https://www.youtube.com/watch?v=Nu7c5t8JnYA
https://www.youtube.com/watch?v=mCt2hzpyWZc
https://www.youtube.com/watch?v=NDVO0Nhufow
https://www.youtube.com/watch?v=dNh2e2QFxOQ
Thursday, 26 February 2015
Twitter ends link with JustSpotted.com after ‘stalker’ warnings - text 5
Twitter ends link with JustSpotted.com after ‘stalker’ warnings
A Twitter has ended its
relationship with JustSpotted.com after criticism the site will help people to
stalk celebrities. The website, which is due to launch next week, is designed
to track the movements of stars
using updates from social networking sites. Postings from celebs’ Twitter accounts and sightings by fans will be used to put together a map showing where
the stars are. It had been developed in co-operation
with Twitter and other social networking websites to collate news of 7,000
celebrities who advertise their activities through the internet.
B Privacy campaign group Big Brother Watch reacted angrily to news of
JustSpotted.com’s imminent launch
and spokesman Daniel Hamilton said: “Aside from being hugely intrusive, it is a gift to stalkers and
people regarded as being very strange or eccentric who could misuse it to
harass celebrities.” PR expert Richard Hillgrove told the Independent he feared
what could happen to people featured on the site if there are negative stories
about them in the press.
C “This site can be used to
facilitate a witch-hunt. You could create vigilantism, that’s a very dangerous aspect of it,” he warned. Their
concerns were echoed by lawyers and Twitter has now decided to withdraw its
support. Lawyer Rod Dadak said the site might break anti-stalking laws. “I don’t
think this site will survive,” he said. “It could be seen as inciting people to
pay celebrities a visit. It could amount to a criminal offence, and it is
certainly invading privacy.”
D Matt Graves, a spokesman for the microblogging service, said: “This is
not the product we licensed, and we have terminated
their agreement.” Twitter had previously agreed to provide postings of
celebrities to the team behind JustSpotted.com, but the new service was being
marketed as a search engine project when the deal was negotiated.
E JustSpotted.com will go ahead as scheduled, using other applications to sift
data from Twitter accounts. Its backers
insist it cannot be used to stalk celebrities, as the real-time nature of the website means people will
not be able to react quickly enough to sightings.
backer – příznivec
imminent launch – blízké
spuštění
intrusive – dotěrný
nature – povaha
posting – aktualizování,
příspěvek
sighting – pozorování
to facilitate – napomáhat,
usnadnit
to sift – prošetřit
to terminate – ukončit
track – stopovat
vigilantism – bdělost
1) Read the article and
match each of the headings to a paragraph.
1 Twitter has decided to stop
its support
2 JustSpotted.com could be misuse
it to harass celebrities
3 JustSpotted.com will go
ahead
4 Matt Graves’
reaction
5 Introduction
2) Read the article again and answer the questions.
1 What is the article about?
2 What is JustSpotted.com?
What does it do?
3 What is Twitter? What do its
representatives say?
4 What does lawyer Rod
Dadak think?
5 What is your opinion
about JustSpotted.com?
3) Explain the following words.
1 stalker
2 criminal offence
3 to invade privacy
4 Twitter accounts
5 to stalk celebrities
What are social networks?
How can they be misused? What information shouldn’t we publish there? What
crimes are connected with using social networks?
Adjusted to:
Read more:
http://www.metro.co.uk/news/844196-twitter-ends-link-with-justspotted-com-after-stalker-warnings
Net users try to avoid phish hooks - text 4
Net users try to avoid phish hooks
A In November 2002, when an e-mail attachment known as the W32/Mimail-I
worm posed as a Web site link from
online payment company PayPal, hundreds of people were duped into exposing their personal bank account information. The
use of viruses, spam and Web sites to defraud financial institutions and their
customers is a relatively new Internet phenomenon. Phishing crimes have been on
the rise throughout the world and are increasingly coming from Central and Eastern Europe.
B “It is very important for consumers to not believe everything,” said
Karel Pavlík of the Consumer Defence Association. He said phishing is not yet a
common practice here, but he thinks it could be a growing problem as people
start to use bank cards and credit cards set up for online purchases.
C North America has been the worst
target of phishing. Customers of TD Canada Trust, Citibank, Ebay’s PayPal and
Visa have all unwittingly spread
account numbers, passwords and other sensitive information. Experts say the
threat from phishing could potentially have a devastating impact on consumer
trust in e-commerce and e-banking. The open nature of the Internet makes it easy for criminals to hide, say
police and consumer advocates.
D While most crimes have been linked to the United
States, where online transactions are more common, there
have been a large number of phishing cases traced to Central
Europe. U.S. intelligence
recently cooperated with online auction site Ebay to look into a number of
scams that came from Romania,
resulting in the arrest of more than 100 people. One man, Dan Marius Stefan,
was convicted of stealing nearly $500,000 (13.5 million Kč) through phishing
and is now serving 30 months in a Romanian prison.
E Since 2002 the Czech
Republic has taken a proactive approach to
the issue by banning unsolicited
advertising, including spam. The government called for greater fines of 10
million Kč, a penalty that would place the country near the top of the European
Union scale. The government complied regulations on spam with European
Commission in 2002. “This proposal harmonized Czech law with European law,”
said OPDP spokeswoman Hana Štěpánková. “It allows people like you and me to
decide who has our data. It makes our position stronger.”
duped – podvedený
nature – povaha
to pose – představovat
unsolicited – nevyžádaný
unwittingly – nevědomky,
bezděčně
1) Read the article and match each of the headings to a paragraph.
1 Phishing has a
devastating impact on consumer trust
2 Consumers should not believe
everything
3 Regulations in the Czech Republic
4 Relatively new Internet
phenomena
5 A number of scams came from Romania
2) Read the article again and answer the questions.
1 What is the article about?
2 What are relatively new
Internet phenomena?
3 Which parts of the world
are the worst targets of phishing?
4 What sensitive
information is endangered?
5 What proactive approach
has been taken in the Czech
Republic?
3) Explain the following words.
1 personal bank account
2 spam
3 phishing crime
4 online purchase
5 password
6 e-banking
What is a spam? How can we
protect our e-mail accounts against spam? What does it usually contain? What is
a computer fraud? What are types of frauds?
Adjusted to:
http://www.praguepost.com/archivescontent/39188-net-users-try-to-avoid-phish-hooks.html
Jailed web sex offender is ‘parent’s worst nightmare’ - text 3
Jailed web sex offender is ‘parent’s worst nightmare’
A A judge branded a man a “parent’s
worst nightmare” as he jailed him
for two-and-a-half years for making indecent
images of children he met through internet chat sites aimed at teenagers. Police
found that Nicholas Bennett, 31, claimed to be aged just 15 on at least one
occasion when talking to girls who told him they were under 16. He was sentenced at Maidstone Crown Court on
Monday after pleading guilty to 10
sexual offences at an earlier hearing, a spokeswoman for Kent Police said. Bennett’s
victims were between 11 and 16, with one living as far away as Sydney, Australia.
B He was arrested last year after a woman told police he tried to blackmail her by threatening to post images on the internet that she sent him as a
child if she refused to engage in further role-play with him. Officers from the
public protection crime unit then executed a search warrant at his home and arrested him on suspicion of
possession of indecent images of children.
C On his computer equipment they also found records from chat showing a
number of internet conversations he had had with children, along with evidence
of him having posed as a 15-year-old boy by supplying false images of himself. Bennett
told officers he spoke with teenagers but denied any of his internet chat was
with children although police believe Bennett made contact with the girls
through a teen chat website and it is suspected he used information found on
social networking sites about the teenagers he spoke to befriend them.
D Detective Constable Mikaela Stevens, who led the investigation, said of
the woman who made the initial report to police: “Her courage and co-operation
with officers was important in bringing this offender before the courts and in
identifying other children he had abused and also preventing further children
from coming into contact with him in the future.”
E Bennett admitted five offences of causing or inciting pornography, four counts of making indecent images of
children and one count of causing or inciting sexual activity with a child. Judge
Philip Statman also gave him a 10-year sex offences prevention order and he
must sign the sex offenders register for life.
indecent – neslušný,
obscénní
nightmare – noční můra
pleading guilty – doznání
viny
search warrant – příkaz k
domovní prohlídce
threatening – hrození
to blackmail – vydírat
to brand – označit
to incite – podněcovat
to sentence – potrestat
1) Read the article and match each of the headings to a paragraph.
1 Stevens’ opinion
2 Bennett spoke to
teenagers and claimed to be 15
3 Bennett arrested after
blackmailing
4 Bennett’s sentence
5 Introduction
2) Read the article again and answer the questions.
1 What is the article about?
2 Who is Nicholas Bennett?
What did he do?
3 What was found on Bennett’s
computer?
4 Where did he contact
teenagers? What did he want from them?
5 What sentence was he
given?
3) Explain the following words.
1 sexual offence
2 to arrest
3 indecent images of
children
4 teen chat website
5 pornography
What is child pornography? Who
is a paedophile? What are chat sites? How can they be misused? How can we
protect children against contacts with paedophiles?
Adjusted to:
http://www.metro.co.uk/home/827597-jailed-web-sex-offender-is-parents-worst-nightmare
Hackers see little risk in breaking law - text 2
Hackers see little risk in breaking law
A A hacker group from Slovakia called binary.division got inside the
e-mail Web site Post.cz and set up the system to regurgitate passwords when a username was entered instead of
requiring one. For four minutes the site was under the hacker’s control, until
technicians at Czech OnLine, Post’s parent company, shut the system down.
B The hackers, who were virtually untraceable,
did no harm other than disrupting
operations for a few moments, but that doesn’t mean it won’t be worse next
time. While the October 13 attack on the Post.cz site is hardly an anomaly,
most Czech companies refuse to report hacker activity against their Web sites
for fear of damaging their reputation and possibly their value, said Jiří
Dastych, a major in the police presidium who deals with computer crime.
C Daniel Nalevajko, customer support director for Czech OnLine, said he
isn’t surprised companies fail to report intrusions
into their servers or on their Web sites. He said customers could desert a company they think can’t
protect their private data. Seznam.cz routinely finds hackers trying to either
break into their Web portal site or attempting to overload their system, said Petr Naidr, the company’s technical
director. Even if the company notices the intrusion, tracking a hacker is
difficult because attacks can come from any corner of the globe.
D “Hackers don’t avoid any countries,” Naidr said. “He can be sitting in
the next room, be in another city, in a different country or on another continent.”
Since most hacker intrusions are resolved by network administrators or Internet
service providers, many companies don’t even think to contact police or don’t
believe they can help, he added. And if a company’s site experiences a lot of
traffic each day – like the e-mail site Post.cz and the portal Seznam.cz – it
is also extremely difficult to weed out which hit was malicious.
E While the rate of computer hacking attacks are still not at the same
level as in the United States – where more people have access to the Internet
and computers – Nalevajko said he expects intrusions from Czech hackers to
increase. For now, hackers tend to
show off their skill than doing any real damage. But the instances of hackers
trying to establish back-door access or copying databases is on the rise,
Dastych said. Despite companies’ vigilance
against intrusion, hacking will probably remain a fear for Czech firms with a
Web presence. “We thought our site was pretty secure, but someone was too
clever,” Nalevajko said.
desert – opustit
disrupting – přerušující
intrusion – vstup, vetření
se
malicious – konaný ve zlém
úmyslu
overload – přetížit
to regurgitate – opakovat
to tend to – inklinovat k
untraceable – nevystopovatelný
vigilance – ostražitost
1) Read the article and match each of the headings to a paragraph.
1 Seznam tracks for hackers
2 Hackers disrupted operations
3 There will be more hackers in the Czech Republic
3 There will be more hackers in the Czech Republic
4 Hackers can be anywhere
5 Binary.division got
inside Post.cz
2) Read the article again and answer the questions.
1 What is the article about?
2 Who are binary.division?
What have they done?
3 Who is Jiří Dastych? What
does he say?
4 Where can hackers be
found?
5 Why do the attacked
companies rarely contact the police?
3) Explain the following words.
1 username
2 Web sites
3 hacker
4 private data
5 e-mail site
Who is a hacker? What does
a hacker do? Whose computer networks do they break into? How can hackers misuse
information and data?
Adjusted to:
http://www.praguepost.com/archivescontent/32866-hackers-see-little-risk-in-breaking-law.html
Facebook and Twitter training lined up for student detectives - Text 1
Facebook and Twitter training lined up for student detectives
A Facebook, Twitter and other social networks will be used by detectives to track down killers and other
criminals. This new approach has been revealed by police leaders. The move is
part of great changes being made to the training given to thousands of student
investigators to bring their work into the 21st century.
B As well as new information on tracking
down suspects through social networking sites, where wanted people may reveal valuable clues, updated training
exercises include examining how to gather the best information from computers,
mobile phones and other electronic devices. Students of police schools will
also receive guidance on how best to
investigate honour-based violence, record evidence of domestic abuse and solve
the problem of rape, while another
new material will link to a national collection of footprints made by specific
shoes as well as how to collect financial information.
C Deputy Chief Constable Nick Gargan, acting head of the NPIA (National
Policing Improvement Agency), commented that modernized training is very
important. “This programme is an important part of the career training for
detectives and the new schooling covers sensitive areas of policing where limited
guidance existed in the past,” he noted. “These improvements are exactly what
detectives need to solve the problems and of modern policing effectively.”
D Gargan also added: “The changes underline
the importance to having a national agency to provide guidance and train
detectives to a single high standard so they can work on investigations in any
part of the country and give their colleagues and the public the best quality
service in fighting crime.”
E Earlier this year, escaped prisoner Craig Lynch mocked police with clues
about his location on Facebook during four months on the run. In London, detectives have
been examining Facebook and Twitter posts
relating to the murder of 17-year-old Marvin Henry during a suspected fight
between rival gangs.
clue – vodítko, stopa
guidance – poradenství,
řízení
posts – příspěvky
rape – únos, znásilnění
to mock – vysmívat se
to reveal – odhalit
to track down – vystopovat
to underline – vyzdvihnout,
zvýraznit
1) Read the article and match each of the headings to a paragraph.
1 Students of police
schools will receive special guidance
2 National agency is needed
to provide guidance
3 Cases of cybercrime
4 Social networks will be
used by detectives
5 Nick Gargan’s comments
2) Read the article again and answer the questions.
1 What is the article about?
2 What will social networks
be used for by the police?
3 Who is Nick Gargan? What
does he say?
4 Why is a national agency
needed?
5 What has police found out
on Facebook and Twitter so far?
3) Explain the following words.
1 suspect
2 social networking sites
3 domestic abuse
4 investigation
5 murder
What is computer crime? What
are types of computer criminality? What are social networks? What are they used
for? How can they be misused?
Adjusted to:
http://www.metro.co.uk/news/845579-student-detectives-to-get-facebook-and-twitter-training
Computer criminality – Vocabulary
Computer criminality – Vocabulary
altering the data – změna údajů
anti-spam laws – protispamové zákony
bank fraud – bankovní podvod
bulk email – hromadný email
circumvent – podvést
commercial purpose – komerční účel
commission – pověření, zplnomocnění
content of websites – obsah webových stránek
criminal offence – trestný čin
cyber stalking – počítačové pronásledování
cybercrime – počítačová kriminalita
device – zařízení
distasteful – odporný
domestic abuse – domácí zneužívání
e-banking – internetové bankovnictví
e-mail site – emailová stránka
encrypt the data – zakódovat data
exploitation – zkoumání
extortion – vydírání
fraud – podvod
hacker – hacker
identity theft – krádež identity
indecent images of children – porno fotky dětí
information warfare – informační boj
investigation – vyšetřování
malware – počítačová nečistota
misusing existing system tools – zneužívání systémových nástrojů
murder – vražda
netcrime – internetová kriminalita
network – internetová síť
obscene – obscénní, nemravný, nahatý
offensive – útočný
online purchase – online obchodování
output – výstup, produkt, tvorba
password – heslo
personal bank account – osobní bankovní účet
phishing crime – kriminalita vedoucí k získávání citlivých informací
phishing scams – phishingové podvody
pornography – pornografie
private data – soukromá data
record keeping – uchovávání záznamů
sexual offence – sexuální čin
social networking sites – sociální sítě
software packages – soubory programů, softwarové balíčky
source of evidence – zdroj důkazů
spam – spam
stalker – stalker, stopař
stored data – uložená data
suspect – podezírat
teen chat website – web s chatem pro teenagery
theft of classified information – loupež důvěrných informací
to arrest – zatknout, zadržet
to blackmail – vydírat mailem
to conceal unauthorized transactions – zamlčet neopravněné transakce
to invade privacy – útok na soukromí
to stalk celebrities – sledování známých osobností
Twitter accounts – účty na Twitteru
unauthorized – neoprávněný
unlawful – nezákonný
unsolicited sending – nevyžádaná pošta
username – uživatelské jméno
Web sites – webové stránky
writing code – kód dokumentu
Computer crime – Vocabulary
Explain the following words.
altering the data
anti-spam laws
bank fraud
bulk email
commercial purpose
commission
content of websites
criminal offence
cyber stalking
cybercrime
device
domestic abuse
e-banking
e-mail site
encrypt the data
exploitation
fraud
hacker
identity theft
indecent images of children
information warfare
investigation
malware
misusing existing system tools
murder
netcrime
network
online purchase
output
password
personal bank account
phishing crime
phishing scams
pornography
private data
record keeping
sexual offence
social networking sites
software packages
source of evidence
spam
stalker
stored data
suspect
teen chat website
theft of classified information
to arrest
to blackmail
to conceal unauthorized transactions
to invade privacy
to stalk celebrities
Twitter accounts
unauthorized
unlawful
unsolicited sending
username
Web sites
writing code
Computer crime – Questions
Answer the following
questions.
What is computer
crime?
What are types
of computer criminality?
What are social
networks?
What are they
used for? How can they be misused?
What information
shouldn’t we publish there?
What crimes are
connected with using social networks?
Who is a hacker?
What does a hacker
do?
Whose computer
networks do they break into?
How can hackers
misuse information and data?
What is child
pornography?
Who is a
paedophile?
What are chat
sites?
How can they be
misused?
How can we
protect children against contacts with paedophiles?
What is a spam?
How can we
protect our e-mail accounts against spam?
What does it
usually contain?
What is a
computer fraud?
What are types
of frauds?
Computer crime – Study material
Computer crime – Study material
Computer crime, or cybercrime,
refers to any crime that involves a
computer and a network, where the computers may or may not have played an
instrumental part in the commission of a crime. Netcrime refers,
more precisely, to criminal exploitation
of the Internet.
Computer crime encompasses a broad range of
potentially illegal activities. It may be divided into one of two types of
categories: (1) crimes that target
computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of
the computer network or device.
Examples of crimes that primarily target computer
networks or devices would include:
- Computer viruses
- Denial-of-service attacks
- Malware (malicious code)
Examples of crimes that merely use computer networks
or devices would include:
- Cyber stalking
- Fraud and identity theft
- Information warfare
- Phishing scams
A computer can be a source of evidence. Even though the computer is not directly used
for criminal purposes, it is an excellent device
for record keeping, particularly
given the power to encrypt the data.
If this evidence can be obtained and decrypted, it can be of great value to
criminal investigators.
Spam, or the unsolicited sending of bulk email for
commercial purposes, is unlawful to varying degrees. As applied to email,
specific anti-spam laws are
relatively new, however limits on unsolicited electronic communications have
existed in some forms for some time.
Computer fraud is any
dishonest misrepresentation of fact
intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result
in obtaining a benefit by:
- Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
- Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;
- Altering or deleting stored data;
- Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.
Other forms of fraud may be facilitated using computer
systems, including bank fraud, identity theft, extortion, and theft of
classified information.
The content of
websites and other electronic communications may be distasteful, obscene or
offensive for a variety of reasons. In some instances these communications
may be illegal. Many jurisdictions place limits on certain speech
and ban racist, politically
subversive, or inflammatory material that tends to incite hate crimes.
One area of Internet
pornography that has been the target of the strongest efforts at
curtailment is child pornography.
Whereas content may be
offensive in a non-specific way, harassment directs obscenities and derogatory
comments at specific individuals focusing for example on gender, race,
religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by
sending hate e-mail to interested
parties (cyber bullying, cyber stalking, harassment by computer, hate
crime, Online predator, and stalking).
Any comment that may be found derogatory or offensive is considered harassment.
Hacker or cracker,
who accesses a computer system by
circumventing its security system.
Adjusted to:
http://en.wikipedia.org/wiki/Computer_crime
Case n. 2 – 3 (Increasing of maintenance of the minor son)
Case n. 2 – 3 (Increasing of
maintenance of the minor son)
A mother of minor children came to
the Municipal Authority of Jihlava, the Department of Social Affairs,
the Department of Social and Legal Protection of Children to ask for
help in solving the situation in which she got.
According to her notification, she
has been married twice. A minor child was born from the first marriage – a son, who was put in her custody. The minor boy attends 2nd
class of primary school today. His father is obliged to contribute to the
maintenance of the son with 1300 Czech crowns a month based on the judgment of the District Court in Jihlava ref P 384/2006-75 of 19th May 2006, which entered into force 3rd July 2006. The father does not contribute beyond the maintenance of his son by any
extra amount of money; he meets him irregularly – on average once or twice a month
throughout the weekend. Otherwise, he shows little interest – just as f.e.
congratulations to his birthday, Christmas.
From the mother's second marriage a 2.5-year-old child was born, who the mother
is currently on parental leave with. Her husband is 42 years old and
he was released from his job on 31st July 2012 (he had been employed by the last employer for 7 years). The family
has a permanent
residence in Luka nad Jihlavou, Nová 83.
Task:
Focus on the situation of mother’s older minor child. Tell the
mother what proposal she should
submit.
Key words and phrases to be solved:
-
The Municipal Authority of Jihlava (preferably local authority)
-
The Department of Social and Legal Protection of
Children
-
Married
for the second time
-
A
minor son was born from the first marriage
-
The
boy attends second grade of primary school
-
The
father is obligated to maintenance of the son by amount of 1,300 CZK per month
-
The
father does not contribute beyond the maintenance of his son by any extra amount of
money
-
From
the second marriage a 2.5-year-old child was born
-
The
mother is currently on parental leave
-
Her
husband is 42 years old
-
The family has a permanent
residence in Luka nad Jihlavou, Nová 83
Solution:
Increasing of maintenance of the minor son
Due to the fact that the minor's needs have increased significantly with entering primary school, the mother
should submit a proposal to increase
maintenance. The proposal should be submitted by the District Court in Jihlava in quadruplicate. One copy is intended
into the guardianship records of the
minor child and other to the participants
of proceedings – i.e. mother, father and minor child represented by a guardian, who is legally appointed by
the court. (Initiate guardianship proceedings)
Within the burden of proof mother and father are heard
and requested for reports on income of
the parents and relation to real estate; furthermore, the evidence on the costs, which are associated with the needs of the child (linked to education,
leisure and health status). After the burden of proofs proceeds, the court gives judgment. The maintenance of the minor child can be
increased with the retroaction of three
years – in this case, entering primary school is the determinative time
period. (proceeding course)
The judgment is given to all participants
who shall have the right to lodge an
appeal within 15 days since its delivery and can lodge an appeal through
the court that determined in the first level (i.e. the District Court). A
second level appeal will be determined be the Regional Court. The guardian will be
appointed again, and it newly decides in
re after the burden of proceeding. Against the above mentioned decisions of
the Regional Court
can no longer be appealed. (appeal
procedure)
Key words and phrases to be solved:
-
A
proposal to increase maintenance of a minor child
-
The
proposal is submitted to the District Court in quadruplicate
-
The
participants are mother, father and a minor child represented by a guardian
-
The
guardian of the minor child is appointed by the court
-
In
the frame of the burden of proceedings, the mother and father are heard by the
court
-
The
court will require a report on the income of the parents and the costs that are
associated with the needs of the child
-
After
the burden of proofs proceeds, the court gives its judgment
-
The
court can determine increasing of maintenance of the minor child with the
retroaction of three years
-
A
written copy of the judgment must be delivered personally to all participants
-
The
participants may lodge an appeal within 15 days from the judgment
-
The
appeal is submitted through the District Court
-
The
Regional Court
decides on the appeal
The case is based on the following legislation:
Material:
The Family Act (94/1963 Coll., As
amended)
The Law on Social and Legal
Protection of Children (359/1999 Coll., As amended)
Process:
Civil Procedure (99/1963 Coll., As
amended)
Subscribe to:
Comments (Atom)
