check compliance
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 3)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Siobhan Mullan ◽  
Bobby Stuijfzand ◽  
Andrew Butterworth

AbstractA range of welfare outcome measures relating to on-farm welfare are monitored in UK slaughterhouses to check compliance with the European Broiler Directive. A national dataset from 438,155 batches of chickens between 2010 and 2014 and from 228,795 batches between 2016 and 2018 was analysed. The data contained information about 3.1 billion chickens. The highest mean proportion for a single condition was for ascites/oedema in 2016–2018 at 0.384%, affecting 3.9 million chickens/year sent to slaughter during that time, followed by abnormal colour/fevered at 0.324%, affecting 3.4 million chickens/year. Identifying farms most likely to have poor welfare is an important strategy for improving animal welfare overall, and for maximising the capacity for checking regulatory compliance when resources are limited. We found a greater proportion of broiler farms overall remained consistently in the best quartile (16.4%) rather than the worst quartile (6.6%). Farms that exceeded a Government ‘trigger’ threshold for poor welfare were significantly more likely to subsequently improve than ‘non-trigger’ farms, although they usually remained in the worst performing quartile of farms.


Bioethica ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 12
Author(s):  
Vasilios Fanaras (Βασίλειος Φανάρας) ◽  
Vasiliki Mollaki (Βασιλική Μολλάκη)

Funding of research proposals by the European Commission (EC) requires not only scientificex cellence and innovation, but also ethical conduct of research. For this reason, the EC performs ethicsreview for all the research proposals that are going to be funded, in order to check compliance with theethics principles of research, as well as the Eu ropean and National laws, in the countries where research isconducted. The aim of the present manuscript is to raise awareness and familiarize researchers with theethics review of research proposals, as conducted in the EC, through the eyes of two ethics experts.Firstly, the stages of the ethics review process are described, which is performed with the assistanceof independent ethics experts. The criteria which are provided and monitored by the Ethics and ResearchIntegrity Sector in the EC are then pr esented in detail. Based on these criteria, the possible outcomes of anethics review are analyzed, which may include the formation of specific requirements that need to befulfilled by the researchers. Specific reference is made to the requirements that m ay result when aresearch proposal involves collection, processing and storage of personal data according to the GeneralData Protection Regulation 2016/679, because this Regulation entered into force recently in the ethicsreview.Finally, reference is m ade to the importance of ensuring integrity in research thought the ethicsreview process, and the necessary compliance with the ethics standards of EC funded research.


2019 ◽  
Vol 19 (4) ◽  
pp. 649-674
Author(s):  
Talita de Souza Dias

ABSTRACT The principle of legality is one of the most fundamental principles of domestic and international criminal law. It features in some of the most prominent human rights instruments, and its application has been scrutinised by various human rights courts and international criminal tribunals. One of the principal tests used to check compliance with that principle measures the accessibility and foreseeability of the criminal law at the time of the conduct. Yet a close analysis of this test reveals a number of fundamental flaws that seem to have escaped the eyes of most commentators and practitioners. These have led to outcomes of dubious legality. In this article, I argue that those problems are serious enough to justify a revision or a substitution of that test for one which is more in line with the rationales and dictates of the legality principle.


2018 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Lenny Novita ◽  
Erwin Dyah Nawawinetu

Background: PT PAL Indonesia (Persero) operates Overhead Crane Double Girder tool everyday. The operation of the device have some risk of material hazard, material pinched, material scratched, fracture and passed away. Purpose: The purpose of this research was to assess the level of risk of occupational injury on the operation of Overhead Crane Double Girder. Methods: This research was a descriptive observational one. This study focuses on the operation of Overhead Crane Double Girder in the Kapal Niaga division PT PAL Indonesia (Persero) which consist of the preparation and operation phase. Result: The initial risk level categorized as high-risk level of 44% and a moderate risk level of 56%. The most frequently prevention measure ware routine check, compliance of SOP and PPE usage on workers. Implementation of control efforts resulted in a moderate risk rate of 44% and a low risk level of 56%. Conclusion: Recommendation of control for PT PAL Indonesia (Persero) performs routine maintenance both on equipment and overhead crane function double girder, application and compliance of operating SOP, and operator must have driving license of overhead crane double girder and experience in the field, if applied properly then final risk level to be 100% low.


Author(s):  
Andrew Sutton ◽  
Reza Samavi

Privacy audit logs are used to capture the actions of participants in a data sharing environment in order for auditors to check compliance with privacy policies. However, collusion may occur between the auditors and participants to obfuscate actions that should be recorded in the audit logs. In this paper, we propose a Linked Data based method of utilizing blockchain technology to create tamper-proof audit logs that provide proof of log manipulation and non-repudiation.


Author(s):  
Maurizio Naldi

Cloud availability is an important parameter present in a typical Service Level Agreement (SLA). In order to check compliance with SLA commitments, a third party availability measurement is strongly needed. An availability estimation methods is evaluated here, based on the periodic repetition of sequence of probing packets in ICMP. Majority Voting, which declares a cloud to be available only if a majority of probing packets gets an echo from the cloud, appears to provide an accurate estimation even when the packet loss probability is rather high.


Sign in / Sign up

Export Citation Format

Share Document