非偽造的 的英文怎麼說
中文拼音 [fēiwěizàode]
非偽造的
英文
genuine-
Neither the bank, its associates, nor any of their directors, officers or employees, shall be liable to the customer for any expenses, loss or damage suffered by or occasioned to the customer by reason of any action taken or omitted to be taken by any one or all of the bank, its associates, their directors, officers, employees or agents pursuant to these conditions or in connection therewith other than as a result of the fraud, wilful default or negligence of the bank, its associates, their directors, officers, employees or agents ; the bank s failure in good faith to honour any stop - payment instructions given by the customer ; the presentation to the bank of any cheque or other payment order which is post - dated ; the bank failing to honour any draft drawn on it by the customer, but the bank shall immediately return such draft to the customer through the normal channels giving the reason for the dishonour ; any loss, damage, destruction or misdelivery of or to the securities howsoever caused unless the same shall result from the negligence of, or theft by, the bank or its associates or any of their directors, officers or employees, in which event the extent of the liability of the bank shall be limited to the market value of such securities at the date of discovery of the loss and even if the bank has been advised of the possibility of such loss or damage ; unauthorised use or forging of any authorised signature as a result of the negligence, wilful default or fraud of the customer ; subject to condition 5. 5, any act or omission, or insolvency of, any person not associated with the bank including, without limitation, a third party nominee or depositary ; viii the collection or deposit or crediting to the custodian accounts of invalid, fraudulent or forged securities or any entry in the custodian accounts which may be made in connection therewith ; any malfunction of, or error in the transmission of information caused by, any electrical or mechanical machine or system or any interception of communication facilities, abnormal operating conditions, labour difficulties, acts of god, or any similar or dissimilar causes beyond the reasonable control of the bank and notwithstanding paragraph, the error, failure, negligence, act or omission of any other person, system, institution or payment infrastructure
本行其聯系人士其各董事高級人員或雇員均毋須向客戶因以下理由而使客戶蒙受或產生之任何開支損失或虧損負責: i本行其聯系人士其董事高級人員雇員或代理人根據此等條件採取或遺漏採取有關之行動,但由於本行其聯系人士其董事高級人員雇員或代理人之欺詐行為故意失責或疏忽所造成者除外ii本行本真誠地未能依約替客戶執行止付指示iii向本行提交任何遠期支票或其他付款指示iv本行未能兌現由客戶開出之匯票,但本行將立即透過正常渠道將該匯票退回客戶,並解釋拒付之理由v無論如何導致之任何證券之損失損毀毀壞或錯誤交付除非上述各項乃因本行或其聯系人士或其任何董事高級人員或雇員之疏忽或盜竊所引致,而在該等情況下,本行的責任將只限於在發現損失當日該等證券之市值,以及即使本行已獲知該等賠償之可能性vi因客戶之疏忽故意失責或欺詐行為而導致的任何偽造授權簽名或不獲授權使用該簽名vii在第5 . 5 a條之規限下,與本行無關者之任何行動或遺漏或無償債能力包括但不限於第三者代名人或寄存處viii代收或存入或貸存於保管人賬戶的無效偽造或假冒證券或在保管人賬戶記入可能與此有關之賬項ix任何電子機械或系統失靈或因該等機件或系統產生的資料傳送錯誤或任何通訊設施之終斷不正常操作情況勞工問題天災或非本行所能合理控制之任何類似或非類似原因及x盡管有第ix項,任何其他人系統機構或付款設施的錯誤故障疏忽行動或遺漏。Part four : applying the basic theories about bills, and principles about forgery of bills and the transfer risks, devise remedial methods for those non obligee of bills, who have lost the bill, according to various situation
第四部分:運用票據基礎理論以及票據偽造、風險轉嫁的有關原理,針對不同的票據喪失情形,對喪失票據直接佔有的各類非票據權利人設計補救方法。This dissertation, which begin from the concept of forfeiture of bills, with the method of comparison, analyzed the orientation of values about forgery of bills in china ' s legal system about bills, and devised a set of remedial methods for those who have lost their bills, especially for those non obligee of bills, who have lost the bill. it fills the gaps of theory of the means of relieving those non obligee of bills, in the studies of laws governing bills
本文從票據喪失的概念入手,通過比較的方法,分析了我國票據法律制度在票據偽造方面的價值取向,為不同的喪失票據佔有者,尤其是喪失票據直接佔有的非票據權利人設計了一整套的補救方法,填補了國內票據法研究中在非票據權利人喪失票據后缺乏對非票據權利人的補救方法研究的理論空白。This paper consists of three parts. in part one, the concept and categories of instruments offence have been discussed ; in part two, the structures of instruments offence have been listed ; in part three, measures have been raised concerning how to attack and prevent instruments offence or crimes in relation to instruments offence. in part one of this paper, the author has firstly defined the concept of instruments offence from the jurisdiction of crime and the nature of instruments offence : instruments offence refers to the activities that violate relevant provisions of instrument law take the illegal ownership make
結合理論知識,本文還討論了在實務中常見的疑難問題,如對使用偽造、變造的金融票據、使用作廢的金融票據中「使用』 』的理解;在票據的背書欄偽造、變造記載內容的定性;將偽造、變造的票據質押后騙取財物的行為定性;倒賣偽造、變造的票據行為定性;非法「補記」空白支票行為的定性;在空白票據上偷蓋印章的行為定性;行為人偽造、變造票據后,將其提供給他人使用行為的定性以及金融機構內部工作人員參與票據詐騙的行為定性等。The foreigners who fabricate, alter, enter under false name, transfer, and trade with visa and identification paper can be punished by fine 1, 000 to 10, 000 yuan in the meantime, the illegal income will be confiscated and whose original visa or identification paper will be withdrawn ; or punished to detain by 3 to 10 days, and also can be coerced leaving the country within time limit at the same time
對偽造、塗改、冒用、轉讓、買賣簽證、證件的外國人,在吊銷或者收繳原簽證、證件並沒收非法所得的同時,可以處1000元以上、 10000元以下的罰款;或者處3日以上、 10日以下的拘留,也可以並處限期出境。This scheme of dividing area makes the network and borders between systems clear, and will help to install the security devices. in dispatch center, security devices such as firewall, physical partition device are installed, and between dispatch centers, encrypting devices will be installed
具體地說,在同一地點的不同安全區之間採用防火墻、隔離裝置等邊界防護設備進行橫向隔離以抵禦非法訪問、拒絕服務等類型的攻擊,不同地點同一安全區之間採用加密認證等手段,以抵禦數據在野外傳輸時可能遭遇的竊聽、偽造、篡改等類型的攻擊。In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown
本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變的步長選擇部分系數,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。The thesis study on the legislation situation, the legislation evolution of our countries ’ finance crime and the overseas legislation stipulation of the financial crime. the author think the financial criminal legislation of our country must form the coordinated financial criminal legal framework and change the penalty structure that is severe but was lax. the paper analysis the theory basis of on perfecting crime names by studying the illegal activity offend against the criminal law, the crime punishment legal principle and the crime punishment balanced principle, the criminal law modest and restrained principle and the criminal law investment cost and benefit analysis. finally the author puts forward the ideas that additionally build illegal gathers capital crime, merge forge, forges the national negotiable securities crime and forge, forges the stock, the bond of the company
本論文從研究我國金融犯罪罪名的立法現狀、立法沿革及國外金融犯罪罪名的立法規定著手,認為我國金融犯罪立法尚待形成協調的金融刑事法律體系和改變「厲而不嚴」的刑罰結構,並從違法行為犯罪化的前提、罪刑法定原則和罪刑均衡原則、刑法謙抑性原則、刑法投入成本?效益分析角度出發,分析金融犯罪罪名完善的理論依據,最後從金融犯罪罪名增設、合併、分立、廢除四個角度,提出增設非法集資罪,合併偽造、變造國家有價證券罪與偽造、變造股票、公司、企業債券罪,分立內幕交易罪與泄露內幕信息罪,廢除偽造、變造、轉讓金融機構許可證罪的立法建議,並分析其可行性。Mr shkurtaj says he spoke out after being shocked by the discovery of $ 3, 500 in counterfeit american bills, sitting in the undp safe in pyongyang
什庫爾特耶說發現平壤的聯合國開發計劃署保險箱里有3 , 500美元的偽造美鈔時,他感到非常震驚並在後來揭發此事。The paper does a systematic and professional research on the group of crimes concerning financial bills which is made up of the crime of forging or altering financial bills, the crime of illegal issuing financial bills, the crime of accepting, paying or guaranteeing illegal financial bills and the crime of fraud by financial bills
本文將與票據有關的四個個罪:偽造、變造金融票證罪,非法出具金融票證罪,對違法票據承兌、付款、保證罪和票據詐騙罪作為一個罪群進行系統性和專業性研究。Although there is no the description of " for the purpose of illegal possession " in the fads about the crime, the crime can not be tenable without the purpose. on the other hand, the crime of fraud on letter of credit leaves from common fraud crime, which is a crime for the purpose of illegal possession with direct intent. on some occasion, there is a division of accomplished cffense and unaccomplished offense in crime of fraud on letter of crfdit. the act of counterfeiting a letter of credit and using it afterwards, and the act of using a noneffec tive credit, and the act of defrauding a bank to open a credit or using fraudulent clause in credit somewhat should be punished seriously by our country ' s criminal law
信用證詐騙罪所侵犯的客體是國家對信用證的管理制度以及公私財產所有權,其客觀行為表現包括使用偽造、變造的信用證或者附隨的單據、文件進行詐騙活動、使用作廢的信用證進行詐騙活動、騙取信用證進行詐騙活動以及以其他方法進行信用證詐騙活動,信用證詐騙罪的犯罪主體包括自然人和單位,主觀上屬于直接故意,要求行為人具有非法佔有的目的。在司法實踐中,應注意信用證詐騙罪與非罪、與彼罪的區分認定,以及對罪數形態、共同犯罪和既未遂形態的認識。The signature is proved to be a forgery
簽字被證明是非法模仿的或偽造的。The counterfeiter was so conceited that he put his own picture on the ten - dollar bill
有個偽造者非常自負,竟把自己的照片印在10美元的紙鈔上。But as pay - per - click advertising has grown into a huge industry, concern has mounted over so - called “ click fraud ” ? bogus clicks that do not come from genuinely interested customers
但是正當點擊率付費廣告成長為一項巨大的產業時,關注點轉向了「點擊欺詐」偽造點擊並非來自真正感興趣的消費者。An immigration officer was jailed for 10 years for possessing a false diplomatic passport and conspiring to sell diplomatic passports
一名入境事務處入境主任,因管有偽造的外交護照並非法售賣外交護照,被判入獄十年。Under internet entironment, data stored in database management system may be faced with unauthenticated disclosure, modification, counterfeit, broken, and so on. all these threat destroys the data ' s confidentiality. integrity, availability and facticity
在internet環境下,數據庫管理系統中存儲的機密數據可能被非授權的泄露,纂改,中斷和偽造等。這破壞了數據的保密性,完整性,可用性和真實性。He gives the bank specimens of his signature, and there is a very firm rule that the bank has no right or authority to pay out a customer ' s money on a cheques on which its customer ' s signature has been forged
他把自己簽名的樣本交給銀行,對此有一條非常嚴格的規定:銀行沒有任何權利或理由把儲戶的錢讓偽造儲戶的支票取走。A vietnamese woman awaiting repatriation in hong kong was sentenced to nine months imprisonment, suspended for 18 months, for producing forged immigration documents to help illegal immigrants find wo
一名正等候遣返的越南船民,串謀偽造入境事務處的擔保書俗稱行街紙,協助非法入境者在港找尋工作,被判入獄九個月,緩刑十八個月。They had identified 4 illegal interior decoration workers attempting to gain entry to the large private housing estate with forged hong kong identity cards from may to july 2005. the alert guards called the police right after the illegal workers entered the building and then helped the police arrest the illegal workers and the contractor successfully
他們於2005年5月至7月,在美孚新37032當值期間,分別3次懷疑4名非法勞工使用偽造的香港身份證,企圖進入該屋苑內之單位進行裝修工程。To be sure you are seeing valid results rather than artefacts of the models, you need to take account of all the ways that can happen
為了確保從模型中得到真實而非偽造的結果,就必須考慮所有可能發生的相互關系。分享友人