.

Monday, September 30, 2019

Causes of Cold War

Causes of the Cold War The Cold War was a very dangerous period of history that lasted from 1945 to 1991. The Cold War was started almost immediately after the surrender ing Germany to the end of World War II there was a threat tot the planet and its existence if this war was ever to be fought. Both upheld a great amount of resources into the expanding their military readiness. It was more than a war between two countries, it was a war between different ideologies in fear of the government.In the United States a â€Å"witch hunt† was carried out against communists, as they feared that communism would take over the country and in the Soviet Union people were â€Å"fenced in† by fear of the police and government and they were not free to travel abroad as many escaped from the hard reigning regime (Artikkel). After World War II two great powers emerged in the world. The world was split into two spheres, the West and the East. The power in the West rested in the hands of th e United States and the power in the East the power rested in the Union of Soviet Socialist Republics.The USSR wanted to spread its ideal government, Communism in Eastern Europe and create a â€Å"buffer zone† as defense against any attacks by the U. S. (Capitalists) or by Germany. In 1946 Europe was split in two the West and East(western democracies and the United States and the Soviet Union and Soviet occupied territory). In Berlin, the capital of Germany a wall was erected to separate theWest the East side, The was known as the â€Å"Iron Curtain†, it was a symbolic of the treat each side felt from the other. The U. S. and U. S. S.R. were as different as day and night. Therefore neither trusted the other completely. A capitalist economy is based on private ownership, private profit and free competition, it encourages private individuals to own businesses and make profits (capitalism). On the other hand a communist economy is very different. The economy is controlled by the government and the country's wealth and resources are owned by the state or government. The state controls and plans all economic activity so that everybody benefits (communism).During World War I and II, the USSR was invaded multiple times resulting in many russian casualties. The USSR began planning making sure they would be secure from any future attack or aggression along the western border. Stalin, the USSR leader, decided to surround Russia with a buffer of â€Å"friendly† countries. The U. S. was afraid that the ideology of Communist would spread largely and vasty. When the USSR began attempting to improve its security by having satellite states, the U. S. saw this as an attempt by the USSR to spread the influence of Communism throughout the world.The United States had the nuclear bomb and soon after that Russia had a nuclear bomb also. Since neither side trusted the other and both wanted to extend their great ideology to the rest of the world, the Cold War hea ted up. Each side constantly believed the other wanted to destroy the other and felt the need to create a better military force. A military tension began between the two countries. The United States also expanded its navy, armed ships with new technology. Scientists were developing new weapons to aid this military buildup.Russia, too also built up their military as well. During this time period, while the Russians pushed the Germans out of their border, they also pushed inwards into Eastern Europe. Russia occupied many countries, making it easier for them to establish control and as they established controls in these areas, they gave the local Communist parties a lot of support. Thus, widened their influence in their countries and brought along Moscow-trained Communist leaders who had gone to the USSR during the war spreading the influence of Communism ((Artikkel).Meanwhile Stalin saw this as an opportunity to establish his ideal one-party governments in these countries , he combine d all allie government and removed their partners which were needed as the Communist Parties in the different countries were not strong enough on their own to gain the support of the people and govern the country. The USSR was now able to continue and increase/maintain power in Eastern Europe, successfully forming the satellite states (Iron Curtain). The arms race had a different result on the economies for each country.The US experienced great economic expansion, new companies were founded by the people to supply the needs of the military. More money was being pumped into the society and as people received more money, they wanted choices how to spend their money. So businesses that expanded this economies expansion. Resources were diverted from one area to provide for the expansion of the military. Since the government owned everything, new companies formed took resources from other areas of their economy.The military expansion robbed resources the provided needs for the needs of t he people hence the result was a shortage of food and other necessary goods for the day to day survival. The arms race resulted in a contraction of the Russian economy. In June 1947, the Marshall Plan was put into effect in order to stop the Russians from influencing any of the weakened western powers(Marshall). Meanwhile the United States sent billions of dollars to help aid to Europe democracies and rebuild vastly reducing the influence of Communism. This brought back Western Germany and rebuilt it as a new ally in US’s fight against USSR.As a result of Russia rejection of aid to Marshall Plan, East Germany was not completely rebuilt, the lack of reconstruction showed and also during its reunification. The Communists never paid for all of the reconstruction cost while Germany’s economy did taking big hit in their economy. The Truman Doctrine, a plan to help states going through a struggle for freedom against their oppressors, was instituted in 1948. President Truman said, â€Å"I believe it must be the policy of the United States to support free peoples who are resisting attempted subjugation by armed minorities or by outside pressures (Truman). Communism was only allowed to areas already under Soviet control, and Americans would resist Soviet expansion everywhere else. The Truman Doctrine could not have been more clearly directed towards East Germany and, technically, West Germany (Truman). Germany was still under the power of an outside force and also under the power the Deutsches Demokratische Republik. In 1949 the Allies made good on what they promised in the Truman Doctrine and unified West Germany into the BDR (Federal Republic of Germany) and also the Russians instituted the DDR, which turned out to be more of a regime than a government (Truman).

Sunday, September 29, 2019

Development Communication

I. Introduction Development communication is the use of communication to promote social development. It involves a planned transformation of an average community into a dynamic one. As such, a community plan is made to help people shape their cities, towns or villages. A community plan is essential because it encourages people to take a full and active role in advocating and implementing economic and social reform. In line with this, the author of this paper conducted a community research at Barangay 694, Malate, Manila City.Within the research is substantial information about the said community – such as ecological factors, historical development, life activities, complex of values, social groups, impact of the world outside, and local life. A proposal for a project plan was also made in order to help build a collective vision for the residents of Barangay 694 – specifically, a summer reading program. The summer reading program will benefit the less developed children of Barangay 693. In addition, it will also develop children’s potentials to be educated and literate adults. II. Community Identification Barangay 694 is located at Malate, Manila City.A part of District 6, it lies along Leon Guinto Street and is near places such as Taft Avenue, The Philippine Women’s University, Philippine Christian University, and the Pedro Gil and Quirino LRT stations. The aforementioned places also serve as primary landmarks of Barangay 694. Because of its strategic location near Taft Avenue, Barangay 694 can be aptly described as a middle-class area with several houses and apartment units for students enrolled at nearby universities. In addition, it is easily accessible by Roxas Boulevard, Quirino Avenue, and Taft Avenue. III. Ecological Frame 1. Geographical factorsBarangay 694 is located at latitude 14. 573330 and longitude120. 990860. Its coordinates are 14 °34’24† North and 120 °59’26† East. It has a total land ar ea of To its south is Pasay City; to its west, Manila Bay; to its north, Ermita; to its east, Paco and San Andres. 2. Climate and soil As part of Manila City, Barangay 694 features a tropical savanna climate that borders on tropical monsoon climate. Along with the rest of the Philippines, Barangay 694 lies within the tropics. The temperature range is very small, rarely going lower than 20 °C (100 °F) and going higher than 38 ° (100 °F).Humidity levels are usually very high which makes the place feel much warmer. It has a distinct dry season from late December to April and a relatively wet season that covers the remaining period. Typhoons can occur from June to September and can cause flooding in the area. 3. Service institutions Barangay 694 has several service institutions that responds to the residents’ needs. Its strategic location offers its residents convenience as they need no look further than the immediate vicinity to have access to hospitals, educational inst itutions, books, recreational areas, and government offices.Listed below are several establishments near Barangay 693: * HEALTH INSTITUTIONS * Ospital ng Maynila * RTM Satellite Clinic * Ruben C. Bartolome, M. D. Clinic * GOVERNMENT INSTITUTIONS * Department of Finance * Bangko Sentral ng Pilipinas * RECREATIONAL AREAS * Rizal Memorial Sports Complex * Manila Zoological and Biological Gardens * Manila Baywalk Area 5. Government The current mayor for the 2010 – 2013 term is Alfredo Lim. Meanwhile, Isko Moreno is the city’s incumbent vice-mayor. Two more members of the Manila City Council are the Association of Barangay Captains and the Sangguniang Kabataan (SK).Barangay 694’s elected barangay officials have the responsibility of carrying out the following tasks: (1) formulating measures to eliminate the use of illegal drugs; (2) maintaining the cleanliness and beautification of the area; (3) promoting peace and order; (4) promoting the well-being of women in the community; (5) promoting youth rights; and (6) maintaining barangay-owned properties and infrastructures. Listed below are the currently elected Barangay 694 officials and brief descriptions of each office position: 1. PUNONG BARANGAY or BARANGAY CHAIRMAN Name: Is the executive head of Barangay 693 * Is in charge of development planning, basic services and facilities, compliance to directives, barangay legislation, and fiscal administration 2. BARANGAY SECRETARY Name: * Is liable for all of Barangay 694’s paper works * Takes down notes during all of the discussions and plans made in meetings * Reads and re-reads the reports he/she has made 3. BARANGAY TREASURER Name: * Is responsible for the funds of Barangay 694 – from properties budget, projects budgets, and salaries 4. SEVEN BARANGAY COUNCILORS: 1. 2. 3. 4. 5. 6. 7. All have specific tasks assigned to them by the Barangay Chairman – Must be in the barangay hall once a week to accommodate people coming to thei r office every now and then SK CHAIRMAN: IV. Historical Development 1. Origin During the Spanish colonial period, Malate was an open area with a small fishing village. When the Americans came to the country after a 333-year Spanish reign, American urban planners envisioned the development of Malate as the most sophisticated area for American families. Despite extensive damage after World War II, many homes and buildings survived the onslaught of the battle fought in the area.Wealthy families who evacuated their homes during the war returned. Along with their return, they re-built their properties and kept the areas around it exclusively residential. Among these residential areas was Barangay 694. A local resident living in the area for almost fifty years related that Barangay 694 has been a residential area since the post-Japanese period. In fact, even before Japanese colonization, several of her forebears have lived there. This is proof that Barangay 694 has been around for many ye ars. 2. First InhabitantsDuring interviews, local residents were asked to name some of the first inhabitants of Barangay 694. The general response was a â€Å"no†. This answer is easily justifiable since the barangay has had such a long history and no one could really be certain of the first people who first inhabited the area. However, several residents know of families who had been living in the barangay for a long time. These families are almost considered as pioneers. As such, they are held in high regard. Among the well-known families in the area are the families of Magalon, San Pedro, Sevilla, Martinez, Andres, and Reyna.Most members of the said families hold positions in local offices – specifically, the Barangay Committee. This is a testament to the high social status they have established along the years. 3. Development The once-exclusive residential areas on the Western portion of Malate began to transform into a commercial area in the 1970s. Real estate boom ed with large houses and apartments being built. Businesses also flourished as small hotels, restaurants, and cafes were established. During the presidency of Ferdinand Marcos, visual and performing artists found a haven in Malate in the 1980s and it became a bohemian enclave. . Progress at present Barangay 694, along with the rest of Malate, is continuously transforming itself as the center of recreation and entertainment in Manila with more restaurants, boutiques, bars, discos, and novelty stores opening for business. V. Life Activities 1. Social Structure: Social status of the residents Barangay 694 is a quiet middle-class area with several houses and apartments for students enrolled at nearby universities. Consequentially, the area is fairly tight-knit. At several community visits, the local residents displayed evident familiarity with those who live among them.In fact, it can be said that everyone knows everyone at Barangay 694. 2. Favorite pastime and recreation Because of wel l-maintained social ties, local residents enjoy doing recreational activities with their families, friends or neighbors. When asked what special activities they did during their pastime, respondents from the area said that they liked going to parks, playing bingo, organizing outings, visiting nearby malls, and perhaps, going out of town. Moreover, a typical Saturday and Sunday night for residents of Barangay 694 would consist of going to the church and, afterwards, watching late-night TV shows.Younger residents, meanwhile, said that they’d rather surf the Web, open their Facebook or Twitter accounts or play video games. 3. Groups and organizations The community has only one major organization, which is the local barangay council. Barangay 694’s elected barangay officials have the responsibility of carrying out the following tasks: (1) formulating measures to eliminate the use of illegal drugs; (2) maintaining the cleanliness and beautification of the area; (3) promotin g peace and order; (4) promoting the well-being of omen in the community; (5) promoting youth rights; and (6) maintaining barangay-owned properties and infrastructures. VI. Complex of Values 1. Core values of the community, that is, those that are generally accepted in society Barangay 694, being a tight-knit community, generally accepts these four core values: honesty, cooperation, a sense of responsibility, and righteousness. These values are considered to be the key to creating harmonious relationships. Honesty came in first in the list as most local residents consider it to be the most valuable trait one can possess. A dishonest man will know and bring nothing but trouble,† says Ronaldo Dela Cruz, 56, a lifelong Barangay 694 resident. Meanwhile, cooperation is also a cherished value in the community. Because of its small population, Barangay 694 expects its residents to participate in community development projects such as street cleaning, tree planting, etc. The spirit of bayanihan ensures that ties among residents are rekindled and reinforced. Accompanying cooperation is a sense of responsibility. Community members should be self-aware. They must be able to look after themselves and perform their obligations as citizens of the Republic.Last but not the least is righteousness. As observed, Barangay 694 holds quite high moral standards. A local resident must be morally upright. He or she must be able to hold and maintain a good reputation. Otherwise, he or she would not be warmly welcomed into the community. 2. Aim values of the community, that is, those options that society allows its members Barangay 694 gives its residents the full freedom to make decisions they thing will best suit their wants and needs – so long as these decisions will not harm or offend other people.While many local residents are still quite conservative in that distinct Filipino way, they are quite open to progressive ideas like the implementation of the RH Law, K-12 ed ucation (while prevalent in other countries, K-12 education is still quite new to Filipinos), and the passing of Freedom of Information Bill. 3. Attitudes and sense of values Overall, Barangay 694 residents are upbeat, friendly, and warm people. They are generally well-mannered and will go out of their way to help others. They uphold traditional Filipino values and strive to uphold them in their daily lives.All of which makes Barangay 694 a very nice place to live in. VII. Impact of the world outside 1. Inflow of ideas, goods, special forms, moral codes, new modus vivendi et operandi from the outside world to the community Barangay 694 keeps abreast of the current happenings through various mediums. Among these mediums are newspapers, television, radio, and the Internet (particularly, social media). Local residents are well-informed and are keen to follow both national and international events. They are also aware of recent popular culture trends. Development Communication I. Introduction Development communication is the use of communication to promote social development. It involves a planned transformation of an average community into a dynamic one. As such, a community plan is made to help people shape their cities, towns or villages. A community plan is essential because it encourages people to take a full and active role in advocating and implementing economic and social reform. In line with this, the author of this paper conducted a community research at Barangay 694, Malate, Manila City.Within the research is substantial information about the said community – such as ecological factors, historical development, life activities, complex of values, social groups, impact of the world outside, and local life. A proposal for a project plan was also made in order to help build a collective vision for the residents of Barangay 694 – specifically, a summer reading program. The summer reading program will benefit the less developed children of Barangay 693. In addition, it will also develop children’s potentials to be educated and literate adults. II. Community Identification Barangay 694 is located at Malate, Manila City.A part of District 6, it lies along Leon Guinto Street and is near places such as Taft Avenue, The Philippine Women’s University, Philippine Christian University, and the Pedro Gil and Quirino LRT stations. The aforementioned places also serve as primary landmarks of Barangay 694. Because of its strategic location near Taft Avenue, Barangay 694 can be aptly described as a middle-class area with several houses and apartment units for students enrolled at nearby universities. In addition, it is easily accessible by Roxas Boulevard, Quirino Avenue, and Taft Avenue. III. Ecological Frame 1. Geographical factorsBarangay 694 is located at latitude 14. 573330 and longitude120. 990860. Its coordinates are 14 °34’24† North and 120 °59’26† East. It has a total land ar ea of To its south is Pasay City; to its west, Manila Bay; to its north, Ermita; to its east, Paco and San Andres. 2. Climate and soil As part of Manila City, Barangay 694 features a tropical savanna climate that borders on tropical monsoon climate. Along with the rest of the Philippines, Barangay 694 lies within the tropics. The temperature range is very small, rarely going lower than 20 °C (100 °F) and going higher than 38 ° (100 °F).Humidity levels are usually very high which makes the place feel much warmer. It has a distinct dry season from late December to April and a relatively wet season that covers the remaining period. Typhoons can occur from June to September and can cause flooding in the area. 3. Service institutions Barangay 694 has several service institutions that responds to the residents’ needs. Its strategic location offers its residents convenience as they need no look further than the immediate vicinity to have access to hospitals, educational inst itutions, books, recreational areas, and government offices.Listed below are several establishments near Barangay 693: * HEALTH INSTITUTIONS * Ospital ng Maynila * RTM Satellite Clinic * Ruben C. Bartolome, M. D. Clinic * GOVERNMENT INSTITUTIONS * Department of Finance * Bangko Sentral ng Pilipinas * RECREATIONAL AREAS * Rizal Memorial Sports Complex * Manila Zoological and Biological Gardens * Manila Baywalk Area 5. Government The current mayor for the 2010 – 2013 term is Alfredo Lim. Meanwhile, Isko Moreno is the city’s incumbent vice-mayor. Two more members of the Manila City Council are the Association of Barangay Captains and the Sangguniang Kabataan (SK).Barangay 694’s elected barangay officials have the responsibility of carrying out the following tasks: (1) formulating measures to eliminate the use of illegal drugs; (2) maintaining the cleanliness and beautification of the area; (3) promoting peace and order; (4) promoting the well-being of women in the community; (5) promoting youth rights; and (6) maintaining barangay-owned properties and infrastructures. Listed below are the currently elected Barangay 694 officials and brief descriptions of each office position: 1. PUNONG BARANGAY or BARANGAY CHAIRMAN Name: Is the executive head of Barangay 693 * Is in charge of development planning, basic services and facilities, compliance to directives, barangay legislation, and fiscal administration 2. BARANGAY SECRETARY Name: * Is liable for all of Barangay 694’s paper works * Takes down notes during all of the discussions and plans made in meetings * Reads and re-reads the reports he/she has made 3. BARANGAY TREASURER Name: * Is responsible for the funds of Barangay 694 – from properties budget, projects budgets, and salaries 4. SEVEN BARANGAY COUNCILORS: 1. 2. 3. 4. 5. 6. 7. All have specific tasks assigned to them by the Barangay Chairman – Must be in the barangay hall once a week to accommodate people coming to thei r office every now and then SK CHAIRMAN: IV. Historical Development 1. Origin During the Spanish colonial period, Malate was an open area with a small fishing village. When the Americans came to the country after a 333-year Spanish reign, American urban planners envisioned the development of Malate as the most sophisticated area for American families. Despite extensive damage after World War II, many homes and buildings survived the onslaught of the battle fought in the area.Wealthy families who evacuated their homes during the war returned. Along with their return, they re-built their properties and kept the areas around it exclusively residential. Among these residential areas was Barangay 694. A local resident living in the area for almost fifty years related that Barangay 694 has been a residential area since the post-Japanese period. In fact, even before Japanese colonization, several of her forebears have lived there. This is proof that Barangay 694 has been around for many ye ars. 2. First InhabitantsDuring interviews, local residents were asked to name some of the first inhabitants of Barangay 694. The general response was a â€Å"no†. This answer is easily justifiable since the barangay has had such a long history and no one could really be certain of the first people who first inhabited the area. However, several residents know of families who had been living in the barangay for a long time. These families are almost considered as pioneers. As such, they are held in high regard. Among the well-known families in the area are the families of Magalon, San Pedro, Sevilla, Martinez, Andres, and Reyna.Most members of the said families hold positions in local offices – specifically, the Barangay Committee. This is a testament to the high social status they have established along the years. 3. Development The once-exclusive residential areas on the Western portion of Malate began to transform into a commercial area in the 1970s. Real estate boom ed with large houses and apartments being built. Businesses also flourished as small hotels, restaurants, and cafes were established. During the presidency of Ferdinand Marcos, visual and performing artists found a haven in Malate in the 1980s and it became a bohemian enclave. . Progress at present Barangay 694, along with the rest of Malate, is continuously transforming itself as the center of recreation and entertainment in Manila with more restaurants, boutiques, bars, discos, and novelty stores opening for business. V. Life Activities 1. Social Structure: Social status of the residents Barangay 694 is a quiet middle-class area with several houses and apartments for students enrolled at nearby universities. Consequentially, the area is fairly tight-knit. At several community visits, the local residents displayed evident familiarity with those who live among them.In fact, it can be said that everyone knows everyone at Barangay 694. 2. Favorite pastime and recreation Because of wel l-maintained social ties, local residents enjoy doing recreational activities with their families, friends or neighbors. When asked what special activities they did during their pastime, respondents from the area said that they liked going to parks, playing bingo, organizing outings, visiting nearby malls, and perhaps, going out of town. Moreover, a typical Saturday and Sunday night for residents of Barangay 694 would consist of going to the church and, afterwards, watching late-night TV shows.Younger residents, meanwhile, said that they’d rather surf the Web, open their Facebook or Twitter accounts or play video games. 3. Groups and organizations The community has only one major organization, which is the local barangay council. Barangay 694’s elected barangay officials have the responsibility of carrying out the following tasks: (1) formulating measures to eliminate the use of illegal drugs; (2) maintaining the cleanliness and beautification of the area; (3) promotin g peace and order; (4) promoting the well-being of omen in the community; (5) promoting youth rights; and (6) maintaining barangay-owned properties and infrastructures. VI. Complex of Values 1. Core values of the community, that is, those that are generally accepted in society Barangay 694, being a tight-knit community, generally accepts these four core values: honesty, cooperation, a sense of responsibility, and righteousness. These values are considered to be the key to creating harmonious relationships. Honesty came in first in the list as most local residents consider it to be the most valuable trait one can possess. A dishonest man will know and bring nothing but trouble,† says Ronaldo Dela Cruz, 56, a lifelong Barangay 694 resident. Meanwhile, cooperation is also a cherished value in the community. Because of its small population, Barangay 694 expects its residents to participate in community development projects such as street cleaning, tree planting, etc. The spirit of bayanihan ensures that ties among residents are rekindled and reinforced. Accompanying cooperation is a sense of responsibility. Community members should be self-aware. They must be able to look after themselves and perform their obligations as citizens of the Republic.Last but not the least is righteousness. As observed, Barangay 694 holds quite high moral standards. A local resident must be morally upright. He or she must be able to hold and maintain a good reputation. Otherwise, he or she would not be warmly welcomed into the community. 2. Aim values of the community, that is, those options that society allows its members Barangay 694 gives its residents the full freedom to make decisions they thing will best suit their wants and needs – so long as these decisions will not harm or offend other people.While many local residents are still quite conservative in that distinct Filipino way, they are quite open to progressive ideas like the implementation of the RH Law, K-12 ed ucation (while prevalent in other countries, K-12 education is still quite new to Filipinos), and the passing of Freedom of Information Bill. 3. Attitudes and sense of values Overall, Barangay 694 residents are upbeat, friendly, and warm people. They are generally well-mannered and will go out of their way to help others. They uphold traditional Filipino values and strive to uphold them in their daily lives.All of which makes Barangay 694 a very nice place to live in. VII. Impact of the world outside 1. Inflow of ideas, goods, special forms, moral codes, new modus vivendi et operandi from the outside world to the community Barangay 694 keeps abreast of the current happenings through various mediums. Among these mediums are newspapers, television, radio, and the Internet (particularly, social media). Local residents are well-informed and are keen to follow both national and international events. They are also aware of recent popular culture trends.

Saturday, September 28, 2019

Expansion Devices

Page 1 of 4 Expansion Devices I. Introduction Expansion devices are basic components of a refrigeration system which carry out two major purposes: (1) the pressure reduction from the condenser to evaporator pressure and (2) the regulation of refrigerant flow into the evaporator. These expansion devices can be generally classified into two types which are namely the fixed opening type (flow area is fixed) and the variable opening type (flow area changes correspondingly with a change in mass flow rates).There are about seven basic types of expansion devices for a refrigerant in a refrigeration system. These include capillary tubes and orifice which are under the fixed opening type and the manual expansion valves, automatic expansion valve (AEV), thermostatic expansion valve (TEV), electronic expansion valve and float type expansion valve which are all under the variable opening type. The float type expansion valve is further classified into high side float valve and low side float valv e (Arora, 2006).One of the most commonly used expansion device is the capillary tube. For the purpose of this exercise, a computation related to it will be performed. In a lesson guide on expansion devices prepared by Prof. R. C. Arora in 2006, he/she defined a capillary tube as â€Å"†¦a long, narrow tube of constant diameter. The word „capillary? is a misnomer since surface tension is not important in refrigeration application of capillary tubes. Typical tube diameters of refrigerant capillary tubes range from 0. 5 mm to 3 mm and the lengths range from 1. 0 m to 6 m. II. Objectives The exercise was conducted to familiarize the students with expansion devices, its functions and its importance. Specifically, the objectives were: 1. ) to examine the construction of some commonly-used expansion devices; and 2. ) to assess the performance of some commonly-used expansion devices. III. Methodology A. Lab-Scale Refrigeration System A lab-scale set-up for a refrigeration system in the refrigeration laboratory was observed for the effects of expansion devices on the pressures at various points within the system.Three different types of expansion devices which are namely the capillary, constant-pressure and thermostatic expansion devices are activated by opening their corresponding valves. The reading at each of the five pressure reading points was recorded for every 2 to 3 minutes until they become stable. An image of the observed set- Page 2 of 4 up was taken and the locations of the pressure-reading points were labelled. See Appendix A for the image. B. Computation: Capillary Tube For the stabilized values of the condenser and evaporator pressures measured, the required theoretical length of the capillary tube was computed.The results were then compared with the actual length of the capillary tube observed in the laboratory. See Appendix B for the value of the computed and measured length of capillary tube. IV. Answers to Questions 1. In the computation part above, is there a discrepancy between the actual and the calculated length of capillary tube? Explain. Based on Table 1, there is a discrepancy between the computed and measured value of the capillary tube. First, it must be noted that throughout the computation, assumptions were made.Upon realizing the difficulty of obtaining a value for the mass flow rate, a reasonable value of it was assumed. This could affect the obtained theoretical length of capillary tube since some of the parameters involved in the computation require its use. Simply said, the theoretical length would either increase or decrease depending on the assumed value but never equal to the actual length, unless the same mass flow rate completely applies to the actual system (which might not really be the case).This is the same explanation behind the other assumed parameters. Additionally, the measurement of quantities necessary for computing the length of capillary tube is also subject to many possible errors. This may include errors due to the limitation of the instruments or devices or due to some human inflicted errors. From the computed percent error, it can be inferred that the two values for capillary tube length deviate from each other at the specified percentage. V. References Arora, 2006. Expansion Devices. [pdf file] Available at . VI.Appendix A. Figure with labels Page 3 of 4 PRESSUREREADING POINT 5 PRESSUREREADING POINT 1 PRESSUREREADING POINT 2 PRESSURE READING POINT 3 PRESSUREREADING POINT4 Fig 1. An image showing the pressure reading points in a lab-scale set-up for a refrigeration system B. Tabulated data Table 1. Measured and computed length of capillary tube Quantities Actual length (m) Theoretical length (m) Percent error (%) Values 4. 1 7. 17 42. 82 Note: Computations on how I arrived with these values are in the spreadsheet submitted with this report. Page 4 of 4

Friday, September 27, 2019

A profile of a country (other than the United States) describing its Essay

A profile of a country (other than the United States) describing its domestic intitutions and how those affect its relations with the rest of the world - Essay Example In 1916, there came into existence an acknowledgement by the British with Qasim Al-Thani recognizing the family as the rulers. In 1971, Qatar broke of the agreement after adopting constitutional independence. The country’s official language is Arabic but other languages such as English, Urdu, and Farsi are also spoken. The use of Arabic is in an effort to reinforce the country’s Islamic identity (Fromherz, 2012). The country has embodied the use of the word Khaleeji to differentiate golf states citizens from N. Africa and Levantine Arabs. The main religion that the country has taken up is Islam (specifically Wahhabism). However, in spite of the high upholding of Islam, the level of activity as regards Islam has been rated as medium. The country notably, has very few incidences that have been reported relating to anti-western terrorist activity. Qatar is ruled by an Emir and is subsequently and Emirate. This type of government is common only in Middle Eastern countries and has been linked to their practice of Islam. Since Qatar attained independence, the Al-Thani family has ruled the country. The cabinet ministers as well as official in high-ranking positions in Qatari government are from the Al-Thani family. However, a few appointments that are of a high level capacity have occurred outside the family. Notably though, the occurrence in question only comes about as a rarity (Gray, 2013). In 1998, Qatar went on to hold its very first open elections. The elections were centered on the election of a municipal council. There was a very large voter turn up as the historical event attracted a lot of attention. The election also attracted a large candidacy inclusive of women. However, no member of the female candidacy populace was elected; an illustration of the regard for female leadership and equality in Qatar at the time. The m unicipal council is meant to represent issues being faced in residential sectors to the relevant t government bodies. As a

Thursday, September 26, 2019

A Case of Morphing Legal Changes in China Study Example | Topics and Well Written Essays - 500 words

A of Morphing Legal Changes in China - Case Study Example I would also be prepared to be knowledgeable on business laws and regulations, particularly those that pertain to sensitive areas that could endanger my professional competence and capabilities to implement organizational strategies. Finally, I will be very careful in dealing with other stakeholders, especially officials from the Chinese Steel Industry and ensure transparency, honesty and integrity in all undertakings, with due support and validations of all correspondences, as required. As a high-potential rising star manager within Rio Tinto, after what happened to the other executives in China, I would not take the position for personal and professional safety. Although China was deemed the company’s biggest customer, its previous image of morphing legal cases prove to be detrimental to one’s professional goal for advancement. The costs and risks of being assigned to China far outweighs the benefits of being assigned there. As the CEO of Rio Tinto, I would ensure that all managers who are eyed to be capable and competent for positions in China must be culturally and legally adept with their business protocols and practices; as well as their legal laws pertaining to managing an organization. Thereby, before sending any executives to China, I would instruct training, orientation, and comprehensive understanding of ethical, moral and legal standards of operating, managing and running a business in the local Chinese setting. Further, I would clearly emphasize to the executives to avoid any confrontations that could lead to legal disputes. Based on the new information, my answers to questions 1, 2 and 3 would not change. Any new information should first be verified as to its accuracy, reliability and veracity. If there are truths to the allegations that any of the executives were instrumental in inflating iron ore prices and in

Physical therapy evidence based practice articles Research Paper

Physical therapy evidence based practice articles - Research Paper Example Moreover, the patients were expected to have no pre-existing conditions limiting mobility or contra-indications or balance to TENS. Furthermore, the participants were selected from local community stroke factions and volunteers from the research groups database. Additionally, the participants were expected to be able to give an explicit consent and travel to the study facilities for the necessary testing. The intervention involved a single session of "active TENS" given through a "sock electrode" (frequency between 70-30Hz over a 5s cycle) as well as a course of control treatment (participants wearing the sock electrode lacking stimulation), lasting about two hours in total. There was blinding where all the patients acted as their own control while the randomization followed the order in which the control or TENS was issued thus all participants receiving both stimulation and control conditions. The outcomes reported were obtained from plantar flexor and dorsiflexor strength and proprioception employing an Isokinetic Dynamometer, balance, gait speed and falls risk. The analysis was an exploratory trial to determine the effects of "activeTENS." The study provided initial evidence of the possibility of "activeTENS" to benefit physical function following stroke that merits further second phase trials to improve the intervention. All the patients tolerated "activeTENS" and most of the parameters, advanced throughout stimulation with activeTENS; gait speed (p = 0.002), balance (p = 0.009), proprioception of plantar flexion (p = 0.029) and plantar flexor strength (p = 0.008), except dorsiflexion proprioception (p = 0.078) and dorsiflexor strength (p = 0.194). There was no threat to validity or reliability as the only complaint of leg pain after treatment was resolved the following day. Moreover, the concerns that "activeTENS" could have

Wednesday, September 25, 2019

Nursing informatics Research Paper Example | Topics and Well Written Essays - 1250 words

Nursing informatics - Research Paper Example It is used in the management of the records of the patients. The data pertaining to a given patient can be safely stored and retrieved with ease when required. The technology can also be used to diagnose a patient based on the records that have been obtained. Thus, technology is generally necessary for the diagnosis, treatment, and the management of patients in a health institution (Cleveland Clinic, 2011, para.1). The success of the application of modern information technology in a given health care institution is not obvious. The management of such institutions needs to define and develop an appropriate strategy for integrating the modern technology into their system. A good patient care will be achieved if the use of technology is supported by the processes of the institution and the cooperation among the workers in the institution (Cleveland Clinic, 2011, para.3). The nurses in the health care institutions need to be conversant with the applications of the automated systems in va rious tasks. There is need to develop a joint passion for the profession and the learning of new technology. Thesis statement The application of information technology in nursing practice will be successful in improving the quality of services to the patients if the processes of the health center are well organized and if there is good coordination between the health workers in the organization. 2. Informatics in nursing The practice of nursing involves handling very vital pieces of information relating to the patients’ health that are necessary for proper service delivery (Ball, 2000, p.7). The management of the patients in a given health care institutions is made easier of the records of the patients are available and in an organized manner. The health history of a given patient can be traced and this will help the clinician in making the appropriate diagnosis (Berner, 1999, p.5). There are also pieces of information relating to the nursing practice. These include the proce dures, guidelines, and policies that are applicable in the practice and in a given institution. The nurses would want to obtain these pieces of information from their seniors or communicate them to the other nurses within the institution. There would also be a need to communicate to the patients in certain instances. The way the information is stored, how it can be retrieved, and how it can be communicated to other people will determine its effectiveness. The confidentiality of information is of particular significance in the nursing practice. Besides, the patients should be involved in designing for their care. There is a need for an effective communication between the patient and the nurses. Thus, the information needs to be kept in a secured system that is protected from unauthorized users and from where it cannot be destroyed. There is need to have an organized system that allows for an easy retrieval of information from a large chunk of information. The communication medium nee ds to be fast and efficient and neither should it tamper with the contents of the information. The use of modern technology in these applications is necessary (Berner, 1999, p.139). By using these modern systems, it is easy to organize enormous data so that the retrieval of the required piece of information

Tuesday, September 24, 2019

How the Lack of Technical and Financial Means Prevent Sustainability Essay

How the Lack of Technical and Financial Means Prevent Sustainability in Developing Countries - Essay Example Such communications are necessary for international trade and the import and export of goods. Business operations would no longer be limited to the home nation alone, but would open the entire world to what that nation has to offer. Such technological innovations would also broaden the range of stakeholders who have an interest in information and communication developments (Souter, p. 5). When developing countries begin showing continual promise, investors can find wonderful opportunities within that country that convinces them to invest money in that economy. When that money is invested, the economy benefits as well. Such actions tend to persuade others to do the same, which can then add a popular trend to investing in that particular market. The World Trade Order states that commercial interests do not take priority over development. They know that freer trade boosts economic growth and that that economic growth supports development. The debate, on the other hand, is of whether or not developing countries gain any from this particular system, but it isn't true that these countries gain nothing at all. Since developing countries are higher on the priority list, they are allowed more time to apply the high number of provisions of the World Trade Order agreements. Those that are less developed receive special treatment, which means that they don't necessarily have to follow certain provisions (WTO p.1). But there is still a deficiency that exists; otherwise those provisions in place that are required to be followed would be working. Perhaps the provisions need to be reviewed in order to give these countries a boost in the right direction and cause a snowball effect that... This report stresses that there is no doubt that developing countries are on the agendas of the WTO and the International Institute for Sustainable Development. One of the priorities on these agendas is the information and communication technology sector. Developing countries that would be able to achieve success in the information and communication technology sector would be able to achieve communication internationally with other businesses and with consumers to increase income potential. Such communications are necessary for international trade and the import and export of goods. Business operations would no longer be limited to the home nation alone, but would open the entire world to what that nation has to offer. This paper makes a conclusion that there is a technological and financial deficiency when it comes to the advancement of developing countries being behind the rest of the world. Developing countries do have, on the other hand, some processes that are in place, otherwise they wouldn’t be developing. One could honestly say that if these countries did not have some sort of successful processes happening, they would be considered undeveloped and consist of much higher poverty levels than what they currently have. Globalization has opened a world of opportunities for developing countries, but it has also opened a world of opportunities for the developing countries to be taken advantage of.

Monday, September 23, 2019

Analysis Essay Example | Topics and Well Written Essays - 500 words - 12

Analysis - Essay Example The paper discussed a vital and challenging aspect of healthcare, by taking into account a way some of the issues related to this topic can be addressed. Moreover, it was a proof of how an initiative can change perspective on a micro level, and why not to the overall medical system. Such initiatives are welcomed, and it must be remembered that the success of the project is a factor of the implication of people involved. Nowadays, an important issue when considering cost accounting are the physical distribution activities and other marketing functions. A solution to this issue is the activity-based costing (ABC) for marketing. The main outcome of this technique is to help marketing managers in their decision making process related to profitability, pricing, and distribution areas. The most important marketing activities considered are selling, warehousing, packing and shipping, and administrative. This article provided a clear distinction on importance of marketing costs, and the ways these are assessed. Because recent years were characterized by advancement in marketing, and also on the costs related to this, I think it is necessary to consider the ABC technique in order for a manager to take the best decisions for the company he is running. In order to assess the quality of distribution channels, an ABC analysis can be used. The advantage of this technique over standard approach to channel profitability is the fact that it is estimating cost more accurately, which is very important for a company to decide where it is selling its products. However, ABC has also a main disadvantage which is related to its assumption that all costs are product-driven so it should be allocated to products. Another approach is the strategic cost management approach, which extends the assumption of ABC to consider also that costs are driven by the customers and by the distribution

Sunday, September 22, 2019

Economic History and Current India Essay Example for Free

Economic History and Current India Essay There have been recent studies of the entire history of the economy of india where it is possible to ananlyse where india stood its place in past and where it is currently held. Paul Birog made a thorough analysis of Asian countries GDP economic development of 1750-1918 where surprisingly the findings in 1700AD drawn economic statistics of world . China had 32. 8% GDP where as as india had 25% . UK at that time had 1. 8% GDP along with 1% GDP in USA. By the time of 1900 there was a total reversal of paradigm shift where US and UK had GDP growth of 41% whereas China and India suffered 1. 7% GDP overall. The western research shows that india was a economic giant . London economist Angus Madisson in 1990, one of the greatest british economist of all time was appointed by the OECD nations to verify Paul Birogs research along with different levels of assistances from different countries. Eventually in 2010 he published a 2000 year economy of India where it showed from 1AD India topped thed world with 34% GDP. Still in 1000AD it had 28% GDP. In the years 1500 and 1600 china overtakes india. Again in 1700 india overtakes china and finally the entire crash of the Indian economy began later in 1750’s where the british colonial overlords landed in the country and started looting the country and exploiting its resources. The OECD website refers in the â€Å"world economic history and millennium perspective† lists out all these information which have been quoted before. It is one of the most trusted and relied upon website to refer to the statistics of the world economies. Although the word society is absent completely in western society where Margaret Thatcher said in 1971, that there is nothing called as society. And today all the western accepts today is the alternate version of so called civil society. Now civil society is totally different from the traditional society where it can be suggested that it is a form of ‘anti society’. Civil society which is the current western trend is based on social contractual theory, which all the institution are based including out democratic government where each citizen is recognized as co-citizen in country rather than mutual brotherhood based society. For eg. In USA, in Philedelphia, a Son can file a case against his own father for divorce of relationship and can achieve his claim since there is no cultural society, it is a civil society where 2 people are viewed as co-citizens rather with any blood and brotherly relationship. The complete western understanding, their institutions, sociology, individualism, constitutional theory of west does not recognize normal basic human relationship. But whereas our Indian society has always been working entirely on human relations since the ages of time where india showed a huge economic superpower with traditional society. Today since Indian government which is puppying around the western ideology fail to realize that they are taking the economy of the nation into a huge catastrophy. In 1993, when Manmohan Singh was the finance minister invited jagadish bhagavati a neo economist from USA, who formed the entire Duncan WTO treaty for the situation crisis in india with its economic situation. He suggested that the problem with Indian people is that they are saving more than need which comes around 23%GDP,out of which 19 % GDP were only saved by Indians. His advise included to bring down the savings of the people by different means of taxations and other techniques to 9-10%. Out of which this 9 -10% should only be focused on food, shelter like basic needs and increase productions by employing more people and made a whole theory model on that. His theory on Indian situation stated that unless you destroy the family saving of the Indian people and bring it down to half of it, there was no chance of development. He also made a research on the Indian families that Indian woman played a vital role in taking hold of the savings of her family expenditures. So his ideas proposed to change the mentality of the reserved family woman to consumer based woman where she can be advertised to spend more of our money and change the family structure symmetrically in Indian society. In western society there is no propensity to save money assets, thus as a result many families are destroyed. Today 51% Americans are single parent family, out of which 41% children are born to unwed mothers, 20% born for school going children. 51% of the American people are dependent on government support on life insurance, health support etc. where as Indian people have always been dependent on society. Moreover the western economy is build on contractual interest based constitutional society which has led to time bomb ticking economy is USA and other European countries. Today the present scenario has changed the entire habitual thinking process of the people in India. They have a huge affiliated love towards the western society and its features less realizing the suicidal catastrophic and destructive features of its empire. The govt. in India always claim to be globalizing with the world but in reality, india is Americanizing by focusing only on American economic model. There are other traditional society based economies like Japan and germany wherr they instead of manipulating the crowd, they motivate their savings in their family and encourage only the financial institutions to put up money in trades of stock market. There is a huge commonality between the german or Japanese structure of economic history of rich cultural based society which our country could have adopted for the people but current democractic model is partially by the people but it has terribly failed to be for the people by inviting the civil society in our country. Indian economies,constitutions, institutions,sociology, philosophy, education etc all are based on the government economic blueprint of those same people who looted the country, colonized it and then destroyed the Indian GDP. CONCLUSION There are fraternity based economic models in this world with which we share commonality and our ideas should be to have a wider understanding of the world with whom we relate culturally and socially and only then our economic model can be aligned to them to achieve prosperity and serenity in our country.

Saturday, September 21, 2019

Development of Electronic Data Flows

Development of Electronic Data Flows 1. Introduction The current development on the flow of electronic data, especially those relating to personal data across nations is increasing daily. Most of the flows are related to business activities whereas services are provided to fulfill the needs of people. It also leads to the transformation of commerce, which becomes worldwide and increasingly international. The transfer of huge quantities of data, relating to customers and employees, are required and often occurred among entities that located in different countries. An example would be the system of outsourcing, a practice in which companies and governments hire an external service provider in another country to deliver a program or provide a service, such as managing database of human resources or customers. This can often result in improved efficiencies and levels of services. Further, the advancement of global networks, such as the internet, provides the possibilities to collect, process, and distribute personal data on an unprecedente d scale. However, the trans-border flow of personal data is not only performed by companies or governments but also conducted by individuals in everyday life as well. When the data is used by companies or government, this can represent a high volume of data, such as in the form of the transfer of databases. There will be a quite different volume of data when it is provided by individuals when they disclose their personal data while participating in particular activities, such as browsing the internet or registering on various websites to obtain certain services. Additionally, there is a strong possibility for individuals, who are engaging in data transfer activities to lack of full awareness concerning what could be done to their personal data. In some instances, they do not realize that they have disclosed their personal data and it is subject to transmission and processing within countries not offering the same level of protection as their own country. For example, a student physically located in the Netherlands may complete an online game registration form, containing several spaces soliciting his/her identities, not knowing that the actual service provider is registered in India. Another example, a social worker residing within the United Kingdom might disclose his/her personal data on a web application for an internet banking service provided by a bank based in the United States. From the short description above, the trans-border flow of personal data exists in everyday life on a daily basis and it becomes a vital need of every stakeholder, whether governments or private sectors, including individuals. Nevertheless, while the flow has led to greater efficiencies and economic benefits, on the other hand this kind of flow has also raised concerns that some information could end up in the hands of people for whom it was not intended. Worse even is the situation when no one has realized the flow has taken place, spawning a great opportunity for infringement upon ones privacy rights. Some rules concerning privacy and data protection have been set up at national, regional, and international levels to guarantee privacy as one of the human rights is not harmed by any activity, including data processing as the final purpose of trans-border flow. Consequently, the trans-border flow of personal data has to be conducted in a lawful manner. In this respect, a legal framework on trans-border flow of personal data has been enacted in Europe by the European Commission (EC) under two directives. The first one is Directive 95/46/EC concerning the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. This Directive has been further equipped by the second directive, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). In relation to the research objective of this thesis, Directive 95/46/EC is the most relevant and therefore, Directive 2002/58/EC will be referred to when necessary. It should be noted that whenever a term the Directive is being used in this thesis, the term shall refer to Directive 95/46/EC. Under the Directive, a main rule concerning the trans-border flow of personal data has been set up. These include the obligation of data controller to use personal data for specified, explicit, and legitimate purposes, to collect only relevant and necessary data, to guarantee the security of the data against accidental or unauthorized access or manipulation, and in specific cases to notify the competent independent supervisory body before carrying out all or certain types of data processing operations. On the other hand, there is a series of rights for individuals as data subject, such as the right to receive certain information whenever data is collected, to access and correct the data, and to object to certain types of data processing. Nevertheless, all of the practice of these rights and obligations present a significant problem when the trans-border flow of personal data takes place from the European Union/European Economic Area (the EU/EEA) Member States to countries outside the EU/EEA, for the reason that the Directive requires an adequate level of protection in the destination countries. The transfer of personal data to a third country is prohibited when the third country does not have an adequate level of protection to ensure that the processing of personal data will not cause any violation to the rights of data subjects. The binding power of the Directive to the EU/EEA Member States requires each of the Member States to embed the provisions in the Directive into their national legal system. Thus, there is a free zone where trans-border flow of personal data can take place freely among the Member States because they provide the adequate level of protection. Any approval, adequate safeguard, or additional requirement is not necessary to any further extent. As far as public international law is concerned, by applying the extra-territoriality principle, the requirement of the adequacy is automatically fulfilled at the official representatives of the EU/EEA Member States in the third country, such as the Embassy or Consulate General because of the extended jurisdiction of the Member States. However, this principle is not extended to private sectors, since subsidiary offices of multinational companies, still have to abide to the national law in the third country although the base of operations of the company is located in the EU/EEA Member States. In this case, the adequate level of protection is still required even though the transfer is conducted internally among the subsidiaries of the company located in third countries. Currently, the EC has conducted some adequacy findings and has compiled a white list of countries providing an adequate level of protection. This approval means the trans-border flow of personal data can take place as in the free zone between the EU/EEA Member States. However, to date, the white list covers a limited list of countries, seven to be exact. This list might not prove too sufficient from the point of view of multinational companies in accommodating their interest, as it does not include many countries of growing commercial interest. From this point of view, there is a need to harmonize various privacy and data protection regulations in many countries through the establishment of an internationally congruent legal framework for privacy and data protection. Unfortunately, it will take some effort and time for the establishment, while a fast solution is needed. By considering the Directive thus far the strictest legal framework compared with other existing legal framework on privacy and data protection, obviously, there is a need for countries outside the EU/EEA Member States to improve their legal framework to become compliance with adequate level of protection requirement under the Directive. Since Indonesia is neither a Member State of the EU/EEA nor included in the white list of adequacy finding, the requirement of adequate level of protection is applied to Indonesia as a third country. The trans-border flow of personal data only can take place after the data controller is certain that the protection level of personal data in Indonesia is adequate under the Directive. Apparently, Indonesia is needed to criticize, whether or not its legal framework providing an adequate level of protection. Moreover, Indonesia as a Member State of the Asia-Pacific Economic Cooperation (APEC) has received a pressure to provide a sufficient level of protection on trans-border flow of personal data, in relation to the existence of the APEC Privacy Framework. This pressure has become heavier because of Indonesia position as the Association of South East Asian Nations/ASEAN Member States. Therefore, the main objective of this thesis is to examinehow Indonesia can improve its legal framework to comply with the adequate level of protection in view of Directive 95/46/EC. Conducting this examination is important in determining ways Indonesia might be developed into an attractive destination country for international commerce activities. In order to answer the objective of this thesis, three research questions have to be answered: firstly,currently, why Directive 95/46/EC is being acknowledged as the strictest legal instrument concerning privacy and data protection on conducting trans-border flow of personal data compared with other existing legal instruments. Secondly, how the European Commission determines the adequate level of protection in the third country in question under Directive 95/46/EC. Then, thirdly, to what extent legal framework of data protection in Indonesia measures up to the adequate level of protection in Indonesia under Directive 95/46/EC. In line with the effort to answer the first research question, this thesis will try to identify any possibility for improvement towards the current adequacy finding system. Hence, a balance accommodation might be obtained and maintained between the one who requires the adequate level of protection and the one who has to fulfill it. This thesis will be structured as follows. The first chapter is the introduction in which the objective of this thesis is explained. In the second chapter, there will be a brief comparison between the Directive with other legal instruments concerning privacy and data protection. Afterwards, some explanations on the requirement of the adequate level of protection in the light of the Directive will be provided, including the measurement to be used in conducting the adequacy finding and will explore any possible solution if there is no adequate level of protection in the third country in question. Further, this chapter will cover the current problems within the Directive as well as possible suggestions to overcome them. Thus, answering the first and second research question. In the third chapter, relevant issues surrounding Indonesian legal framework will be discussed, including a brief explanation on how Indonesia regulates privacy and data protection as well as a number of the difficulties experienced in doing so. The findings in the second and third chapters shall be employed to carry out the examination in the fourth chapter, which objective is to answer the third research question. The chapter serves to analyze the adequate level of protection of Indonesian legal framework by applying the measurements in the light of the Directive. The analysis will include various potential problems faced by Indonesia on its effort to improve protection of personal data along with several suggestions on how to overcome them. At the final stage, there will be a conclusion, to what extent Indonesia can be deemed as providing an adequate level of protection. As a result, a solution on how Indonesia might improve its legal framework under the Directive to both avoid a lack of protection and offer an adequate level of protection will be achieved. 2. The EU Legal Framework regarding trans-border flow of Personal Data The trans-border flow of personal data is stipulated by regulations concerning data protection. Since the early eighties, several regulations, drawn up by different organizations, have been published in this respect. The first initiative was performed by Organization for Economic Co-operation and Development (OECD) by establishing the Guidelines on the Protection of Privacy and Trans-border Flows of Personal Data (the OECD Guidelines) in 1980. The intention of the Guidelines is to prevent any conflicts between national laws, which can hamper the free flow of personal data between the OECD Member States. This establishment brought an awareness of the importance protection of the trans-border flow of personal data. A similar purpose with the OECD Guidelines has brought the Member States of the Council of Europe (the CoE) to publish a convention on their interest in the following year. They agreed that it is needed to reconcile the fundamental values of the respect for privacy and the free flow of information between them. The agreement is stated in the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (CETS No. 108), with purpose to take into account the right of privacy and the increasing flow across frontiers of personal data in regards of automatic processing, as a way to extend the safeguards for everyones rights and fundamental freedoms. In 1990, by considering the UN has more Member States compared with the OECD and the CoE, Guidelines concerning Computerized Personal Data Files (the UN Guidelines) was established as a way to bring the principles on privacy and data protection being implemented wider among countries. The UN General Assembly through Resolution No. A/RES/45/95 on 14 December 1990, requests the Governments of every Member States to take into account this Guidelines in their legislation. Further, the governmental, intergovernmental, and non-governmental organizations are also requested to respect the Guidelines in carrying out the activities within their field of competence. Nonetheless, the OECD Guidelines, the CETS No. 108, and the UN Guidelines still have some weaknesses. There are some principles of data protection, which are required to be embedded in national laws of each of the Member States but there is no means for ensuring their effective application. For examples, there are no supervisory authority provision in the CETS No. 108 and a lack of procedural clauses in the OECD Guidelines. In another case, concerning the binding power of the instrument, the OECD Guidelines is voluntarily binding to its Member States as well as the UN Guidelines, even though the UN Guidelines has the supervision and sanction provisions. Therefore, Directive 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data has been established by the European Union (the EU) to overcome the limited effect of the two Guidelines and the Convention as mentioned above. Good level of compliance, support and help to individual data subject, and appropriate redress to the injured parties are the means used by the Directive for ensuring the effective application of the content of the rules. Apart from the compliance issue, the obligations and rights set down in the Directive are built upon the OECD Guidelines, the CETS No. 108, and the UN Guidelines. These three legal instruments contain similar principles, except for lawfulness, fairness, and non-discrimination principles are from the UN Guidelines; and special categories of data and additional safeguards for the data subject principles are from the ECTS No. 108. While the rest of the adopted principles are collection limitation, data quality, purpose specification, use limitation, security safeguard, openness, individual participation, and accountability. Further, the aims of the Directive can be seen from two perspectives. The first one is the economical perspective, in relation to the establishment and functioning of an internal market, in which to ensure the free movement of goods, persons, services, and capital, including the free movement of personal data. The second is from the fundamental rights perspective, in which to set the rules for high-level data protection to ensure the protection of the fundamental rights of the individuals. The newest legal instrument concerning privacy and data protection is the APEC Privacy Framework 2004 (the Framework), established by Asia-Pacific Economic Cooperation (APEC). The purpose of the Framework is to ensure there are no barriers for information flows among the APEC Member Economies by promoting a consistent approach to data protection. There are nine principles in the Framework that are built based on the OECD Guidelines. In brief, the adopted principles are preventing harm, notice, collection limitation, uses of personal information, choice, integrity of personal information, security safeguard, access and correction, and accountability. However, this Framework has the same weakness as the previous legal instruments on privacy and data protection before the Directive, which is the absent of means for ensuring the effective application of the principles. Additionally, it should be noted that APEC is a forum that established based on a voluntary basis, without any constitut ion or legally binding obligations for the Member Economies. Hence, the Framework is not binding to the Member Economies. From the brief analysis above, currently, the Directive posses the highest level of protection compared with other existing legal instruments on privacy and data protection. In this respect, to achieve the objective of this thesis as stated in the first chapter, the research questions will be answered by focusing on the Directive. Therefore, in the next section, there will be an explanation on the legal bases of trans-border flow of personal data to third countries under the Directive, followed by a rationalization on how the European Commission (EC) determines whether or not an adequate level of protection exists in the third country in question. Subsequently, the means for ensuring the effective application of the content of rules will be elaborated upon a description on a series of possibilities if the third country in question is not deemed to provide an adequate level of protection. Although currently, the Directive provides high-level of protection, some problems and suggestions will be provided, as an effort to address input for improvement. The findings in this chapter will be used to carry out the adequacy finding of Indonesia as a third country (in the fourth chapter) by doing a comparison with the findings on Indonesian legal framework in chapter three. 2. The Legal Bases of Trans-border Flows of Personal Data to Third Countries The trans-border flow of personal data to a third country to be acknowledged as lawful, it has to be conducted in accordance with the national data protection law of the EU/EEA Member States. It is applicable to the data controllers established in the EU, both at the time when data is being collected and processed. In general, the law consists of a combination between the obligations of data controllers and the rights of data subject. Before the establishment of the Directive, these rights and obligations were regulated under some national data protection laws with different level of protection. In the light of the functioning of internal market in the EU/EEA, all these obligations and rights, including certain procedures to be applied in case of trans-border flow of personal data to a third country, are regulated in the Directive. Whereas the Directive is legally binding to the EU/EEA Member States, an adequate level of protection is fulfilled and consequently trans-border flow of personal data is able to take place among them. Further, when the personal data is used for electronic communication purposes, then the rights and obligations as lay down in Directive 2002/58/EC shall take place. There are three possible types of transfer under the Directive. The first and second types are a communication of personal data by a data controller based in the EU/EEA Member States to another data controller or to a processor based in a third country. Another possibility type is a communication of personal data by a data subject based in the EU/EEA Member States to a data controller based in a third country. Nevertheless, it should noted that the Directive does not cover transfers of personal data in the course of judicial and police cooperation activities falling within Titles V and VI of the Treaty on European Union. The main regulation in the Directive concerning trans-border flow of personal data to a third country is Article 25. The first paragraph of the Article sets out the principle that the EU/EEA Member States shall allow the transfer of personal data only if the third country in question ensures an adequate level of protection. From this provision, it is necessary to explain further on the subject of the transfer of personal data and an adequate level of protection. First, what the Directive means by the transfer of personal data. Undoubtedly, it is often associated with the act of sending or transmitting personal data from one country to another, for instance by sending paper or electronic documents containing personal data by post or e-mail. By seeing from a different perspective, the situation where one conducts a certain activity with the purpose to make data available for others, besides the owner of the data (the data subject), and located in another country, is included as a trans-border flow of personal data. However, by making data accessible for everyone who connects to internet by uploading any personal data on internet web pages, even though that person is located in another country, is not included in the meaning of transfer of personal data to another country. The reason for the previous statement is this kind of activity is properly acknowledged as publishing activity, not transferring activity. This exception is stated clearly by the Court of Justice in the Bodil Lindqvist Case as there is no transfer of personal data to a third country where an individual in a Member State loads personal data onto an internet page making those data accessible to anyone who connects to the internet, including people in a third country. Subsequently, since the Directive is binding to 27 EU Member States, including three countries (Norway, Liechtenstein, and Iceland), which are bound by the Directive by virtue of the European Economic Area agreement (EEA), personal data can flow freely among them. In other words, there is a free zone among the EU/EEA member states. Therefore, transfer in the light of the Directive has to be seen as transfer of personal data from EU/EEA member states to other countries outside EU/EEA, which are recognized as third countries, and the adequate level of protection in those third countries has to be assessed. There is a so-called white list of countries, which have been assessed by the EC and affirmed to provide an adequate level of protection according to the Directive. Currently, the list consists of seven countries as follows: Argentina, Canada (limited to private sector data), Switzerland, United States (Safe Harbor and specific type of transfer: Passenger Name Record/PNR), the Bailiwick of Guernsey, the Isle of Man, and the Bailiwick of Jersey. The approval of adequacy shall be analyzed more carefully because once a country is listed in the white list, does not automatically mean that personal data can flow to the country freely. One should pay attention whether the affirmation is given for the entire legal framework or only for certain part of it in a specific field, sector (public or private), or regarding a specific type of transfer. Insofar, even though the result of adequacy finding shows that the data protection level in certain countries is not adequate, the EC will not create a black list for that negative finding because of political consequences. Instead of the black list, the EC tends to enter into negotiation with the certain country in order to find a solution. It can be concluded from the foregoing, that the adequacy finding is temporary and subject to be reviewed. Procedure of the Adequacy Finding In acknowledging the adequacy finding, the EC has to follow certain procedure, which has been determined in Article 25 Paragraph (6) of the Directive and is known as comitology. At first, there will be a proposal from the EC, followed by an opinion from Article 29 Working Party and an opinion from Article 31 Management Committee, which needs to be delivered by a qualified majority of member states. Afterwards, the EC submits the proposed finding to the European Parliament (EP), who will examine whether the EC has used its executing powers correctly and comes up with recommendation if necessary. As a final point, the EC then can formally issue the result of the adequacy finding. In the next section, the measurements used by the EC in conducting the finding will be explained in detail. 3. Assessing the Adequate Level of Protection The Article 29 Working Party has given an obvious statement thatany meaningful analysis of adequate protection must comprise the two basic elements: the content of the rules applicable and the means for ensuring their effective application.According to WP 12 of the European Commission (EC), a set of content principles that should be embodied in the existing regulations are the following: Purpose limitation principle: data should be processed for a specific purpose and subsequently used or further communicated only if it is compatible with the purpose of the transfer. Data quality and proportionality principle: data should be accurate and, where necessary, kept up to date. Transparency principle: individuals should be provided with information as to the purpose of the processing, the identity of the data controller in the third country and other necessary information to ensure fairness. Security principle: technical and organizational measures should be taken by the data controller that are appropriate to the risks presented by the processing. Rights of access, rectification and opposition: the data subject have the right to obtain a copy of all data relating to him/her that are processed, to rectification of those data that are shown to be inaccurate, and be able to object to the processing of the data. Restrictions on onwards transfers to non-parties to the contract: further transfers of the personal data by the recipient of the original data transfer only permitted if the second recipient provides an adequate level of protection. In addition to these content principles, another set of the means for ensuring the effective application of the principles, whether judicial or non-judicial, are required in order to fulfill the following objectives: Good level of compliance with the rules: the level of awareness of controllers and data subjects and the existence of effective and dissuasive sanctions are the measurements to examine the compliance level, including direct verification by authorities, auditors, or independent data protection officials. Support and help to individual data subjects: an individual should be able to enforce his/her rights rapidly and effectively without prohibitive cost. Institutional mechanism is needed to conduct independent investigation of complaints. Appropriate redress to the injured parties: where rules are not complied, redress to the injured party with independent adjudication or arbitration is provided, including compensation and sanction impose. Beyond the content principles, some additional principles are still needed to consider when it comes to certain types of processing. Additional safeguards when sensitive categories of data are involved and a right to opt-out when data are processed for direct marketing purposes should be in place. Another principle is the right for the data subject not to be a subject to an automated individual decision that intended to evaluate certain aspects, which can give any legal effects and have a significant effect to the data subject. These content principles, including additional principles, and the means for ensuring their effectiveness should be viewed as a minimum requirement in assessing the adequate level of protection in all cases. However, according to Article 25 Paragraph 2 of the Directive, in some cases, there will be two possibilities. There is a need to add the list with more requirements or to reduce it. To determine whether some requirements need to be added or reduced, the degree of risk that the transfer poses to the data subject becomes an important factor. The Article 29 Working Party has provided a list of categories of transfer, which poses particular risks to privacy, as mentioned below: Transfers involving certain sensitive categories of data as defined by Article 8 of the Directive Transfers which carry the risk of financial loss (e.g., credit card payments over the internet) Transfers carrying a risk to personal safety Transfers made for the purpose of making a decision which significantly affects the individual (e.g., recruitment or promotion decisions, the granting of credit, etc) Transfers which carry a risk of serious embarrassment or tarnishing of an individuals reputation Transfers which may result in specific actions which constitute a significant intrusion into an individuals private life (e.g., unsolicited telephone calls) Repetitive transfers involving massive volumes of data (e.g., transactional data processed over telecommunications networks, the Internet, etc.) Transfers involving the collection of data in a particularly covert or clandestine manner (e.g., internet cookies) To sum up, the circumstances should be taken into account when assessing adequacy in a specific case, being: the nature of the data the purpose and duration of the proposed processing operations the country of origin and the country of final destination the rules of law, both general and sectoral, in force in the country in question the professional rules and the security measures which are complied with in that country. Self -regulation From the circumstances as referred to Article 25 Paragraph 2 of the Directive, it can be seen that the assessments of the adequate level of protection is conducted according to the rules of law as well as the professional rules and the security measures. In other words, it has to be examined from a self-regulation perspective as well. The Article 29 Working Party presents a broad meaning of self-regulation asany set of data protection rules applying to a plurality of the data controllers from the same profession or industry sector, the content of which has been determined primarily by members of the industry or profession concerned.This wide definition offers the possibility to on the one hand a voluntary data protection code developed by a small industry association with only a few members and on the other hand a set of codes of professional ethics with quasi judicial force for a certain profession, such as doctors or bankers. Still, one should bear in mind, to be considered as an appropriate legal instrument to be analyzed, it has to have binding power to its members and has to provide adequate safeguards if the personal data are transferred again to non-member entities. Ob Development of Electronic Data Flows Development of Electronic Data Flows 1. Introduction The current development on the flow of electronic data, especially those relating to personal data across nations is increasing daily. Most of the flows are related to business activities whereas services are provided to fulfill the needs of people. It also leads to the transformation of commerce, which becomes worldwide and increasingly international. The transfer of huge quantities of data, relating to customers and employees, are required and often occurred among entities that located in different countries. An example would be the system of outsourcing, a practice in which companies and governments hire an external service provider in another country to deliver a program or provide a service, such as managing database of human resources or customers. This can often result in improved efficiencies and levels of services. Further, the advancement of global networks, such as the internet, provides the possibilities to collect, process, and distribute personal data on an unprecedente d scale. However, the trans-border flow of personal data is not only performed by companies or governments but also conducted by individuals in everyday life as well. When the data is used by companies or government, this can represent a high volume of data, such as in the form of the transfer of databases. There will be a quite different volume of data when it is provided by individuals when they disclose their personal data while participating in particular activities, such as browsing the internet or registering on various websites to obtain certain services. Additionally, there is a strong possibility for individuals, who are engaging in data transfer activities to lack of full awareness concerning what could be done to their personal data. In some instances, they do not realize that they have disclosed their personal data and it is subject to transmission and processing within countries not offering the same level of protection as their own country. For example, a student physically located in the Netherlands may complete an online game registration form, containing several spaces soliciting his/her identities, not knowing that the actual service provider is registered in India. Another example, a social worker residing within the United Kingdom might disclose his/her personal data on a web application for an internet banking service provided by a bank based in the United States. From the short description above, the trans-border flow of personal data exists in everyday life on a daily basis and it becomes a vital need of every stakeholder, whether governments or private sectors, including individuals. Nevertheless, while the flow has led to greater efficiencies and economic benefits, on the other hand this kind of flow has also raised concerns that some information could end up in the hands of people for whom it was not intended. Worse even is the situation when no one has realized the flow has taken place, spawning a great opportunity for infringement upon ones privacy rights. Some rules concerning privacy and data protection have been set up at national, regional, and international levels to guarantee privacy as one of the human rights is not harmed by any activity, including data processing as the final purpose of trans-border flow. Consequently, the trans-border flow of personal data has to be conducted in a lawful manner. In this respect, a legal framework on trans-border flow of personal data has been enacted in Europe by the European Commission (EC) under two directives. The first one is Directive 95/46/EC concerning the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data. This Directive has been further equipped by the second directive, Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). In relation to the research objective of this thesis, Directive 95/46/EC is the most relevant and therefore, Directive 2002/58/EC will be referred to when necessary. It should be noted that whenever a term the Directive is being used in this thesis, the term shall refer to Directive 95/46/EC. Under the Directive, a main rule concerning the trans-border flow of personal data has been set up. These include the obligation of data controller to use personal data for specified, explicit, and legitimate purposes, to collect only relevant and necessary data, to guarantee the security of the data against accidental or unauthorized access or manipulation, and in specific cases to notify the competent independent supervisory body before carrying out all or certain types of data processing operations. On the other hand, there is a series of rights for individuals as data subject, such as the right to receive certain information whenever data is collected, to access and correct the data, and to object to certain types of data processing. Nevertheless, all of the practice of these rights and obligations present a significant problem when the trans-border flow of personal data takes place from the European Union/European Economic Area (the EU/EEA) Member States to countries outside the EU/EEA, for the reason that the Directive requires an adequate level of protection in the destination countries. The transfer of personal data to a third country is prohibited when the third country does not have an adequate level of protection to ensure that the processing of personal data will not cause any violation to the rights of data subjects. The binding power of the Directive to the EU/EEA Member States requires each of the Member States to embed the provisions in the Directive into their national legal system. Thus, there is a free zone where trans-border flow of personal data can take place freely among the Member States because they provide the adequate level of protection. Any approval, adequate safeguard, or additional requirement is not necessary to any further extent. As far as public international law is concerned, by applying the extra-territoriality principle, the requirement of the adequacy is automatically fulfilled at the official representatives of the EU/EEA Member States in the third country, such as the Embassy or Consulate General because of the extended jurisdiction of the Member States. However, this principle is not extended to private sectors, since subsidiary offices of multinational companies, still have to abide to the national law in the third country although the base of operations of the company is located in the EU/EEA Member States. In this case, the adequate level of protection is still required even though the transfer is conducted internally among the subsidiaries of the company located in third countries. Currently, the EC has conducted some adequacy findings and has compiled a white list of countries providing an adequate level of protection. This approval means the trans-border flow of personal data can take place as in the free zone between the EU/EEA Member States. However, to date, the white list covers a limited list of countries, seven to be exact. This list might not prove too sufficient from the point of view of multinational companies in accommodating their interest, as it does not include many countries of growing commercial interest. From this point of view, there is a need to harmonize various privacy and data protection regulations in many countries through the establishment of an internationally congruent legal framework for privacy and data protection. Unfortunately, it will take some effort and time for the establishment, while a fast solution is needed. By considering the Directive thus far the strictest legal framework compared with other existing legal framework on privacy and data protection, obviously, there is a need for countries outside the EU/EEA Member States to improve their legal framework to become compliance with adequate level of protection requirement under the Directive. Since Indonesia is neither a Member State of the EU/EEA nor included in the white list of adequacy finding, the requirement of adequate level of protection is applied to Indonesia as a third country. The trans-border flow of personal data only can take place after the data controller is certain that the protection level of personal data in Indonesia is adequate under the Directive. Apparently, Indonesia is needed to criticize, whether or not its legal framework providing an adequate level of protection. Moreover, Indonesia as a Member State of the Asia-Pacific Economic Cooperation (APEC) has received a pressure to provide a sufficient level of protection on trans-border flow of personal data, in relation to the existence of the APEC Privacy Framework. This pressure has become heavier because of Indonesia position as the Association of South East Asian Nations/ASEAN Member States. Therefore, the main objective of this thesis is to examinehow Indonesia can improve its legal framework to comply with the adequate level of protection in view of Directive 95/46/EC. Conducting this examination is important in determining ways Indonesia might be developed into an attractive destination country for international commerce activities. In order to answer the objective of this thesis, three research questions have to be answered: firstly,currently, why Directive 95/46/EC is being acknowledged as the strictest legal instrument concerning privacy and data protection on conducting trans-border flow of personal data compared with other existing legal instruments. Secondly, how the European Commission determines the adequate level of protection in the third country in question under Directive 95/46/EC. Then, thirdly, to what extent legal framework of data protection in Indonesia measures up to the adequate level of protection in Indonesia under Directive 95/46/EC. In line with the effort to answer the first research question, this thesis will try to identify any possibility for improvement towards the current adequacy finding system. Hence, a balance accommodation might be obtained and maintained between the one who requires the adequate level of protection and the one who has to fulfill it. This thesis will be structured as follows. The first chapter is the introduction in which the objective of this thesis is explained. In the second chapter, there will be a brief comparison between the Directive with other legal instruments concerning privacy and data protection. Afterwards, some explanations on the requirement of the adequate level of protection in the light of the Directive will be provided, including the measurement to be used in conducting the adequacy finding and will explore any possible solution if there is no adequate level of protection in the third country in question. Further, this chapter will cover the current problems within the Directive as well as possible suggestions to overcome them. Thus, answering the first and second research question. In the third chapter, relevant issues surrounding Indonesian legal framework will be discussed, including a brief explanation on how Indonesia regulates privacy and data protection as well as a number of the difficulties experienced in doing so. The findings in the second and third chapters shall be employed to carry out the examination in the fourth chapter, which objective is to answer the third research question. The chapter serves to analyze the adequate level of protection of Indonesian legal framework by applying the measurements in the light of the Directive. The analysis will include various potential problems faced by Indonesia on its effort to improve protection of personal data along with several suggestions on how to overcome them. At the final stage, there will be a conclusion, to what extent Indonesia can be deemed as providing an adequate level of protection. As a result, a solution on how Indonesia might improve its legal framework under the Directive to both avoid a lack of protection and offer an adequate level of protection will be achieved. 2. The EU Legal Framework regarding trans-border flow of Personal Data The trans-border flow of personal data is stipulated by regulations concerning data protection. Since the early eighties, several regulations, drawn up by different organizations, have been published in this respect. The first initiative was performed by Organization for Economic Co-operation and Development (OECD) by establishing the Guidelines on the Protection of Privacy and Trans-border Flows of Personal Data (the OECD Guidelines) in 1980. The intention of the Guidelines is to prevent any conflicts between national laws, which can hamper the free flow of personal data between the OECD Member States. This establishment brought an awareness of the importance protection of the trans-border flow of personal data. A similar purpose with the OECD Guidelines has brought the Member States of the Council of Europe (the CoE) to publish a convention on their interest in the following year. They agreed that it is needed to reconcile the fundamental values of the respect for privacy and the free flow of information between them. The agreement is stated in the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (CETS No. 108), with purpose to take into account the right of privacy and the increasing flow across frontiers of personal data in regards of automatic processing, as a way to extend the safeguards for everyones rights and fundamental freedoms. In 1990, by considering the UN has more Member States compared with the OECD and the CoE, Guidelines concerning Computerized Personal Data Files (the UN Guidelines) was established as a way to bring the principles on privacy and data protection being implemented wider among countries. The UN General Assembly through Resolution No. A/RES/45/95 on 14 December 1990, requests the Governments of every Member States to take into account this Guidelines in their legislation. Further, the governmental, intergovernmental, and non-governmental organizations are also requested to respect the Guidelines in carrying out the activities within their field of competence. Nonetheless, the OECD Guidelines, the CETS No. 108, and the UN Guidelines still have some weaknesses. There are some principles of data protection, which are required to be embedded in national laws of each of the Member States but there is no means for ensuring their effective application. For examples, there are no supervisory authority provision in the CETS No. 108 and a lack of procedural clauses in the OECD Guidelines. In another case, concerning the binding power of the instrument, the OECD Guidelines is voluntarily binding to its Member States as well as the UN Guidelines, even though the UN Guidelines has the supervision and sanction provisions. Therefore, Directive 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data has been established by the European Union (the EU) to overcome the limited effect of the two Guidelines and the Convention as mentioned above. Good level of compliance, support and help to individual data subject, and appropriate redress to the injured parties are the means used by the Directive for ensuring the effective application of the content of the rules. Apart from the compliance issue, the obligations and rights set down in the Directive are built upon the OECD Guidelines, the CETS No. 108, and the UN Guidelines. These three legal instruments contain similar principles, except for lawfulness, fairness, and non-discrimination principles are from the UN Guidelines; and special categories of data and additional safeguards for the data subject principles are from the ECTS No. 108. While the rest of the adopted principles are collection limitation, data quality, purpose specification, use limitation, security safeguard, openness, individual participation, and accountability. Further, the aims of the Directive can be seen from two perspectives. The first one is the economical perspective, in relation to the establishment and functioning of an internal market, in which to ensure the free movement of goods, persons, services, and capital, including the free movement of personal data. The second is from the fundamental rights perspective, in which to set the rules for high-level data protection to ensure the protection of the fundamental rights of the individuals. The newest legal instrument concerning privacy and data protection is the APEC Privacy Framework 2004 (the Framework), established by Asia-Pacific Economic Cooperation (APEC). The purpose of the Framework is to ensure there are no barriers for information flows among the APEC Member Economies by promoting a consistent approach to data protection. There are nine principles in the Framework that are built based on the OECD Guidelines. In brief, the adopted principles are preventing harm, notice, collection limitation, uses of personal information, choice, integrity of personal information, security safeguard, access and correction, and accountability. However, this Framework has the same weakness as the previous legal instruments on privacy and data protection before the Directive, which is the absent of means for ensuring the effective application of the principles. Additionally, it should be noted that APEC is a forum that established based on a voluntary basis, without any constitut ion or legally binding obligations for the Member Economies. Hence, the Framework is not binding to the Member Economies. From the brief analysis above, currently, the Directive posses the highest level of protection compared with other existing legal instruments on privacy and data protection. In this respect, to achieve the objective of this thesis as stated in the first chapter, the research questions will be answered by focusing on the Directive. Therefore, in the next section, there will be an explanation on the legal bases of trans-border flow of personal data to third countries under the Directive, followed by a rationalization on how the European Commission (EC) determines whether or not an adequate level of protection exists in the third country in question. Subsequently, the means for ensuring the effective application of the content of rules will be elaborated upon a description on a series of possibilities if the third country in question is not deemed to provide an adequate level of protection. Although currently, the Directive provides high-level of protection, some problems and suggestions will be provided, as an effort to address input for improvement. The findings in this chapter will be used to carry out the adequacy finding of Indonesia as a third country (in the fourth chapter) by doing a comparison with the findings on Indonesian legal framework in chapter three. 2. The Legal Bases of Trans-border Flows of Personal Data to Third Countries The trans-border flow of personal data to a third country to be acknowledged as lawful, it has to be conducted in accordance with the national data protection law of the EU/EEA Member States. It is applicable to the data controllers established in the EU, both at the time when data is being collected and processed. In general, the law consists of a combination between the obligations of data controllers and the rights of data subject. Before the establishment of the Directive, these rights and obligations were regulated under some national data protection laws with different level of protection. In the light of the functioning of internal market in the EU/EEA, all these obligations and rights, including certain procedures to be applied in case of trans-border flow of personal data to a third country, are regulated in the Directive. Whereas the Directive is legally binding to the EU/EEA Member States, an adequate level of protection is fulfilled and consequently trans-border flow of personal data is able to take place among them. Further, when the personal data is used for electronic communication purposes, then the rights and obligations as lay down in Directive 2002/58/EC shall take place. There are three possible types of transfer under the Directive. The first and second types are a communication of personal data by a data controller based in the EU/EEA Member States to another data controller or to a processor based in a third country. Another possibility type is a communication of personal data by a data subject based in the EU/EEA Member States to a data controller based in a third country. Nevertheless, it should noted that the Directive does not cover transfers of personal data in the course of judicial and police cooperation activities falling within Titles V and VI of the Treaty on European Union. The main regulation in the Directive concerning trans-border flow of personal data to a third country is Article 25. The first paragraph of the Article sets out the principle that the EU/EEA Member States shall allow the transfer of personal data only if the third country in question ensures an adequate level of protection. From this provision, it is necessary to explain further on the subject of the transfer of personal data and an adequate level of protection. First, what the Directive means by the transfer of personal data. Undoubtedly, it is often associated with the act of sending or transmitting personal data from one country to another, for instance by sending paper or electronic documents containing personal data by post or e-mail. By seeing from a different perspective, the situation where one conducts a certain activity with the purpose to make data available for others, besides the owner of the data (the data subject), and located in another country, is included as a trans-border flow of personal data. However, by making data accessible for everyone who connects to internet by uploading any personal data on internet web pages, even though that person is located in another country, is not included in the meaning of transfer of personal data to another country. The reason for the previous statement is this kind of activity is properly acknowledged as publishing activity, not transferring activity. This exception is stated clearly by the Court of Justice in the Bodil Lindqvist Case as there is no transfer of personal data to a third country where an individual in a Member State loads personal data onto an internet page making those data accessible to anyone who connects to the internet, including people in a third country. Subsequently, since the Directive is binding to 27 EU Member States, including three countries (Norway, Liechtenstein, and Iceland), which are bound by the Directive by virtue of the European Economic Area agreement (EEA), personal data can flow freely among them. In other words, there is a free zone among the EU/EEA member states. Therefore, transfer in the light of the Directive has to be seen as transfer of personal data from EU/EEA member states to other countries outside EU/EEA, which are recognized as third countries, and the adequate level of protection in those third countries has to be assessed. There is a so-called white list of countries, which have been assessed by the EC and affirmed to provide an adequate level of protection according to the Directive. Currently, the list consists of seven countries as follows: Argentina, Canada (limited to private sector data), Switzerland, United States (Safe Harbor and specific type of transfer: Passenger Name Record/PNR), the Bailiwick of Guernsey, the Isle of Man, and the Bailiwick of Jersey. The approval of adequacy shall be analyzed more carefully because once a country is listed in the white list, does not automatically mean that personal data can flow to the country freely. One should pay attention whether the affirmation is given for the entire legal framework or only for certain part of it in a specific field, sector (public or private), or regarding a specific type of transfer. Insofar, even though the result of adequacy finding shows that the data protection level in certain countries is not adequate, the EC will not create a black list for that negative finding because of political consequences. Instead of the black list, the EC tends to enter into negotiation with the certain country in order to find a solution. It can be concluded from the foregoing, that the adequacy finding is temporary and subject to be reviewed. Procedure of the Adequacy Finding In acknowledging the adequacy finding, the EC has to follow certain procedure, which has been determined in Article 25 Paragraph (6) of the Directive and is known as comitology. At first, there will be a proposal from the EC, followed by an opinion from Article 29 Working Party and an opinion from Article 31 Management Committee, which needs to be delivered by a qualified majority of member states. Afterwards, the EC submits the proposed finding to the European Parliament (EP), who will examine whether the EC has used its executing powers correctly and comes up with recommendation if necessary. As a final point, the EC then can formally issue the result of the adequacy finding. In the next section, the measurements used by the EC in conducting the finding will be explained in detail. 3. Assessing the Adequate Level of Protection The Article 29 Working Party has given an obvious statement thatany meaningful analysis of adequate protection must comprise the two basic elements: the content of the rules applicable and the means for ensuring their effective application.According to WP 12 of the European Commission (EC), a set of content principles that should be embodied in the existing regulations are the following: Purpose limitation principle: data should be processed for a specific purpose and subsequently used or further communicated only if it is compatible with the purpose of the transfer. Data quality and proportionality principle: data should be accurate and, where necessary, kept up to date. Transparency principle: individuals should be provided with information as to the purpose of the processing, the identity of the data controller in the third country and other necessary information to ensure fairness. Security principle: technical and organizational measures should be taken by the data controller that are appropriate to the risks presented by the processing. Rights of access, rectification and opposition: the data subject have the right to obtain a copy of all data relating to him/her that are processed, to rectification of those data that are shown to be inaccurate, and be able to object to the processing of the data. Restrictions on onwards transfers to non-parties to the contract: further transfers of the personal data by the recipient of the original data transfer only permitted if the second recipient provides an adequate level of protection. In addition to these content principles, another set of the means for ensuring the effective application of the principles, whether judicial or non-judicial, are required in order to fulfill the following objectives: Good level of compliance with the rules: the level of awareness of controllers and data subjects and the existence of effective and dissuasive sanctions are the measurements to examine the compliance level, including direct verification by authorities, auditors, or independent data protection officials. Support and help to individual data subjects: an individual should be able to enforce his/her rights rapidly and effectively without prohibitive cost. Institutional mechanism is needed to conduct independent investigation of complaints. Appropriate redress to the injured parties: where rules are not complied, redress to the injured party with independent adjudication or arbitration is provided, including compensation and sanction impose. Beyond the content principles, some additional principles are still needed to consider when it comes to certain types of processing. Additional safeguards when sensitive categories of data are involved and a right to opt-out when data are processed for direct marketing purposes should be in place. Another principle is the right for the data subject not to be a subject to an automated individual decision that intended to evaluate certain aspects, which can give any legal effects and have a significant effect to the data subject. These content principles, including additional principles, and the means for ensuring their effectiveness should be viewed as a minimum requirement in assessing the adequate level of protection in all cases. However, according to Article 25 Paragraph 2 of the Directive, in some cases, there will be two possibilities. There is a need to add the list with more requirements or to reduce it. To determine whether some requirements need to be added or reduced, the degree of risk that the transfer poses to the data subject becomes an important factor. The Article 29 Working Party has provided a list of categories of transfer, which poses particular risks to privacy, as mentioned below: Transfers involving certain sensitive categories of data as defined by Article 8 of the Directive Transfers which carry the risk of financial loss (e.g., credit card payments over the internet) Transfers carrying a risk to personal safety Transfers made for the purpose of making a decision which significantly affects the individual (e.g., recruitment or promotion decisions, the granting of credit, etc) Transfers which carry a risk of serious embarrassment or tarnishing of an individuals reputation Transfers which may result in specific actions which constitute a significant intrusion into an individuals private life (e.g., unsolicited telephone calls) Repetitive transfers involving massive volumes of data (e.g., transactional data processed over telecommunications networks, the Internet, etc.) Transfers involving the collection of data in a particularly covert or clandestine manner (e.g., internet cookies) To sum up, the circumstances should be taken into account when assessing adequacy in a specific case, being: the nature of the data the purpose and duration of the proposed processing operations the country of origin and the country of final destination the rules of law, both general and sectoral, in force in the country in question the professional rules and the security measures which are complied with in that country. Self -regulation From the circumstances as referred to Article 25 Paragraph 2 of the Directive, it can be seen that the assessments of the adequate level of protection is conducted according to the rules of law as well as the professional rules and the security measures. In other words, it has to be examined from a self-regulation perspective as well. The Article 29 Working Party presents a broad meaning of self-regulation asany set of data protection rules applying to a plurality of the data controllers from the same profession or industry sector, the content of which has been determined primarily by members of the industry or profession concerned.This wide definition offers the possibility to on the one hand a voluntary data protection code developed by a small industry association with only a few members and on the other hand a set of codes of professional ethics with quasi judicial force for a certain profession, such as doctors or bankers. Still, one should bear in mind, to be considered as an appropriate legal instrument to be analyzed, it has to have binding power to its members and has to provide adequate safeguards if the personal data are transferred again to non-member entities. Ob