- •Содержание
- •Предисловие
- •Unit 1 legal profession in the united kingdom
- •Give Russian equivalents for the following English words and phrases:
- •Word formation. Complete this table by filling in the correct forms.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Read the text and decide whether the statements are true (t) or false (f).
- •Chose the phrase which best completes each statement.
- •Text 1 entering the profession
- •Text 2 solicitors at work
- •Unit 2 different types of companies
- •Give Russian equivalents for the following English words and phrases:
- •Word formation. Complete this table by filling in the correct forms.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Read the text and decide whether the statements are true (t) or false (f).
- •Chose the phrase which best completes each statement. Sometimes more than one variant is possible.
- •Text 1 lecture on company law Part I
- •Text 2 lecture on company law Part II
- •Tick the correct answer of the questions in the table.
- •Complete the table:
- •Unit 3 company structure
- •Give Russian equivalents for the following English words and phrases:
- •Word formation. Complete this table by filling in the correct forms.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Read the text and decide whether the statements are true (t) or false (f).
- •Chose the phrase which best completes each statement. Sometimes more than one variant is possible.
- •Lawyers involvement in managing a business entity
- •Unit 4 fundamental changes in a company
- •Give Russian equivalents for the following English words and phrases:
- •Word formation.
- •Complete this table by filling in the correct forms.
- •Add the prefixes in-, ir-, un-, dis-, anti- to each of these words to form its opposite.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Read the text and decide whether the statements are true (t) or false (f).
- •Chose the phrase which best completes each statement. Sometimes more than one variant is possible.
- •Text 1 a lecture on legal aspects of acquisition
- •Text 2 spin-offs
- •Unit 5 contract law
- •Give Russian equivalents for the following English words and phrases:
- •Word formation. Complete this table by filling in the correct forms.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Read the text and decide whether the statements are true (t) or false (f).
- •Chose the phrase which best completes each statement. Sometimes more than one variant is possible.
- •Text 1 structure of a commercial contract Part I
- •Interpretation
- •Text 2 structure of a commercial contract Part II
- •Text 3 contracts: remedies
- •Information technology law and cybercrime
- •Give Russian equivalents for the following English words and phrases:
- •Word formation. Complete this table by filling in the correct forms.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Read the text and decide whether the statements are true (t) or false (f).
- •Identity thefts
- •Intellectual property law
- •Give Russian equivalents for the following English words and phrases:
- •Word formation. Complete this table by filling in the correct forms.
- •Match the columns.
- •Fill in the gaps with prepositions if necessary.
- •Match the terms with their definitions. There are some extra terms.
- •How cybersquatters and typosquatters make money from yout own innocent flubs
Read the text and decide whether the statements are true (t) or false (f).
New Internet technologies have led to innovative illegal activities.
Hacking includes both the breach of computer security and unauthorized access to a computer.
The process of stealing personal information and obtaining financial benefit thereby is known as money laundering.
When users are moved to fake web sites, it is called fishing.
When fraudsters use phishing or pharming, they are subject to administrative proceeding.
Data Protection legislation regulates the way employers collect, store and distribute personal information of their employees.
The management of a company must have the agreement of the Board of Directors to make personal staff information available.
SPEAKING
Answer the questions:
Have you ever been a victim of identity theft?
Give examples of real cybercrimes you know (have read about or learnt through mass media or Internet).
Give advice to your mates how to protect yourself against identity theft/cybercrimes.
ADDITIONAL READING
Identity thefts
Changing addresses
According to experts, members of the public are placing themselves at considerable risk from identity theft, and are being told that they must be more vigilant about discarding personal records.
With enough biographical information, a criminal can take over another person’s identity to commit a wide range of crimes; for example, a false applications for loans, fraudulent withdrawls from bank accounts or obtaining other goods which criminals might otherwise be denied. If the criminal has the bill for the falsely obtained credit card sent to an address other than the victim’s, the victim may not become aware of what is happening until the criminal has already inflicted substantial damage on the victim’s assets, credit and reputation. The same is true of bank statements showing unauthorized withdrawls.
If you think you may become the victim of identity theft, you should place a fraud alert on your credit report as soon as possible. You should then review your credit reports carefully. Look for enquiries from companies you haven’t contacted, accounts you did not open and debts on your accounts that you cannot explain.
Once you have placed a fraud alert on your credit report, potential creditors must use what the law refers to as ‘reasonable polices and procedures’ to verify your identity before issuing credit in your name.
Phishing
Phishing involves people being fooled by fake e-mails, claiming to be from a bank, into giving out bank or credit card details to online fraudsters. The term is also used to describe the practice of creating look-alike websites, often of banks and other financial institutions, and duping people into visiting them and giving out their personal information.
While banks generally repay money lost to victims of such crimes, they may refuse to compensate the same person more than once if the customer’s negligence was a contributory factor. So, could banks themselves do more to protect their customers? Banks often claim they would never send requests for confidentaial information by e-mail. However, according to the recent research, some banks do just that. This sends out a mixed message, confusing vulnerable customers who cannot tell which e-mails are genuine and which are not.
Bin-raidning
A shocking new survey has revealed the potential extent of bin raiding by British fraudsters. The report shows how easy it is for ID thieves to obtain personal information from household rubbish. An examination of the content of 400 domestic bins found that:
72% of bins contained the full name and the full address of at least one members of a household;
two in five contained a whole credit- or debit- card number that could be linked to an individual;
one of five bins contained a bank-account number and sort code that could be related to an individual’s name and address.
In the US, the practice has been recognized as a real risk to consumers and businesses for many years; 9.9 million Americans have been the victims of identity theft, as an avarage cost per person of $ 5,000.
Do the task.
Match the types of identity thefts with their definitions.
bin raiding
skimming
phishing
changing addresses
stealing
pretexting
stealing credit/debit card numbers by using a special storage device when processing cards (often in order to make illegal copies);
fraudulently gaining access to personal information from financiaal institutions, telephone companies and other sources;
taking wallets, mail and other items containing personal information without permission
pretending to be a financial institution or company and sending spam or pop messages to get people reveal personal information;
sending someone’s billing statements to another location by completeing a change of address form;
looking through rubbish for bills and other papers containing detailed information.
UNIT 7
