#intellectual property law maldives
Explore tagged Tumblr posts
trademarkmaldives · 4 years ago
Link
A Chinese AI company has quite recently hit Apple (an American multinational technology company headquartered in California that specializes in designing, developing, and selling computer software, consumer electronics, and online services) with a massive lawsuit alleging Patent Infringement. The company, known both as Xiao-i and Shanghai Zhizhen Intelligent Network Technology is suing Apple for $1.4 billion (10 billion Yuan) over Siri, which is Apple’s voice assistant technology. According to Xiao-i, Apple has infringed upon a patent that it had applied for in 2004 and was granted in 2009.
In its lawsuit filed, the company stated that it has been asking Apple to stop patent infringement on its smart assistant product called Siri, including but not limited to stopping the manufacturing, promising to sell, using, selling, and importing products.
On the other hand, Apple said that it is looking forward to protecting its software in court.
An Apple spokesperson said that the case between the companies has been going on for eight years now. He said that Siri has no features included in the Chinese company’s patent, which corresponds to instant messaging and games. He further mentioned that Independent appraisers, certified by the Supreme People’s Court, have also concluded that Apple has not infringed upon Xiao-i’s patented technology. Apple is extremely disappointed with Xiao-i filing another lawsuit.
The lawsuit filed isn’t the first fight between the two companies over this particular patent. It was in 2012 when Xiao-i had first filed its complaint; however, Apple had then filed a request to have the patent invalidated. The discussion concerning whether the patent is valid or not has continued for eight years, but the Supreme People’s Court of China ruled in favor of Xiao-i last month by reversing a previous decision held by the Beijing High Court.
Xiao-i is now making the most out of this latest decision to get its original patent infringement claim renewed. The company, specializing in Natural Language Processing (NLP), said that it filed the formal lawsuit with Shanghai High People’s Court.
The tech giant Apple has not yet responded to the request for comment.
For view source: https://www.trademarkmaldives.com/blog/chinese-company-hits-apple-with-1-4-billion-lawsuit-in-patent-fight/
 Don’t forget to follow us on social media:
Facebook – https://www.facebook.com/trademarkmaldives/
Twitter – https://twitter.com/trademarkmaldiv
Linkedin – https://www.linkedin.com/company/trademarkmaldives/
Pinterest – https://in.pinterest.com/trademarkmaldives/
Tumblr – https://trademarkmaldives.tumblr.com/
Contact - US
Website: www.trademarkmaldives.com
0 notes
kashishipr · 4 years ago
Text
Tumblr media
Is it Possible to Register Trademarks in Maldives?
👉 ✅ For view source: https://bit.ly/2QYDcVw
0 notes
hg47 · 4 years ago
Text
47 Reasons Why I Fear Islam - (Reason 40)
-40-I am suspicious of a religion which demands total and absolute slavery from its members. ++++------- ALI DASHTI: “The God of the Koran is cruel, angry, and proud—qualities not to be admired.” Dashti died in 1984 after spending three years in Khomeini’s prisons, where he was tortured despite his age of eighty-three. ++++------- A quote from J. ROSENBLUM: The Western media consistently downplays the scope of Islamic threat, perhaps in an effort to calm its fears. The overwhelming majority of Muslims worldwide are peace-loving fellows, we are assured, and only a handful of bad apples spoil the image of the rest. Ignored are the worldwide network of Saudi-sponsored Wahhabi mosques and the vast number of Muslim Brotherhood-inspired offshoots…not just al-Qaida and Hamas, but groups in Western countries promoting Shari’a as the only legitimate system of law. ++++------- tweet ~ 2011 Pew study finds Muslims are more “phobic” of non-Muslims than non-Muslims are “Islamophobic” of Muslims. ~ verify at: http://wikiislam.net/wiki/Muslim_Statistics ++++------- http://www.foxnews.com/opinion/2013/05/17/bipartisan-folly-our-islam-delusion/ Michael Youssef on the 90% of Islamic nations that signed the UN’s Universal Declaration of Human Rights, and the right to freedom of religion, nations which all define “freedom of religion” as being a slave to Allah without the commotions of any other religions. @hg47 says – About a year ago, an Egyptian Christian protester and an Egyptian Muslim protester were both caught in a photograph, both holding different signs in English declaring that they wanted FREEDOM!  It seemed they were joined together in temporarily wanting the same thing.  A gem of a multicultural moment. “Buzzzzzzzzzzzzt!”  Incorrect. Both these protesters, however, wanted totally different things.  The Christian wanted freedom from Islamic interference in his Christian behavior.  The Muslim wanted to be free of distractions (the elimination of Christians) from his perfect slavery to Islam. http://wikiislam.net/wiki/Freedom ++++------- http://www.cnn.com/2013/03/17/world/meast/iraq-damon/index.html?iid=article_sidebar The train wreck of post-war Iraq, with everyone blaming everyone else for what went wrong. ++++------- http://frontpagemag.com/2011/dgreenfield/five-reasons-to-ban-the-burqa/ From the article by Daniel Greenfield, FIVE REASONS TO BAN THE BURQA: 5. The Wearing of the Burqa is Enforced Through Violence @hg47 says – Of some interest, some of the people I work with are refugees from Iraq, mostly Christian, but occasionally a Muslim or two.  I don’t ask, but I am interested in what is happening in the Middle East, and occasionally the question of religion will come up in conversation.  Iraqi refugees are expert former eye-witnesses. One Christian mentioned that Muslim families that he knew in Iraq who were now here comported themselves completely differently.  In Iraq, the women in these families did not go veiled.  This surprised me.  But here in the States, all the women, even the little girls in those families, are now all bundled up in public.  I’m not sure what that is all about. I am also informed that the more moderate Muslim families in the U.S. sometimes celebrate Christmas, exchanging gifts during the season, and buying a Christmas tree, and decorating it, putting up outside colored lights around their apartments.  The whole nine yards.  I’m also not sure what that is all about. ++++------- A quote from AMIL IMANI: Freedom in all its forms, highly prized by free people, is taboo in Islam. The duty of the true believer is to completely surrender [her or] his humanness and will to the will of Allah as required in the Quran and dictated by the clergy. ++++------- http://www.investors.com/NewsAndAnalysis/Article/568999/201104131804/How-Free-Israel-Prospers-As-Islam-Remains-In-Dark.htm Chuck Devore has some interesting stats comparing Israel’s growth (under a free system) versus Arab stagnation (chained down by Islam).  For example: Israel’s per capita output of intellectual property is 132 times greater than Saudi Arabia’s. ++++------- http://www.npr.org/2011/01/17/132711102/pakistans-lesbians-live-in-silence-love-in-secret Story about how life in Pakistan is like living in prison; how Pakistan’s Lesbians Live In Silence, Love In Secret. ++++------- http://www.huffingtonpost.com/terry-kelhawk/wikileaks-expose-cracks-i_b_789615.html Terry Kelhawk asks some interesting questions in this article: 1) When one nation wants chaos and war, how can another make peace with it? 2) How do neighboring and declared enemy nations respond to one which does not want peace and openly states its apocalyptic goals? ++++------- tweet ~ Muslims in Denmark make up 5% of the population but receive 40% of social-welfare outlays. ~ verify at: http://wikiislam.net/wiki/Muslim_Statistics ++++------- A Jane Kramer quote from TAKING THE VEIL: “More often the girls were under orders [to wear a veil] from their fathers and uncles and brothers, and even their male classmates. For the boys, transforming a bluejeaned teen-age sister into a docile and observant ‘Muslim’ virgin was a rite de passage into authority, the fast track to becoming a man, and more important, a Muslim man…it was also a license for violence.” ++++------- A quote from Citizen Warrior: Islam must be your first allegiance. This is a great idea to add to the collection if the goal is world domination. You are a Muslim first, before any allegiance you give to your family, your tribe, or your country.  [Or your sex.] ++++------- http://www.huffingtonpost.com/2010/10/15/islam-and-democracy-can-a_n_763486.html (I probably won’t be vacationing there.) Vishal Arora writing on the Maldives, a pretty chain of about a thousand Islamic islands. ++++------- http://www.amazon.com/Slavery-Terrorism-Islam-Peter-Hammond/dp/1612154980/ref=sr_1_1?s=books&ie=UTF8&qid=1378266788&sr=1-1&keywords=SLAVERY%2C+TERRORISM+AND+ISLAM+by+Peter+Hammond In SLAVERY, TERRORISM AND ISLAM: The Historical Roots and Contemporary Threat, Peter Hammond breaks down Muslim behavior according to their percentages within different nations.  Statistics slightly dated, but the trends are still valid.  Interesting reading.  And a bit scary for the survival of representative democracy and the Western way of life. +++++++++++++++++++++++++++++++++++++++++++++++ +Go-To-41+ +Go-To-Beginning-Of-47-REASONS-WHY-I-FEAR-ISLAM+
0 notes
margdarsanme · 4 years ago
Text
NCERT Class 12 History Chapter 5 Through the Eyes of Travellers Perceptions of Society
NCERT Class 12 History Solutions
Chapter 5 Through the Eyes of Travellers Perceptions of Society
NCERT TEXTBOOK QUESTIONS SOLVED : Q l. Write a note on the Kitab-ul-Hind.
Ans. Kitab-ul-Hind was written by Al-Biruni in 1031. It was considered with India and also known by the name of Tarikh-ul-Hind and Tahqiq-ma-ul-Hind. It was written in Arabic. It is divided into 80 Chapters. They have thrown a detailed light on Hindu religions and philosphy, festivals, customs and tradition, the social and economic as well as political life of the people. In each chapter he adopted a distinctive style and had a question in the beginning. It was followed by a description based on Sanskrit tradition, At last he compare the India culture with other culture. This geometric structure he followed is known for its precision and predictability. The main reason for this structure was Al-Biruni’s mathematical orientation. Q 2. Compare and contrast the perspectives from which Ibn Battuta and Bernier wrote their accounts of their travels in India.
Ans. Both have written them accounts in their different prospectives. While Ibn Battuta describe everything that impressed and excited him because of his novelty, Bernier had followed a different intellectual tradition. He wrote whatever he saw in India. Bernier wanted to pin point the weakness of the Indian society and considered the Mughal India Inferior to European society. In his description Ibn Battuta recorded his observation about new culture, people, believes and values. Q 3. Discuss the picture of urban centres that emerges from Bernier’s accout.
Ans. During the 17th century nearly 15% of population was living in town. This was average proportion of urban population of western Europe. Bernier described Mughal towns as court towns. By it he meant those towns which depended upon the imperial court for their existence and survival. These towns came into existence with the imperial court and declined with the impanel court when they moved to other places. In his travel accounts, Bernier described many big towns and cities such as Delhi, Mathura, Kashmir, Surat, Masulipatnam and Golconda. These gained importance as manufacturing centres, trading towns, and sacred towns. The merchant communities had deep influence in these cities. They remained organised due to their own caste and occupational bodies. These trading groups were known as Mahajans in western India. Their head was called Sheth. In Ahmedabad, the chief of Merchant community was known as nagarsheth. Besides the trading groups, musicians, architects, painters, lawyers, calligraphies, etc. lived in towns. Q 4. Analyse the evidence for slavery provided by Ibn Battuta.
Ans. Battuta has given a detailed description on the practice of slavery prevalent in India. Delhi Sultan-Muhammad bin Tughlaq had a large number of slaves. Most of these slaves were forcibly captured during the aggressions. Many people sold their children as a slave, because of acute poverty. Slaves were also offered as a gift during this time. Battuta when visited him, also brought many horses, camels and slaves for the Sultan to present him. Sultan Muhammad bin Tuglaq, himself had presented two hundred slaves to Nasiruddin a religious preacher.
Nobels are used to keep slave those days. Through these slaves, the Sultan used to get information about the activities of the noble and all other important events of the empire. The woman slaves served as servants in the house of the rich (nobles). These women informed the Sultan about the activities of their masters (i.e., nobles). Most of the slaves used to do domestic works and there was a lot of difference between the status of these slaves and the court slaves. Q 5. What were the elements of the practice of sati that drew the attention of Bernier?
Ans. The practice of sati according to Bernier showed the difference in the treatment of women in western and eastern society. He noticed how a child widow were forcefully burnt screaming on the funeral pyre while many of the older women were resigned their fate. The following elements drew his attention. (i) Under this cruel practices an alive widow was forcibly made to sit on the pyre of her husband. (ii) People had no sympathy for her. (iii) The widow was an unwilling victim of the sati-practice. She was forced to be a Sati. Q 6. Discuss Al-Biruni’s understanding of the caste system.
Ans. Al-Biruni’s description about caste system as he understood. Al-Biruni tried to explain the caste system by looking far parallels in other societies. He described that in ancient Persia, four social categories were recognised. (i) knight and princes. (ii) monks (iii) fire-priests and lawyers; physicians, astronomers, other scientists; (iv) Finally, peasants and artisans. He attempted to suggest that social divisions were not unique to India.
His description of the caste system in India was deeply influenced by his study of Sanskrit texts. According to these texts, the highest castes were the Brahmins as they were created from the head of the Brahmins.
The Kshatriyas were the next caste created from the shoulders and hands of the Brahmin. The Vaishyas and Shudras were created from the thighs and feet of the Brahmin respectively. Thus, he sought to understand the Indian caste system by looking for parallels in other societies. Nothing that ancient Persian society was divided into four categories he realized that social division was not unique to India.
But despite accepting the caste system he was against the notion of pollution. He believed that according to the laws of nature anything which becomes impure ultimately becomes pure again, e.g. the sun clears the air. The concept of social pollution is the bedrock of the caste system. Thus, the caste system was according to him contrary to the laws of nature. He failed to realize that the caste system was not as rigid as portrayed in the Sanskrit texts. Q 7. Do you think Ibn Battuta’s account is useful in arriving at an understanding of life in contemporary urban centres? Give reasons for your answer.
Ans. Battuta’s observation about the cities of India.
(i) According to him, Indian cities had many exciting opportunities and are useful for those who had the necessary drive, skill and resources.
(ii) The Indian cities were prosperous and densely populated.
(iii) These cities had colourful market trading in different kinds of goods.
(iv) Delhi was the largest city of India and had a lot of population. Daultabad was an another important city of India which challenged Delhi in size.
(v) The cities were not only the centre of economic transactions but also the centres of ! social and cultural activities.
(vii) Most of the bazars in the cities had temple and mosques.
(viii) Cities also had fixed places for public performances by dancer, musicians and singer. He found that many towns derived their wealth and prosperity through the appropriation of surplus from villages.
(ix) Indian goods were in great demand in west Asia and South-east Asia. So the artisans and merchants earned huge profit. Q 8. Discuss the extent to which Bernier’s accounts enables historians to reconstruct contemporary rural society.
Ans. Bernier’s assessment about Indian rural society was not correct. It was far away from the truth, but it is not acceptable. There are some truth in his description which are evident from the following facts.
(i) According to his account, mughal empire was the owner of the land and distributed among its nobles. It had a disastrous impact on the society.
(ii) According to him the system of crown of ownership of land was good. It was because, the land holders could not pass on their land to their children. They did not make any long term investment on the land.
(iii) As there was no private property in land, there was not any improvement in the landlord class. This system ruin agriculture and led to opinion of peasants. Bernier’s view regarding Indian society had the following features: (a) The rich people Were in minority. (b) It had the poorest of the poor and the richest of the rich, no middle class existed there. (c) All the cities and towns were reined and had contaminated air. Q 9. Read this excerpt from Bernier:
Tumblr media
List the crafts mentioned in the passage. Compare these with the descriptions of artisanal activity in the chapter.
Ans. :
I. Names of the crafts mentioned in this passage. In this passage the crafts such as making of muskets and following pieces and making beautiful gold ornaments are mentioned. These products were beautifully made. Bernier was amazed to see these products.
II. Comparison of crafts referred in the passage with the description of artisanal activity in the chapter. (i) In the chapter boat manufacturing and terracottan sculpture and temple architecture has been mentioned. (ii) Art of painting has been referred. (iii) Art of carpet manufacturing has been referred. (iv) Art of dance, music and calligraphy have been referred in the chapter. (v) Description about Rajal Khamos have also been mentioned. Q 10. On an outline map of the world, mark the countries visited by Ibn Battuta. What are the seas that he might have crossed?
Ans. :
Countries visited by Ibn Battuta: (i) Morocco (ii) Mecca (iii) Syria (iv) Iraq (v) Persia (vi) Yamen (vii) Oman (viii) China (ix) India (x) Maldives (xi) Sri Lanka (xii) Sumatra (Indonesia)
Name of Seas: (i) North Atlantic Ocean (ii) South Atlantic Ocean (iii) Indian Ocean (iv) Red Sea (v) Arabian Sea (vi) Bay of Bengal (vii) South China Sea (viii) East China Sea.
from Blogger http://www.margdarsan.com/2020/08/ncert-class-12-history-chapter-5.html
0 notes
pop-culture-dump · 8 years ago
Text
The Simpsons: The Lost Season
Tumblr media
Tree House of Horror XXIX For their 29th Halloween special the Simpsons family takes on the Horror and Science Fiction classics such as The Big Bang Theory, Hell’s Kitchen, and Fifty Shades of Grey. Snow Money Snow Problems Bart and Grandpa Accidentally sign up both themselves and Santa’s Little Helper in the Iditarod. While the three of them are braving the Alaskan wilderness as well as colorful cast of competing dog sled racers, back in Springfield Homer is brought onto a Hypnotist’s stage show and has a recovered memory of being sexually abused by his mother. A Moe Fashion Love Song Moe’s Tavern gains critical success with the new addition of a Karaoke machine. However this fame is cut short when special guest star; Singer songwriter and standing of president of ASCAP (American Society of Composers, Authors and Publishers) Paul Williams threatens to shut them down for unpaid song royalties. Sparking a town hall debate over fair use and intellectual property laws. Meanwhile after taking on a class assignment involving family history and genealogy Millhouse discovers his parents may be cousins. The Sinking Love of Lisa Simpson Lisa becomes infatuated with a passionate young Journalist who is a filming a VICE style expose on  the Nuclear power plant and decides to run away from home and secretly follows him on his trip cover the sinking of the Maldives islands and the UN complacency in offering aid. Lisa The Puppet Master After writing a series of successful speeches for Mayor Quimby’s reelection campaign Lisa is promoted to campaign advisor. However she slowly begins to sell out to constituents and other lobbyists and becomes corrupt with power with Quimby acting as her political puppet. Krust-acolypse NOW Krusty is shot down over Afghanistan while performing in a series of USO shows and videotapes of him being tortured by ISIS insurgents begin to leak onto the internet. Bart and his fellow classmates plead with the US government for the hasty rescue of their beloved idol but their pleas fall onto deaf ears prompting Bart to go on a national campaign to raise awareness of Krusty’s plight and legacy. However Bart soon discovers that Krusty’s kidnapping was a hoax in order to garnish publicity and merchandise sales. Bart by Gaslight While sitting through one of Lisa’s feminist group studies Bart learns about the concept of “Gas lighting”. Intrigued by the idea that you can subtly manipulate someone into thinking their losing their grip on reality he attempts to put the process into effect on Homer. However Homer is well aware of Bart’s tactics and confesses that he’s been doing it to his own father for decades. The two of them band together to see how many people in town they can bend to their will. Marge vs the Internet The family discovers that Bart has been secretly documenting them for years and uploading their daily escapades onto Youtube. At first Marge is excited about the notion of being a modest internet celebrity however she is shocked and appalled at the overwhelming amount of lewd fan art and literature based on her and her family that are floating around the web. After a very vocal cease and desist campaign blows up in her face and creates more of an internet backlash she takes her case to congress and demands that the internet either be heavily regulated or shut down entirely. Rita Hayworth and the Bart-shank redemption In the face of severe punishment Bart agrees to participate in a scared straight reality TV program where juvenile delinquents are to spend a week in a maximum security prison. Confident he can coast by without any problems  Bart is shocked to discover he’s to share a cell with Sideshow Bob, who takes every opportunity to violently berate and humiliate both him and his fellow students. However Bart slowly develops Stockholm Syndrome for Bob and aids him in an elaborate prison escape plan. The cutting edge of Homer In a vain attempt to keep up appearances at work Homer falls in league with Springfield’s technophile crowd and becomes obsessed with getting the latest and greatest Apple I phone, and goes to such lengths as cashing out his savings and camping out in front of the Apple store to get one. However upon purchase Homer is outraged that he got the wrong color and insights a riot. meanwhile Marge and Ned Flanders accidentally go to the wrong church retreat and find themselves being recruited into the Westbouro Baptist church. Springfield History X Bart is blamed for an accident that Homer caused in Herman’s antique and Army surplus store and is forced to work off the debt. While cleaning up, Bart discovers a hidden room containing Herman’s collection of Nazi war relics and is confronted by Herman who paints the fascists in a sympathetic light. Herman continues to manipulate Bart to become the poster child for his neo nazi/ alt right hate group. Things quickly escalate when Bart and his followers plan to sabotage a peaceful college protest and turn it into a full on a race war and it’s up to Homer, Lisa and Grandpa to rescue Bart and show him the error of his bigoted ways. Gumble and Son A clean and Sober Barney Gumble becomes a rehab councilor and takes in a young addict who he has reason to believe may be his estranged son. However before Barney can find out the truth the young man relapses and dies of an overdose. Homer and Barney use what little information they have to go with and embark a humbling cross country road trip in search of closure.   Marge Simpson’s Monday Morning Podcast Marge becomes absorbed in producing a podcast that no one listens to. Homer finally listens to it and is deeply saddened by the realization of how lonely and clinically depressed his wife really is.
11 notes · View notes
at8acounting · 5 years ago
Text
PATENT REGISTRATION DELHI
PATENT REGISTRATION Delhi
A patent is an exclusive right granted by the government to the inventor for an invention which is a new and inventive solution to an existing technological problem. The patent rights are granted for a limited period of time in exchange for complete public disclosure of the invention. Filing a patent in India is important as it restricts the contenders from copying, selling or importing the inventors’ creation without their permission, and it is valid for a period of 20 years from the date of application of the patent.
A patent, like any other intellectual property, can be transferred or sold by the inventor.
TYPES OF PATENT AND THEIR FORMS
Form 1- Application for grant of patent
Form2- Provisional/complete specification
Form 3- Statement and undertaking under section 8 (this is only required where a patent application is already filed in the country other than India)
Form 5-Declaration as to inventor ship
Form 28- Forms submitted only by start-ups and small entities.
PUBLICATION OF PATENT APPLICATION
Patent application filed with the Indian patent office will be published in the official patent journal. This is generally done after 18 months of filing the application. In case one wants to get it published earlier, he can make a request in form 9 for early publication. When a restriction is placed by the Indian patent act with regards to the publishing of the patent, the same will not be published in the journal. Patent Registration is a process under which an application is filed with the prescribed authority in order to register an invention in line with The Patent Act, 1970. With Patent Registration, an inventor will have the monopoly over his/her invention. Patent Registration application should be filed to avoid any dispute in future in relation to infringement
company registration and filing
PATENT REGISTRATION Delhi
company registration cost in delhi
company registration with virtual office
company registration and trademark
company registration office in chennai
company registration on emi
company registration jobs
company registration johannesburg
company registration charges in delhi
company registration enquiry
company registration and incorporation
company registration belgium
company registration websites in india
company registration process online
company registration time
company registration help
company registration bc
company registration and gst
company registration worldwide
company registration with gst
company registration expenses
company registration under msme
company registration under startup india
for company registration
company registration msme
company registration maldives
how much does company registration cost
company registration portal
company registration renewal
company registration expenses accounting
company registration new york
company registration guide
company registration zambia
company registration extract
which documents required for company registration
company registration kenya
company registration tracking
company registration ernakulam kochi kerala
company registration rules
company registration bhubaneswar odisha
company registration zimbabwe
company registration law
company registration roc
what are company registration documents
what is company registration number usa
what is company registration number uk
company registration eswatini
company registration address proof
company registration benefits
company registration with cipc
company registration under gst
0 notes
digitalshopers · 5 years ago
Quote
.CustomHtmlSignupForm label {display: block;} .CustomHtmlSignupForm label.error { color: #a94442; background-color: #f2dede; border-color: #ebccd1; padding:1px 20px 1px 20px; font-style:italic; } Personal Information Username (Email) First Name Last Name Referral ID (Create your own) Additional Information Web Url Company name Street City State CountryAfghanistanAland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAnonymous ProxyAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAsia/PacificRegionAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo, The Democratic Republic of theCook IslandsCosta RicaCote D'IvoireCroatiaCubaCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaEuropeFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrance, MetropolitanFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and McDonald IslandsHoly See (Vatican City State)HondurasHong KongHungaryIcelandIndiaIndonesiaIran, Islamic Republic ofIraqIrelandIsle of ManIsraelItalyJamaicaJapanJerseyJordanKazakstanKenyaKiribatiKorea, Democratic People's Republic ofKorea, Republic ofKuwaitKyrgyzstanLao People's Democratic RepublicLatviaLebanonLesothoLiberiaLibyan Arab JamahiriyaLiechtensteinLithuaniaLuxembourgMacauMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesia, Federated States ofMoldova, Republic ofMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlands AntillesNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorthern Mariana IslandsNorwayOmanOtherPakistanPalauPalestinian TerritoryPanamaPapua New GuineaParaguayPeruPhilippinesPitcairn IslandsPolandPortugalPuerto RicoQatarReunionRomaniaRussian FederationRwandaSaint HelenaSaint Kitts and NevisSaint LuciaSaint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSatellite ProviderSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSpainSriLankaSudanSurinameSvalbardand Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzania, United Republic ofThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited States Minor Outlying IslandsUnited StatesUruguayUzbekistanVanuatuVenezuelaVietnamVirgin Islands, BritishVirgin Islands, U.S.Wallis and FutunaWestern SaharaYemenZambiaZimbabwe Zipcode Phone Fax Terms & conditionsPLEASE READ THE ENTIRE AGREEMENT. YOU MAY PRINT THIS PAGE FOR YOUR RECORDS. THIS IS A LEGAL AGREEMENT BETWEEN YOU AND NINJAOUTREACH (TheSEOGenie LTD) BY SUBMITTING THE ONLINE APPLICATION YOU ARE AGREEING THAT YOU HAVE READ AND UNDERSTAND THE TERMS AND CONDITIONS OF THIS AGREEMENT AND THAT YOU AGREE TO BE LEGALLY RESPONSIBLE FOR EACH AND EVERY TERM AND CONDITION. 1. Overview This Agreement contains the complete terms and conditions that apply to you becoming an affiliate in NinjaOutreach.com's Affiliate Program. The purpose of this Agreement is to allow HTML linking between your web site and the NinjaOutreach.com web site. Please note that throughout this Agreement, "we," "us," and "our" refer to NinjaOutreach.com, and "you," "your," and "yours" refer to the affiliate. 2. Affiliate Obligations 2.1. To begin the enrollment process, you will complete the registration at affiliates.ninjaoutreach.com. The fact that we auto-approve applications does not imply that we may not re-evaluate your application at a later time. We may reject your application at our sole discretion. We may cancel your application if we determine that your site is unsuitable for our Program, including if it: 2.1.1. Promotes sexually explicit materials 2.1.2. Promotes violence 2.1.3. Promotes discrimination based on race, sex, religion, nationality, disability, sexual orientation, or age 2.1.4. Promotes illegal activities 2.1.5. Incorporates any materials which infringe or assist others to infringe on any copyright, trademark or other intellectual property rights or to violate the law 2.1.6. Includes "NinjaOutreach" or variations or misspellings thereof in its domain name 2.1.7. Is otherwise in any way unlawful, harmful, threatening, defamatory, obscene, harassing, or racially, ethnically or otherwise objectionable to us in our sole discretion. 2.1.8. Contains software downloads that potentially enable diversions of commission from other affiliates in our program. 2.1.9. You may not create or design your website or any other website that you operate, explicitly or implied in a manner which resembles our website nor design your website in a manner which leads customers to believe you are NinjaOutreach.com or any other affiliated business. 2.2. As a member of NinjaOutreach.com's Affiliate Program, you will have access to Affiliate Account Manager. Here you will be able to review our Program’s details and previously-published affiliate newsletters, download HTML code (that provides for links to web pages within the NinjaOutreach.com web site) and banner creatives, browse and get tracking codes for our coupons and deals. In order for us to accurately keep track of all guest visits from your site to ours, you must use the HTML code that we provide for each banner, text link, or other affiliate link we provide you with. 2.3. NinjaOutreach.com reserves the right, at any time, to review your placement and approve the use of Your Links and require that you change the placement or use to comply with the guidelines provided to you. 2.4. The maintenance and the updating of your site will be your responsibility. We may monitor your site as we feel necessary to make sure that it is up-to-date and to notify you of any changes that we feel should enhance your performance. 2.5. It is entirely your responsibility to follow all applicable intellectual property and other laws that pertain to your site. You must have express permission to use any person's copyrighted material, whether it be a writing, an image, or any other copyrightable work. We will not be responsible (and you will be solely responsible) if you use another person's copyrighted material or other intellectual property in violation of the law or any third party rights. 3. NinjaOutreach.com Rights and Obligations 3.1. We have the right to monitor your site at any time to determine if you are following the terms and conditions of this Agreement. We may notify you of any changes to your site that we feel should be made, or to make sure that your links to our web site are appropriate and to notify further you of any changes that we feel should be made. If you do not make the changes to your site that we feel are necessary, we reserve the right to terminate your participation in the NinjaOutreach.com Affiliate Program. 3.2. NinjaOutreach.com reserves the right to terminate this Agreement and your participation in the NinjaOutreach.com Affiliate Program immediately and without notice to you should you commit fraud in your use of the NinjaOutreach.com Affiliate Program or should you abuse this program in any way. If such fraud or abuse is detected, NinjaOutreach.com shall not be liable to you for any commissions for such fraudulent sales. 3.3. This Agreement will begin upon our acceptance of your Affiliate application, and will continue unless terminated hereunder. 4. Termination Either you or we may end this Agreement AT ANY TIME, with or without cause, by giving the other party written notice. Written notice can be in the form of mail, email or fax. In addition, this Agreement will terminate immediately upon any breach of this Agreement by you. 5. Modification We may modify any of the terms and conditions in this Agreement at any time at our sole discretion. In such event, you will be notified by email. Modifications may include, but are not limited to, changes in the payment procedures and NinjaOutreach.com's Affiliate Program rules. If any modification is unacceptable to you, your only option is to end this Agreement. Your continued participation in NinjaOutreach.com's Affiliate Program following the posting of the change notice or new Agreement on our site will indicate your agreement to the changes. 6. Payment NinjaOutreach.com uses a third party to handle all of the tracking and payment. NinjaOutreach payouts every 30 days on all sales that have matured over 60 days. For example, if payments are made on the first of every month, and an affiliate sale is made on January 15th 2015, then the payout for that will be April 1st 2015. We have a minimum affiliate payout threshold of $100 this means you will have to generate a minimum of $100 commission to be paid out. In the event that a customer asks for a refund the affiliate will not receive the commission for the month connected with the refund. 7. Access to Affiliate Account Interface You will create a password so that you may enter our affiliate account interface. From their you will be able to receive your reports that will describe our calculation of the commissions due to you. 8. Promotion Restrictions 8.1. You are free to promote your own web sites, but naturally any promotion that mentions NinjaOutreach.com could be perceived by the public or the press as a joint effort. You should know that certain forms of advertising are always prohibited by NinjaOutreach.com. For example, advertising commonly referred to as "spamming" is unacceptable to us and could cause damage to our name. Other generally prohibited forms of advertising include the use of unsolicited commercial email (UCE), postings to non-commercial newsgroups and cross-posting to multiple newsgroups at once. In addition, you may not advertise in any way that effectively conceals or misrepresents your identity, your domain name, or your return email address. You may use mailings to customers to promote NinjaOutreach.com so long as the recipient is already a customer or subscriber of your services or web site, and recipients have the option to remove themselves from future mailings. Also, you may post to newsgroups to promote NinjaOutreach.com so long as the news group specifically welcomes commercial messages. At all times, you must clearly represent yourself and your web sites as independent from NinjaOutreach.com. If it comes to our attention that you are spamming, we will consider that cause for immediate termination of this Agreement and your participation in the NinjaOutreach.com Affiliate Program. Any pending balances owed to you will not be paid if your account is terminated due to such unacceptable advertising or solicitation. 8.2. Affiliates that among other keywords or exclusively bid in their Pay-Per-Click campaigns on keywords such as NinjaOutreach.com, NinjaOutreach, www.NinjaOutreach, www.NinjaOutreach.com, and/or any misspellings or similar alterations of these – be it separately or in combination with other keywords – and do not direct the traffic from such campaigns to their own website prior to re-directing it to ours, will be considered trademark violators, and will be banned from NinjaOutreach's Affiliate Program. We will do everything possible to contact the affiliate prior to the ban. However, we reserve the right to expel any trademark violator from our affiliate program without prior notice, and on the first occurrence of such PPC bidding behavior. 8.3. Affiliates are not prohibited from keying in prospect’s information into the lead form as long as the prospects’ information is real and true, and these are valid leads (i.e. sincerely interested in NinjaOutreach's service). 8.4. Affiliate shall not transmit any so-called “interstitials,” “Parasiteware™,” “Parasitic Marketing,” “Shopping Assistance Application,” “Toolbar Installations and/or Add-ons,” “Shopping Wallets” or “deceptive pop-ups and/or pop-unders” to consumers from the time the consumer clicks on a qualifying link until such time as the consumer has fully exited NinjaOutreach's site (i.e., no page from our site or any NinjaOutreach.com’s content or branding is visible on the end-user’s screen). As used herein a. “Parasiteware™” and “Parasitic Marketing” shall mean an application that (a) through accidental or direct intent causes the overwriting of affiliate and non affiliate commission tracking cookies through any other means than a customer initiated click on a qualifying link on a web page or email; (b) intercepts searches to redirect traffic through an installed software, thereby causing, pop ups, commission tracking cookies to be put in place or other commission tracking cookies to be overwritten where a user would under normal circumstances have arrived at the same destination through the results given by the search (search engines being, but not limited to, Google, MSN, Yahoo, Overture, AltaVista, Hotbot and similar search or directory engines); (c) set commission tracking cookies through loading of NinjaOutreach site in IFrames, hidden links and automatic pop ups that open NinjaOutreach.com’s site; (d) targets text on web sites, other than those web sites 100% owned by the application owner, for the purpose of contextual marketing; (e) removes, replaces or blocks the visibility of Affiliate banners with any other banners, other than those that are on web sites 100% owned by the owner of the application. 9. Grant of Licenses 9.1. We grant to you a non-exclusive, non-transferable, revocable right to (i) access our site through HTML links solely in accordance with the terms of this Agreement and (ii) solely in connection with such links, to use our logos, trade names, trademarks, and similar identifying material (collectively, the "Licensed Materials") that we provide to you or authorize for such purpose. You are only entitled to use the Licensed Materials to the extent that you are a member in good standing of NinjaOutreach.com's Affiliate Program. You agree that all uses of the Licensed Materials will be on behalf of NinjaOutreach.com and the good will associated therewith will inure to the sole benefit of NinjaOutreach.com. 9.2. Each party agrees not to use the other's proprietary materials in any manner that is disparaging, misleading, obscene or that otherwise portrays the party in a negative light. Each party reserves all of its respective rights in the proprietary materials covered by this license. Other than the license granted in this Agreement, each party retains all right, title, and interest to its respective rights and no right, title, or interest is transferred to the other. 10. Disclaimer NINJAOUTREACH.COM MAKES NO EXPRESS OR IMPLIED REPRESENTATIONS OR WARRANTIES REGARDING NINJAOUTREACH.COM SERVICE AND WEB SITE OR THE PRODUCTS OR SERVICES PROVIDED THEREIN, ANY IMPLIED WARRANTIES OF NINJAOUTREACH.COM ABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT ARE EXPRESSLY DISCLAIMED AND EXCLUDED. IN ADDITION, WE MAKE NO REPRESENTATION THAT THE OPERATION OF OUR SITE WILL BE UNINTERRUPTED OR ERROR FREE, AND WE WILL NOT BE LIABLE FOR THE CONSEQUENCES OF ANY INTERRUPTIONS OR ERRORS. 11. Representations and Warranties You represent and warrant that: 11.1. This Agreement has been duly and validly executed and delivered by you and constitutes your legal, valid, and binding obligation, enforceable against you in accordance with its terms; 11.2. You have the full right, power, and authority to enter into and be bound by the terms and conditions of this Agreement and to perform your obligations under this Agreement, without the approval or consent of any other party; 11.3. You have sufficient right, title, and interest in and to the rights granted to us in this Agreement. 12. Limitations of Liability WE WILL NOT BE LIABLE TO YOU WITH RESPECT TO ANY SUBJECT MATTER OF THIS AGREEMENT UNDER ANY CONTRACT, NEGLIGENCE, TORT, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL OR EXEMPLARY DAMAGES (INCLUDING, WITHOUT LIMITATION, LOSS OF REVENUE OR GOODWILL OR ANTICIPATED PROFITS OR LOST BUSINESS), EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. FURTHER, NOTWITHSTANDING ANYTHING TO THE CONTRARY CONTAINED IN THIS AGREEMENT, IN NO EVENT SHALL NINJAOUTREACH.COM'S CUMULATIVE LIABILITY TO YOU ARISING OUT OF OR RELATED TO THIS AGREEMENT, WHETHER BASED IN CONTRACT, NEGLIGENCE, STRICT LIABILITY, TORT OR OTHER LEGAL OR EQUITABLE THEORY, EXCEED THE TOTAL COMMISSION FEES PAID TO YOU UNDER THIS AGREEMENT. 13. Indemnification You hereby agree to indemnify and hold harmless NinjaOutreach.com, and its subsidiaries and affiliates, and their directors, officers, employees, agents, shareholders, partners, members, and other owners, against any and all claims, actions, demands, liabilities, losses, damages, judgments, settlements, costs, and expenses (including reasonable attorneys' fees) (any or all of the foregoing hereinafter referred to as "Losses") insofar as such Losses (or actions in respect thereof) arise out of or are based on (i) any claim that our use of the affiliate trademarks infringes on any trademark, trade name, service mark, copyright, license, intellectual property, or other proprietary right of any third party, (ii) any misrepresentation of a representation or warranty or breach of a covenant and agreement made by you herein, or (iii) any claim related to your site, including, without limitation, content therein not attributable to us. 14. Confidentiality All confidential information, including, but not limited to, any business, technical, financial, and customer information, disclosed by one party to the other during negotiation or the effective term of this Agreement which is marked "Confidential," will remain the sole property of the disclosing party, and each party will keep in confidence and not use or disclose such proprietary information of the other party without express written permission of the disclosing party. 15. Miscellaneous 15.1. You agree that you are an independent contractor, and nothing in this Agreement will create any partnership, joint venture, agency, franchise, sales representative, or employment relationship between you and NinjaOutreach.com. You will have no authority to make or accept any offers or representations on our behalf. You will not make any statement, whether on Your Site or any other of Your Site or otherwise, that reasonably would contradict anything in this Section. 15.2. Neither party may assign its rights or obligations under this Agreement to any party, except to a party who obtains all or substantially all of the business or assets of a third party. 15.3. This Agreement shall be governed by and interpreted in accordance with the laws of the State of New York without regard to the conflicts of laws and principles thereof. 15.4. You may not amend or waive any provision of this Agreement unless in writing and signed by both parties. 15.5. This Agreement represents the entire agreement between us and you, and shall supersede all prior agreements and communications of the parties, oral or written. 15.6. The headings and titles contained in this Agreement are included for convenience only, and shall not limit or otherwise affect the terms of this Agreement. 15.7. If any provision of this Agreement is held to be invalid or unenforceable, that provision shall be eliminated or limited to the minimum extent necessary such that the intent of the parties is effectuated, and the remainder of this agreement shall have full force and effect. I agree to the terms & conditions if (typeof jQuery == "undefined") { var script = document.createElement("script"); script.type = "text/javascript"; script.src = "https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js"; script.onload = function () { loadValidator(); } document.getElementsByTagName("head")[0].appendChild(script); } else { loadValidator(); } function loadValidator() { if (typeof jQuery.validator == "undefined") { var script = document.createElement("script"); script.type = "text/javascript"; script.src = "https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/jquery.validate.js"; script.onload = function () { preparePAPform(); } document.getElementsByTagName("head")[0].appendChild(script); } else { preparePAPform(); } } function preparePAPform () { var signupForm = jQuery("#affiliateSignup"); /* ID of the signup form */ jQuery.validator.addMethod("referralIDconstrain", function(value, element) { return this.optional(element) || /^[a-z0-9_-]+$/i.test(value); }, " Referral ID can only contain letters, numbers, underscores and hyphens."); var validator = signupForm.validate({ rules: { refid: {required: true, referralIDconstrain: true}, notificationemail: {email: true}, name: {required: true}, firstname: {required: true}, lastname: {required: true}, username: {required: true, email: true} }, messages: { username: "Please enter a valid email address", refid: {required: "Please enter your ID, it will be used in your affiliate links"}, agreeWithTerms: "You must accept the terms and conditions" }, submitHandler: function(form, event) { event.preventDefault();submitToPAP(signupForm, validator); } }); } function submitToPAP (signupForm, validator) { var submitButton = jQuery("#affiliateSignup input[type='submit']"); submitButton.attr("disabled", "disabled"); /* Disable the submit button to prevent repeated clicks */ submitButton.attr("value","Signing up..."); var formArray = signupForm.serializeArray(); formArray.push({name: "method", value: "jsonp"}); var formQueryString = $.param(formArray); jQuery.ajax({ type: "GET", url: signupForm.attr("action"), data: formQueryString, dataType: "jsonp", success: function(data) { if(data.successMessage != "") { /* action on success, e.g. display success message and redirect to http://www.SuccessUrl.com after 1 second or anything else you'd like instead. */ jQuery("#FormMessage").html(data.successMessage); submitButton.attr("value","Redirecting"); setTimeout(function(){window.location = "http://www.SuccessUrl.com/";},1000); } else { /* action on error, display the cumulative error message under the form and per field error next to field */ jQuery("#FormMessage").html(data.cumulativeErrorMessage); var fieldsError = {}; jQuery.each(data, function (key, value) { if (key.indexOf("Error") != -1 && key != "cumulativeErrorMessage" && value != "" && formQueryString.indexOf(key.substring(0, key.length - 5)) != -1) { fieldsError[key.substring(0, key.length - 5)] = value; } }); validator.showErrors(fieldsError); submitButton.removeAttr("disabled"); submitButton.attr("value","Signup"); } } }); }
http://dstorebd.blogspot.com/2020/02/ninjaoutreach-affiliates-program-join.html
0 notes
olliejennabn · 6 years ago
Text
HK taps national strategies
Since taking office in July 2017, I have been advocating new roles of the Government in order to scale new heights and we have adopted a new tagline for branding our city, and that is, to connect and excel. Indeed, you can say that we are reshaping our city for the economic promise that this 21st century will surely bring the countries and economies of Asia, Hong Kong very much included.
 Of course, we remain the world's bridge between East and West, as between Mainland China and the rest of Asia. Our role of connecting companies, economies and cultures continues to grow, and we continue to find fresh ways of helping businesses and people to excel, whatever it is they are building or pursuing, whatever their ambitions or their vision.
 Thanks to our deepening economic integration with the Mainland, we are also taking full advantage of two national strategies of Mainland China to build on our world-class strengths in financial and professional services, and to develop, as well, our fast-emerging innovation and technology sector. I am talking about the Belt & Road Initiative and the Guangdong-Hong Kong-Macao Greater Bay Area. I will be happy to tell you more about these opportunities in a few minutes.
 Global trade leader But let me first give you a brief update on Hong Kong. Our economy, I am pleased to say, expanded by 2.9% in real terms in the third quarter of 2018, marking Hong Kong's eighth consecutive quarter of above-trend growth. Through the first three quarters of 2018, our economy grew by 3.7%, year-on-year. Due to some external factors, economic growth for 2018 as a whole is forecast at a moderated rate of 3.2%. And our unemployment rate remains at 2.8%, which is a 20-year low. I would say that these figures are more than respectable, given the ongoing uncertainties of the global economy.
 Thanks to our open and externally oriented economy, we have been a global leader in trade. In 2017, our exports and imports of goods and services amounted to better than 370% of our GDP. That year, Hong Kong was ranked the world's seventh-leading trading economy, our trade totalling US$1.14 trillion - up 7.15% over the previous year.
 We continue to be closely linked with the economies of Asia. Indeed, nine of Hong Kong's top 10 trading partners are from Asia, and they accounted for US$912 billion, almost 80% of our total merchandise trade in 2017. Those numbers, and our focus on Asia, will surely expand down the road. Asia, after all, accounts for more than 60% of global growth, according to the International Monetary Fund (IMF). Last year's full-year results are not yet in, but growth in Asia in 2018 is expected to reach a laudable 5.6%. This year, the IMF projects Asian growth at about 5.4% - still considerably higher than the projected global average of 3.7%. In short, the fast-growing Asian market presents huge potential and myriad business opportunities for all of us.
 The Hong Kong Government maintains 12 overseas Economic and Trade Offices (ETO), including Tokyo, Singapore and Jakarta in Asia. That is not nearly enough, not if we are to take advantage of the expanding business opportunities in Asia. Which is why we have announced that we are planning to add five new ETOs, three of them in Asian cities: Bangkok, Mumbai and Seoul. Among them, I am pleased to say that the Bangkok ETO, which is the most recently announced one, is going to open soon, hopefully in February this year.
 We also hope to set up the Mumbai ETO soon. For this, I look to the Consul-General for his support. Hong Kong and India have strong, long-established ties, both economically and culturally. Hong Kong is home to a large Indian community and many Indian companies. And we greatly value and treasure the manifold contributions that the Indian community has made to Hong Kong over the decades. In 2017, our bilateral trade reached US$34 billion, up 27% over 2016 results. I am confident that, with the new Mumbai ETO in India up and running, our bilateral ties will reach new heights in our business, trade and cultural co-operation.
 Unique advantages Hong Kong's working philosophy, whether in enhancing ties with India, the Mainland, the rest of Asia or the world beyond, focuses on the mutual rewards that open, inclusive and sustainable growth can realise. That considered approach is supported by our unique advantages under the "one country, two systems" principle.
 Thanks to "one country, two systems", Hong Kong maintains an open and free market, a simple and low tax regime and a level-playing field for companies. For the past 24 years in a row, the Heritage Foundation has named Hong Kong the world's freest economy. Last year, we finished second worldwide in the Swiss-based International Institute for Management Development's World Competitiveness Yearbook. And in this year's World Bank "Doing Business" report, we placed number four.
 Our attractiveness to overseas business is visible in the increasing number of offices set up by international companies in Hong Kong. At last count, more than 8,700 businesses with parent companies overseas or in Mainland China maintained an office here. That, ladies and gentlemen, is up 6.4%, year on year. Let me add that nearly 50% of them have parent companies based in Asia. Further, among the 8,700 businesses, 1,530 are regional headquarters, increased by 8.3%, year-on-year.
 Hong Kong has long been the business bridge for foreign investors seeking access to the Mainland market. Our gateway position was appreciably strengthened by CEPA, the Mainland and Hong Kong Closer Economic Partnership Arrangement. As a free trade agreement, CEPA was first established in 2003 and enhanced in the years since then. CEPA provides preferential treatment to Hong Kong service suppliers, as well as tariff-free treatment for products of Hong Kong origin. The beauty of CEPA is that it is nationality-neutral. That means overseas companies need only partner with Hong Kong or set up an office here to realise CEPA's wide-ranging business advantages.
 We are, as well, expanding our network of free trade agreements, investment agreements and comprehensive avoidance of double taxation agreements with foreign economies. Since I took office as Chief Executive in July 2017, my Government has established free trade agreements with the Association of Southeast Asian Nations (ASEAN) and with Georgia. We have, as well, recently concluded negotiations with Australia and the Maldives. I am determined to realise more free trade agreements in the years to come, in order to enhance prospects and opportunities for Hong Kong companies and service providers, as well as our business partners.
 HK's national role While upholding the principle of "one country, two systems" and taking advantage of our unique strengths, Hong Kong is geared up to integrating herself into the national development strategies. And this includes President Xi Jinping's commitment to building open and inclusive relations among countries and peoples. I was in Shanghai last November for the inaugural China International Import Expo. There, President Xi delivered a keynote address entitled "Work Together for an Open Global Economy that is Innovative & Inclusive." In his speech, President Xi emphasised, and I quote, "China's consistent position of supporting the multilateral trading system and promoting free trade." President Xi added that "openness and co-operation will remain essential for continued human progress."
 President Xi's embrace of multilateral co-operation and the shared benefits it can bring is powerfully reflected in the Belt & Road Initiative and the international connectivity it enables. Our strategic location and status as an international trading and financial services centre make Hong Kong the ideal springboard for overseas companies looking to tap the resources, the markets and the opportunities that the Belt & Road affords.
 Hong Kong enjoys distinct economic, legal and social systems. They are backed by a deep pool of professionals. Their expertise ranges from infrastructure development and engineering to consultancy, accounting, law and more, and their global networks and affiliations are extensive. No less important, they are well versed in cross-border business transactions. They can make all the difference for countries and companies taking part in the Belt & Road Initiative.
 Our strength in financial services is powered by capital formation. Thanks to our liquid capital flow, Hong Kong is the natural centre for those looking to raise capital for infrastructure, as well as production and investment projects. In particular, Hong Kong is well positioned to respond to green financing needs. In the coming months, we will launch a government green bond issuance programme. It will come with a borrowing ceiling of about US$13 billion, making it one of the world's largest sovereign green bond issuances. We have also initiated a Green Bond Grant Scheme that subsidises the costs issuers incur in obtaining certification under our Green Finance Certification Scheme. In short, Hong Kong has what it takes to become a fund-raising hub for green projects, and I am confident our bond market will attract Belt & Road investors.
 Alongside our financial acumen, Hong Kong is a hub for risk management, insurance and dispute-resolution services. Our legal services sector is renowned. Its foundation is the rule of law, underpinned by an independent judiciary and robust intellectual property rights protection. Arbitral awards made here are enforceable in more than 150 jurisdictions, including the Mainland. Hong Kong boasts more than 13,000 lawyers, and many more legal professionals. They come from all over the world, and their services range from risk assessment and the drafting of contracts, to dispute resolution for investment and commercial deals.
 The connectivity that drives the Belt & Road extends well beyond infrastructure or the business and trade it enables. Building people-to-people bonds is also one of the key objectives. Such bonds must, of course, be inclusive, if they are to be meaningful. That, unfortunately, is not always the case. Despite the remarkable socio-economic transformation of Asia in recent decades, the gains have not always benefited those in need. The result is communities, regions and economies experiencing more, not less, inequality; more, not less, environmental degradation.
 If economic development is to become more inclusive, we must find ways of expanding essential needs, ensuring that our societies have access to such basics as safety, equity and justice. In that regard, ladies and gentlemen, Hong Kong has much to offer. And we are happy to share our experience and to help emerging economies build their capacity. I see it as part of our contribution to expanding people-to-people bonds, whether in the Asian region or in the broader reaches of the Belt & Road.
 It begins with our city management expertise. That ranges from town planning and railway operation, to flood prevention, slope stabilisation, aviation safety and emergency services. We have, as well, the institutions and the experience to promote equal opportunity, deal with administrative complaints and fight corruption. Indeed, some of our institutions, from the Independent Commission Against Corruption to the Fire & Ambulance Services Academy, offer training and experience-sharing with their counterparts in Asia, including Belt & Road economies.
 The Independent Commission Against Corruption, for example, has in place a dedicated unit providing training services for anti-corruption agencies in Belt & Road countries. Similarly, our Fire & Ambulance Services Academy has helped train firemen, for example, from Vietnam, and the Academy welcomes opportunities to work with other Asian and Belt & Road economies. It's much the same with the Hong Kong Airport Authority and its aviation academy, as well as our Mass Transit Railway Corporation, which has established a rail academy. Their doors, ladies and gentlemen, are always open.
 Such capacity building helps promote inclusive growth. That in turn can only strengthen confidence in the Belt & Road Initiative and the welcome co-operation it offers us all.
 Ladies and gentlemen, you can learn more about the prospects and the promise of the Belt & Road Initiative in September, when Hong Kong hosts its fourth Belt & Road Summit. The summit is now the largest, most important annual gathering among Belt & Road project owners, investors and service providers. The third summit held in June last year attracted about 5,000 government and business leaders from some 50 countries and regions.
 Bay area development Allow me now to briefly touch on the other important national strategy of Mainland China, which is the fast-rising Guangdong-Hong Kong-Macao Greater Bay Area, the development plan of which will soon be promulgated. The Greater Bay Area covers Hong Kong, Macau and nine prosperous Guangdong cities, bringing together a collective population of about 70 million, and a GDP of more than US$1.5 trillion.
 While the Greater Bay Area accounts for only 5% of the Mainland's population, it is responsible for fully 12% of the Mainland's GDP. That's equivalent to the GDP of Australia or Korea. Air passenger and cargo throughputs of the Greater Bay Area rank first among the world's major bay areas. While the New York, San Francisco and Tokyo bay areas may pride themselves on their status as financial, technology and industry hubs respectively, the Greater Bay Area encompasses all of that.
 The Greater Bay Area is built on complementarity instead of competition among the cities. Hong Kong, China's most international city, will play the role as an international finance and trade hub, as well as a global arbitration centre. In addition, we look to contribute to the Greater Bay Area's development into an international innovation and technology hub. Hong Kong has much to offer, including world-class universities and scientific research capabilities. We have, as well, a government, and a Chief Executive, that places Innovation & Technology at the heart of our policy agenda in this 21st century of endless change and boundless promises. Combined with the strengths of Mainland cities such as their advanced manufacturing capability, the Greater Bay Area has all it takes to become Asia's Silicon Valley. We welcome talent, technology enterprises and scientific institutions from Asia and from all over the world to join us.
 Chief Executive Carrie Lam gave these remarks at the Economic Times Asian Business Leaders Conclave 2019 on January 17.
from news.gov.hk - Business & Finance http://www.news.gov.hk/eng/2019/01/20190117/20190117_165744_640.html
0 notes
Text
How Russian cyber attacks illustrate the deterioration of U.S.- Russia relations
Reporting produced for my International Newsroom class at Columbia University Graduate School of Journalism, under the supervision of Dean Steve Coll. Unpublished.
Date: June 2, 2015
How Russian cyber attacks illustrate the deterioration of U.S.- Russia relations  By Michelle Inaba
            Roman Seleznev and his girlfriend were waiting for their plane back to Russia at the international airport of Male, in the Maldives, last July. Only she would make it to Moscow. As Seleznev tried to board, U.S. Secret Service agents detained him and then forced him into a private jet heading to Guam Island, according to Russia’s foreign ministry.
Seleznev is a Russian hacker who had been wanted by the Secret Service since 2011. But his arrest has not stopped other Russian hackers from continuing to target the U.S., as made plain by recent attacks on the White House and the State Department.
Cyber conflict is only adding to the overall deterioration of U.S.-Russian relations since the crisis caused by Russia’s annexation of Crimea, Ukraine.
           “Russia has a well-educated population with a significant presence on the web and a government that at least tacitly encourages these attacks,” said Garrett Khoury, a political and security risk analyst and director of research and content at the Eastern Project, an online group of policy professionals writing about politics. “Whether it’s going after money, identities, or intellectual property, hackers are going after the economic well-being of the United States.”
Seleznev is the son of Valery Seleznev, a member of the Russian Liberal Democratic Party. The Russian foreign ministry called his arrest “kidnapping,” according to the Russian News Agency TASS. However, in the context of financial sanctions imposed by the U.S. and Europe on Russia over Crimea, the arrest of Seleznev does not seem to be a matter of real diplomatic repercussion. “It is a relatively small issue,” Khoury said. “If Ukraine, Syria, and Iran weren’t issues, maybe it would be of some importance, but right now I can’t see any tangible effect on relations.”
           Seleznev is accused of hacking into computers of American businesses between 2007 and 2014, stealing credit card information that would be sold to third parties in the digital black market. According to court documents, he is accused of causing millions of dollars in losses to merchants and financial institutions, and has made “millions of dollars in illicit profits.” He operated from servers located in Russia, Ukraine, and Germany.
           “The adverse impact this individual and other transnational organized crime groups have on our nation’s financial infrastructure is significant and should not be underestimated,” Julia Pierson, director of the U.S. Secret Service, said in a statement on July 7, 2014.
           Seleznev advertised his business on international carding forums, where stolen data is usually traded. The ads he placed to attract more customers to his website “2Pac.cc” even resembled legitimate business ads, according to the indictment, with promises of best offers. “2pac, the first market of dumps! All Sellers in once [sic] place!!! We invite sellers, hackers and owners of dumps bases. You get the 50% share of income from selling your base, that is much more than you can earn from selling your base to other seller.” (“Dump” is the word used to describe the stolen data.)
           According to court records, Seleznev even created a website with tutorials on how to buy and use stolen credit card data and what equipment was needed to create fraudulent credit cards. The purpose was to encourage potential customers to go to his “2Pac.cc” website and buy stolen data there.
           Selzenev’s case shows “how cybercriminals use the Internet not only to infiltrate and steal sensitive data, but also to teach other criminals how to navigate the credit-card selling underworld and get equipment that can be used to defraud U.S. citizens,” Leslie Caldwell, U.S. Assistant Attorney General, said in October 2014.
According to a statement from the U.S. Department of Justice in July 2014, the Secret Service arrested Seleznev in the Maldives and transferred him to Guam, which is under the United States jurisdiction, where he was detained until he was transferred to the United States. The U.S. Secret Service did not respond to requests for comment.
           Seleznev’s case is not an isolated one. CrowdStrike, a cyber security consultant firm, dubbed 2014 as “the Year of the Bear in the cyber realm.” Their witticism referred partly to the fact that many offending hacker groups had the word “bear” in their names.
In a sense, the hacking is a Russian way to retaliate over official economic sanctions, showing that the deterioration of U.S.-Russia relations can reach into the U.S. economy.
“If they are indeed hacking in response to the sanctions, then I think it does show how in cyberspace, there aren’t always neat distinctions between a country’s foreign policy and its domestic policy,” said Shane Harris, author of the book @War: The Rise of the Military-Internet Complex.
           To understand how the relations between the U.S. and Russia went sour, it is necessary to go back to the protests in Kiev, Ukraine, in November 2013. Ukraine’s economic situation was dire, and both the European Union and Russia proposed aid. Russia offered a $15bn loan, and this would foster Ukraine’s participation in an “Eurasian Union” with Russia, Belarus, and Kazakhstan. When Ukrainian president Viktor Yanukovych decided to take the Russian money and turn his back on Europe, protests erupted. As they became more deadly, Yanukovych fled to Russia, and a temporary coalition government took over Kiev.
           Meanwhile, Russian troops were mobilized on the border of Ukraine, in what Russia called “military drills.” Simultaneously, armed gunmen seized government buildings and airports in Crimea. In March 2014, Crimeans voted on a referendum to decide whether the region would join Russia or would be independent. According to the published results, 97 percent of Crimeans voted for a Russian annexation of their territory, which Ukraine, the U.S. and the E.U. considered illegal. Immediately after the referendum, the U.S., the E.U., and Canada responded with financial sanctions against Russia. American sanctions evolved from targeting one bank and individuals who were close to Russian President Vladimir Putin, to sanctions against major Russian banks, defense and energy industries.
Before the Russian annexation of Crimea, it appeared that the U.S. and Russia might cooperate on cyber security. In June 2013, the countries signed an agreement to share information about threats appearing to emanate from each other’s territory, and made the commitment to keep a hotline to make formal inquiries about cyber security incidents. The goal of the agreement is to avoid that a cyber attack is misperceived as being state-sponsored, thus causing an escalation of the incident that could spill over to areas that are not in cyber space anymore, such as a military conflict.  
           “That’s what some people worry about: someone will make a mistake, and you’ll see some sort of problem grow out of this escalation or concern,” James Lewis, a partner at the Center for Strategic and International Studies, said. “One of the big fears of cyber security is that you’ve got these risks that are very hard to control, and they might end up leading to a much bigger conflict.”
           Just three months after the agreement was signed, however, the Russian Foreign Ministry released a travel warning cautioning Russian hackers wanted by the Federal Bureau of Investigations to avoid traveling abroad. “Practice shows that the trials of those who were actually kidnapped and taken to the United States are biased, based on shaky evidence and having a pronounced accusatory [tone],” the Russian Foreign Ministry stated. “Under these conditions, the Russian Foreign Ministry recommends Russian citizens to refrain from trips abroad, especially in countries which have concluded agreements with the United States on mutual extradition.”
The travel warning came after Alexander Panin’s arrest in the Dominican Republic. Panin is a Russian hacker, author of the malware SpyEye, which is believed to have infected more than 1.4 million computers in the United States and abroad. He is accused of hacking into computers to steal personal and financial information in order to defraud banks in the United States. He was also selling SpyEye in underground online forums. In June 2011, a FBI covert agent contacted Panin and bought a version of SpyEye for $8,500. In July 2013, Panin was arrested while flying through the Atlanta international airport, according to a statement issued by the FBI. The Russian foreign ministry claimed that he was arrested in the Dominican Republic and extradited to the United States.
Since Russia does not have extradition agreements with the United States and does not help prosecute its cyber criminals, American authorities try to arrest them when they travel to countries that have extradition treaties with the U.S.  
“The message to the Russian cyber criminals is ‘you’re basically stuck in Russia for the rest of your life,” Edward Lucas, author of the book Cyberphobia, said. “Maybe you can get to Belarus or Uzbekistan, but you basically can’t go anywhere else because you are on the Americans’ radar.”
“U.S. law enforcement interprets this as the Russian government being in league with and supporting criminal hackers in their country,” Harris said. “I was told by a senior U.S. law enforcement official that the Russians will tip off hackers who are under investigation and advise them to change their names,” Harris said.
Peter Clement, a visiting professor at Columbia University currently teaching a course on Russian security policy, said there were several possible reasons why Russia does not seem to want to cooperate with the United States in cyber security matters. “Because there’s been a long history of bad feeling about the U.S. - this goes back into the Soviet period, there are people on the Russian government and security bureaucracies who very much think the U.S. is their main enemy still, and they have no problem with people doing things that are disruptive to the US,” he said. “And certainly now, since we are imposing all these sanctions on them.”
Some experts speculate that Russia might conceivably authorize cyber attacks as a form of retaliation against the financial sanctions imposed by the United States against Russia for its occupation of Crimea. “Attacks against us are increasing in frequency, scale, sophistication and severity of impact,” James Clapper, Director of National Intelligence, said in a Senate Armed Services Committee hearing on February 2015. “While I can’t go into detail here, the Russian cyber threat is more severe than we’ve previously assessed.”
“There certainly are researchers, including those I trust, who are tying the increase in Russian cyber activity targeting the U.S. to the sanctions imposed on Russia for its aggression in Crimea,” Harris said.
“Right now probably the far more dangerous aspect is what is called ‘exploitation’ which is considered a form of espionage, not warfare: the ‘exfiltration’ of intellectual property and other information from U.S. firms, educational institutions and government systems,” added Matthew Jones, professor of early modern Europe and information technologies at Columbia University. “This is clearly occurring at a massive scale, by state actors and many non-state actors.”
The attacks recently started moving from stolen credit card information and industrial espionage to the realm of government. Last October there was a cyber attack against the White House, compromising its unclassified email system. One month later, the State Department suffered the same type of attack. The government did not confirm the identity of the hackers, nor where they were from, but media reports at the time cited Russians as the authors of the attacks. And in the beginning of April the White House suffered a similar cyber attack. CNN reported that confidential sources briefed on the investigation confirmed that Russian hackers were behind it.
“Criminal hackers go after money; so there is no money in neither the State Department or the White House,” Lewis said. “And that makes you think it had to be politically motivated.”
This brings into question whether the United States is engaging in a new type of Cold War with Russia, one that is being battled through financial sanctions and cyber attacks. The tensions between the two countries have been increasing ever since the United States imposed sanctions on Russian banks, energy and defense industries.
“It is certainly true that we are in a new world with respect to Russian and U.S. relations; there’s no question about that,” said Herb Lin, researcher for cyber policy and security at Stanford University.
However, argued Lewis, “It’s not really a Cold War because it hasn’t gotten to that point yet. It’s tense, it’s hostile. The Russians seem to want to re-start the Cold War. I mean, they fly bombers up and down over Sweden, and Denmark, and Britain; and they send ships through the English Channel; they use their fire planes to harass airlines over Europe, and they send bombers near Alaska. My question to the Russians is: they didn’t do so well in the last Cold War, so what makes them think they’re going to do better this time?”
The escalation on cyber attacks coming mostly from Russia, China, North Korea, and Iran led to the creation of a new government agency in February. The Cyber Threat Intelligence Integration Center will report to the Office of the Director of National Intelligence, and is tasked with fighting cyber security threats.
Just two weeks after the announcement of the new cyber security center, the U.S. Department of State also announced a reward of $3 million for information leading to the arrest of Evgeniy Bogachev, a Russian hacker responsible for the malware GameOver Zeus, Peer-to-Peer Zeus, and Cryptolocker. Bogachev is allegedly responsible for over $100 million in financial losses in the United States alone, according to the Bureau of International Narcotics and Law Enforcement Affairs.
“Perhaps one of the most serious cyber criminals found on Planet Earth today,” William Brownfield, Assistant Secretary at the Bureau of International Narcotics and Law Enforcement Affairs, said at a press conference on February 24, 2015.
Bogachev has been indicted for hacking computers at Haysite Reinforced Plastics, in Erie, Pennsylvania. He allegedly installed malware in the company’s computers, stole confidential personal and financial information, and used that data to steal funds from the company’s bank account. In just three days he stole approximately $374,000.
The details of his hack are typical of a new era of sophisticated bank robbery:
On October 18 2011, Bogachev sent an email to Haysite pretending to be a financial institution and said that an ACH payment (a payment directly debited from someone’s checking or savings account) had been canceled. The email had a link that offered information about the canceled payment. An employee at Haysite clicked on the link, which installed the malware in the computer.
Two days later, Bogachev sent web injects (fake internet pages) to Haysite computers, asking three employees to enter their credentials into a fake online banking page, which gave Bogachev access to their banking identities. On the same day, he used those credentials to transfer funds from the company’s account to two money mule accounts, one in Atlanta and another one in New York City. (Money mules are individuals who receive the stolen money and then transfer it to accounts overseas.) On October 21, the mules transferred the funds to bank accounts in London.
Joseph Demarest, FBI Assistant Director for cyber security, said during a press conference on February 24, 2015, that 14 countries are giving assistance to the United States in the search for Bogachev, but he did not mention Russia.
Of Bogachev, he said, “While he is known to reside in Russia, he may in fact travel,” he said. If he travels to a country that has an extradition treaty with the United States, it is very likely that he may be caught and extradited. When asked about the lack of Russian cooperation on this case, Demarest dodged the question answering that the FBI has “engaged the FSB on this particular case and are currently sharing information with them regarding Bogachev.”
In April, President Barack Obama approved a new wave of financial sanctions on Russia, including some that target cyber criminals and the companies that buy their stolen data. The sanctions are intended as another form of deterrence against cyber threats, focusing on activities that threaten national security, foreign policy, economic health, or financial stability. “Cyberthreats pose one of the most serious economic and national security challenges to the United States,” Obama said.
           “It’s a move that says we need to have better ways than going to war when people hack us, and this is a way to do it,” Lin said. “The question is whether or not they thought it through to the end, when the other guy responds. You’ve got to think that part through, and it’s not clear to me that anybody has thought that part through.”
           Because America’s cyber defenses are erected mostly by private companies, not the government, Obama’s policy is dependent on corporate cooperation. “I think President Obama’s remarks on cyber crime are actually not so much aimed to the criminals, it’s aimed to the victims: what he’s really trying to do is to get American companies to take cyber crimes more seriously,” Lucas said.
           Seleznev is still imprisoned in the United States. Court records show that he has changed defense lawyers several times since the U.S. Secret Service caught him. His new trial is scheduled for November 2, 2015. His two defense lawyers did not respond to requests for comments.
Russia may complain about Seleznev’s “kidnapping” by America but it’s undisputed that Russia does nothing about the cyber criminals on its own soil. “Russia doesn’t punish hackers who attack the United States because it doesn’t want to,” Khoury said. “First, because it’s better to have the hackers going after the United States than after the Russian government. Second, because those hackers, whether directed by the Russian government or not, are doing exactly what the Russians would like them to be doing.”
0 notes
trademarkmaldives · 4 years ago
Link
Without any second thoughts, Artificial Intelligence (AI) is the latest buzzword across the globe. While it is not a recent phenomenon, it has indeed entered our lives in the past few years more than ever before. Be it Apple’s Siri, Amazon’s Alexa, or Google Assistant – all of them are powered by a backend AI engine, which is ever constantly changing and expanding
The pharmaceutical industry is one of the earliest adopters of the technology that utilized the AI engines in drug discovery and diagnosis of diseases. Furthermore, AI has been proven efficient, like human dermatologists, in identifying all the skin-related diseases. When we talk about patents and AI, there are multiple issues, which we shall be discussing now.
Patentability of AI-Based Inventions
With a complex and continuously evolving nature – AI is a software, and software patentability has been disapproved by several laws in different countries worldwide. Under Section 3(k) of the Indian Patent Act, the computer programs are not patentable. While the law seems to be united against patenting the AI-based inventions; however, there have been workarounds for patenting the software – for instance, in India, the software patents are allowed in the scenario where they are tied up with hardware.
The Prime Issue – AI as an Inventor
The most crucial issue in the patenting industry corresponds to AI being referred to as the inventor of the algorithms it designs or develops. DABUS – Device for the Autonomous Bootstrapping of Unified Sentience – is an AI-based system developed by Dr. Stephen Thaler. He filed the Patent Applications for the same, with DABUS as the inventor, in the UK, US, and European Patent Office (EPO).
All three patent applications with DABUS as the inventor were rejected. The grounds for rejecting the same were that the laws, in the three nations, consider a natural person to be an inventor and not AI.
Without any doubt, there a major gap in the current laws, rules, and regulations, which the lawmakers around the world need to reconsider and address, specifically, in the case of AI-based inventions.
AI has affected many industries, and patents are no different in this scenario. The ultimate benefit of AI is that it shall make the entire process way faster and efficient at different levels, including Patent Search, Patent Examination, Patent Grant, and even Patent Licensing. The AI-based systems can help significantly in consuming the unstructured data and observing critical trends in the same. Additionally, an AI engine can absorb different patent data and identify the patterns in them. At present, AI has already been integrated into many patent search tools, which have made the searching process faster and convenient.
Final Thoughts
When it comes to patents, AI is still very much at the growing stage, and we all are yet to explore all the potential benefits that it can offer. It is a matter of fact that yes – the AI-based systems shall prove to be exceedingly beneficial for one and all by making the patent process way more efficient and faster. The only concern is that patent laws worldwide seem to be lagging in this scenario, as most of them were framed when AI was an imaginative concept. Now, in the present digital era, there is a need to update the laws, so that they match well with AI. For view source: https://www.trademarkmaldives.com/blog/flirtey-wins-a-new-patent-critical-to-the-safety-of-drone-delivery/
 Don’t forget to follow us on social media:
Facebook – https://www.facebook.com/trademarkmaldives/
Twitter – https://twitter.com/trademarkmaldiv
Linkedin – https://www.linkedin.com/company/trademarkmaldives/
Pinterest – https://in.pinterest.com/trademarkmaldives/
Tumblr – https://trademarkmaldives.tumblr.com/
 Contact - US
Website: www.trademarkmaldives.com
0 notes
kashishipr · 4 years ago
Text
Tumblr media
Who can Register a Trademark in Maldives under the Present Law?
👉 ✅ For more visit: https://bit.ly/3fQVti9
0 notes
omcik-blog · 7 years ago
Text
New Post has been published on OmCik
New Post has been published on http://omcik.com/how-using-personal-email-led-to-the-downfall-of-notorious-criminals/
How using personal email led to the downfall of notorious criminals
Conventional wisdom says everyone should practice basic online security measures, like using different passwords for different accounts. And when you want to stay anonymous, don’t publish your email address on public forums, or tie it to things like Facebook (FB, Tech30) or Instagram.
But failing to do so is what helped federal law enforcement take down some of the most notorious cybercriminals on the dark web.
At the Black Hat security conference in Las Vegas on Wednesday, attorneys Harold Chun and Norman Barbosa described how federal prosecutors built a case against the famous hacker and credit-card fraudster Roman Seleznev. It was a multi-year effort that took painstaking attention to cyber details, including finding links between the email account he used for crime and personal transactions.
There were two different email accounts Seleznev tied to his online personas. But he also tripped up and used them for personal communications. He used one email to open a PayPal account associated with his real home address, and another to send a gift to his wife.
“We found a number of things tracing back to him, including a flower order that he had placed for his wife in his own name with a phone number that showed up in other records tied to him,” Barbosa, the assistant U.S. attorney for the Western District of Washington and the office’s Computer Hacking and Intellectual Property Crimes coordinator, said.
Related: Cybercriminals can take a class on stealing credit cards
Further, because the feds knew Seleznev used the same passwords on a variety of online accounts, they were able to immediately guess the password to his laptop that contained 1.7 million credit card numbers.
Seleznev was arrested in the Maldives in 2014, and sentenced to 27 years in prison in April of this year.
The fraudster’s case isn’t unusual. Last week, the Justice Department announced the takedown of AlphaBay, the largest marketplace on the dark web. On it, criminals could buy and sell everything from drugs to firearms to malware.
Alexandre Cazes, the 25-year-old AlphaBay administrator, was arrested in Thailand earlier this month, and killed himself in custody.
In the complaint filed against Cazes, U.S. attorneys list a variety of his security failures. At one point, the administrator listed his personal email address “[email protected]” in the headers of emails to new users and the password recovery process on AlphaBay. The same email was used to post on other internet forums, where he signed his real name.
Ring leaders aren’t the only ones that get captured thanks to bad operational security. On Monday, the Justice Department announced two AlphaBay drug dealers were sentenced to 6.5 years in prison. The feds were able to determine that one of them tied his email and usernames used on the dark web to his real Instagram, Facebook, and Twitter accounts.
According to Chun, now an independent attorney, operational security is getting better, but criminals can still easily make mistakes.
“The hard part is keeping your online profile and your actual self separate completely,” Chun said. “Sometimes your VPN fails, sometimes mistakes just happen on your hardware. And if law enforcement sees that one mistake, it’s something to work on.”
CNNMoney (Las Vegas) First published July 27, 2017: 1:27 PM ET
0 notes
trademarkmaldives · 4 years ago
Link
The pioneer of the commercial drone delivery industry, Flirtey, has quite recently won a new patent critical to the safety of drone delivery. The newly granted patent presents the safety-enhancing technologies like landing a drone safely in case of failure with the help of a parachute, which steers the drone towards a safe location.
The Founder and CEO at Flirtey, Matthew Sweeny, said that the company is indeed thrilled to receive another patent, which is vital to the safety of drone delivery. The US Patent and Trademark Office (USPTO) granted the patent to Flirtey recently when it was the time to celebrate the Fifth Anniversary of the
‘Kitty Hawk Moment’ on 17th July 2020. The day marks Flirtey’s first drone delivery on the US soil, in Wise County, Virginia, on 17th July 2015.
Previously, Flirtey had unveiled its next-generation delivery drone, known as Flirtey Eagle, at the National Press Club in Washington, D.C. Now, the company is actively pursuing a Type Certificate for the Flirtey Eagle.
Flirtey’s unique technology is protected by even more than 1,000 issued and pending Patent Claims in the US and other nations across the globe as well.
As an aerospace technology company, Flirtey specializes in providing full-stack drone delivery technology solutions. The company has a mission of saving lives and improving the lifestyle by making delivery instant for everyone worldwide. In 2015, the company first made history by conducting the first-ever FAA-approved drone delivery. In the following years, Flirtey successfully proceeded towards becoming the first unmanned aircraft system company, capable of performing an autonomous drone delivery to a home, and pioneering an AED drone delivery service in the US. The company has efficiently worked alongside NASA, the City of Reno, emergency medical services provider REMSA, Johns Hopkins University of Medicine, and several other commercial partners to come up with the fastest and most effective customer-centric logistics technology around the world. For view source: https://www.trademarkmaldives.com/blog/flirtey-wins-a-new-patent-critical-to-the-safety-of-drone-delivery/
Don’t forget to follow us on social media:
Facebook – https://www.facebook.com/trademarkmaldives/
Twitter – https://twitter.com/trademarkmaldiv
Linkedin – https://www.linkedin.com/company/trademarkmaldives/
Pinterest – https://in.pinterest.com/trademarkmaldives/
Tumblr – https://trademarkmaldives.tumblr.com/
 Contact - US
Website: www.trademarkmaldives.com
0 notes
trademarkmaldives · 4 years ago
Link
A European Court of Justice (ECJ) adviser has quite recently stated that YouTube (an American online video-sharing platform) and other online platforms are not at all liable for the users who upload Copyrighted works illegally on their platforms; however, in this scenario, the copyright holders can indeed ask for injunctions against such users. The EU judges, who have followed such opinions in four cases out of five, shall rule on this matter in the coming months.
For quite a while now, the owners of the social media channels and online platforms have found themselves stuck in an issue corresponding to how much responsibility they all should bear for the hateful or illegal content posted on their platforms. The European Commission is now actively looking forward to addressing these issues and concerns by coming up with new rules and regulations, known as the Digital Services Act, at the end of the year.
In a non-binding opinion concerning two cases before the court, Advocate General Henrik Saugmandsgaard Øe said that the present EU rules exempt YouTube and other online platforms from such a responsibility when they are informed of violations and remove them. He mentioned that because of the current EU law, the online platform operators, including YouTube, aren’t directly liable for the illegal uploading of protected or copyrighted works by the users of their platforms. According to him, if the platforms are made directly liable, then there would be a risk of the platform operators becoming the judges of the matter of online legality. Additionally, he said that there would also be a risk of ‘over-removal’ of content by the platforms at the request of the users, which would also lead to the removal of legal content.
The first case before the court revolves around a music producer, Frank Peterson, who sued Google and YouTube in Germany for uploading several phonograms (for which he holds the rights) on YouTube in 2018.
The second case revolves around the publishing group Elsevier’s lawsuit against Cyando in Germany for illegally uploading quite a few of Elsevier’s works on its file-hosting and file-sharing platform, known as Uploaded, in 2013. For view source: https://www.trademarkmaldives.com/blog/eu-court-adviser-says-youtube-is-not-liable-for-user-copyright-breaches/
 Don’t forget to follow us on social media:
Facebook – https://www.facebook.com/trademarkmaldives/
Twitter – https://twitter.com/trademarkmaldiv
Linkedin – https://www.linkedin.com/company/trademarkmaldives/
Pinterest – https://in.pinterest.com/trademarkmaldives/
Tumblr – https://trademarkmaldives.tumblr.com/
 Contact - US
Website: www.trademarkmaldives.com
0 notes
trademarkmaldives · 5 years ago
Photo
Tumblr media
Intellectual Property Protection in Maldives
Trademark Protection/Publication of Cautionary Notices in English and Dhivehi in Maldives 👉 ✅  For more visit: https://www.trademarkmaldives.com/
0 notes
trademarkmaldives · 5 years ago
Link
In the scenario where your Intellectual Property (IP) renewals are fast approaching, you may end up looking out for a few management ways, using which you can efficiently save both time and money for your business. There are a lot of tips ranging from filing the IP renewals as quickly as possible to outsourcing the overall management of your renewals altogether, which can have a positive impact on the time and money you spend. So, now is the time to have a look at these tips one by one.
 1.     File your IP renewals as quickly as possible
Although it may appear to be a pretty straightforward tip, filing all your IP renewals on time is a brilliant way of ensuring that you save yourself both on time and money. Managing all your IP renewals on time implies that you proactively avoid the imposition of late fees, which is the additional financial sanctions for companies and organizations filing their IP renewals post the renewal deadline. For instance, let us consider the scenario of the EUIPO, where there is a grace period of six months post the renewal date within which you can still get your trademark renewed; however, this grace period, at the same time, also implies that businesses become subject to an additional 25% charge.
Besides saving money, filing your IP renewals as quickly as possible also makes the overall process faster by the straightforward fact that it doesn’t get drawn out over a long period. Without any second thoughts, renewing your IP as soon as you get a notification from the relevant authorities implies that the matter is closed for a substantial period, which is usually ten years for a trademark.
It is always highly advisable to consider your circumstances before filing your IP renewals. The reason behind the same lies in the fact that there may be a few IP assets, which couldn’t prove to be profitable during the previous term. In this scenario, you can give a thought to abandoning such assets as well and saving both time and money. However, if we consider the inexpensive nature of IP renewals, we can conclude that the abandonment of assets, partly or altogether, may not prove to be a viable option as the IP assets never become so unprofitable that you end up not renewing them. All in all, you can find greater savings in delegating the overall management of your IP renewals.
 2.     Outsource the IP renewals process
If your business company or organization has an in-house legal department, which handles the management of renewals along with other legal concerns, then it is always a good idea to assign the task of managing IP renewals to external IP experts or specialists. By doing the same, you will be able to save time on two fronts – firstly, the renewals will be completed quickly, and secondly, delegating this task will allow your in-house team to focus on other legal matters. Hiring an external IP expert can prove to be cheaper too as such agents usually agree on a fee at the outset for the work completed. Apart from the benefits of saving time and money, outsourcing the management of your IP renewals will also save you from the stressful process of doing the same all by yourself.
For view source: https://www.trademarkmaldives.com/blog/how-can-you-save-time-and-money-in-managing-your-ip-renewals/
Don’t forget to follow us on social media:
Facebook – https://www.facebook.com/trademarkmaldives/
Twitter – https://twitter.com/trademarkmaldiv
Linkedin – https://www.linkedin.com/company/trademarkmaldives/
Pinterest – https://in.pinterest.com/trademarkmaldives/
Tumblr – https://trademarkmaldives.tumblr.com/
 Contact - US
Website: www.trademarkmaldives.com
0 notes