Skip to Content

CFI 007/2008 – Consent Order

CFI 007/2008 – Consent Order

February 9, 2009

image_pdfimage_print

Claim No: CFI 007/2008

THE JUDICIAL AUTHORITY OF THE DUBAI INTERNATIONAL FINANCIAL CENTRE

IN THE COURT OF FIRST INSTANCE

Between

ANNA DADIC Claimant
vORION HOLDING OVERSEAS LIMITED Defendant

 

ORDER BY CONSENT

BY CONSENT IT IS ORDERED THAT:

1. The Claimant is granted an extension of one (1) day to serve evidence in reply on the Defendant until 5pm on 3 February 2009.

 

2. Costs in the case.

 

Mark Beer
Registrar
Date of Issue: 9 February 2009
At 4pm

 

X

Privacy Policy

The Dispute Resolution Authority and all its affiliates are committed to preserve the confidentiality, integrity and availability of client data and personal information.

Dispute Resolution Authority and all its affiliates employees, vendors, contract workers, shall follow Information Security Management System in all the processes and technology.

  1. DRA's Top Management is committed to secure information of all our interested parties.
  2. Information security controls the policies, processes, and measures that are implemented by DRA in order to mitigate risks to an acceptable level, and to maximize opportunities in order to achieve its information security objectives.
  3. DRA and all its affiliates shall adopt a systematic approach to risk assessment and risk treatment.
  4. DRA is committed to provide information security awareness among team members and evaluate the competency of all its employees.
  5. DRA and all its affiliates shall protect personal information held by them in all its form.
  6. DRA and all its affiliates shall comply with all regulatory, legal and contractual requirements.
  7. DRA and all its affiliates shall provide a comprehensive Business Continuity Plan encompassing the locations within the scope of the ISMS.
  8. Information shall be made available to authorised persons as and when required.
  9. DRA’s Top Management is committed towards continual improvement in information security in all our processes through regular review of our information security management system.