---
language:
- en
license: apache-2.0
tags:
- sentence-transformers
- sentence-similarity
- feature-extraction
- generated_from_trainer
- dataset_size:1580
- loss:MatryoshkaLoss
- loss:MultipleNegativesRankingLoss
base_model: BAAI/bge-m3
widget:
- source_sentence: How can the duties of a member end?
sentences:
- "**Court (Civil/Criminal):**\nProvisions: Articles 8 of Law 2251/1994, Articles\
\ 2, 4, 48 et seq. of Law 4537/2018, Article 11 paragraph 1 of Law 4261/2014,\
\ Articles 830, 806, 827, 914, 932 of the Civil Code and 176 of the Code of Civil\
\ Procedure.\nTime of commission of the act:\nOutcome (not guilty, guilty):\n\
Rationale: Electronic fraud through the method of phishing. A third party fraudulently\
\ obtained money from the plaintiff's bank account and transferred it to another\
\ bank account. Both the defendant is liable for the inadequate protection of\
\ its systems, which should have been excellent, and the plaintiff who failed\
\ to fulfill his obligation to protect his information and disregarded the defendant's\
\ security instructions. Law 4537/2018 introduces mandatory law in favor of users,\
\ as according to Article 103, payment service providers are prohibited from deviating\
\ from the provisions to the detriment of payment service users. It is determined\
\ that a resumption of the discussion should be ordered in order to provide all\
\ possible evidence, with diligence from both parties, especially from the defendant,\
\ who has access to the transaction data through its systems, but also bears the\
\ relevant burden of proof concerning the exact timing of the execution of the\
\ money transfer order at each stage (withdrawal from the plaintiff's account,\
\ transfer to another bank, transfer to the third party's account).\nFacts: The\
\ plaintiff maintains a joint bank account with his wife at the defendant bank\
\ and has also agreed to online banking transactions (e-banking). On July 31,\
\ 2020, at 13:45, the plaintiff was informed of a transfer of €3,000 from his\
\ account, which he had not initiated, nor had his wife. At 14:05, he immediately\
\ contacted the bank’s customer service line and reported the incident, stating\
\ that it was not his action and requesting its cancellation. The bank employee\
\ found that the plaintiff had provided his details to a fake website 10 days\
\ earlier, and subsequently, the mobile number used for transaction confirmations\
\ had been changed. The employee informed him that the money was at the other\
\ bank and that they would logically be able to retrieve it, provided it had not\
\ already been transferred to a third party's account. Since then, the plaintiff\
\ has not seen any return of the amount to his account, and he has made numerous\
\ attempts to resolve the issue with the bank, with effort, costs, and distress;\
\ however, nothing was achieved, as the money had already entered a third party's\
\ account and the defendant denied responsibility for the transfer of the funds.\n\
Facts: The plaintiff maintained a joint account with his wife at a bank and used\
\ internet banking services. On July 21, 2020, a third party deceived the plaintiff\
\ through phishing (a misleading SMS with a link), obtaining his banking credentials.\
\ The third party, using the stolen information, requested a phone number change\
\ for receiving OTP (one-time password) and completing electronic transactions.\
\ The bank completed the change process based on the correct credentials. On July\
\ 31, 2020, a transfer of €3,000 was made from the plaintiff's account to a third\
\ party. The plaintiff was immediately informed, called the bank, and reported\
\ the fraud; however, the recovery of the funds was not successful. The plaintiff\
\ claims that the bank is responsible for inadequate protection of its systems,\
\ while the bank asserts that it followed the procedure based on the agreed identification\
\ methods. \nThe court recognizes that there is responsibility on both sides:\
\ the bank for inadequate security and prevention of phishing, and the plaintiff\
\ for negligence in safeguarding his personal information, despite the bank's\
\ relevant warnings. A critical issue is the exact timing of the completion of\
\ the transfer: if the bank was timely notified of the fraud but did not intervene,\
\ it may be fully liable. The court requests a resumption of the discussion and\
\ further evidence, mainly from the bank, which has access to the relevant technical\
\ details."
- 'Email phishing is a type of identity theft scam conducted via email or SMS. The
attacker uses social engineering tactics such as impersonating trusted entities
and inducing urgency. Victims are tricked into disclosing personal information
or downloading malware.
Scenarios:
- Scenario 1: Emails impersonating high-ranking executives accuse victims of crimes
to coerce them into revealing information or opening malware-laden attachments.
- Scenario 2: Emails/SMS from fake banks or authorities alert victims of data
breaches, directing them to spoofed websites to input credentials.
- Scenario 3: SMS messages deliver disguised malware apps that harvest sensitive
data.
- Scenario 4: SMS links lead to pharming sites that mimic trusted brands and steal
login data through fake pop-ups.'
- '1.Member States shall provide for each member of their supervisory authorities
to be appointed by means of a transparent procedure by: — their parliament; — their
government; — their head of State; or — an independent body entrusted with the
appointment under Member State law.
2.Each member shall have the qualifications, experience and skills, in particular
in the area of the protection of personal data, required to perform its duties
and exercise its powers.
3.The duties of a member shall end in the event of the expiry of the term of office,
resignation or compulsory retirement, in accordance with the law of the Member
State concerned.
4.A member shall be dismissed only in cases of serious misconduct or if the member
no longer fulfils the conditions required for the performance of the duties.'
- source_sentence: What is covered under point (i)?
sentences:
- '1.The Member States, the supervisory authorities, the Board and the Commission
shall encourage the drawing up of codes of conduct intended to contribute to the
proper application of this Regulation, taking account of the specific features
of the various processing sectors and the specific needs of micro, small and medium-sized
enterprises.
2.Associations and other bodies representing categories of controllers or processors
may prepare codes of conduct, or amend or extend such codes, for the purpose of
specifying the application of this Regulation, such as with regard to: (a) fair
and transparent processing; 4.5.2016 L 119/56 (b) the legitimate interests
pursued by controllers in specific contexts; (c) the collection of personal data;
(d) the pseudonymisation of personal data; (e) the information provided to the
public and to data subjects; (f) the exercise of the rights of data subjects;
(g) the information provided to, and the protection of, children, and the manner
in which the consent of the holders of parental responsibility over children is
to be obtained; (h) the measures and procedures referred to in Articles 24 and
25 and the measures to ensure security of processing referred to in Article 32;
(i) the notification of personal data breaches to supervisory authorities and
the communication of such personal data breaches to data subjects; (j) the transfer
of personal data to third countries or international organisations; or (k) out-of-court
proceedings and other dispute resolution procedures for resolving disputes between
controllers and data subjects with regard to processing, without prejudice to
the rights of data subjects pursuant to Articles 77 and 79
3.In addition to adherence by controllers or processors subject to this Regulation,
codes of conduct approved pursuant to paragraph 5 of this Article and having general
validity pursuant to paragraph 9 of this Article may also be adhered to by controllers
or processors that are not subject to this Regulation pursuant to Article 3 in
order to provide appropriate safeguards within the framework of personal data
transfers to third countries or international organisations under the terms referred
to in point (e) of Article 46(2). Such controllers or processors shall make binding
and enforceable commitments, via contractual or other legally binding instruments,
to apply those appropriate safeguards including with regard to the rights of data
subjects.
4.A code of conduct referred to in paragraph 2 of this Article shall contain mechanisms
which enable the body referred to in Article 41(1) to carry out the mandatory
monitoring of compliance with its provisions by the controllers or processors
which undertake to apply it, without prejudice to the tasks and powers of supervisory
authorities competent pursuant to Article 55 or 56
5.Associations and other bodies referred to in paragraph 2 of this Article which
intend to prepare a code of conduct or to amend or extend an existing code shall
submit the draft code, amendment or extension to the supervisory authority which
is competent pursuant to Article 55. The supervisory authority shall provide an
opinion on whether the draft code, amendment or extension complies with this Regulation
and shall approve that draft code, amendment or extension if it finds that it
provides sufficient appropriate safeguards.
6.Where the draft code, or amendment or extension is approved in accordance with
paragraph 5, and where the code of conduct concerned does not relate to processing
activities in several Member States, the supervisory authority shall register
and publish the code.
7.Where a draft code of conduct relates to processing activities in several Member
States, the supervisory authority which is competent pursuant to Article 55 shall,
before approving the draft code, amendment or extension, submit it in the procedure
referred to in Article 63 to the Board which shall provide an opinion on whether
the draft code, amendment or extension complies with this Regulation or, in the
situation referred to in paragraph 3 of this Article, provides appropriate safeguards.
8.Where the opinion referred to in paragraph 7 confirms that the draft code, amendment
or extension complies with this Regulation, or, in the situation referred to in
paragraph 3, provides appropriate safeguards, the Board shall submit its opinion
to the Commission.
9.The Commission may, by way of implementing acts, decide that the approved code
of conduct, amendment or extension submitted to it pursuant to paragraph 8 of
this Article have general validity within the Union. Those implementing acts shall
be adopted in accordance with the examination procedure set out in Article 93(2)
10.The Commission shall ensure appropriate publicity for the approved codes which
have been decided as having general validity in accordance with paragraph
11.The Board shall collate all approved codes of conduct, amendments and extensions
in a register and shall make them publicly available by way of appropriate means.'
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Claim for\
\ compensation and monetary satisfaction due to moral damage against a mobile\
\ phone company and a credit institution within the framework of inadequate fulfillment\
\ of a payment services contract for \"web banking.\" Appropriate actions for\
\ mobile phone companies in case of a request for a \"sim\" card replacement due\
\ to wear or loss. They must verify the customer's identity based on the personal\
\ details and identification information registered in their system but are not\
\ liable for any changes in the latter that were not timely communicated to them.\
\ Further security measures such as phone communication or sending an SMS to the\
\ mobile number holder are not required. Payment services under Law 4357/2018.\
\ Obligation of the payment service provider, such as banks, to inform the payer\
\ after receiving a relevant order for making a payment. The content of this varies\
\ per case, such as sending a personalized code to the user's mobile phone for\
\ transaction approval, as well as sending an email immediately after its completion.\
\ However, the bank is not liable for customer damage resulting from illicit electronic\
\ transactions due to third-party interception of either the access codes for\
\ electronic banking transactions or the sim card and the phone number to which\
\ the personalized codes for approving the aforementioned transactions are sent,\
\ within the framework of increased security protocols. Appropriate actions by\
\ banks upon diagnosing illicit banking transactions that may be fraudulent. Relevant\
\ criteria for consideration. The evidence did not indicate negligent and thus\
\ tortious behavior from all defendants. The claim is dismissed. \n\n**Facts:**\
\ In the present claim, upon due assessment of its content, the plaintiff states\
\ that he has a mobile phone subscription with the first defendant, a mobile phone\
\ company. On October 26, 2020, in the morning, he realized that his mobile phone\
\ was offline, and by noon, he received email notifications from Bank ..........\
\ and ............ (whose third and fourth defendants are de facto universal successors,\
\ respectively), with which he holds an account, regarding transactions he had\
\ made. From phone calls from his home phone to Bank .............. and ............\
\ Bank, he was informed that on the same day, in a very short period, four money\
\ transfers had been made from the account he maintains at Bank ..............,\
\ specifically, an amount of €15,000 was transferred to the account mentioned\
\ in the claim document under the name ..........., at ........ an amount of €15,000\
\ was transferred to the account mentioned in the claim document under the name\
\ ......... at ........... Bank, an amount of €15,000 was transferred to the plaintiff's\
\ account with his daughter as a co-holder at ......... Bank, and an amount of\
\ €6,700 was transferred from another of his accounts to the account from which\
\ the transfer to the aforementioned accounts of €45,000 was made. Additionally,\
\ from the plaintiff's account with his daughter as a co-holder at ..........\
\ Bank, an amount of €9,999 was transferred to an account under the name of ....\
\ . He attempted to log into the online banking service of Bank ......... from\
\ his home computer, but found that the service was locked, while regarding the\
\ corresponding service of ........... Bank, he requested alongside his daughter\
\ to 'lock' it. In a phone call with the call center of Bank ............, he\
\ was informed about the locking of his electronic account in the online banking\
\ service and was told to dispute the transactions, which he did immediately through\
\ ... banking, while his daughter communicated about this with ....... Bank. The\
\ transfer to the account with the beneficiary was canceled, and the amount of\
\ €15,000 was returned to the plaintiff. After his investigation, he discovered\
\ that an unknown individual appeared at the branch of the first defendant, served\
\ by the second defendant, who posed as the plaintiff and presented a forged military\
\ ID card of the plaintiff, requesting and receiving a new sim card, resulting\
\ in the deactivation of the plaintiff's sim card and gaining access to the codes\
\ sent to him by the banks for completing the transfers. Due to the negligence\
\ of the second defendant, he did not realize that the identity used was forged,\
\ as since 2010, when the plaintiff retired, he has had a police identification\
\ card. The first defendant does not have security protocols to prevent such incidents,\
\ which constitute the sim .... method, despite the issuance of a press release\
\ from the Attica Security and numerous publications regarding the aforementioned\
\ method, unlike other mobile phone companies, which implement a specific procedure\
\ for changing sim cards. The second defendant did not take the obvious step to\
\ check the functioning of the sim card before replacing it, where he would have\
\ realized that the plaintiff's mobile phone was functioning normally. Bank ..........\
\ and ........... Bank: a) accepted requests for transferring large amounts of\
\ money from accounts that had no similar activity in the past, while the plaintiff's\
\ online banking account with the above banks was locked quite some time later,\
\ b) sent email notifications regarding successful transactions in succession,\
\ under a single email, c) did not check the address ... of the perpetrators,\
\ which was different from that used by the plaintiff, and d) did not take necessary\
\ security measures to prevent fraud via sim ... against the plaintiff, as the\
\ security code (pin) sent by the banks via message to the mobile phone proved\
\ to be compromised. As a result of the above illegal and culpable behavior of\
\ the defendants, the plaintiff suffered property damage amounting to a total\
\ of €24,999, which constitutes the total amount of the transfers made by third\
\ unknown persons to accounts of unknown individuals, as stated above, and has\
\ not been refunded despite his repeated inquiries, while he also suffered distress\
\ and mental anguish, and his trust in the banks was shaken, thus entitling him\
\ to monetary compensation for his moral damage, amounting to €5,000."
- Any processing of personal data in the context of the activities of an establishment
of a controller or a processor in the Union should be carried out in accordance
with this Regulation, regardless of whether the processing itself takes place
within the Union. Establishment implies the effective and real exercise of activity
through stable arrangements. The legal form of such arrangements, whether through
a branch or a subsidiary with a legal personality, is not the determining factor
in that respect. 4.5.2016 L 119/4 Official Journal of the European Union EN
- source_sentence: On what date did the defendant file the motion?
sentences:
- In order to enhance compliance with this Regulation where processing operations
are likely to result in a high risk to the rights and freedoms of natural persons,
the controller should be responsible for the carrying-out of a data protection
impact assessment to evaluate, in particular, the origin, nature, particularity
and severity of that risk. The outcome of the assessment should be taken into
account when determining the appropriate measures to be taken in order to demonstrate
that the processing of personal data complies with this Regulation. Where a data-protection
impact assessment indicates that processing operations involve a high risk which
the controller cannot mitigate by appropriate measures in terms of available technology
and costs of implementation, a consultation of the supervisory authority should
take place prior to the processing.
- "Court (Civil/Criminal): Criminal \nProvisions: Article 42 paragraphs 1, 2, 3,\
\ and 7 of Law 4557/2018 \nTime of commission of the act: \nOutcome (not guilty,\
\ guilty): \nReasoning: Obligation of the payment service provider, such as banks,\
\ to inform their contracting customer after receiving a relevant order for a\
\ payment to be made on their behalf. Content of the above notification at the\
\ stage of receiving the payment order and during its execution. Terms of liability\
\ for the provider regarding compensation for non-execution, erroneous, or delayed\
\ execution of payment transactions. In particular, in the case of an unauthorized\
\ or erroneous payment, the user is required to notify the provider within a specified\
\ timeframe as soon as they become aware of the corresponding transaction. The\
\ provisions of Law 4357/2018 establish mandatory legal regulations in favor of\
\ users of payment services and cannot be contractually modified to their detriment,\
\ but only to their benefit. Defenses available to payment service providers to\
\ relieve them of liability. Burden of proof distribution between the parties.\
\ This responsibility of banks may also stem from Law 2251/1994, as they provide\
\ services to the public and are considered suppliers. Conditions for supplier\
\ liability under the aforementioned legislation. Distribution of the burden of\
\ proof between the litigants to demonstrate liability for compensation under\
\ Law 2251/1994. Terms of concurrency between contractual and tort liability for\
\ compensation. The court partially accepts the lawsuit. \nFacts: On 01/09/2021,\
\ an unknown perpetrator sent an email to her from the electronic address “...............”,\
\ in which they stated that for security reasons she needed to confirm her account\
\ with the bank ....... Not realizing that it was a scam, she followed the attached\
\ hyperlink, entered her personal information, resulting in an unknown perpetrator\
\ intercepting her online banking credentials and making a transfer totaling 7,000.00\
\ euros to account number ................ of the bank ......... \nC) The beneficiary\
\ of the aforementioned account is ......... born on 16/05/1995 in the Municipality\
\ of ........., residing at .............., with ID number ....................\
\ issued on 02/10/2009 by T.A .............. and tax number ............. from\
\ the tax office ................... \nD) The criminal proceeds reportedly arising\
\ from the above criminal activity amount to a total of seven thousand euros (7,000.00€).\
\ Following the above, serious suspicions arise that the aforementioned criminal\
\ proceeds transferred to the aforementioned bank account were unlawfully appropriated\
\ by her and subsequently mixed with other legally held assets, which she used\
\ in her overall economic activities, aiming to launder them, thus concealing\
\ their true origin and making it impossible for them to be seized. Therefore,\
\ there are reasonable suspicions that the aforementioned individual committed\
\ not only the primary offense but also the criminal act of “Money Laundering”\
\ (Article 2 §1 a, d of Law 4557/2018, in conjunction with Article 4 subparagraph\
\ z of the same law as it stands, as well as Article 39 paragraph 1 subparagraphs\
\ a & c of the same Law 4557/2018). Because there are serious suspicions that\
\ the bank account numbered .......... maintained at the bank .....................,\
\ whose beneficiary is ..... (Tax ID ....................), contains part of the\
\ monetary amount from the aforementioned criminal activity that was placed behind\
\ banking secrecy to conceal its true origin and ultimately to launder it. Because,\
\ in this case, part of the criminal proceeds has been found while the remainder\
\ has not been found in its entirety, there is a lawful reason and an urgent case\
\ for prohibiting the sale or any other transfer of the following assets, given\
\ that they are subject to seizure and forfeiture according to Articles 40 and\
\ 42 of Law 4557/2018 as they currently stand."
- '1.The data protection officer shall have at least the following tasks: (a) to
inform and advise the controller or the processor and the employees who carry
out processing of their obligations pursuant to this Regulation and to other Union
or Member State data protection provisions; (b) to monitor compliance with this
Regulation, with other Union or Member State data protection provisions and with
the policies of the controller or processor in relation to the protection of personal
data, including the assignment of responsibilities, awareness-raising and training
of staff involved in processing operations, and the related audits; (c) to provide
advice where requested as regards the data protection impact assessment and monitor
its performance pursuant to Article 35; (d) to cooperate with the supervisory
authority; (e) to act as the contact point for the supervisory authority on issues
relating to processing, including the prior consultation referred to in Article
36, and to consult, where appropriate, with regard to any other matter.
2.The data protection officer shall in the performance of his or her tasks have
due regard to the risk associated with processing operations, taking into account
the nature, scope, context and purposes of processing. Section 5 Codes of conduct
and certification'
- source_sentence: What should the processing of personal data by public authorities
comply with?
sentences:
- '**Court (Civil/Criminal): Civil**
**Provisions:**
**Time of commission of the act:**
**Outcome (not guilty, guilty):**
**Rationale:**
**Facts:**
The plaintiff holds credit card number ............ with the defendant banking
corporation. Based on the application for alternative networks dated 19/7/2015
with number ......... submitted at a branch of the defendant, he was granted access
to the electronic banking service (e-banking) to conduct banking transactions
(debit, credit, updates, payments) remotely. On 30/11/2020, the plaintiff fell
victim to electronic fraud through the "phishing" method, whereby an unknown perpetrator
managed to withdraw a total amount of €3,121.75 from the aforementioned credit
card. Specifically, the plaintiff received an email at 1:35 PM on 29/11/2020 from
sender ...... with address ........, informing him that due to an impending system
change, he needed to verify the mobile phone number linked to the credit card,
urging him to complete the verification process within the next 24 hours by following
a link titled ........; otherwise, his account would be locked for security reasons.
The plaintiff read this email on the afternoon of 30 November 2020 and, believing
it was from the defendant, followed the instructions and proceeded via the provided
link to a website that was identical (a clone) to that of the defendant. On this
page, he was asked to enter the six-digit security code (.........) that had just
been sent to his mobile phone by the defendant at 3:41 PM, with the note that
it was an activation code for his ........ card at ........., which he entered.
Subsequently, the plaintiff received, according to his statements, a new email
(not submitted), which requested him to enter the details of the aforementioned
credit card, specifically the name of the cardholder and the card number, not
the PIN, which he also entered, convinced that he was within the online environment
of the defendant. Then, at 3:47 PM, he received a message on his mobile phone
from the defendant containing the exact same content as the one he received at
3:41 PM, while at 3:50 PM he received a message stating that the activation of
his ......... card at ....... had been completed. Once the plaintiff read this,
he became concerned that something was not right, and immediately called (at 4:41
PM) the defendant''s call center to inform them. There, the employees, with whom
he finally connected at 5:04 PM due to high call center volume, advised him to
delete the relevant emails, cancel his credit card, change his access passwords
for the service, and submit a dispute request regarding the conducted transactions.
The plaintiff electronically sent this request to the defendant, disputing the
detailed transactions amounting to €3,121.75, which were conducted on 30/11/2020
during the time frame of 16:37:45-16:43:34 PM, arguing that he had neither performed
them himself nor authorized anyone else to do so. The plaintiff specifically disputed
the following transactions, as evidenced by the account activity of the disputed
credit card during the aforementioned timeframe: a) transaction number .........
amounting to €150.62 conducted on 30/11/2020 at 4:43:34 PM, b) transaction number
........ amounting to €293.20 conducted on 30/11/2020 at 4:42:40 PM, c) transaction
number ............ amounting to €295.21 conducted on 30/11/2020 at 4:42:10 PM,
d) transaction number .......... amounting to €299.22 conducted on 30/11/2020
at 4:41:31 PM, e) transaction number ........ amounting to €297.21 conducted on
30/11/2020 at 4:41:01 PM, f) transaction number ........ amounting to €299.22
conducted on 30/11/2020 at 4:40:27 PM, g) transaction number ....... amounting
to €299.22 conducted on 30/11/2020 at 4:39:55 PM, h) transaction number ......
amounting to €299.22 conducted on 30/11/2020 at 4:39:22 PM, i) transaction number
......... amounting to €297.22 conducted on 30/11/2020 at 4:38:52 PM, j) transaction
number ......... amounting to €295.21 conducted on 30/11/2020 at 4:38:17 PM, and
k) transaction number ......... amounting to €296.21 conducted on 30/11/2020 at
4:37:45 PM. In its response letter dated 21/12/2020, the defendant denied responsibility
for the costs of the aforementioned transactions, placing the entire blame on
the plaintiff for the leak of his card details and security code to the fraudulent
page. The plaintiff, completely denying any fault for the conducted transactions,
repeatedly contacted the defendant, both by phone and via email (see emails dated
15/1/2021 and 11/2/2021), while on 2/3/2021, he electronically sent a report dated
1/03/2021 to the Consumer Advocate’s email address, recounting the events and
requesting that the aforementioned Independent Authority intervene to have the
disputed debt canceled. In its letter with reference number ...../27.04.2021,
the aforementioned Independent Authority informed the plaintiff that the case
was outside its mediating role and was therefore archived. Subsequently, the plaintiff
sent the defendant on 5/3/2021 his extrajudicial statement dated 4/3/2021, calling
upon it to fully cancel the debt of €3,121.75 that had been unjustly incurred
against him within two days and to immediately instruct the representatives of
the collection agency working with it to cease contacting him regarding the disputed
case. The defendant sent the plaintiff a message on his mobile phone on 20/04/2021
informing him that his case was still being processed due to lengthy operational
requirements, while on 23/04/2021, via email, it informed him that considering
their good cooperation and his efforts to keep them updated, it had reviewed his
case and decided to refund him the amounts of the transactions that were conducted
after his contact with their representatives on 30/11/2020 at 4:41 PM, totaling
€1,038.25, specifically the following: a) transaction of €150.62 conducted on
30/11/2020 at 4:43 PM, b) transaction of €295.21 conducted on 30/11/2020 at 4:42
PM, c) transaction of €293.20 conducted on 30/11/2020 at 4:42 PM, and d) transaction
of €299.22 conducted on 30/11/2020 at 4:41 PM. Beyond this, the defendant refused
to refund the plaintiff the amount of the remaining transactions conducted on
30/11/2020, totaling €2,376.08 (and not €2,376.48 as incorrectly stated by the
plaintiff in his lawsuit), which the plaintiff ultimately fully paid, transferring
€2,342.77 to the defendant on 7/06/2021 and €33.31 on 15/06/2021 (see related
deposit receipts).'
- "1.Where a type of processing in particular using new technologies, and taking\
\ into account the nature, scope, context and purposes of the processing, is likely\
\ to result in a high risk to the rights and freedoms of natural persons, the\
\ controller shall, prior to the processing, carry out an assessment of the impact\
\ of the envisaged processing operations on the protection of personal data. A\
\ single assessment may address a set of similar processing operations that present\
\ similar high risks.\n2.The controller shall seek the advice of the data protection\
\ officer, where designated, when carrying out a data protection impact assessment.\n\
3.A data protection impact assessment referred to in paragraph 1 shall in particular\
\ be required in the case of: (a) a systematic and extensive evaluation of personal\
\ aspects relating to natural persons which is based on automated processing,\
\ including profiling, and on which decisions are based that produce legal effects\
\ concerning the natural person or similarly significantly affect the natural\
\ person; (b) processing on a large scale of special categories of data referred\
\ to in Article 9(1), or of personal data relating to criminal convictions and\
\ offences referred to in Article 10; or (c) a systematic monitoring of a publicly\
\ accessible area on a large scale.\n4.The supervisory authority shall establish\
\ and make public a list of the kind of processing operations which are subject\
\ to the requirement for a data protection impact assessment pursuant to paragraph\
\ 1. The supervisory authority shall communicate those lists to the Board referred\
\ to in Article 68\n5.The supervisory authority may also establish and make public\
\ a list of the kind of processing operations for which no data protection impact\
\ assessment is required. The supervisory authority shall communicate those lists\
\ to the Board.\n6.Prior to the adoption of the lists referred to in paragraphs\
\ 4 and 5, the competent supervisory authority shall apply the consistency mechanism\
\ referred to in Article 63 where such lists involve processing activities which\
\ are related to the offering of goods or services to data subjects or to the\
\ monitoring of their behaviour in several Member States, or may substantially\
\ affect the free movement of personal data within the Union. 4.5.2016 L 119/53\
\ \n7.The assessment shall contain at least: (a) a systematic description of\
\ the envisaged processing operations and the purposes of the processing, including,\
\ where applicable, the legitimate interest pursued by the controller; (b) an\
\ assessment of the necessity and proportionality of the processing operations\
\ in relation to the purposes; (c) an assessment of the risks to the rights and\
\ freedoms of data subjects referred to in paragraph 1; and (d) the measures\
\ envisaged to address the risks, including safeguards, security measures and\
\ mechanisms to ensure the protection of personal data and to demonstrate compliance\
\ with this Regulation taking into account the rights and legitimate interests\
\ of data subjects and other persons concerned.\n8.Compliance with approved codes\
\ of conduct referred to in Article 40 by the relevant controllers or processors\
\ shall be taken into due account in assessing the impact of the processing operations\
\ performed by such controllers or processors, in particular for the purposes\
\ of a data protection impact assessment.\n9.Where appropriate, the controller\
\ shall seek the views of data subjects or their representatives on the intended\
\ processing, without prejudice to the protection of commercial or public interests\
\ or the security of processing operations.\n10.Where processing pursuant to point\
\ (c) or (e) of Article 6(1) has a legal basis in Union law or in the law of the\
\ Member State to which the controller is subject, that law regulates the specific\
\ processing operation or set of operations in question, and a data protection\
\ impact assessment has already been carried out as part of a general impact assessment\
\ in the context of the adoption of that legal basis, paragraphs 1 to 7 shall\
\ not apply unless Member States deem it to be necessary to carry out such an\
\ assessment prior to processing activities.\n11. Where necessary, the controller\
\ shall carry out a review to assess if processing is performed in accordance\
\ with the data protection impact assessment at least when there is a change of\
\ the risk represented by processing operations."
- Public authorities to which personal data are disclosed in accordance with a legal
obligation for the exercise of their official mission, such as tax and customs
authorities, financial investigation units, independent administrative authorities,
or financial market authorities responsible for the regulation and supervision
of securities markets should not be regarded as recipients if they receive personal
data which are necessary to carry out a particular inquiry in the general interest,
in accordance with Union or Member State law. The requests for disclosure sent
by the public authorities should always be in writing, reasoned and occasional
and should not concern the entirety of a filing system or lead to the interconnection
of filing systems. The processing of personal data by those public authorities
should comply with the applicable data-protection rules according to the purposes
of the processing.
- source_sentence: What are the consequences for unlawful interference with sensitive
data?
sentences:
- 'Any person who, in contravention of the provisions of this law or of the provisions
of lawfully ratified multilateral international conventions on the protection
of copyright, unlawfully makes a fixation of a work or of copies, reproduces them
directly or indirectly, temporarily or permanently in any form, in whole or in
part, translates, adapts, alters or transforms them, or distributes them to the
public by sale or other means, or possesses with the intent of distributing them,
rents, performs in public, broadcasts by radio or television or any other means,
communicates to the public works or copies by any means, imports copies of a work
illegally produced abroad without the consent of the author and, in general, exploits
works, reproductions or copies being the object of copyright or acts against the
moral right of the author to decide freely on the publication and the presentation
of his work to the public without additions or deletions, shall be liable to imprisonment
of no less than a year and to a fine from 2.900-15.000 Euro.
Without the permission of the performers: fixes their performance; directly or
indirectly, temporarily or permanently reproduces by any means and form, in whole
or in part, the fixation of their performance; distributes to the public the fixation
of their performance or possesses them with the purpose of distribution; rents
the fixation of their performance; broadcasts by radio and television by any means,
the live performance, unless such broadcasting is rebroadcasting of a legitimate
broadcasting; communicates to the public the live performance made by any means,
except radio and television broadcasting; makes available to the public, by wire
or wireless means, in such a way that members of the public may access them from
a place and at a time individually chosen by them, the fixation of their performance.
Without the permission of phonogram producers (producers of sound recordings):
directly or indirectly, temporarily or permanently reproduces by any means and
form, in whole or in part, their phonograms; distributes to the public the above
recordings, or possesses them with the purpose of distribution; rents the said
recordings; makes available to the public, by wire or wireless means, in such
a way that members of the public may access them from a place and at a time individually
chosen by them, their phonograms; imports the said recordings produced abroad
without their consent.
Without the permission of producers of audiovisual works (producers of visual
or sound and visual recordings): directly or indirectly, temporarily or permanently
reproduces by any means and form, in whole or in part, the original and the copies
of their films; distributes to the public the above recordings, including the
copies thereof, or possesses them with the purpose of distribution; rents the
said recordings; makes available to the public, by wire or wireless means, in
such a way that members of the public may access them from a place and at a time
individually chosen by them, the original and the copies of their films; imports
the said recordings produced abroad without their consent; broadcasts by radio
or television by any means including satellite transmission and cable retransmission,
as well as the communication to the public.
Without the permission of radio and television organizations: rebroadcasts their
broadcasts by any means; presents their broadcasts to the public in places accessible
to the public against payment of an entrance fee; fixes their broadcasts on sound
or sound and visual recordings, regardless of whether the broadcasts are transmitted
by wire or by the air, including by cable or satellite; directly or indirectly,
temporarily or permanently reproduces by any means and form, in whole or in part,
the fixation of their broadcasts; distributes to the public the recordings containing
the fixation or their broadcasts; rents the recordings containing the fixation
of their broadcasts; makes available to the public, by wire or wireless means,
in such a way that members of the public may access them from a place and at a
time individually chosen by them, the fixation of their broadcasts.
If the financial gain sought or the damage caused by the perpetration of an act
listed in paragraphs (1) and (2), above, is particularly great, the sanction shall
be not less than two years imprisonment and a fine of from 2 to 10 million drachmas.
If the guilty party has perpetrated any of the aforementioned acts by profession
or at a commercial scale or if the circumstances in connection with the perpetration
of the act indicate that the guilty party poses a serious threat to the protection
of copyright or related rights, the sanction shall be imprisonment of up to ten
(10) years and a fine of from 5 to 10 million drachmas, together with the withdrawal
of the trading license of the undertaking which has served as the vehicle for
the act. The act shall be likewise deemed to have been perpetrated by way of standard
practice if the guilty party has on a previous occasion been convicted of a contravention
pursuant to the provisions of the Article or for a violation of the preceding
copyright legislation and sentenced to a non-redeemable period of imprisonment.
Any infringement of copyright and related rights in the form of felony is tried
by the competent Three-member Court of Appeal for Felonies.
Any person who did not pay the remuneration provided for by Article 18, paragraph
(3) hereof to a collecting society is punished with the sanction of paragraph
(1), (2) and (3). The same sentence is imposed on the debtor who, after the issuance
of the decision of the one-member first instance court, does not submit the declaration
under the provisions of article 18, par. 6, of this law.
The sanctions specified in paragraph (1), above, shall be applicable likewise
to any person who: uses or distributes, or possesses with the intent to distribute,
any system or means whose sole purpose is to facilitate the unpermitted removal
or neutralization of a technical system used to protect a computer program; manufactures
or imports or distributes, or possesses with intent to distribute, equipment and
other materials utilizable for the reproduction of a work which do not conform
to the specifications determined pursuant to Article 59 of this Law; manufactures
or imports or distributes, or possesses with intent to distribute, objects which
can thwart the efficacy of the above-mentioned specifications, or engages in an
act which can have that result; reproduces or uses a work without utilizing the
equipment or without applying the systems specified pursuant to Article 60 of
this Law; distributes, or possesses with intent to distribute, a phonogram or
film without the special mark or control label specified pursuant to Article 61
of this Law.
Where a sentence of imprisonment is imposed with the option of redeemability,
the sum payable for the redemption shall be 10 times the sum specified as per
the case in the Penal Code.
Where mitigating circumstances exist, the fine imposed shall not be less than
half of the minimum fine imposable as per the case under this Law.
Any person who proceeds to authorized temporary or permanent reproduction of the
database, translation, adaptation, arrangement and any other alteration of the
database, distribution to the public of the database or of copies thereof, communication,
display or performance of the database to the public, is punished by imprisonment
of at least one (1) year and a fine of one (1) to five (5) million drachmas.
Any person who proceeds to extraction and/or re-utilization of the whole or of
a substantial part of the contents of the database without the authorization of
the author thereof, is punished by imprisonment of at least one (1) year and a
fine of one (1) to five (5) million drachmas (article 12 of Directive 96/9).
When the object of the infringement refers to computer software, the culpable
character of the action, as described in paragraph 1 of article 65A and under
the prerequisites provided there, is raised under the condition that the infringer
proceeds in the unreserved payment of the administrative fee and the infringement
concerns a quantity of up to 50 programs.
When the object of infringement concerns recordings of sound in which a work protected
by copyright law has been recorded, the unreserved payment of an administrative
fee according to the stipulation of par.2 of article 65A and under the prerequisites
provided there, the culpable character of the action is raised under the condition
that the infringement concerns a quantity of up to five hundred (500) illegal
sound recording carriers.
The payment of the administrative fee and the raising of the culpable character
of the action, do not relieve the infringers from the duty of buying off the copyright
and related rights or from the duty of compensating and paying the rest expenses
to the holders of these rights, according to the provisions of the relevant laws.
In case of recidivism during the same financial year the administrative fee provided
for by article 65A doubles.
'
- 'Failure to notify the Authority of file establishment or permit changes is punished
by up to three years’ imprisonment and a fine of one to five million Drachmas.
Maintaining a file without a permit or violating permit terms is punished by at
least one year’s imprisonment and a fine of one to five million Drachmas.
Unauthorized file interconnection or without permit is punished by up to three
years’ imprisonment and a fine of one to five million Drachmas.
Unlawful interference with personal data is punished by imprisonment and a fine;
for sensitive data, at least one year’s imprisonment and a fine of one to ten
million Drachmas.
Controllers who fail to comply with Authority decisions or violate data transfer
rules face at least two years’ imprisonment and a fine of one to five million
Drachmas.
If acts were committed for unlawful benefit or to cause harm, punishment is up
to ten years’ imprisonment and a fine of two to ten million Drachmas.
If acts jeopardize democratic governance or national security, punishment is confinement
in a penitentiary and a fine of five to ten million Drachmas.
Acts committed due to negligence result in at least three months’ imprisonment
and a fine.
If the Controller is not a natural person, the responsible party is the representative
or head of the organization with administrative or managerial duties.
Authorized members of the Authority may carry out preliminary investigations even
without Prosecutor’s order for certain offenses.
The Authority''s President must notify the Public Prosecutor of any offenses under
investigation, forwarding all relevant evidence.
Preliminary investigations must conclude within two months of charges, and trial
must begin within three months of completion.
Continuation of proceedings is allowed only once and for extremely important reasons,
with adjournment not exceeding two months.
Felonies under this law fall under the jurisdiction of the Court of Appeal.
'
- "1.The competent supervisory authority shall approve binding corporate rules in\
\ accordance with the consistency mechanism set out in Article 63, provided that\
\ they: (a) are legally binding and apply to and are enforced by every member\
\ concerned of the group of undertakings, or group of enterprises engaged in a\
\ joint economic activity, including their employees; 4.5.2016 L 119/62 (b)\
\ expressly confer enforceable rights on data subjects with regard to the processing\
\ of their personal data; and (c) fulfil the requirements laid down in paragraph\
\ 2\n2.The binding corporate rules referred to in paragraph 1 shall specify at\
\ least: (a) the structure and contact details of the group of undertakings,\
\ or group of enterprises engaged in a joint economic activity and of each of\
\ its members; (b) the data transfers or set of transfers, including the categories\
\ of personal data, the type of processing and its purposes, the type of data\
\ subjects affected and the identification of the third country or countries in\
\ question; (c) their legally binding nature, both internally and externally;\
\ (d) the application of the general data protection principles, in particular\
\ purpose limitation, data minimisation, limited storage periods, data quality,\
\ data protection by design and by default, legal basis for processing, processing\
\ of special categories of personal data, measures to ensure data security, and\
\ the requirements in respect of onward transfers to bodies not bound by the binding\
\ corporate rules; (e) the rights of data subjects in regard to processing and\
\ the means to exercise those rights, including the right not to be subject to\
\ decisions based solely on automated processing, including profiling in accordance\
\ with Article 22, the right to lodge a complaint with the competent supervisory\
\ authority and before the competent courts of the Member States in accordance\
\ with Article 79, and to obtain redress and, where appropriate, compensation\
\ for a breach of the binding corporate rules; (f) the acceptance by the controller\
\ or processor established on the territory of a Member State of liability for\
\ any breaches of the binding corporate rules by any member concerned not established\
\ in the Union; the controller or the processor shall be exempt from that liability,\
\ in whole or in part, only if it proves that that member is not responsible for\
\ the event giving rise to the damage; (g) how the information on the binding\
\ corporate rules, in particular on the provisions referred to in points (d),\
\ (e) and (f) of this paragraph is provided to the data subjects in addition to\
\ Articles 13 and 14; (h) the tasks of any data protection officer designated\
\ in accordance with Article 37 or any other person or entity in charge of the\
\ monitoring compliance with the binding corporate rules within the group of undertakings,\
\ or group of enterprises engaged in a joint economic activity, as well as monitoring\
\ training and complaint-handling; (i) the complaint procedures; (j) the mechanisms\
\ within the group of undertakings, or group of enterprises engaged in a joint\
\ economic activity for ensuring the verification of compliance with the binding\
\ corporate rules. Such mechanisms shall include data protection audits and methods\
\ for ensuring corrective actions to protect the rights of the data subject. Results\
\ of such verification should be communicated to the person or entity referred\
\ to in point (h) and to the board of the controlling undertaking of a group of\
\ undertakings, or of the group of enterprises engaged in a joint economic activity,\
\ and should be available upon request to the competent supervisory authority;\
\ (k) the mechanisms for reporting and recording changes to the rules and reporting\
\ those changes to the supervisory authority; (l) the cooperation mechanism with\
\ the supervisory authority to ensure compliance by any member of the group of\
\ undertakings, or group of enterprises engaged in a joint economic activity,\
\ in particular by making available to the supervisory authority the results of\
\ verifications of the measures referred to in point (j); (m) the mechanisms\
\ for reporting to the competent supervisory authority any legal requirements\
\ to which a member of the group of undertakings, or group of enterprises engaged\
\ in a joint economic activity is subject in a third country which are likely\
\ to have a substantial adverse effect on the guarantees provided by the binding\
\ corporate rules; and (n) the appropriate data protection training to personnel\
\ having permanent or regular access to personal data. 4.5.2016 L 119/63 \n3.The\
\ Commission may specify the format and procedures for the exchange of information\
\ between controllers, processors and supervisory authorities for binding corporate\
\ rules within the meaning of this Article. Those implementing acts shall be adopted\
\ in accordance with the examination procedure set out in Article 93(2)."
pipeline_tag: sentence-similarity
library_name: sentence-transformers
metrics:
- cosine_accuracy@1
- cosine_accuracy@3
- cosine_accuracy@5
- cosine_accuracy@10
- cosine_precision@1
- cosine_precision@3
- cosine_precision@5
- cosine_precision@10
- cosine_recall@1
- cosine_recall@3
- cosine_recall@5
- cosine_recall@10
- cosine_ndcg@10
- cosine_mrr@10
- cosine_map@100
model-index:
- name: ModernBERT Embed base Legal Matryoshka
results:
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 768
type: dim_768
metrics:
- type: cosine_accuracy@1
value: 0.4595959595959596
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.5025252525252525
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.5202020202020202
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5656565656565656
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.4595959595959596
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.44528619528619523
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.4166666666666667
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.36287878787878786
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.09165916350710272
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.2306549962850208
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.3069127804735972
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.4211855701941311
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.5076744210018042
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.484268278018278
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.5664503864728206
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 512
type: dim_512
metrics:
- type: cosine_accuracy@1
value: 0.4595959595959596
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.49747474747474746
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.5151515151515151
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5732323232323232
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.4595959595959596
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.44360269360269355
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.4146464646464647
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.3661616161616162
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.0911697609343668
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.2289623216756795
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.3039527967844468
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.42391112595488795
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.5097410896532786
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.48467813051146386
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.5636729515882724
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 256
type: dim_256
metrics:
- type: cosine_accuracy@1
value: 0.43434343434343436
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.4595959595959596
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.4772727272727273
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5303030303030303
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.43434343434343436
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.41329966329966333
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.3858585858585859
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.3416666666666667
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.08666211766664289
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.2099599446222272
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.2767937661015934
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.39114273606113564
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.47542048434929435
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.4539331810165143
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.5311664794885055
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 128
type: dim_128
metrics:
- type: cosine_accuracy@1
value: 0.41414141414141414
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.44696969696969696
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.4671717171717172
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5050505050505051
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.41414141414141414
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.398989898989899
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.37727272727272726
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.3340909090909091
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.07958141271625109
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.19645395412649433
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.2640705077398205
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.3706613130677149
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.45730976306219634
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.43498777457110793
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.507884562461354
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 64
type: dim_64
metrics:
- type: cosine_accuracy@1
value: 0.3661616161616162
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.3888888888888889
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.41414141414141414
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.44191919191919193
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.3661616161616162
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.351010101010101
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.32929292929292925
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.2906565656565657
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.07054343654955235
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.17865690678889054
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.23753083290232105
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.3325729030102926
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.40277157483949066
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.3831329164662498
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.45598855399752575
name: Cosine Map@100
---
# ModernBERT Embed base Legal Matryoshka
This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [BAAI/bge-m3](https://huggingface.co/BAAI/bge-m3) on the json dataset. It maps sentences & paragraphs to a 1024-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
## Model Details
### Model Description
- **Model Type:** Sentence Transformer
- **Base model:** [BAAI/bge-m3](https://huggingface.co/BAAI/bge-m3)
- **Maximum Sequence Length:** 8192 tokens
- **Output Dimensionality:** 1024 dimensions
- **Similarity Function:** Cosine Similarity
- **Training Dataset:**
- json
- **Language:** en
- **License:** apache-2.0
### Model Sources
- **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
### Full Model Architecture
```
SentenceTransformer(
(0): Transformer({'max_seq_length': 8192, 'do_lower_case': False}) with Transformer model: XLMRobertaModel
(1): Pooling({'word_embedding_dimension': 1024, 'pooling_mode_cls_token': True, 'pooling_mode_mean_tokens': False, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
(2): Normalize()
)
```
## Usage
### Direct Usage (Sentence Transformers)
First install the Sentence Transformers library:
```bash
pip install -U sentence-transformers
```
Then you can load this model and run inference.
```python
from sentence_transformers import SentenceTransformer
# Download from the 🤗 Hub
model = SentenceTransformer("IoannisKat1/bge-m3-legal-matryoshka")
# Run inference
sentences = [
'What are the consequences for unlawful interference with sensitive data?',
"Failure to notify the Authority of file establishment or permit changes is punished by up to three years’ imprisonment and a fine of one to five million Drachmas.\nMaintaining a file without a permit or violating permit terms is punished by at least one year’s imprisonment and a fine of one to five million Drachmas.\nUnauthorized file interconnection or without permit is punished by up to three years’ imprisonment and a fine of one to five million Drachmas.\nUnlawful interference with personal data is punished by imprisonment and a fine; for sensitive data, at least one year’s imprisonment and a fine of one to ten million Drachmas.\nControllers who fail to comply with Authority decisions or violate data transfer rules face at least two years’ imprisonment and a fine of one to five million Drachmas.\nIf acts were committed for unlawful benefit or to cause harm, punishment is up to ten years’ imprisonment and a fine of two to ten million Drachmas.\nIf acts jeopardize democratic governance or national security, punishment is confinement in a penitentiary and a fine of five to ten million Drachmas.\nActs committed due to negligence result in at least three months’ imprisonment and a fine.\nIf the Controller is not a natural person, the responsible party is the representative or head of the organization with administrative or managerial duties.\nAuthorized members of the Authority may carry out preliminary investigations even without Prosecutor’s order for certain offenses.\nThe Authority's President must notify the Public Prosecutor of any offenses under investigation, forwarding all relevant evidence.\nPreliminary investigations must conclude within two months of charges, and trial must begin within three months of completion.\nContinuation of proceedings is allowed only once and for extremely important reasons, with adjournment not exceeding two months.\nFelonies under this law fall under the jurisdiction of the Court of Appeal.\n",
'Any person who, in contravention of the provisions of this law or of the provisions of lawfully ratified multilateral international conventions on the protection of copyright, unlawfully makes a fixation of a work or of copies, reproduces them directly or indirectly, temporarily or permanently in any form, in whole or in part, translates, adapts, alters or transforms them, or distributes them to the public by sale or other means, or possesses with the intent of distributing them, rents, performs in public, broadcasts by radio or television or any other means, communicates to the public works or copies by any means, imports copies of a work illegally produced abroad without the consent of the author and, in general, exploits works, reproductions or copies being the object of copyright or acts against the moral right of the author to decide freely on the publication and the presentation of his work to the public without additions or deletions, shall be liable to imprisonment of no less than a year and to a fine from 2.900-15.000 Euro.\nWithout the permission of the performers: fixes their performance; directly or indirectly, temporarily or permanently reproduces by any means and form, in whole or in part, the fixation of their performance; distributes to the public the fixation of their performance or possesses them with the purpose of distribution; rents the fixation of their performance; broadcasts by radio and television by any means, the live performance, unless such broadcasting is rebroadcasting of a legitimate broadcasting; communicates to the public the live performance made by any means, except radio and television broadcasting; makes available to the public, by wire or wireless means, in such a way that members of the public may access them from a place and at a time individually chosen by them, the fixation of their performance.\nWithout the permission of phonogram producers (producers of sound recordings): directly or indirectly, temporarily or permanently reproduces by any means and form, in whole or in part, their phonograms; distributes to the public the above recordings, or possesses them with the purpose of distribution; rents the said recordings; makes available to the public, by wire or wireless means, in such a way that members of the public may access them from a place and at a time individually chosen by them, their phonograms; imports the said recordings produced abroad without their consent.\nWithout the permission of producers of audiovisual works (producers of visual or sound and visual recordings): directly or indirectly, temporarily or permanently reproduces by any means and form, in whole or in part, the original and the copies of their films; distributes to the public the above recordings, including the copies thereof, or possesses them with the purpose of distribution; rents the said recordings; makes available to the public, by wire or wireless means, in such a way that members of the public may access them from a place and at a time individually chosen by them, the original and the copies of their films; imports the said recordings produced abroad without their consent; broadcasts by radio or television by any means including satellite transmission and cable retransmission, as well as the communication to the public.\nWithout the permission of radio and television organizations: rebroadcasts their broadcasts by any means; presents their broadcasts to the public in places accessible to the public against payment of an entrance fee; fixes their broadcasts on sound or sound and visual recordings, regardless of whether the broadcasts are transmitted by wire or by the air, including by cable or satellite; directly or indirectly, temporarily or permanently reproduces by any means and form, in whole or in part, the fixation of their broadcasts; distributes to the public the recordings containing the fixation or their broadcasts; rents the recordings containing the fixation of their broadcasts; makes available to the public, by wire or wireless means, in such a way that members of the public may access them from a place and at a time individually chosen by them, the fixation of their broadcasts.\nIf the financial gain sought or the damage caused by the perpetration of an act listed in paragraphs (1) and (2), above, is particularly great, the sanction shall be not less than two years imprisonment and a fine of from 2 to 10 million drachmas. If the guilty party has perpetrated any of the aforementioned acts by profession or at a commercial scale or if the circumstances in connection with the perpetration of the act indicate that the guilty party poses a serious threat to the protection of copyright or related rights, the sanction shall be imprisonment of up to ten (10) years and a fine of from 5 to 10 million drachmas, together with the withdrawal of the trading license of the undertaking which has served as the vehicle for the act. The act shall be likewise deemed to have been perpetrated by way of standard practice if the guilty party has on a previous occasion been convicted of a contravention pursuant to the provisions of the Article or for a violation of the preceding copyright legislation and sentenced to a non-redeemable period of imprisonment. Any infringement of copyright and related rights in the form of felony is tried by the competent Three-member Court of Appeal for Felonies.\nAny person who did not pay the remuneration provided for by Article 18, paragraph (3) hereof to a collecting society is punished with the sanction of paragraph (1), (2) and (3). The same sentence is imposed on the debtor who, after the issuance of the decision of the one-member first instance court, does not submit the declaration under the provisions of article 18, par. 6, of this law.\nThe sanctions specified in paragraph (1), above, shall be applicable likewise to any person who: uses or distributes, or possesses with the intent to distribute, any system or means whose sole purpose is to facilitate the unpermitted removal or neutralization of a technical system used to protect a computer program; manufactures or imports or distributes, or possesses with intent to distribute, equipment and other materials utilizable for the reproduction of a work which do not conform to the specifications determined pursuant to Article 59 of this Law; manufactures or imports or distributes, or possesses with intent to distribute, objects which can thwart the efficacy of the above-mentioned specifications, or engages in an act which can have that result; reproduces or uses a work without utilizing the equipment or without applying the systems specified pursuant to Article 60 of this Law; distributes, or possesses with intent to distribute, a phonogram or film without the special mark or control label specified pursuant to Article 61 of this Law.\nWhere a sentence of imprisonment is imposed with the option of redeemability, the sum payable for the redemption shall be 10 times the sum specified as per the case in the Penal Code.\nWhere mitigating circumstances exist, the fine imposed shall not be less than half of the minimum fine imposable as per the case under this Law.\nAny person who proceeds to authorized temporary or permanent reproduction of the database, translation, adaptation, arrangement and any other alteration of the database, distribution to the public of the database or of copies thereof, communication, display or performance of the database to the public, is punished by imprisonment of at least one (1) year and a fine of one (1) to five (5) million drachmas.\nAny person who proceeds to extraction and/or re-utilization of the whole or of a substantial part of the contents of the database without the authorization of the author thereof, is punished by imprisonment of at least one (1) year and a fine of one (1) to five (5) million drachmas (article 12 of Directive 96/9).\nWhen the object of the infringement refers to computer software, the culpable character of the action, as described in paragraph 1 of article 65A and under the prerequisites provided there, is raised under the condition that the infringer proceeds in the unreserved payment of the administrative fee and the infringement concerns a quantity of up to 50 programs.\nWhen the object of infringement concerns recordings of sound in which a work protected by copyright law has been recorded, the unreserved payment of an administrative fee according to the stipulation of par.2 of article 65A and under the prerequisites provided there, the culpable character of the action is raised under the condition that the infringement concerns a quantity of up to five hundred (500) illegal sound recording carriers.\nThe payment of the administrative fee and the raising of the culpable character of the action, do not relieve the infringers from the duty of buying off the copyright and related rights or from the duty of compensating and paying the rest expenses to the holders of these rights, according to the provisions of the relevant laws.\nIn case of recidivism during the same financial year the administrative fee provided for by article 65A doubles.\n',
]
embeddings = model.encode(sentences)
print(embeddings.shape)
# [3, 1024]
# Get the similarity scores for the embeddings
similarities = model.similarity(embeddings, embeddings)
print(similarities.shape)
# [3, 3]
```
## Evaluation
### Metrics
#### Information Retrieval
* Dataset: `dim_768`
* Evaluated with [InformationRetrievalEvaluator
](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 768
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.4596 |
| cosine_accuracy@3 | 0.5025 |
| cosine_accuracy@5 | 0.5202 |
| cosine_accuracy@10 | 0.5657 |
| cosine_precision@1 | 0.4596 |
| cosine_precision@3 | 0.4453 |
| cosine_precision@5 | 0.4167 |
| cosine_precision@10 | 0.3629 |
| cosine_recall@1 | 0.0917 |
| cosine_recall@3 | 0.2307 |
| cosine_recall@5 | 0.3069 |
| cosine_recall@10 | 0.4212 |
| **cosine_ndcg@10** | **0.5077** |
| cosine_mrr@10 | 0.4843 |
| cosine_map@100 | 0.5665 |
#### Information Retrieval
* Dataset: `dim_512`
* Evaluated with [InformationRetrievalEvaluator
](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 512
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.4596 |
| cosine_accuracy@3 | 0.4975 |
| cosine_accuracy@5 | 0.5152 |
| cosine_accuracy@10 | 0.5732 |
| cosine_precision@1 | 0.4596 |
| cosine_precision@3 | 0.4436 |
| cosine_precision@5 | 0.4146 |
| cosine_precision@10 | 0.3662 |
| cosine_recall@1 | 0.0912 |
| cosine_recall@3 | 0.229 |
| cosine_recall@5 | 0.304 |
| cosine_recall@10 | 0.4239 |
| **cosine_ndcg@10** | **0.5097** |
| cosine_mrr@10 | 0.4847 |
| cosine_map@100 | 0.5637 |
#### Information Retrieval
* Dataset: `dim_256`
* Evaluated with [InformationRetrievalEvaluator
](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 256
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.4343 |
| cosine_accuracy@3 | 0.4596 |
| cosine_accuracy@5 | 0.4773 |
| cosine_accuracy@10 | 0.5303 |
| cosine_precision@1 | 0.4343 |
| cosine_precision@3 | 0.4133 |
| cosine_precision@5 | 0.3859 |
| cosine_precision@10 | 0.3417 |
| cosine_recall@1 | 0.0867 |
| cosine_recall@3 | 0.21 |
| cosine_recall@5 | 0.2768 |
| cosine_recall@10 | 0.3911 |
| **cosine_ndcg@10** | **0.4754** |
| cosine_mrr@10 | 0.4539 |
| cosine_map@100 | 0.5312 |
#### Information Retrieval
* Dataset: `dim_128`
* Evaluated with [InformationRetrievalEvaluator
](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 128
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.4141 |
| cosine_accuracy@3 | 0.447 |
| cosine_accuracy@5 | 0.4672 |
| cosine_accuracy@10 | 0.5051 |
| cosine_precision@1 | 0.4141 |
| cosine_precision@3 | 0.399 |
| cosine_precision@5 | 0.3773 |
| cosine_precision@10 | 0.3341 |
| cosine_recall@1 | 0.0796 |
| cosine_recall@3 | 0.1965 |
| cosine_recall@5 | 0.2641 |
| cosine_recall@10 | 0.3707 |
| **cosine_ndcg@10** | **0.4573** |
| cosine_mrr@10 | 0.435 |
| cosine_map@100 | 0.5079 |
#### Information Retrieval
* Dataset: `dim_64`
* Evaluated with [InformationRetrievalEvaluator
](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 64
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.3662 |
| cosine_accuracy@3 | 0.3889 |
| cosine_accuracy@5 | 0.4141 |
| cosine_accuracy@10 | 0.4419 |
| cosine_precision@1 | 0.3662 |
| cosine_precision@3 | 0.351 |
| cosine_precision@5 | 0.3293 |
| cosine_precision@10 | 0.2907 |
| cosine_recall@1 | 0.0705 |
| cosine_recall@3 | 0.1787 |
| cosine_recall@5 | 0.2375 |
| cosine_recall@10 | 0.3326 |
| **cosine_ndcg@10** | **0.4028** |
| cosine_mrr@10 | 0.3831 |
| cosine_map@100 | 0.456 |
## Training Details
### Training Dataset
#### json
* Dataset: json
* Size: 1,580 training samples
* Columns: anchor
and positive
* Approximate statistics based on the first 1000 samples:
| | anchor | positive |
|:--------|:----------------------------------------------------------------------------------|:--------------------------------------------------------------------------------------|
| type | string | string |
| details |
At what time must the controller provide the data subject with the required information?
| 1.Where personal data relating to a data subject are collected from the data subject, the controller shall, at the time when personal data are obtained, provide the data subject with all of the following information: (a) the identity and the contact details of the controller and, where applicable, of the controller's representative; (b) the contact details of the data protection officer, where applicable; (c) the purposes of the processing for which the personal data are intended as well as the legal basis for the processing; 4.5.2016 L 119/40 (d) where the processing is based on point (f) of Article 6(1), the legitimate interests pursued by the controller or by a third party; (e) the recipients or categories of recipients of the personal data, if any; (f) where applicable, the fact that the controller intends to transfer personal data to a third country or international organisation and the existence or absence of an adequacy decision by the Commission, or in the case of trans...
|
| What information does the duty of professional secrecy cover during the term of office?
| 1.Each Member State shall provide by law for all of the following: (a) the establishment of each supervisory authority; 4.5.2016 L 119/66 (b) the qualifications and eligibility conditions required to be appointed as member of each supervisory authority; (c) the rules and procedures for the appointment of the member or members of each supervisory authority; (d) the duration of the term of the member or members of each supervisory authority of no less than four years, except for the first appointment after 24 May 2016, part of which may take place for a shorter period where that is necessary to protect the independence of the supervisory authority by means of a staggered appointment procedure; (e) whether and, if so, for how many terms the member or members of each supervisory authority is eligible for reappointment; (f) the conditions governing the obligations of the member or members and staff of each supervisory authority, prohibitions on actions, occupations and benefits inco...
|
| Under what circumstances should the controller be allowed to further process personal data?
| The processing of personal data for purposes other than those for which the personal data were initially collected should be allowed only where the processing is compatible with the purposes for which the personal data were initially collected. In such a case, no legal basis separate from that which allowed the collection of the personal data is required. If the processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller, Union or Member State law may determine and specify the tasks and purposes for which the further processing should be regarded as compatible and lawful. Further processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes should be considered to be compatible lawful processing operations. The legal basis provided by Union or Member State law for the processing of personal data may also provide a legal basis for ...
|
* Loss: [MatryoshkaLoss
](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#matryoshkaloss) with these parameters:
```json
{
"loss": "MultipleNegativesRankingLoss",
"matryoshka_dims": [
768,
512,
256,
128,
64
],
"matryoshka_weights": [
1,
1,
1,
1,
1
],
"n_dims_per_step": -1
}
```
### Training Hyperparameters
#### Non-Default Hyperparameters
- `eval_strategy`: epoch
- `per_device_train_batch_size`: 4
- `per_device_eval_batch_size`: 4
- `gradient_accumulation_steps`: 2
- `learning_rate`: 2e-05
- `num_train_epochs`: 15
- `lr_scheduler_type`: cosine
- `warmup_ratio`: 0.1
- `bf16`: True
- `tf32`: True
- `load_best_model_at_end`: True
- `optim`: adamw_torch_fused
- `batch_sampler`: no_duplicates
#### All Hyperparameters