Examples of using Basic approaches to security in English and their translations into Arabic
{-}
-
Colloquial
-
Political
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Basic approaches to security.
Chapter III. Basic approaches to security.
Basic approaches to security(A/CN.9/WG. VI/WP.26/Add.7).
Chapter II(Scope of application and other general rules) and chapter III(Basic approaches to security).
III. Basic approaches to security.
The Guide(see chapter I, section B, Basic approaches to regulating secured transactions) reviews the basic approaches to security that might be adopted by a State seeking to reform its secured transactions law.
In chapter III(Basic approaches to security), this Guide recommends that States adopt the unitary approach to non-acquisition secured transactions.
Morocco welcomed the work done on the draft legislative guide on secured transactions andsupported the recommendations approved by the Commission on the basic approaches to security that enshrined the comprehensive approach and the functional approach that should be followed in a modern secured transactions law.
Chapter III. Basic approaches to security A/CN.9/WG. VI/WP.26/Add.7.
Mr. Bazinas(Secretariat) said that document A/CN.9/CRP.11/Add.1 contained a proposal to revise and reorder chapter II on the scopeof application and other general rules and chapter III on basic approaches to security, as set out in document A/CN.9/631/Add.1, and to combine them in a new chapter I entitled" Scope of application and basic approaches to secured transactions".
Chapter III. Basic approaches to security and other general rules.
Except in connection with the non-unitary approach to acquisition financing(see chapter XI on acquisition financing), whether a creditor seeks to obtain a preference by means of either the principle of the common pledge or the principle of creditor equality, the particular means by which it does so will be a matter for secured transactions law(see chapter III, Basic approaches to security, recommendation 11).
Chapter III. Basic approaches to security(A/CN.9/WG. VI/WP.6/Add.2).
Section B on basic approaches to security reproduced paragraphs 78 to 141 of document A/CN.9/631/Add.1 containing chapter III with some minor amendments.
Chapter II: Scope of application and other general rules; and chapter III: Basic approaches to security:(a) Recommendations(A/CN.9/637, recommendations 2-12) and(b) Commentary(A/CN.9/631/Add.1, paras. 23-56 and 78-141).
(b) Section B(Basic approaches to security) should include the material contained in document A/CN.9/631/Add.1, paragraphs 78-141, appropriately updated to reflect the decisions of the Commission during the first part of its fortieth session(A/62/17(Part I), para. 158);
Chapter III of this Guide reviews the basic approaches to security that might be adopted by a State considering secured transactions law reform in general.
As noted in chapter III(Basic approaches to security) of this Guide, States have developed a wide variety of legal devices through which those that advance credit can ensure repayment of their debtor ' s obligation.
The Commission approved the substance of the recommendations on the basic approaches to security that enshrined the comprehensive approach and the functional approach that should be followed in a modern secured transactions law.
Chapter III. Basic approaches to security A/CN.9/WG. VI/WP.9/Add.1.
Nonetheless, in chapter III(Basic approaches to security) the Guide notes the importance of intangible assets and, in particular, rights to payment as assets that a grantor might encumber.
The purpose of the recommendations on basic approaches to security is to ensure that the law covers in an integrated and consistent manner all forms of rights in movable property that serve security purposes.
With regard to new chapter I, section B(Basic approaches to security), it was suggested that the draft Guide should further explain the rationale for all the different approaches taken with respect to security rights and their historical evolution.
The Working Groupconsidered the recommendations contained in chapters III(Basic approaches to security and other general rules), IV(Creation of a security right(effectiveness as between the parties)), VIII(Rights and obligations of the parties), IX(Rights and obligations of third-party obligors), XIII(Conflict of laws), XIV(Transition)(see A/CN.9/WG. VI/WP.29), as well as revised recommendations contained in chapter XII(Acquisition financing devices) based on a proposal by the Secretariat.
Clear differences in terms of the concepts, priorities and approaches to security have cast a shadow on our basic aspiration, which is for the Assembly to fully and effectively use the powers conferred upon it under Article 11, paragraph 1, of the Charter-- namely, with regard to the principles governing disarmament and the regulation of arms.
In 2009/10,UNSOA support services have focused initially on improving the basic living conditions and security of AMISOM, which was originally tactically deployed in five major locations(the airport, the seaport, the State House, the military academy and the university), as well as in five semi-permanent locations protecting routes between the various major locations and flight approaches to the airport.
One representative referred to the holistic approach to security, taking into account basic developmental needs, as well as the need for political security, including respect for human rights.
Moreover, all the basic approaches to the elaboration of requirements, design, development, security assessment and protection of information resources in information and telecommunications systems as a whole correspond to the approaches employed by the State security services of the Member States of the United Nations and the member States of the European Union.
A first practical step must be taken to define a basic approach that enjoys the largest support of the Member States, including the permanent members of the Security Council.
