24. The Operation of Mortgages

2019 ◽  
pp. 726-754
Author(s):  
Barbara Bogusz ◽  
Roger Sexton

Titles in the Complete series combine extracts from a wide range of primary materials with clear explanatory text to provide readers with a complete introductory resource. This chapter discusses the rights of the mortgagor (rules protecting the equitable right to redeem, ‘clogs’ and ‘fetters’, postponement of redemption, collateral advantages, restraint on trade); statutory regulation of mortgages; leasing of the mortgaged property; undue influence, where a third party pressurizes the mortgagor into cooperating in the granting of a mortgage so that the third party can get a loan from a lending organization; redemption of mortgages; and fire insurance of the mortgaged property.

Author(s):  
Barbara Bogusz ◽  
Roger Sexton

Titles in the Complete series combine extracts from a wide range of primary materials with clear explanatory text to provide readers with a complete introductory resource. This chapter discusses the rights of the mortgagor; leasing of the mortgaged property; undue influence, where a third party pressures the mortgagor into cooperating in the granting of a mortgage so that the third party can get a loan from a lending organization; redemption of mortgages; and fire insurance of the mortgaged property.


Author(s):  
Barbara Bogusz ◽  
Roger Sexton

Titles in the Complete series combine extracts from a wide range of primary materials with clear explanatory text to provide readers with a complete introductory resource. This chapter discusses licences and proprietary estoppel. It covers bare licences; licences coupled with an interest; contractual licences; revocation of a licence by the licensor; the effect of licences between the licensee and a third party; estoppel licences; proprietary estoppel; satisfying the equity; and status of ‘an equity’ before it has been satisfied.


2016 ◽  
Vol 5 (1) ◽  
Author(s):  
Sinta Dewi

<p align="center"><strong><em>Abstract</em></strong></p><p><em>The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or  individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.</em></p><p><strong><em>Keywords</em></strong><em>: protection, privacy, personal data, cloud computing.</em></p><p align="center"><strong>Abstrak</strong></p><p>Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi <em>cloud computing</em>. <em>Cloud computing </em>adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. <em>Cloud computing </em>membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, <em>cloud computing </em>telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.</p><p><strong>Kata kunci</strong>: perlindungan, privasi, data pribadi, <em>cloud computing</em>.</p>


Author(s):  
Sinta Dewi ,

<p>Abstract<br />The increasing use of internet technology has spawned new challenges to the protection of privacy and personal data, especially with the increasing practice of collection, use and dissemination of personal data of a person. The lack of specific instruments and regulations will cause of the weakness of the privacy and data personal protection mechanism, especially in the use of cloud computing technology. Cloud computing is a technology that uses the internet and central remote servers to maintain or manage user data. It allows users to use applications without installation so that personal files can be accessed anywhere and anytime through internet access. This technology enables efficiencies by centralizing storage, processing and data memory. However, on the other hand, cloud computing has raised a new legal issue is how could the personal data of the user of cloud computing be protected from a wide range of abuses by the provider of cloud computing and the third party. This legal issue become very significant because if a personal data of the user of cloud computing is misused by the provider or the third party, then it is contrary to human rights, namely the protection of privacy and personal data which has been protected by international, regional, and national instruments. So far, Indonesia has not been having regulation that specifically protect its citizens from the personal data abuse whether committed by governments, private companies or individuals. Therefore, this study aims to create the concept of adequate regulation in order to provide protection for user of cloud computing services in Indonesia.<br /><em>Keywords: protection, privacy, personal data, cloud computing.</em></p><p>Abstrak<br />Meningkatnya pemanfaatan teknologi internet melahirkan tantangan baru dalam perlindungan atas privasi dan data pribadi, terutama dengan semakin meningkatnya praktik pengumpulan, pemanfaatan dan penyebaran data pribadi seseorang. Ketertinggalan instrumen dan regulasi menjadi salah satu pemicu lemahnya mekanisme proteksi terhadap privasi dan data pribadi khususnya dalam penggunaan teknologi cloud computing. Cloud computing adalah teknologi yang menggunakan internet dan server pusat yang jauh untuk menjaga atau mengelola data pengguna. Cloud computing membantu pengguna untuk menggunakan aplikasi tanpa melakukan instalasi sehingga file pribadi dapat diakses di manapun dan kapanpun melalui akses internet. Teknologi ini memungkinkan efisiensi dengan memusatkan penyimpanan, pemrosesan dan memori data. Namun demikian, di sisi lain, cloud computing telah menimbulkan permasalahan hukum baru yaitu bagaimana data pribadi pengguna cloud computing terlindungi dari berbagai macam pengungkapan dan pendistribusian oleh penyedia jasa cloud computing terhadap pihak ketiga. Permasalahan hukum ini menjadi sangat signifikan karena jika data pribadi seseorang disalahgunakan oleh pihak penyedia data atau pihak ketiga, maka hal ini bertentangan dengan hak dasar manusia yaitu perlindungan terhadap privasi dan data pribadi seseorang yang telah dilindungi oleh instrumen internasional, regional dan nasional. Indonesia hingga saat ini belum memiliki regulasi yang secara khusus melindungi warga negara dari praktik pemanfatan data pribadi yang sewenang wenang, baik yang dilakukan oleh pemerintah, perusahaan swasta maupun individu. Oleh sebab itu, penelitian ini bertujuan untuk menciptakan konsep pengaturan yang memadai dalam rangka memberikan perlindungan bagi pengguna jasa cloud computing di Indonesia.<br /><em>Kata kunci: perlindungan, privasi, data pribadi, cloud computing.</em></p>


2019 ◽  
pp. 297-338
Author(s):  
Barbara Bogusz ◽  
Roger Sexton

Titles in the Complete series combine extracts from a wide range of primary materials with clear explanatory text to provide readers with a complete introductory resource. This chapter discusses the various types of licences and proprietary estoppel. It covers bare licences; licences coupled with an interest; contractual licences; revocation of a licence by the licensor; the effect of licences between the licensee and a third party; estoppel licences; proprietary estoppel; the requirements for an estoppel: assurance, detriment and reliance; satisfying the equity and proportionality in the assessment of an award for estoppel; and status of ‘an equity’ before it has been satisfied.


2014 ◽  
Author(s):  
Jaclyn M. Moloney ◽  
Chelsea A. Reid ◽  
Jody L. Davis ◽  
Jeni L. Burnette ◽  
Jeffrey D. Green

Author(s):  
Chen Lei

This chapter examines the position of third party beneficiaries in Chinese law. Article 64 of the Chinese Contract Law states that where a contract for the benefit of a third party is breached, the debtor is liable to the creditor. The author regards this as leaving unanswered the question of whether the thirdparty has a right of direct action against the debtor. One view regards the third party as having the right to sue for the benefit although this right was ultimately excluded from the law. Another view, supported by the Supreme People’s Court, is that Article 64 does not provide a right of action for a third party and merely prescribes performance in ‘incidental’ third party contracts. The third view is that there is a third party right of action in cases of ‘genuine’ third party contracts but courts are unlikely to recognize a third party action where the contract merely purports to confer a benefit on the third party.


Sign in / Sign up

Export Citation Format

Share Document