• Title/Summary/Keyword: Loss of the Documents

Search Result 74, Processing Time 0.03 seconds

A Study on The Duty of the Bank's upon Loss of the Documents under Letter of Credit Transactions - Focused on UCP 600 - (신용장거래에서 네고서류의 분실에 대한 은행의 책임에 관한 소고 - UCP 600을 중심으로 -)

  • Lim, Mok-Sam
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.107-130
    • /
    • 2008
  • The purpose of this study is to provide the guideline for the loss of documents relating to the delivery of documents under Letter of Credits transactions. If the documents are lost while in transit from the nominated bank to the issuing bank neither the nominated bank nor the issuing bank is liable as Article. 35 of the UCP600. Normally such matters are settled amicably between banks and problems are only likely to give rise to litigation where this cannot be done and the applicants does not want the goods or take delivery or sell them on because of the loss of documents. UCP 2007 Revision stated that a presentation is complying and forwards the documents to the issuing bank, whether or not the nominated bank has honoured or negotiated, an issuing bank must honour or negotiate, or reimburse that nominated bank. Accordingly, the applicant liable to the issuing bank for any damage sustained as a result of the loss of document. In such circumstance it might be possible to obtain a second(duplicate) set of documents that were sufficient to satisfy the applicant that the document were compliant and enable the applicant to obtain deliver of documents or comply with the terms of a sub-sale. If the applicant does not want the documents presented, no the less, the bank might find it difficult to prove that complaint documents had been presented and, subject to the terms of arrangement with the buyer, could be liable for damage sustained by the applicant as a result the loss of the documents.

  • PDF

A Study on Development of SGML Repository System Based on DTD-dependent Schema (DTD 의존 스키마에 기반한 SGML 문서 저장 시스템 개발에 관한 연구)

  • Kim, Hyeon-Gi;No, Dae-Sik;Gang, Hyeon-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1153-1165
    • /
    • 1999
  • In various fields of information technology, it is growing up the needs about dynamic content management systems to store and manage SGML(Standard Generalized Markup language) documents in a database system. In this paper, we consider the issue of storing SGML documents that having complex hierarchical structure into a database system, and then propose a data model based on ODMG(Object Database Management Group) object model in order to store SGML documents without loss of information. Because the proposed data model reflects physical element structure and logical entity structure of SGML documents, it is able to store the SGML document in a database system at the system at the element- level granularity without any information loss. And also the proposed data model can be adapted among ODMG-compliant object database management systems. Finally, we will discuss on the implementation details of SGML repository system supports the functionality of automatic database schema creation for any DTD(Document Type Definition0, the functionality of storing the SGML document, the functionality of dynamic document assembly from stored database objects to SGML document, and the functionality of indexing and searching for database objects.

  • PDF

An Efficient Versioning Method for XML Document Repository System (XML 문서 저장관리 시스템을 위한 효율적인 버전닝 기법)

  • 손충범;배양석;유재수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.37-50
    • /
    • 2002
  • XML document repositary system(XDRS) should be able to manage vertical and horizontal versions of documents to store, update and manage XML documents without loss of information, However, most of existing XDRSs do not support a versioning method Although a few systems support versioning method. they only manage vertical versions of XML documents, While the vertical versioning preserves the update history of documents. the horizontal versioning branches a document to many other versions of documents so that users can easily create new documents from the original version and edit them to have different meanings. In this paper, we propose a new version numbering scheme to support both vertical and horizontal versioning efficiently. We also design a schema that supports versioning and preserves the paradigm of structure information.

  • PDF

Automatic Linkage Method Between Email and Block Structure to Store Construction Project Documents in The Blockchain

  • Kim, Eu Wang;Park, Min Seo;Kim, Jong Inn;Wei, Ameng;Kim, Kyoungmin;Kim, Kyong Ju
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.886-892
    • /
    • 2022
  • In construction projects, it is common to exchange documents using email because of convenience. In this study, a method extracting and organizing block information automatically based on email was developed. This method is composed of document exchange and archiving processes, which are difficult to manage and vulnerable to loss. Therefore, this study aims to develop a solution that can automatically link email and block information. The block data components are designed to derive from email exchange and user-additional input information. Also, automatically generating blocks process including extraction and conversion of information was proposed. This solution can lead to promote the convenience of project document management in terms of identifying the document flow and preventing loss of information.

  • PDF

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

A View from the Bottom: Project-Oriented Risk Mining Approach for Overseas Construction Projects

  • Lee, JeeHee;Son, JeongWook;Yi, June-Seong
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.97-100
    • /
    • 2015
  • Analysis of construction tender documents in overseas projects is a very important issue from a risk management point of view. Unfortunately, majority of construction firms are biased by winning contracts without in-depth analysis of tender documents. As a result, many contractors have incurred loss in overseas projects. Although a lot of risk analysis techniques have been introduced, most of them focus project's external unexpected risks such as country conditions and owner's financial standing. However, because those external risks are difficult to control and take preemptive action, we need to concentrate on project inherent risks. Based on this premise, this paper proposes a project-oriented risk mining approach which could detect and extract project risk factors automatically before they are materialized and assess them. This study presents a methodology regarding how to extract potential risks which exist in owner's project requirements and project tender documents using state of the art data analysis method such as text mining, data mining, and information visualization. The project-oriented risk mining approach is expected to effectively reflect project characteristics to the project risk management and could provide construction firms with valuable business intelligence.

  • PDF

A Study on the Seller's Obligation of the Delivery of Goods and Handing over the Documents in International Contracts for Sale of Goods - Focusing CISG and Incoterms 2010 - (국제물품매매계약상의 물품인도 및 서류교부에 관한 매도인의 의무에 관한 연구 - CISG와 Incoterms 2010을 중심으로 -)

  • Park, Nam Kyu
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.3-26
    • /
    • 2013
  • Seller's obligation on the Delivery of Goods and Handing over the Documents are key elements in Contracts for the International Sale of Goods. The United Nations Convention on Contracts for the International Sale of Goods(CISG) has been entered into force on 1 January 1988 to create international certainty and uniformity in the law and to govern issues that arise in an international sale of goods transaction. The Incoterms were first published by the ICC in 1936 and were most recently revised in 2010. Incoterms 2010 are entering into force on 1 January 2011. The Incoterms focus on the seller's delivery obligations and reflect the principle that the risk of loss or damage to the goods passes from the seller to the buyer when the seller has fulfilled its obligations to deliver the goods. This study highlights basic rules covering seller's obligation of delivery of goods and handing over the documents under the Incoterms 2010 and the United Nations Convention and Contracts for the International Sale of Goods. In the second chapter, this study will provide analyses and compare these two legal systems in relation to the basic rules governing delivery of goods and passing of risks in contract of sale. This chapter evaluates the meaning of Article 31 and Article 67(1) and FOB, CFR, CIF & FCA, CPT, CIP terms of Incoterms 2010. Chapter Three will focus on handing over the documents. Article 30 CISG imposes the seller's primary obligations to deliver the goods and to hand over documents relating to them. Article 34 CISG supplements the seller's obligation in relation to documents by providing that the seller must hand over documents relating to the goods. In contrast, Article 58(1) CISG imposes on the buyer the obligation to pay only when it has received the goods or documents controlling their disposition. I reviewed only some of the documents relating to the goods are documents controlling their disposition. This chapter considers the meaning of the phrase "documents that control the disposition of the goods and do not control disposition of the goods." Finally, the fourth chapter will assess the meaning of rules of CISG and Incoterms 2010.

  • PDF

An Algorithm for Detecting Leak of Defaced Confidential Information Based on SVDD (SVDD 기반 중요문서 변조 유출 탐지 알고리즘)

  • Ghil, Ji-Ho;Nam, Ki-Hyo;Kang, Hyung-Seok;Kim, Seong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.105-111
    • /
    • 2010
  • This paper proposes the algorithm which addresses the problem of detecting leak of defaced confidential documents from original confidential document. Generally, a confidential document is defaced into various forms by insiders and then they are trying to leak these defaced documents to outside. Traditional algorithms detecting leak of documents have low accuracy because they are based on similarity of two documents, which do not reflect various forms of defaced documents in detection. In order to overcome this problem, this paper proposes a novel v-SVDD algorithm which is based on SVDD, the novelty detection algorithm. The result of experiment shows that there is significant improvement m the accuracy of the v-SVDD in comparison with the traditional algorithms.

Study on Security Grade Classification of Financial Company Documents (금융기관 문서 보안등급 분류에 관한 연구)

  • Kang, Bu Il;Kim, Seung Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1319-1328
    • /
    • 2014
  • While the recent advance in network system has made it easier to collect and process personal information, the loss of customers, financial companies and even nations is getting bigger due to the leakage of personal information. Therefore, it is required to take a measure to prevent additional damage from the illegal use of leakaged personal information. Currently, financial companies use access control in accordance with job title or position on general documents as well as important documents including personal information. Therefore, even if a documents is confidential, it is possible for a person of the same job title or position to access the document properly. This paper propose setting up security grade of documents to improve current access control system. It will help preventing the leakage of personal information.