psychology, and Family and Domestic Violence. EbscoHost (all) Ebsco databases provide access to numerous publications. Select this link to search all databases simultaneously. To search each database separately, use the specific links to the named databases. EbscoHost Academic Search Elite Search academic journals for topics in all areas of academic study; many peer-reviewed titles are included. EbscoHost Business Source Premier Search periodicals covering a wide variety of business topics. EbscoHost CINAHL Plus with Full Text Search nursing and allied health journals. EbscoHost MasterFile Premier Search periodicals covering a wide variety of topics including general reference, business, education, health, and science. EbscoHost Regional Business News Search regional business publications from major metropolitan areas. EbscoHost SocIndex with Full Text Search for articles related to sociology, criminal justice, criminology, and ethnic and gender studies. Full Text Electronic Journals Use this portal to locate full-text magazines, journals, and newspapers in the various periodical databases. Gale Computer Database Search this database to find computer-related product introductions, news and reviews in areas such as hardware, software, electronics, engineering...

Words: 676 - Pages: 3

Free Essay

No Title

...Global Journal of Computer Science and Technology Interdisciplinary Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172 & Print ISSN: 0975-4350 Ethical Issues in Computer use: A Study from Islamic Perspective By Abdul Kadar Muhammad Masum International Islamic University, Bangladesh Abstract - Computer users are continuously facing ethical challenges as society adopts new and increasingly complex tools and technologies. These ethical challenges can be managed by Islamic code of life. In this paper, we have studied and tried to identify, how computer affects the ethical issues of the society. In this regards, we have traced some highly related issues to the ethics of computer usage, namely – misuse of time, honesty and integrity, privacy, security, intellectual property right, and computer crime. We have also tried to explain these issues in the light of Qur’an and Hadith. At the end of this paper, we have also suggested some measures that can help in promoting proper use of computer facilities by the Muslim masses without compromising the Islamic principles. Keywords : islamic ethics, computer ethics, privacy, security, computer crime. GJCST-G Classification: K.8.m Ethical Issues in Computer use A Study from Islamic Perspective Strictly as per the compliance and regulations of: © 2013. Abdul Kadar Muhammad Masum. This is a research/review...

Words: 5242 - Pages: 21

Free Essay

Importance of Legal Database

...IMPORTANCE OF ONLINE LEGAL DATABASES Submitted by: Rhea Srivastava Division B (BBA LLB) Roll No – 11 Class 2016 of Symbiosis Law School, NOIDA Symbiosis International University, PUNE In February 2012 Under the guidance of: Ms. Harjinder Kaur and Mr. Nilesh Aeer Course in Charge, Use of Legal Database Symbiosis Law School, NOIDA 201301 D E C L A R A T I O N I Rhea Srivastava, student of BBA LLB Semester II of Symbiosis Law School, Noida hereby declare that the Advanced ICT Training research paper titled “IMPORTANCE OF ONLINE LEGAL DATABASES ” is submitted by me in the line of partial fulfillment of course objectives for the BBA LLB degree. I assure that this synopsis is the result of my own efforts and that any other institute for the award of any degree or diploma has not submitted it. C E R T I F I C A T E The project entitled “IMPORTANCE OF ONLINE LEGAL DATABASES” submitted to the Symbiosis Law School, Noida for Use of Legal Databases as part of internal assessment is based on my original work carried out under the guidance of Ms. Harjinder Kaur and Mr. Nilesh Aeer. The research work has not been submitted elsewhere for award of any degree. The material borrowed from other sources and incorporated in the thesis has been duly acknowledged. I understand that I myself could be held responsible and accountable for plagiarism, if any, detected later on. RHEA SRIVASTAVA Date: 23rd March, 2012 A C K...

Words: 3243 - Pages: 13

Premium Essay

What Impact Does Technology Laws Have on Business in America?

...What Impact Does Technology Laws Have On Business In America? Tracy Bennett Herzing University 02/13/2015 What impact does technology laws have on business in America? We live in a world where laws control how America operates and how our society functions (Arndt, n.d.). We also live in a world where technology has taken over and for many it would be inconceivable to imagine living in a world without technology. Technology has changed the way we live and communicate (Winston & Edelbach, 2014, p. 2). Technology has also changed the way companies conduct business. It has opened up new opportunities for companies to gain more business but at the same time has also created new ethical problems and therefore lawmakers have had to design new technology laws that have had a major impact on American businesses. Technology laws can impact American businesses in a variety of ways from software licensing agreements, privacy issues, and the use of electronic signatures. In order to keep up the pace with changing technology businesses continuously change their operating software (Information Technology Law, n.d.). Continuously changing software programs has the benefit of greater profitability for the company but at the same time it can also create some major problems. Business managers and owners can run into legal issues if they do not fully understand the rules and laws of the licensing agreement which could result in a huge lawsuit against...

Words: 1009 - Pages: 5

Premium Essay

Software

...Principle of Software Engineering Table of Contents Abstract 3 Introduction 4 Boehm's First Law 4 Boehm's Second law 5 Conway's law 5 Parnas Law 6 Corbató Law 7 Observation 8 Theory 9 Law 9 Question 3 10 Law 11 References 12 Abstract The purpose of the study is to show the capability to understand the set of laws that are the part of principles of the software engineering. In this paper, it is discussed that there are many laws related to the software engineering but only few of them are to be addressed. Boehm first and second law, Conway’s laws, Parnas laws & Corbato law were discussed with examples. There are two relationship processes that are also discussed, related to the software Engineering. Law method and tools which are depended on each other and they are performing the task with the help of principle and process by following the rules. Same scenario is followed in other relation too, where observation, law and theory are depended on each other. Observation is repeatable to law and law is explained by theory. Theory should be confirmed by the law and it predict by the observation before further proceeding. Introduction Question No 1 Boehm's First Law Errors are more regular in the middle of fundamentals and configuration exercises and are more abundant when they are displaced. In this law, some basic configuration errors do outnumber code blunders. However, cost stays smooth...

Words: 1641 - Pages: 7

Free Essay

Technology and Training

...Technology and Training Jennifer Mitchell BUS 375 Instructor Charles Orgbon January 30, 2012 Technology Taking Over Electronic technology has worked its way into just about every area of American society. The new technologies are changing jobs and the training that is received for these jobs. This paper is going to look at technology and how it has impacted the way employees are trained. The attitudes towards technology and the laws that surround it will be shown. Different tools that are used with technology in training will also be given. The things that technology has allowed to occur for training will also be looked at. Technology is becoming a part of training in many organizations and it is growing with new methods being used as new technologies are formed. Technology Attitudes and Law The technology in the workplace is changing very rapidly and companies that can't keep up will drop out of competition. The American Society for Training and Development (ASTD) reports that less than $1500 per employee was spent for training in 1996. The largest part of that (49 percent) was spent for technical and professional training. Only two percent was spent for New Employee Orientation and three percent on quality, competition and business practices training (Reh, 2012). Computers and associated technology have become central to modern life. In a society where the population is rapidly ageing, the acceptance and utilization...

Words: 2635 - Pages: 11

Free Essay

Uniform Commercial Code: Article 2 Sales Transactions over the Internet

...regulations and laws that were primarily established to harmonize and standardize sales and commercial transactions in the United States. The primary reason for standardizing the state laws regarding the conduct of sale and transactions is that, often in today’s society, those transactions and sales tend to extend beyond the jurisdiction of a given state. For instance, a particular product may be manufactured in California, warehoused in Arizona, sold in Texas and delivered in Michigan. Consequently, the use of the UCC has not only ensured uniformity of the state laws regulating commercial transactions but has also allowed the states to achieve the necessary flexibility required to meet their local transaction demands (Benjamin and Jane,1998). The history of the UCC dates back to the 1940s when top American legal scholars began to draft a uniform law regulating commercial transactions that was intended to be adopted into the code of statutes of all of the states in America. Although the content of the UCC is generally the same in all the states that have adopted it, some states have however undertaken minimal structural adjustments to conform to the local state customs. The implementation of the UCC has enabled people from various states to freely make their commercial contracts without the different terms and conditions that another state may implement. Instead, the contracts may be written…uniformly. In some cases, the UCC may also be used to limit the number of legal formalities...

Words: 2777 - Pages: 12

Premium Essay

Project Proposal for It System

...Limitations of Study/Project………………………….5 CHAPTER 2: LITERATURE REVIEW…………………………………………..6 2.1 Introduction……………………………………………………................6 2.2 Review of Relevant Literature and Opinion…………………………….6 2.3 Existing Systems………………………………………………………...7 2.4 Re-Definition of Problem………………………………………………..8 CHAPTER 3: RESEARCH METHODOLOGY………………………………....8 3.1 Participants………………………………………………………………8 3.1.1 Leading/senior counsel…………………………..……………8 3.1.2 Junior Associate Attorney………………………..……............8 3.1.3 other non-legal staff……………………………..……………8 3.2 Research Design…………………………………………………………8 3.2.1 Descriptive Design……………………….….………………...8 3.3 DATA COLLECTION…………………………………………………9 3.3.1 Interviews………………………………………………………9 3.3.2 Questionnaires…………………………………………….........9 3.3.3 Literature Review………………………………….…………..10 3.4 DATA ANALYSIS……………………………………………………….10 2 3.5 RESOURCES AND TOOLS REQUIRED FOR THE PROJECT…….10 3.5.1 Development Tools……………………………………………...10 3.5.2 Hardware…………………………………………………………10 3.5.3 Software…………………………………………………………10 3.6 COSTS…………………………………………………………………….11 Fig.2…………………………………………………………………………….11 3.7 PROJECT PLAN (PROJECT PLAN AND SCHEDULE)……………..11 Fig.3…………………………………………………………………………….11 4.0 REFERENCES…………………………………………………………….12 CHAPTER 1:...

Words: 2802 - Pages: 12

Premium Essay

Researchpaper

...BANGLADESH RESEARCH PUBLICATIONS JOURNAL ISSN: 1998-2003, Volume: 6, Issue: 1, Page: 12-21, September-October, 2011 PROTECTING INTELLECTUAL PROPERTY RIGHTS IN BANGLADESH: AN OVERVIEW S. M. Atia Naznin1 S. M. Atia Naznin (2011). Protecting Intellectual Property Rights in Bangladesh: an overview. Bangladesh Res. Pub. J. 6(1): 12-21. Retrieve from http://www.bdresearchpublications.com/admin/journal/upload/09251/09251.pdf Abstract In this era of globalization and rapid expansion of world economy, intellectual property and the corresponding rights over intellectual property are crucial to the economic, social and technological development of any country beyond doubt. Globalization also has made the Intellectual property rights a subject matter of international concern. All nations who want to promote and project their development in all aspects must protect the rights over intellectual property by granting legal veil through exclusive enactments. Realizing this fact, all industrialized nations and by now most developing countries of the world have enacted laws for the protection of ‘works of mind’. To comply with the international obligations Bangladesh also has introduced intellectual property rights protection system. This research paper explores to seek how enforcement mechanisms in Bangladesh are intrinsically precious, effective and thenceforth, worth in protecting the rights of IP holders. As an obvious flow of discussion the paper reiterates to look beyond the constraint and...

Words: 5031 - Pages: 21