File size: 131,505 Bytes
e3058b0 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 |
---
language:
- en
license: apache-2.0
tags:
- sentence-transformers
- sentence-similarity
- feature-extraction
- dense
- generated_from_trainer
- dataset_size:1580
- loss:MatryoshkaLoss
- loss:MultipleNegativesRankingLoss
base_model: intfloat/multilingual-e5-large
widget:
- source_sentence: When should supervisory authorities monitor the application of
the provisions?
sentences:
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Partially\
\ accepts the lawsuit. \n**Facts:** The plaintiff, who works as a lawyer, maintains\
\ a savings account with the defendant banking corporation under account number\
\ GR.............. Pursuant to a contract dated June 11, 2010, established in\
\ Thessaloniki between the defendant and the plaintiff, the plaintiff was granted\
\ access to the electronic banking system (e-banking) to conduct banking transactions\
\ remotely. On October 10, 2020, the plaintiff fell victim to electronic fraud\
\ through the \"phishing\" method, whereby an unknown perpetrator managed to extract\
\ and transfer €3,000.00 from the plaintiff’s account to another account of the\
\ same bank. Specifically, on that day at 6:51 a.m., the plaintiff received an\
\ email from the sender \".........\", with the address ..........., informing\
\ him that his debit card had been suspended and that online payments and cash\
\ withdrawals could not be made until the issue was resolved. The email urged\
\ him to confirm his details within the next 72 hours by following a link titled\
\ \"card activation.\" \nThe plaintiff read the above email on his mobile phone\
\ around 8:00 a.m., and believing it came from the defendant, he followed the\
\ instructions and accessed a website that was identical (a clone) to that of\
\ the defendant. On this page, he was asked to enter his login credentials to\
\ connect to the service, which he did, and he was subsequently asked to input\
\ his debit card details for the alleged activation, which he also provided. Then,\
\ to complete the process, a number was sent to his mobile phone at 8:07 a.m.\
\ from the sender ........, which he entered, and two minutes later he received\
\ a message from the same sender in English stating that the quick access code\
\ had been activated on his mobile. A few minutes later, at 8:18 a.m., he received\
\ an email from the defendant informing him of the transfer of €3,000.00 from\
\ his account to account number GR ........... held at the same bank, with the\
\ beneficiary's details being .......... As soon as the plaintiff read this, he\
\ immediately called the defendant's call center and canceled his debit card,\
\ the access codes for the service ......., and locked the application ..........\
\ At the same time, he verbally submitted a request to dispute and cancel the\
\ contested transaction, and in a subsequent phone call, he also canceled his\
\ credit card. On the same day, he also sent an email to the defendant informing\
\ them in writing of the above and requesting the cancellation of the transaction\
\ and the return of the amount of €3,000.00 to his account, as this transfer was\
\ not made by him but by an unknown perpetrator through electronic fraud and was\
\ not approved by him. It should also be noted that the plaintiff, as the sole\
\ beneficiary according to the aforementioned contract for using the defendant's\
\ Internet Banking service, never received any update via SMS or the VIBER application\
\ from the bank regarding the transaction details before its completion, nor did\
\ he receive a one-time code (OTP) to approve the contested transaction. He subsequently\
\ filed a complaint against unknown persons at the Cyber Crime Division for the\
\ crime of fraud. The defendant sent an email to the plaintiff on October 16,\
\ 2020, informing him that his request had been forwarded to the appropriate department\
\ of the bank for investigation, stating that the bank would never send him an\
\ email or SMS asking him to enter his personal data and that as of October 7,\
\ 2020, there was a notice posted for its customers regarding malicious attempts\
\ to steal personal data in the \"Our News\" section on ....... A month after\
\ the disputed incident, on November 10, 2020, an amount of €2,296.82 was transferred\
\ to the plaintiff's account from the account to which the fraudulent credit had\
\ been made. The plaintiff immediately sent an email to the defendant asking to\
\ be informed whether this transfer was a return of part of the amount that had\
\ been illegally withdrawn from his account and requested the return of the remaining\
\ amount of €703.18. In its response dated January 13, 2021, the defendant confirmed\
\ that the aforementioned amount indeed came from the account to which the fraudulent\
\ credit had been made, following a freeze of that account initiated by the defendant\
\ during the investigation of the incident, but refused to return the remaining\
\ amount, claiming it bore no responsibility for the leak of the personal codes\
\ to third parties, according to the terms of the service contract established\
\ between them. \nFrom the entirety of the evidence presented to the court, there\
\ is no indication of the authenticity of the contested transaction, as the plaintiff\
\ did not give his consent for the execution of the transfer of the amount of\
\ €3,000.00, especially in light of the provision in Article 72 paragraph 2 of\
\ Law 4537/2018 stating that the mere use of the Internet Banking service by the\
\ plaintiff does not necessarily constitute sufficient evidence that the payer\
\ approved the payment action. Specifically, it was proven that the contested\
\ transaction was not carried out following a strong identification of the plaintiff\
\ – the sole beneficiary of the account – and his approval, as the latter may\
\ have entered his personal codes on the counterfeit website; however, he was\
\ never informed, before the completion of the contested transaction, of the amount\
\ that would be transferred from his account to a third-party account, nor did\
\ he receive on his mobile phone, either via SMS or through the VIBER application\
\ or any other means, the one-time code - extra PIN for its completion, which\
\ he was required to enter to approve the contested transaction (payment action)\
\ and thus complete his identification, a fact that was not countered by any evidence\
\ from the defendant. Furthermore, it is noted that the defendant's claims that\
\ it bears no responsibility under the terms of the banking services contract,\
\ whereby it is not liable for any damage to its customer in cases of unauthorized\
\ use of their personal access codes to the Internet Banking service, are to be\
\ rejected as fundamentally unfounded. This is because the aforementioned contractual\
\ terms are invalid according to the provision of Article 103 of Law 4537/2018,\
\ as they contradict the provisions of Articles 71, 73, and 92 of the same Law,\
\ which provide for the provider's universal liability and its exemption only\
\ for unusual and unforeseen circumstances that are beyond the control of the\
\ party invoking them and whose consequences could not have been avoided despite\
\ all efforts to the contrary; these provisions establish mandatory law in favor\
\ of users, as according to Article 103 of Law 4537/2018, payment service providers\
\ are prohibited from deviating from the provisions to the detriment of payment\
\ service users, unless the possibility of deviation is explicitly provided and\
\ they can decide to offer only more favorable terms to payment service users;\
\ the aforementioned contractual terms do not constitute more favorable terms\
\ but rather disadvantageous terms for the payment service user. In this case,\
\ however, the defendant did not prove the authenticity of the transaction and\
\ its approval by the plaintiff and did not invoke, nor did any unusual and unforeseen\
\ circumstances beyond its control, the consequences of which could not have been\
\ avoided despite all efforts to the contrary, come to light. Therefore, the contested\
\ transaction transferring the amount of €3,000.00 is considered, in the absence\
\ of demonstrable consent from the plaintiff, unapproved according to the provisions\
\ of Article 64 of Law 4537/2018, and the defendant's contrary claims are rejected,\
\ especially since the plaintiff proceeded, according to Article 71 paragraph\
\ 1 of Law 4537/2018, without undue delay to notify the defendant regarding the\
\ contested unapproved payment action. Consequently, the defendant is liable for\
\ compensating the plaintiff for the positive damage he suffered under Article\
\ 73 of Law 4537/2018 and is obliged to pay him the requested amount of €703.18,\
\ while the plaintiff’s fault in the occurrence of this damage cannot be established,\
\ as he entered his personal details in an online environment that was a faithful\
\ imitation of that of the defendant, as evidenced by the comparison of the screenshots\
\ of the fake website and the real website provided by the plaintiff, a fact that\
\ he could not have known while being fully convinced that he was transacting\
\ with the defendant. Furthermore, the defendant’s liability to compensate the\
\ plaintiff is based on the provision of Article 8 of Law 2251/1994, which applies\
\ in this case, as the plaintiff's damage resulted from inadequate fulfillment\
\ of its obligations in the context of providing its services, but also on the\
\ provision of Article 914 of the Civil Code in the sense of omission on its part\
\ of unlawfully and culpably imposed actions. In this case, given that during\
\ the relevant period there had been a multitude of similar incidents of fraud\
\ against the defendant's customers, the latter, as a service provider to the\
\ consumer public and bearing transactional obligations of care and security towards\
\ them, displayed gross negligence regarding the security provided for electronic\
\ transaction services, which was compromised by the fraudulent theft of funds,\
\ as it did not comply with all required high-security measures for executing\
\ the contested transaction, failing to implement the strict customer identification\
\ verification process and to check the authenticity of the account to which the\
\ funds were sent, thus not assuming the suspicious nature of the transaction,\
\ did not adopt comprehensive and improved protective measures to fully protect\
\ its customers against malicious attacks and online fraud and to prevent the\
\ infiltration of unauthorized third parties, nor did it fulfill its obligations\
\ to inform, accurately inform, and warn its consumers - customers, as it failed\
\ to adequately inform them of attempts to steal their personal data through the\
\ sending of informative emails or SMS, while merely posting in a section rather\
\ than on a central banner (as it later did) does not constitute adequate information\
\ such that it meets the requirement of protecting its customers and the increased\
\ safeguarding of their interests. Although the plaintiff acted promptly and informed\
\ the defendant on the same day about the contested incident, the defendant did\
\ not act as promptly regarding the investigation of the incident and the freezing\
\ of the account that held the fraudulent credit to prevent the plaintiff's loss,\
\ but only returned part of the funds to the plaintiff a month later. This behavior,\
\ beyond being culpable due to gross negligence, was also unlawful, as it would\
\ have been illegal even without the contractual relationship, as contrary to\
\ the provisions of Law 4537/2018 and Law 2251/1994, regarding the lack of security\
\ of the services that the consumer is legitimately entitled to expect, as well\
\ as the building of trust that is essential in banking transactions, elements\
\ that it was obligated to provide within the sphere of the services offered,\
\ and contrary to the principles of good faith and commercial ethics, as crystallized\
\ in the provision of Article 288 of the Civil Code, as well as the general duty\
\ imposed by Article 914 of the Civil Code not to cause harm to another culpably.\
\ This resulted not only in positive damage to the plaintiff but also in causing\
\ him moral harm consisting of his mental distress and the disruption, agitation,\
\ and sorrow he experienced, for which he must be awarded financial compensation.\
\ Taking into account all the general circumstances of the case, the extent of\
\ the plaintiff's damage, the severity of the defendant's fault, the mental distress\
\ suffered by the plaintiff, the insecurity he felt regarding his deposits, the\
\ sorrow he experienced, and the stress caused by his financial loss, which occurred\
\ during the pandemic period when his earnings from his professional activity\
\ had significantly decreased, as well as the financial and social situation of\
\ the parties, it is the court's opinion that he should be granted, as financial\
\ compensation for his moral harm, an amount of €250.00, which is deemed reasonable\
\ and fair. Therefore, the total monetary amount that the plaintiff is entitled\
\ to for his positive damage and financial compensation for the moral harm suffered\
\ amounts to a total of (€703.18 + €250.00) = €953.18."
- "Court (Civil/Criminal): Criminal \nProvisions: Article 42 paragraphs 1, 2, 3,\
\ and 7 of Law 4557/2018 \nTime of commission of the act: \nOutcome (not guilty,\
\ guilty): \nReasoning: Obligation of the payment service provider, such as banks,\
\ to inform their contracting customer after receiving a relevant order for a\
\ payment to be made on their behalf. Content of the above notification at the\
\ stage of receiving the payment order and during its execution. Terms of liability\
\ for the provider regarding compensation for non-execution, erroneous, or delayed\
\ execution of payment transactions. In particular, in the case of an unauthorized\
\ or erroneous payment, the user is required to notify the provider within a specified\
\ timeframe as soon as they become aware of the corresponding transaction. The\
\ provisions of Law 4357/2018 establish mandatory legal regulations in favor of\
\ users of payment services and cannot be contractually modified to their detriment,\
\ but only to their benefit. Defenses available to payment service providers to\
\ relieve them of liability. Burden of proof distribution between the parties.\
\ This responsibility of banks may also stem from Law 2251/1994, as they provide\
\ services to the public and are considered suppliers. Conditions for supplier\
\ liability under the aforementioned legislation. Distribution of the burden of\
\ proof between the litigants to demonstrate liability for compensation under\
\ Law 2251/1994. Terms of concurrency between contractual and tort liability for\
\ compensation. The court partially accepts the lawsuit. \nFacts: On 01/09/2021,\
\ an unknown perpetrator sent an email to her from the electronic address “...............”,\
\ in which they stated that for security reasons she needed to confirm her account\
\ with the bank ....... Not realizing that it was a scam, she followed the attached\
\ hyperlink, entered her personal information, resulting in an unknown perpetrator\
\ intercepting her online banking credentials and making a transfer totaling 7,000.00\
\ euros to account number ................ of the bank ......... \nC) The beneficiary\
\ of the aforementioned account is ......... born on 16/05/1995 in the Municipality\
\ of ........., residing at .............., with ID number ....................\
\ issued on 02/10/2009 by T.A .............. and tax number ............. from\
\ the tax office ................... \nD) The criminal proceeds reportedly arising\
\ from the above criminal activity amount to a total of seven thousand euros (7,000.00€).\
\ Following the above, serious suspicions arise that the aforementioned criminal\
\ proceeds transferred to the aforementioned bank account were unlawfully appropriated\
\ by her and subsequently mixed with other legally held assets, which she used\
\ in her overall economic activities, aiming to launder them, thus concealing\
\ their true origin and making it impossible for them to be seized. Therefore,\
\ there are reasonable suspicions that the aforementioned individual committed\
\ not only the primary offense but also the criminal act of “Money Laundering”\
\ (Article 2 §1 a, d of Law 4557/2018, in conjunction with Article 4 subparagraph\
\ z of the same law as it stands, as well as Article 39 paragraph 1 subparagraphs\
\ a & c of the same Law 4557/2018). Because there are serious suspicions that\
\ the bank account numbered .......... maintained at the bank .....................,\
\ whose beneficiary is ..... (Tax ID ....................), contains part of the\
\ monetary amount from the aforementioned criminal activity that was placed behind\
\ banking secrecy to conceal its true origin and ultimately to launder it. Because,\
\ in this case, part of the criminal proceeds has been found while the remainder\
\ has not been found in its entirety, there is a lawful reason and an urgent case\
\ for prohibiting the sale or any other transfer of the following assets, given\
\ that they are subject to seizure and forfeiture according to Articles 40 and\
\ 42 of Law 4557/2018 as they currently stand."
- The supervisory authorities should monitor the application of the provisions pursuant
to this Regulation and contribute to its consistent application throughout the
Union, in order to protect natural persons in relation to the processing of their
personal data and to facilitate the free flow of personal data within the internal
market. For that purpose, the supervisory authorities should cooperate with each
other and with the Commission, without the need for any agreement between Member
States on the provision of mutual assistance or on such cooperation.
- source_sentence: When can a data subject seek an effective judicial remedy?
sentences:
- '1.Without prejudice to any available administrative or non-judicial remedy, including
the right to lodge a complaint with a supervisory authority pursuant to Article
77, each data subject shall have the right to an effective judicial remedy where
he or she considers that his or her rights under this Regulation have been infringed
as a result of the processing of his or her personal data in non-compliance with
this Regulation.
2.Proceedings against a controller or a processor shall be brought before the
courts of the Member State where the controller or processor has an establishment.
Alternatively, such proceedings may be brought before the courts of the Member
State where the data subject has his or her habitual residence, unless the controller
or processor is a public authority of a Member State acting in the exercise of
its public powers. 4.5.2016 L 119/80 (1) Regulation (EC) No 1049/2001 of the
European Parliament and of the Council of 30 May 2001 regarding public access
to European Parliament, Council and Commission documents (OJ L 145, 31.5.2001,
p. 43).'
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Partially\
\ accepts the lawsuit. \n**Facts:** The plaintiff, who works as a lawyer, maintains\
\ a savings account with the defendant banking corporation under account number\
\ GR.............. Pursuant to a contract dated June 11, 2010, established in\
\ Thessaloniki between the defendant and the plaintiff, the plaintiff was granted\
\ access to the electronic banking system (e-banking) to conduct banking transactions\
\ remotely. On October 10, 2020, the plaintiff fell victim to electronic fraud\
\ through the \"phishing\" method, whereby an unknown perpetrator managed to extract\
\ and transfer €3,000.00 from the plaintiff’s account to another account of the\
\ same bank. Specifically, on that day at 6:51 a.m., the plaintiff received an\
\ email from the sender \".........\", with the address ..........., informing\
\ him that his debit card had been suspended and that online payments and cash\
\ withdrawals could not be made until the issue was resolved. The email urged\
\ him to confirm his details within the next 72 hours by following a link titled\
\ \"card activation.\" \nThe plaintiff read the above email on his mobile phone\
\ around 8:00 a.m., and believing it came from the defendant, he followed the\
\ instructions and accessed a website that was identical (a clone) to that of\
\ the defendant. On this page, he was asked to enter his login credentials to\
\ connect to the service, which he did, and he was subsequently asked to input\
\ his debit card details for the alleged activation, which he also provided. Then,\
\ to complete the process, a number was sent to his mobile phone at 8:07 a.m.\
\ from the sender ........, which he entered, and two minutes later he received\
\ a message from the same sender in English stating that the quick access code\
\ had been activated on his mobile. A few minutes later, at 8:18 a.m., he received\
\ an email from the defendant informing him of the transfer of €3,000.00 from\
\ his account to account number GR ........... held at the same bank, with the\
\ beneficiary's details being .......... As soon as the plaintiff read this, he\
\ immediately called the defendant's call center and canceled his debit card,\
\ the access codes for the service ......., and locked the application ..........\
\ At the same time, he verbally submitted a request to dispute and cancel the\
\ contested transaction, and in a subsequent phone call, he also canceled his\
\ credit card. On the same day, he also sent an email to the defendant informing\
\ them in writing of the above and requesting the cancellation of the transaction\
\ and the return of the amount of €3,000.00 to his account, as this transfer was\
\ not made by him but by an unknown perpetrator through electronic fraud and was\
\ not approved by him. It should also be noted that the plaintiff, as the sole\
\ beneficiary according to the aforementioned contract for using the defendant's\
\ Internet Banking service, never received any update via SMS or the VIBER application\
\ from the bank regarding the transaction details before its completion, nor did\
\ he receive a one-time code (OTP) to approve the contested transaction. He subsequently\
\ filed a complaint against unknown persons at the Cyber Crime Division for the\
\ crime of fraud. The defendant sent an email to the plaintiff on October 16,\
\ 2020, informing him that his request had been forwarded to the appropriate department\
\ of the bank for investigation, stating that the bank would never send him an\
\ email or SMS asking him to enter his personal data and that as of October 7,\
\ 2020, there was a notice posted for its customers regarding malicious attempts\
\ to steal personal data in the \"Our News\" section on ....... A month after\
\ the disputed incident, on November 10, 2020, an amount of €2,296.82 was transferred\
\ to the plaintiff's account from the account to which the fraudulent credit had\
\ been made. The plaintiff immediately sent an email to the defendant asking to\
\ be informed whether this transfer was a return of part of the amount that had\
\ been illegally withdrawn from his account and requested the return of the remaining\
\ amount of €703.18. In its response dated January 13, 2021, the defendant confirmed\
\ that the aforementioned amount indeed came from the account to which the fraudulent\
\ credit had been made, following a freeze of that account initiated by the defendant\
\ during the investigation of the incident, but refused to return the remaining\
\ amount, claiming it bore no responsibility for the leak of the personal codes\
\ to third parties, according to the terms of the service contract established\
\ between them. \nFrom the entirety of the evidence presented to the court, there\
\ is no indication of the authenticity of the contested transaction, as the plaintiff\
\ did not give his consent for the execution of the transfer of the amount of\
\ €3,000.00, especially in light of the provision in Article 72 paragraph 2 of\
\ Law 4537/2018 stating that the mere use of the Internet Banking service by the\
\ plaintiff does not necessarily constitute sufficient evidence that the payer\
\ approved the payment action. Specifically, it was proven that the contested\
\ transaction was not carried out following a strong identification of the plaintiff\
\ – the sole beneficiary of the account – and his approval, as the latter may\
\ have entered his personal codes on the counterfeit website; however, he was\
\ never informed, before the completion of the contested transaction, of the amount\
\ that would be transferred from his account to a third-party account, nor did\
\ he receive on his mobile phone, either via SMS or through the VIBER application\
\ or any other means, the one-time code - extra PIN for its completion, which\
\ he was required to enter to approve the contested transaction (payment action)\
\ and thus complete his identification, a fact that was not countered by any evidence\
\ from the defendant. Furthermore, it is noted that the defendant's claims that\
\ it bears no responsibility under the terms of the banking services contract,\
\ whereby it is not liable for any damage to its customer in cases of unauthorized\
\ use of their personal access codes to the Internet Banking service, are to be\
\ rejected as fundamentally unfounded. This is because the aforementioned contractual\
\ terms are invalid according to the provision of Article 103 of Law 4537/2018,\
\ as they contradict the provisions of Articles 71, 73, and 92 of the same Law,\
\ which provide for the provider's universal liability and its exemption only\
\ for unusual and unforeseen circumstances that are beyond the control of the\
\ party invoking them and whose consequences could not have been avoided despite\
\ all efforts to the contrary; these provisions establish mandatory law in favor\
\ of users, as according to Article 103 of Law 4537/2018, payment service providers\
\ are prohibited from deviating from the provisions to the detriment of payment\
\ service users, unless the possibility of deviation is explicitly provided and\
\ they can decide to offer only more favorable terms to payment service users;\
\ the aforementioned contractual terms do not constitute more favorable terms\
\ but rather disadvantageous terms for the payment service user. In this case,\
\ however, the defendant did not prove the authenticity of the transaction and\
\ its approval by the plaintiff and did not invoke, nor did any unusual and unforeseen\
\ circumstances beyond its control, the consequences of which could not have been\
\ avoided despite all efforts to the contrary, come to light. Therefore, the contested\
\ transaction transferring the amount of €3,000.00 is considered, in the absence\
\ of demonstrable consent from the plaintiff, unapproved according to the provisions\
\ of Article 64 of Law 4537/2018, and the defendant's contrary claims are rejected,\
\ especially since the plaintiff proceeded, according to Article 71 paragraph\
\ 1 of Law 4537/2018, without undue delay to notify the defendant regarding the\
\ contested unapproved payment action. Consequently, the defendant is liable for\
\ compensating the plaintiff for the positive damage he suffered under Article\
\ 73 of Law 4537/2018 and is obliged to pay him the requested amount of €703.18,\
\ while the plaintiff’s fault in the occurrence of this damage cannot be established,\
\ as he entered his personal details in an online environment that was a faithful\
\ imitation of that of the defendant, as evidenced by the comparison of the screenshots\
\ of the fake website and the real website provided by the plaintiff, a fact that\
\ he could not have known while being fully convinced that he was transacting\
\ with the defendant. Furthermore, the defendant’s liability to compensate the\
\ plaintiff is based on the provision of Article 8 of Law 2251/1994, which applies\
\ in this case, as the plaintiff's damage resulted from inadequate fulfillment\
\ of its obligations in the context of providing its services, but also on the\
\ provision of Article 914 of the Civil Code in the sense of omission on its part\
\ of unlawfully and culpably imposed actions. In this case, given that during\
\ the relevant period there had been a multitude of similar incidents of fraud\
\ against the defendant's customers, the latter, as a service provider to the\
\ consumer public and bearing transactional obligations of care and security towards\
\ them, displayed gross negligence regarding the security provided for electronic\
\ transaction services, which was compromised by the fraudulent theft of funds,\
\ as it did not comply with all required high-security measures for executing\
\ the contested transaction, failing to implement the strict customer identification\
\ verification process and to check the authenticity of the account to which the\
\ funds were sent, thus not assuming the suspicious nature of the transaction,\
\ did not adopt comprehensive and improved protective measures to fully protect\
\ its customers against malicious attacks and online fraud and to prevent the\
\ infiltration of unauthorized third parties, nor did it fulfill its obligations\
\ to inform, accurately inform, and warn its consumers - customers, as it failed\
\ to adequately inform them of attempts to steal their personal data through the\
\ sending of informative emails or SMS, while merely posting in a section rather\
\ than on a central banner (as it later did) does not constitute adequate information\
\ such that it meets the requirement of protecting its customers and the increased\
\ safeguarding of their interests. Although the plaintiff acted promptly and informed\
\ the defendant on the same day about the contested incident, the defendant did\
\ not act as promptly regarding the investigation of the incident and the freezing\
\ of the account that held the fraudulent credit to prevent the plaintiff's loss,\
\ but only returned part of the funds to the plaintiff a month later. This behavior,\
\ beyond being culpable due to gross negligence, was also unlawful, as it would\
\ have been illegal even without the contractual relationship, as contrary to\
\ the provisions of Law 4537/2018 and Law 2251/1994, regarding the lack of security\
\ of the services that the consumer is legitimately entitled to expect, as well\
\ as the building of trust that is essential in banking transactions, elements\
\ that it was obligated to provide within the sphere of the services offered,\
\ and contrary to the principles of good faith and commercial ethics, as crystallized\
\ in the provision of Article 288 of the Civil Code, as well as the general duty\
\ imposed by Article 914 of the Civil Code not to cause harm to another culpably.\
\ This resulted not only in positive damage to the plaintiff but also in causing\
\ him moral harm consisting of his mental distress and the disruption, agitation,\
\ and sorrow he experienced, for which he must be awarded financial compensation.\
\ Taking into account all the general circumstances of the case, the extent of\
\ the plaintiff's damage, the severity of the defendant's fault, the mental distress\
\ suffered by the plaintiff, the insecurity he felt regarding his deposits, the\
\ sorrow he experienced, and the stress caused by his financial loss, which occurred\
\ during the pandemic period when his earnings from his professional activity\
\ had significantly decreased, as well as the financial and social situation of\
\ the parties, it is the court's opinion that he should be granted, as financial\
\ compensation for his moral harm, an amount of €250.00, which is deemed reasonable\
\ and fair. Therefore, the total monetary amount that the plaintiff is entitled\
\ to for his positive damage and financial compensation for the moral harm suffered\
\ amounts to a total of (€703.18 + €250.00) = €953.18."
- 'Whoever, without authorization, copies, uses, discloses to another person, or
in any way violates data of a computer or a computer program, which belong to
the realm of state secrets, private secrets, business secrets, trade secrets,
or privacy, shall be punished by imprisonment from three months to five years.
Private computer data or programs should be considered all the data and programs
that the legal holder keeps secret with justified interest, especially if the
owner had taken security measures.
If the offender is in the service of the legal holder of the data, or the secret
computer data and programs have a great economic value, the act shall be punished
by imprisonment from one year to five years.
If the secret computer data and programs belong to the realm of military or diplomatic
secrets, or of the security of the state, the act shall be punished according
to Articles 146–147.
The offences of paragraphs 1–2 are prosecuted only upon complaint.
'
- source_sentence: What triggers the need for a review of processing operations?
sentences:
- The data subject should have the right not to be subject to a decision, which
may include a measure, evaluating personal aspects relating to him or her which
is based solely on automated processing and which produces legal effects concerning
him or her or similarly significantly affects him or her, such as automatic refusal
of an online credit application or e-recruiting practices without any human intervention.
Such processing includes ‘profiling’ that consists of any form of automated processing
of personal data evaluating the personal aspects relating to a natural person,
in particular to analyse or predict aspects concerning the data subject's performance
at work, economic situation, health, personal preferences or interests, reliability
or behaviour, location or movements, where it produces legal effects concerning
him or her or similarly significantly affects him or her. However, decision-making
based on such processing, including profiling, should be allowed where expressly
authorised by Union or Member State law to which the controller is subject, including
for fraud and tax-evasion monitoring and prevention purposes conducted in accordance
with the regulations, standards and recommendations of Union institutions or national
oversight bodies and to ensure the security and reliability of a service provided
by the controller, or necessary for the entering or performance of a contract
between the data subject and a controller, or when the data subject has given
his or her explicit consent. In any case, such processing should be subject to
suitable safeguards, which should include specific information to the data subject
and the right to obtain human intervention, to express his or her point of view,
to obtain an explanation of the decision reached after such assessment and to
challenge the decision. Such measure should not concern a child. In order to ensure
fair and transparent processing in respect of the data subject, taking into account
the specific circumstances and context in which the personal data are processed,
the controller should use appropriate mathematical or statistical procedures for
the profiling, implement technical and organisational measures appropriate to
ensure, in particular, that factors which result in inaccuracies in personal data
are corrected and the risk of errors is minimised, secure personal data in a manner
that takes account of the potential risks involved for the interests and rights
of the data subject and that prevents, inter alia, discriminatory effects on natural
persons on the basis of racial or ethnic origin, political opinion, religion or
beliefs, trade union membership, genetic or health status or sexual orientation,
or that result in measures having such an effect. Automated decision-making and
profiling based on special categories of personal data should be allowed only
under specific conditions.
- "Court (Civil/Criminal): Civil \nProvisions: Law 4537/2018. \nTime of commission\
\ of act: \nOutcome (not guilty, guilty): \nReasoning: PARTIALLY ACCEPTS the\
\ lawsuit. RECOGNIZES the obligation of the defendant (a) to pay the plaintiffs\
\ in full the amount of eight thousand eight hundred ninety (8,890) euros, with\
\ legal interest from December 2, 2021, and (b) to pay each of the plaintiffs\
\ the amount of five hundred (500) euros with legal interest from the service\
\ of the lawsuit. \nFacts: The plaintiffs claim that they are co-beneficiaries\
\ of a savings account held by the defendant, and that unknown perpetrators gained\
\ access to the aforementioned account via the internet, without the plaintiffs\
\ themselves having any fault regarding the safeguarding of the codes or the disclosure\
\ of the unique transaction codes (OTR). They assert that the defendant is responsible\
\ for the access gained by the unknown perpetrators to the savings account, as\
\ the defendant negligently violated the protective obligations it owed to the\
\ plaintiffs. They state that, due to the actions of the unknown perpetrators,\
\ gradual transfers of monetary amounts were made, resulting in the aforementioned\
\ savings account being depleted by the amount of 10,120 euros within a few minutes.\
\ They informed the defendant of the aforementioned actions through the appropriate\
\ channels; however, the defendant negligently delayed the necessary actions.\
\ The defendant denies any liability and the return of the aforementioned monetary\
\ amount."
- "1.Where a type of processing in particular using new technologies, and taking\
\ into account the nature, scope, context and purposes of the processing, is likely\
\ to result in a high risk to the rights and freedoms of natural persons, the\
\ controller shall, prior to the processing, carry out an assessment of the impact\
\ of the envisaged processing operations on the protection of personal data. A\
\ single assessment may address a set of similar processing operations that present\
\ similar high risks.\n2.The controller shall seek the advice of the data protection\
\ officer, where designated, when carrying out a data protection impact assessment.\n\
3.A data protection impact assessment referred to in paragraph 1 shall in particular\
\ be required in the case of: (a) a systematic and extensive evaluation of personal\
\ aspects relating to natural persons which is based on automated processing,\
\ including profiling, and on which decisions are based that produce legal effects\
\ concerning the natural person or similarly significantly affect the natural\
\ person; (b) processing on a large scale of special categories of data referred\
\ to in Article 9(1), or of personal data relating to criminal convictions and\
\ offences referred to in Article 10; or (c) a systematic monitoring of a publicly\
\ accessible area on a large scale.\n4.The supervisory authority shall establish\
\ and make public a list of the kind of processing operations which are subject\
\ to the requirement for a data protection impact assessment pursuant to paragraph\
\ 1. The supervisory authority shall communicate those lists to the Board referred\
\ to in Article 68\n5.The supervisory authority may also establish and make public\
\ a list of the kind of processing operations for which no data protection impact\
\ assessment is required. The supervisory authority shall communicate those lists\
\ to the Board.\n6.Prior to the adoption of the lists referred to in paragraphs\
\ 4 and 5, the competent supervisory authority shall apply the consistency mechanism\
\ referred to in Article 63 where such lists involve processing activities which\
\ are related to the offering of goods or services to data subjects or to the\
\ monitoring of their behaviour in several Member States, or may substantially\
\ affect the free movement of personal data within the Union. 4.5.2016 L 119/53\
\ \n7.The assessment shall contain at least: (a) a systematic description of\
\ the envisaged processing operations and the purposes of the processing, including,\
\ where applicable, the legitimate interest pursued by the controller; (b) an\
\ assessment of the necessity and proportionality of the processing operations\
\ in relation to the purposes; (c) an assessment of the risks to the rights and\
\ freedoms of data subjects referred to in paragraph 1; and (d) the measures\
\ envisaged to address the risks, including safeguards, security measures and\
\ mechanisms to ensure the protection of personal data and to demonstrate compliance\
\ with this Regulation taking into account the rights and legitimate interests\
\ of data subjects and other persons concerned.\n8.Compliance with approved codes\
\ of conduct referred to in Article 40 by the relevant controllers or processors\
\ shall be taken into due account in assessing the impact of the processing operations\
\ performed by such controllers or processors, in particular for the purposes\
\ of a data protection impact assessment.\n9.Where appropriate, the controller\
\ shall seek the views of data subjects or their representatives on the intended\
\ processing, without prejudice to the protection of commercial or public interests\
\ or the security of processing operations.\n10.Where processing pursuant to point\
\ (c) or (e) of Article 6(1) has a legal basis in Union law or in the law of the\
\ Member State to which the controller is subject, that law regulates the specific\
\ processing operation or set of operations in question, and a data protection\
\ impact assessment has already been carried out as part of a general impact assessment\
\ in the context of the adoption of that legal basis, paragraphs 1 to 7 shall\
\ not apply unless Member States deem it to be necessary to carry out such an\
\ assessment prior to processing activities.\n11. Where necessary, the controller\
\ shall carry out a review to assess if processing is performed in accordance\
\ with the data protection impact assessment at least when there is a change of\
\ the risk represented by processing operations."
- source_sentence: What elements does the Commission take into account when assessing
the adequacy of the level of protection?
sentences:
- '**Court (Civil/Criminal): Civil**
**Provisions:**
**Time of commission of the act:**
**Outcome (not guilty, guilty):**
**Rationale:**
**Facts:**
The plaintiff holds credit card number ............ with the defendant banking
corporation. Based on the application for alternative networks dated 19/7/2015
with number ......... submitted at a branch of the defendant, he was granted access
to the electronic banking service (e-banking) to conduct banking transactions
(debit, credit, updates, payments) remotely. On 30/11/2020, the plaintiff fell
victim to electronic fraud through the "phishing" method, whereby an unknown perpetrator
managed to withdraw a total amount of €3,121.75 from the aforementioned credit
card. Specifically, the plaintiff received an email at 1:35 PM on 29/11/2020 from
sender ...... with address ........, informing him that due to an impending system
change, he needed to verify the mobile phone number linked to the credit card,
urging him to complete the verification process within the next 24 hours by following
a link titled ........; otherwise, his account would be locked for security reasons.
The plaintiff read this email on the afternoon of 30 November 2020 and, believing
it was from the defendant, followed the instructions and proceeded via the provided
link to a website that was identical (a clone) to that of the defendant. On this
page, he was asked to enter the six-digit security code (.........) that had just
been sent to his mobile phone by the defendant at 3:41 PM, with the note that
it was an activation code for his ........ card at ........., which he entered.
Subsequently, the plaintiff received, according to his statements, a new email
(not submitted), which requested him to enter the details of the aforementioned
credit card, specifically the name of the cardholder and the card number, not
the PIN, which he also entered, convinced that he was within the online environment
of the defendant. Then, at 3:47 PM, he received a message on his mobile phone
from the defendant containing the exact same content as the one he received at
3:41 PM, while at 3:50 PM he received a message stating that the activation of
his ......... card at ....... had been completed. Once the plaintiff read this,
he became concerned that something was not right, and immediately called (at 4:41
PM) the defendant''s call center to inform them. There, the employees, with whom
he finally connected at 5:04 PM due to high call center volume, advised him to
delete the relevant emails, cancel his credit card, change his access passwords
for the service, and submit a dispute request regarding the conducted transactions.
The plaintiff electronically sent this request to the defendant, disputing the
detailed transactions amounting to €3,121.75, which were conducted on 30/11/2020
during the time frame of 16:37:45-16:43:34 PM, arguing that he had neither performed
them himself nor authorized anyone else to do so. The plaintiff specifically disputed
the following transactions, as evidenced by the account activity of the disputed
credit card during the aforementioned timeframe: a) transaction number .........
amounting to €150.62 conducted on 30/11/2020 at 4:43:34 PM, b) transaction number
........ amounting to €293.20 conducted on 30/11/2020 at 4:42:40 PM, c) transaction
number ............ amounting to €295.21 conducted on 30/11/2020 at 4:42:10 PM,
d) transaction number .......... amounting to €299.22 conducted on 30/11/2020
at 4:41:31 PM, e) transaction number ........ amounting to €297.21 conducted on
30/11/2020 at 4:41:01 PM, f) transaction number ........ amounting to €299.22
conducted on 30/11/2020 at 4:40:27 PM, g) transaction number ....... amounting
to €299.22 conducted on 30/11/2020 at 4:39:55 PM, h) transaction number ......
amounting to €299.22 conducted on 30/11/2020 at 4:39:22 PM, i) transaction number
......... amounting to €297.22 conducted on 30/11/2020 at 4:38:52 PM, j) transaction
number ......... amounting to €295.21 conducted on 30/11/2020 at 4:38:17 PM, and
k) transaction number ......... amounting to €296.21 conducted on 30/11/2020 at
4:37:45 PM. In its response letter dated 21/12/2020, the defendant denied responsibility
for the costs of the aforementioned transactions, placing the entire blame on
the plaintiff for the leak of his card details and security code to the fraudulent
page. The plaintiff, completely denying any fault for the conducted transactions,
repeatedly contacted the defendant, both by phone and via email (see emails dated
15/1/2021 and 11/2/2021), while on 2/3/2021, he electronically sent a report dated
1/03/2021 to the Consumer Advocate’s email address, recounting the events and
requesting that the aforementioned Independent Authority intervene to have the
disputed debt canceled. In its letter with reference number ...../27.04.2021,
the aforementioned Independent Authority informed the plaintiff that the case
was outside its mediating role and was therefore archived. Subsequently, the plaintiff
sent the defendant on 5/3/2021 his extrajudicial statement dated 4/3/2021, calling
upon it to fully cancel the debt of €3,121.75 that had been unjustly incurred
against him within two days and to immediately instruct the representatives of
the collection agency working with it to cease contacting him regarding the disputed
case. The defendant sent the plaintiff a message on his mobile phone on 20/04/2021
informing him that his case was still being processed due to lengthy operational
requirements, while on 23/04/2021, via email, it informed him that considering
their good cooperation and his efforts to keep them updated, it had reviewed his
case and decided to refund him the amounts of the transactions that were conducted
after his contact with their representatives on 30/11/2020 at 4:41 PM, totaling
€1,038.25, specifically the following: a) transaction of €150.62 conducted on
30/11/2020 at 4:43 PM, b) transaction of €295.21 conducted on 30/11/2020 at 4:42
PM, c) transaction of €293.20 conducted on 30/11/2020 at 4:42 PM, and d) transaction
of €299.22 conducted on 30/11/2020 at 4:41 PM. Beyond this, the defendant refused
to refund the plaintiff the amount of the remaining transactions conducted on
30/11/2020, totaling €2,376.08 (and not €2,376.48 as incorrectly stated by the
plaintiff in his lawsuit), which the plaintiff ultimately fully paid, transferring
€2,342.77 to the defendant on 7/06/2021 and €33.31 on 15/06/2021 (see related
deposit receipts).'
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Claim for\
\ compensation and monetary satisfaction due to moral damage against a mobile\
\ phone company and a credit institution within the framework of inadequate fulfillment\
\ of a payment services contract for \"web banking.\" Appropriate actions for\
\ mobile phone companies in case of a request for a \"sim\" card replacement due\
\ to wear or loss. They must verify the customer's identity based on the personal\
\ details and identification information registered in their system but are not\
\ liable for any changes in the latter that were not timely communicated to them.\
\ Further security measures such as phone communication or sending an SMS to the\
\ mobile number holder are not required. Payment services under Law 4357/2018.\
\ Obligation of the payment service provider, such as banks, to inform the payer\
\ after receiving a relevant order for making a payment. The content of this varies\
\ per case, such as sending a personalized code to the user's mobile phone for\
\ transaction approval, as well as sending an email immediately after its completion.\
\ However, the bank is not liable for customer damage resulting from illicit electronic\
\ transactions due to third-party interception of either the access codes for\
\ electronic banking transactions or the sim card and the phone number to which\
\ the personalized codes for approving the aforementioned transactions are sent,\
\ within the framework of increased security protocols. Appropriate actions by\
\ banks upon diagnosing illicit banking transactions that may be fraudulent. Relevant\
\ criteria for consideration. The evidence did not indicate negligent and thus\
\ tortious behavior from all defendants. The claim is dismissed. \n\n**Facts:**\
\ In the present claim, upon due assessment of its content, the plaintiff states\
\ that he has a mobile phone subscription with the first defendant, a mobile phone\
\ company. On October 26, 2020, in the morning, he realized that his mobile phone\
\ was offline, and by noon, he received email notifications from Bank ..........\
\ and ............ (whose third and fourth defendants are de facto universal successors,\
\ respectively), with which he holds an account, regarding transactions he had\
\ made. From phone calls from his home phone to Bank .............. and ............\
\ Bank, he was informed that on the same day, in a very short period, four money\
\ transfers had been made from the account he maintains at Bank ..............,\
\ specifically, an amount of €15,000 was transferred to the account mentioned\
\ in the claim document under the name ..........., at ........ an amount of €15,000\
\ was transferred to the account mentioned in the claim document under the name\
\ ......... at ........... Bank, an amount of €15,000 was transferred to the plaintiff's\
\ account with his daughter as a co-holder at ......... Bank, and an amount of\
\ €6,700 was transferred from another of his accounts to the account from which\
\ the transfer to the aforementioned accounts of €45,000 was made. Additionally,\
\ from the plaintiff's account with his daughter as a co-holder at ..........\
\ Bank, an amount of €9,999 was transferred to an account under the name of ....\
\ . He attempted to log into the online banking service of Bank ......... from\
\ his home computer, but found that the service was locked, while regarding the\
\ corresponding service of ........... Bank, he requested alongside his daughter\
\ to 'lock' it. In a phone call with the call center of Bank ............, he\
\ was informed about the locking of his electronic account in the online banking\
\ service and was told to dispute the transactions, which he did immediately through\
\ ... banking, while his daughter communicated about this with ....... Bank. The\
\ transfer to the account with the beneficiary was canceled, and the amount of\
\ €15,000 was returned to the plaintiff. After his investigation, he discovered\
\ that an unknown individual appeared at the branch of the first defendant, served\
\ by the second defendant, who posed as the plaintiff and presented a forged military\
\ ID card of the plaintiff, requesting and receiving a new sim card, resulting\
\ in the deactivation of the plaintiff's sim card and gaining access to the codes\
\ sent to him by the banks for completing the transfers. Due to the negligence\
\ of the second defendant, he did not realize that the identity used was forged,\
\ as since 2010, when the plaintiff retired, he has had a police identification\
\ card. The first defendant does not have security protocols to prevent such incidents,\
\ which constitute the sim .... method, despite the issuance of a press release\
\ from the Attica Security and numerous publications regarding the aforementioned\
\ method, unlike other mobile phone companies, which implement a specific procedure\
\ for changing sim cards. The second defendant did not take the obvious step to\
\ check the functioning of the sim card before replacing it, where he would have\
\ realized that the plaintiff's mobile phone was functioning normally. Bank ..........\
\ and ........... Bank: a) accepted requests for transferring large amounts of\
\ money from accounts that had no similar activity in the past, while the plaintiff's\
\ online banking account with the above banks was locked quite some time later,\
\ b) sent email notifications regarding successful transactions in succession,\
\ under a single email, c) did not check the address ... of the perpetrators,\
\ which was different from that used by the plaintiff, and d) did not take necessary\
\ security measures to prevent fraud via sim ... against the plaintiff, as the\
\ security code (pin) sent by the banks via message to the mobile phone proved\
\ to be compromised. As a result of the above illegal and culpable behavior of\
\ the defendants, the plaintiff suffered property damage amounting to a total\
\ of €24,999, which constitutes the total amount of the transfers made by third\
\ unknown persons to accounts of unknown individuals, as stated above, and has\
\ not been refunded despite his repeated inquiries, while he also suffered distress\
\ and mental anguish, and his trust in the banks was shaken, thus entitling him\
\ to monetary compensation for his moral damage, amounting to €5,000."
- '1.A transfer of personal data to a third country or an international organisation
may take place where the Commission has decided that the third country, a territory
or one or more specified sectors within that third country, or the international
organisation in question ensures an adequate level of protection. Such a transfer
shall not require any specific authorisation.
2.When assessing the adequacy of the level of protection, the Commission shall,
in particular, take account of the following elements: (a) the rule of law, respect
for human rights and fundamental freedoms, relevant legislation, both general
and sectoral, including concerning public security, defence, national security
and criminal law and the access of public authorities to personal data, as well
as the implementation of such legislation, data protection rules, professional
rules and security measures, including rules for the onward transfer of personal
data to another third country or international organisation which are complied
with in that country or international organisation, case-law, as well as effective
and enforceable data subject rights and effective administrative and judicial
redress for the data subjects whose personal data are being transferred; (b) the
existence and effective functioning of one or more independent supervisory authorities
in the third country or to which an international organisation is subject, with
responsibility for ensuring and enforcing compliance with the data protection
rules, including adequate enforcement powers, for assisting and advising the data
subjects in exercising their rights and for cooperation with the supervisory authorities
of the Member States; and (c) the international commitments the third country
or international organisation concerned has entered into, or other obligations
arising from legally binding conventions or instruments as well as from its participation
in multilateral or regional systems, in particular in relation to the protection
of personal data.
3.The Commission, after assessing the adequacy of the level of protection, may
decide, by means of implementing act, that a third country, a territory or one
or more specified sectors within a third country, or an international organisation
ensures an adequate level of protection within the meaning of paragraph 2 of this
Article. The implementing act shall provide for a mechanism for a periodic review,
at least every four years, which shall take into account all relevant developments
in the third country or international organisation. The implementing act shall
specify its territorial and sectoral application and, where applicable, identify
the supervisory authority or authorities referred to in point (b) of paragraph
2 of this Article. The implementing act shall be adopted in accordance with the
examination procedure referred to in Article 93(2).
4.The Commission shall, on an ongoing basis, monitor developments in third countries
and international organisations that could affect the functioning of decisions
adopted pursuant to paragraph 3 of this Article and decisions adopted on the basis
of Article 25(6) of Directive 95/46/EC.
5.The Commission shall, where available information reveals, in particular following
the review referred to in paragraph 3 of this Article, that a third country, a
territory or one or more specified sectors within a third country, or an international
organisation no longer ensures an adequate level of protection within the meaning
of paragraph 2 of this Article, to the extent necessary, repeal, amend or suspend
the decision referred to in paragraph 3 of this Article by means of implementing
acts without retro-active effect. Those implementing acts shall be adopted in
accordance with the examination procedure referred to in Article 93(2). On duly
justified imperative grounds of urgency, the Commission shall adopt immediately
applicable implementing acts in accordance with the procedure referred to in Article
93(3).
6.The Commission shall enter into consultations with the third country or international
organisation with a view to remedying the situation giving rise to the decision
made pursuant to paragraph 5
7.A decision pursuant to paragraph 5 of this Article is without prejudice to transfers
of personal data to the third country, a territory or one or more specified sectors
within that third country, or the international organisation in question pursuant
to Articles 46 to 49
8.The Commission shall publish in the Official Journal of the European Union and
on its website a list of the third countries, territories and specified sectors
within a third country and international organisations for which it has decided
that an adequate level of protection is or is no longer ensured.
9.Decisions adopted by the Commission on the basis of Article 25(6) of Directive
95/46/EC shall remain in force until amended, replaced or repealed by a Commission
Decision adopted in accordance with paragraph 3 or 5 of this Article.'
- source_sentence: What can the contract be based on, besides individual contracts,
in part according to this excerpt?
sentences:
- '1.The Board shall draw up an annual report regarding the protection of natural
persons with regard to processing in the Union and, where relevant, in third countries
and international organisations. The report shall be made public and be transmitted
to the European Parliament, to the Council and to the Commission.
2.The annual report shall include a review of the practical application of the
guidelines, recommendations and best practices referred to in point (l) of Article
70(1) as well as of the binding decisions referred to in Article 65.'
- '1.Where processing is to be carried out on behalf of a controller, the controller
shall use only processors providing sufficient guarantees to implement appropriate
technical and organisational measures in such a manner that processing will meet
the requirements of this Regulation and ensure the protection of the rights of
the data subject.
2.The processor shall not engage another processor without prior specific or general
written authorisation of the controller. In the case of general written authorisation,
the processor shall inform the controller of any intended changes concerning the
addition or replacement of other processors, thereby giving the controller the
opportunity to object to such changes.
3.Processing by a processor shall be governed by a contract or other legal act
under Union or Member State law, that is binding on the processor with regard
to the controller and that sets out the subject-matter and duration of the processing,
the nature and purpose of the processing, the type of personal data and categories
of data subjects and the obligations and rights of the controller. That contract
or other legal act shall stipulate, in particular, that the processor: (a) processes
the personal data only on documented instructions from the controller, including
with regard to transfers of personal data to a third country or an international
organisation, unless required to do so by Union or Member State law to which the
processor is subject; in such a case, the processor shall inform the controller
of that legal requirement before processing, unless that law prohibits such information
on important grounds of public interest; (b) ensures that persons authorised
to process the personal data have committed themselves to confidentiality or are
under an appropriate statutory obligation of confidentiality; (c) takes all measures
required pursuant to Article 32; (d) respects the conditions referred to in paragraphs
2 and 4 for engaging another processor; (e) taking into account the nature of
the processing, assists the controller by appropriate technical and organisational
measures, insofar as this is possible, for the fulfilment of the controller''s
obligation to respond to requests for exercising the data subject''s rights laid
down in Chapter III; (f) assists the controller in ensuring compliance with the
obligations pursuant to Articles 32 to 36 taking into account the nature of processing
and the information available to the processor; (g) at the choice of the controller,
deletes or returns all the personal data to the controller after the end of the
provision of services relating to processing, and deletes existing copies unless
Union or Member State law requires storage of the personal data; (h) makes available
to the controller all information necessary to demonstrate compliance with the
obligations laid down in this Article and allow for and contribute to audits,
including inspections, conducted by the controller or another auditor mandated
by the controller. 4.5.2016 L 119/49 With regard to point (h) of the first subparagraph,
the processor shall immediately inform the controller if, in its opinion, an instruction
infringes this Regulation or other Union or Member State data protection provisions.
4.Where a processor engages another processor for carrying out specific processing
activities on behalf of the controller, the same data protection obligations as
set out in the contract or other legal act between the controller and the processor
as referred to in paragraph 3 shall be imposed on that other processor by way
of a contract or other legal act under Union or Member State law, in particular
providing sufficient guarantees to implement appropriate technical and organisational
measures in such a manner that the processing will meet the requirements of this
Regulation. Where that other processor fails to fulfil its data protection obligations,
the initial processor shall remain fully liable to the controller for the performance
of that other processor''s obligations.
5.Adherence of a processor to an approved code of conduct as referred to in Article
40 or an approved certification mechanism as referred to in Article 42 may be
used as an element by which to demonstrate sufficient guarantees as referred to
in paragraphs 1 and 4 of this Article.
6.Without prejudice to an individual contract between the controller and the processor,
the contract or the other legal act referred to in paragraphs 3 and 4 of this
Article may be based, in whole or in part, on standard contractual clauses referred
to in paragraphs 7 and 8 of this Article, including when they are part of a certification
granted to the controller or processor pursuant to Articles 42 and 43
7.The Commission may lay down standard contractual clauses for the matters referred
to in paragraph 3 and 4 of this Article and in accordance with the examination
procedure referred to in Article 93(2).
8.A supervisory authority may adopt standard contractual clauses for the matters
referred to in paragraph 3 and 4 of this Article and in accordance with the consistency
mechanism referred to in Article 63
9.The contract or the other legal act referred to in paragraphs 3 and 4 shall
be in writing, including in electronic form.
10.Without prejudice to Articles 82, 83 and 84, if a processor infringes this
Regulation by determining the purposes and means of processing, the processor
shall be considered to be a controller in respect of that processing.'
- In order to ensure consistent monitoring and enforcement of this Regulation throughout
the Union, the supervisory authorities should have in each Member State the same
tasks and effective powers, including powers of investigation, corrective powers
and sanctions, and authorisation and advisory powers, in particular in cases of
complaints from natural persons, and without prejudice to the powers of prosecutorial
authorities under Member State law, to bring infringements of this Regulation
to the attention of the judicial authorities and engage in legal proceedings.
Such powers should also include the power to impose a temporary or definitive
limitation, including a ban, on processing. Member States may specify other tasks
related to the protection of personal data under this Regulation. The powers of
supervisory authorities should be exercised in accordance with appropriate procedural
safeguards set out in Union and Member State law, impartially, fairly and within
a reasonable time. In particular each measure should be appropriate, necessary
and proportionate in view of ensuring compliance with this Regulation, taking
into account the circumstances of each individual case, respect the right of every
person to be heard before any individual measure which would affect him or her
adversely is taken and avoid superfluous costs and excessive inconveniences for
the persons concerned. Investigatory powers as regards access to premises should
be exercised in accordance with specific requirements in Member State procedural
law, such as the requirement to obtain a prior judicial authorisation. Each legally
binding measure of the supervisory authority should be in writing, be clear and
unambiguous, indicate the supervisory authority which has issued the measure,
the date of issue of the measure, bear the signature of the head, or a member
of the supervisory authority authorised by him or her, give the reasons for the
measure, and refer to the right of an effective remedy. This should not preclude
additional requirements pursuant to Member State procedural law. The adoption
of a legally binding decision implies that it may give rise to judicial review
in the Member State of the supervisory authority that adopted the decision.
pipeline_tag: sentence-similarity
library_name: sentence-transformers
metrics:
- cosine_accuracy@1
- cosine_accuracy@3
- cosine_accuracy@5
- cosine_accuracy@10
- cosine_precision@1
- cosine_precision@3
- cosine_precision@5
- cosine_precision@10
- cosine_recall@1
- cosine_recall@3
- cosine_recall@5
- cosine_recall@10
- cosine_ndcg@10
- cosine_mrr@10
- cosine_map@100
model-index:
- name: multilingual-e5-large
results:
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 1024
type: dim_1024
metrics:
- type: cosine_accuracy@1
value: 0.39646464646464646
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.44191919191919193
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.4772727272727273
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5303030303030303
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.39646464646464646
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.38636363636363635
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.3681818181818182
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.3290404040404041
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.08304287864930793
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.2081343496506072
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.2835680574260267
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.39409768094763203
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.4598689419093947
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.42710938752605426
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.5168519133450287
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 768
type: dim_768
metrics:
- type: cosine_accuracy@1
value: 0.3939393939393939
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.44191919191919193
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.5025252525252525
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5505050505050505
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.3939393939393939
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.3855218855218855
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.37626262626262624
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.3446969696969697
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.08168070862236515
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.20453019286463223
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.2832633651660053
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.40242302005471103
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.47166637655254595
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.4309634038800705
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.5280748790211213
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 512
type: dim_512
metrics:
- type: cosine_accuracy@1
value: 0.3787878787878788
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.4318181818181818
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.48484848484848486
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.5303030303030303
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.3787878787878788
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.3728956228956229
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.36060606060606065
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.32601010101010097
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.07971959353722971
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.2026184382863416
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.27887644095443376
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.39430746021109475
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.45372338563687165
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.414860910694244
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.5082323561062431
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 256
type: dim_256
metrics:
- type: cosine_accuracy@1
value: 0.3712121212121212
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.398989898989899
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.44191919191919193
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.494949494949495
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.3712121212121212
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.3552188552188552
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.33282828282828286
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.29949494949494954
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.07982818259272316
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.1976196380449212
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.26002173221499414
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.36485373765457696
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.4261612717180349
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.3972482764149431
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.48924480926248376
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 128
type: dim_128
metrics:
- type: cosine_accuracy@1
value: 0.33585858585858586
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.37626262626262624
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.41919191919191917
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.4797979797979798
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.33585858585858586
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.32659932659932656
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.3111111111111111
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.2803030303030303
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.07421363164771244
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.18525500642088516
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.25267706028894804
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.35720405753526513
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.4004282713649355
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.3674543049543049
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.45757274754945104
name: Cosine Map@100
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: dim 64
type: dim_64
metrics:
- type: cosine_accuracy@1
value: 0.2777777777777778
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.31565656565656564
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.3434343434343434
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.38636363636363635
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.2777777777777778
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.2685185185185185
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.253030303030303
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.2222222222222222
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.06505275009099755
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.16288196174670413
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.22036463456449257
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.30790852718468
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.3305966214431583
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.3029501362834696
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.39861110645687153
name: Cosine Map@100
---
# multilingual-e5-large
This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [intfloat/multilingual-e5-large](https://huggingface.co/intfloat/multilingual-e5-large). It maps sentences & paragraphs to a 1024-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
## Model Details
### Model Description
- **Model Type:** Sentence Transformer
- **Base model:** [intfloat/multilingual-e5-large](https://huggingface.co/intfloat/multilingual-e5-large) <!-- at revision 0dc5580a448e4284468b8909bae50fa925907bc5 -->
- **Maximum Sequence Length:** 512 tokens
- **Output Dimensionality:** 1024 dimensions
- **Similarity Function:** Cosine Similarity
<!-- - **Training Dataset:** Unknown -->
- **Language:** en
- **License:** apache-2.0
### Model Sources
- **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
### Full Model Architecture
```
SentenceTransformer(
(0): Transformer({'max_seq_length': 512, 'do_lower_case': False, 'architecture': 'XLMRobertaModel'})
(1): Pooling({'word_embedding_dimension': 1024, 'pooling_mode_cls_token': False, 'pooling_mode_mean_tokens': True, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
(2): Normalize()
)
```
## Usage
### Direct Usage (Sentence Transformers)
First install the Sentence Transformers library:
```bash
pip install -U sentence-transformers
```
Then you can load this model and run inference.
```python
from sentence_transformers import SentenceTransformer
# Download from the 🤗 Hub
model = SentenceTransformer("IoannisKat1/intfloat-multilingual-e5-large-new2")
# Run inference
sentences = [
'What can the contract be based on, besides individual contracts, in part according to this excerpt?',
"1.Where processing is to be carried out on behalf of a controller, the controller shall use only processors providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject.\n2.The processor shall not engage another processor without prior specific or general written authorisation of the controller. In the case of general written authorisation, the processor shall inform the controller of any intended changes concerning the addition or replacement of other processors, thereby giving the controller the opportunity to object to such changes.\n3.Processing by a processor shall be governed by a contract or other legal act under Union or Member State law, that is binding on the processor with regard to the controller and that sets out the subject-matter and duration of the processing, the nature and purpose of the processing, the type of personal data and categories of data subjects and the obligations and rights of the controller. That contract or other legal act shall stipulate, in particular, that the processor: (a) processes the personal data only on documented instructions from the controller, including with regard to transfers of personal data to a third country or an international organisation, unless required to do so by Union or Member State law to which the processor is subject; in such a case, the processor shall inform the controller of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest; (b) ensures that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality; (c) takes all measures required pursuant to Article 32; (d) respects the conditions referred to in paragraphs 2 and 4 for engaging another processor; (e) taking into account the nature of the processing, assists the controller by appropriate technical and organisational measures, insofar as this is possible, for the fulfilment of the controller's obligation to respond to requests for exercising the data subject's rights laid down in Chapter III; (f) assists the controller in ensuring compliance with the obligations pursuant to Articles 32 to 36 taking into account the nature of processing and the information available to the processor; (g) at the choice of the controller, deletes or returns all the personal data to the controller after the end of the provision of services relating to processing, and deletes existing copies unless Union or Member State law requires storage of the personal data; (h) makes available to the controller all information necessary to demonstrate compliance with the obligations laid down in this Article and allow for and contribute to audits, including inspections, conducted by the controller or another auditor mandated by the controller. 4.5.2016 L 119/49 With regard to point (h) of the first subparagraph, the processor shall immediately inform the controller if, in its opinion, an instruction infringes this Regulation or other Union or Member State data protection provisions.\n4.Where a processor engages another processor for carrying out specific processing activities on behalf of the controller, the same data protection obligations as set out in the contract or other legal act between the controller and the processor as referred to in paragraph 3 shall be imposed on that other processor by way of a contract or other legal act under Union or Member State law, in particular providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that the processing will meet the requirements of this Regulation. Where that other processor fails to fulfil its data protection obligations, the initial processor shall remain fully liable to the controller for the performance of that other processor's obligations.\n5.Adherence of a processor to an approved code of conduct as referred to in Article 40 or an approved certification mechanism as referred to in Article 42 may be used as an element by which to demonstrate sufficient guarantees as referred to in paragraphs 1 and 4 of this Article.\n6.Without prejudice to an individual contract between the controller and the processor, the contract or the other legal act referred to in paragraphs 3 and 4 of this Article may be based, in whole or in part, on standard contractual clauses referred to in paragraphs 7 and 8 of this Article, including when they are part of a certification granted to the controller or processor pursuant to Articles 42 and 43\n7.The Commission may lay down standard contractual clauses for the matters referred to in paragraph 3 and 4 of this Article and in accordance with the examination procedure referred to in Article 93(2).\n8.A supervisory authority may adopt standard contractual clauses for the matters referred to in paragraph 3 and 4 of this Article and in accordance with the consistency mechanism referred to in Article 63\n9.The contract or the other legal act referred to in paragraphs 3 and 4 shall be in writing, including in electronic form.\n10.Without prejudice to Articles 82, 83 and 84, if a processor infringes this Regulation by determining the purposes and means of processing, the processor shall be considered to be a controller in respect of that processing.",
'1.The Board shall draw up an annual report regarding the protection of natural persons with regard to processing in the Union and, where relevant, in third countries and international organisations. The report shall be made public and be transmitted to the European Parliament, to the Council and to the Commission.\n2.The annual report shall include a review of the practical application of the guidelines, recommendations and best practices referred to in point (l) of Article 70(1) as well as of the binding decisions referred to in Article 65.',
]
embeddings = model.encode(sentences)
print(embeddings.shape)
# [3, 1024]
# Get the similarity scores for the embeddings
similarities = model.similarity(embeddings, embeddings)
print(similarities)
# tensor([[1.0000, 0.4491, 0.1215],
# [0.4491, 1.0000, 0.2320],
# [0.1215, 0.2320, 1.0000]])
```
<!--
### Direct Usage (Transformers)
<details><summary>Click to see the direct usage in Transformers</summary>
</details>
-->
<!--
### Downstream Usage (Sentence Transformers)
You can finetune this model on your own dataset.
<details><summary>Click to expand</summary>
</details>
-->
<!--
### Out-of-Scope Use
*List how the model may foreseeably be misused and address what users ought not to do with the model.*
-->
## Evaluation
### Metrics
#### Information Retrieval
* Dataset: `dim_1024`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 1024
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.3965 |
| cosine_accuracy@3 | 0.4419 |
| cosine_accuracy@5 | 0.4773 |
| cosine_accuracy@10 | 0.5303 |
| cosine_precision@1 | 0.3965 |
| cosine_precision@3 | 0.3864 |
| cosine_precision@5 | 0.3682 |
| cosine_precision@10 | 0.329 |
| cosine_recall@1 | 0.083 |
| cosine_recall@3 | 0.2081 |
| cosine_recall@5 | 0.2836 |
| cosine_recall@10 | 0.3941 |
| **cosine_ndcg@10** | **0.4599** |
| cosine_mrr@10 | 0.4271 |
| cosine_map@100 | 0.5169 |
#### Information Retrieval
* Dataset: `dim_768`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 768
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.3939 |
| cosine_accuracy@3 | 0.4419 |
| cosine_accuracy@5 | 0.5025 |
| cosine_accuracy@10 | 0.5505 |
| cosine_precision@1 | 0.3939 |
| cosine_precision@3 | 0.3855 |
| cosine_precision@5 | 0.3763 |
| cosine_precision@10 | 0.3447 |
| cosine_recall@1 | 0.0817 |
| cosine_recall@3 | 0.2045 |
| cosine_recall@5 | 0.2833 |
| cosine_recall@10 | 0.4024 |
| **cosine_ndcg@10** | **0.4717** |
| cosine_mrr@10 | 0.431 |
| cosine_map@100 | 0.5281 |
#### Information Retrieval
* Dataset: `dim_512`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 512
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.3788 |
| cosine_accuracy@3 | 0.4318 |
| cosine_accuracy@5 | 0.4848 |
| cosine_accuracy@10 | 0.5303 |
| cosine_precision@1 | 0.3788 |
| cosine_precision@3 | 0.3729 |
| cosine_precision@5 | 0.3606 |
| cosine_precision@10 | 0.326 |
| cosine_recall@1 | 0.0797 |
| cosine_recall@3 | 0.2026 |
| cosine_recall@5 | 0.2789 |
| cosine_recall@10 | 0.3943 |
| **cosine_ndcg@10** | **0.4537** |
| cosine_mrr@10 | 0.4149 |
| cosine_map@100 | 0.5082 |
#### Information Retrieval
* Dataset: `dim_256`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 256
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.3712 |
| cosine_accuracy@3 | 0.399 |
| cosine_accuracy@5 | 0.4419 |
| cosine_accuracy@10 | 0.4949 |
| cosine_precision@1 | 0.3712 |
| cosine_precision@3 | 0.3552 |
| cosine_precision@5 | 0.3328 |
| cosine_precision@10 | 0.2995 |
| cosine_recall@1 | 0.0798 |
| cosine_recall@3 | 0.1976 |
| cosine_recall@5 | 0.26 |
| cosine_recall@10 | 0.3649 |
| **cosine_ndcg@10** | **0.4262** |
| cosine_mrr@10 | 0.3972 |
| cosine_map@100 | 0.4892 |
#### Information Retrieval
* Dataset: `dim_128`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 128
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.3359 |
| cosine_accuracy@3 | 0.3763 |
| cosine_accuracy@5 | 0.4192 |
| cosine_accuracy@10 | 0.4798 |
| cosine_precision@1 | 0.3359 |
| cosine_precision@3 | 0.3266 |
| cosine_precision@5 | 0.3111 |
| cosine_precision@10 | 0.2803 |
| cosine_recall@1 | 0.0742 |
| cosine_recall@3 | 0.1853 |
| cosine_recall@5 | 0.2527 |
| cosine_recall@10 | 0.3572 |
| **cosine_ndcg@10** | **0.4004** |
| cosine_mrr@10 | 0.3675 |
| cosine_map@100 | 0.4576 |
#### Information Retrieval
* Dataset: `dim_64`
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters:
```json
{
"truncate_dim": 64
}
```
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.2778 |
| cosine_accuracy@3 | 0.3157 |
| cosine_accuracy@5 | 0.3434 |
| cosine_accuracy@10 | 0.3864 |
| cosine_precision@1 | 0.2778 |
| cosine_precision@3 | 0.2685 |
| cosine_precision@5 | 0.253 |
| cosine_precision@10 | 0.2222 |
| cosine_recall@1 | 0.0651 |
| cosine_recall@3 | 0.1629 |
| cosine_recall@5 | 0.2204 |
| cosine_recall@10 | 0.3079 |
| **cosine_ndcg@10** | **0.3306** |
| cosine_mrr@10 | 0.303 |
| cosine_map@100 | 0.3986 |
<!--
## Bias, Risks and Limitations
*What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.*
-->
<!--
### Recommendations
*What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.*
-->
## Training Details
### Training Dataset
#### Unnamed Dataset
* Size: 1,580 training samples
* Columns: <code>anchor</code> and <code>positive</code>
* Approximate statistics based on the first 1000 samples:
| | anchor | positive |
|:--------|:----------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------|
| type | string | string |
| details | <ul><li>min: 7 tokens</li><li>mean: 17.21 tokens</li><li>max: 43 tokens</li></ul> | <ul><li>min: 27 tokens</li><li>mean: 373.71 tokens</li><li>max: 512 tokens</li></ul> |
* Samples:
| anchor | positive |
|:--------------------------------------------------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| <code>What measures should each supervisory authority take to facilitate the submission of complaints?</code> | <code>Every data subject should have the right to lodge a complaint with a single supervisory authority, in particular in the Member State of his or her habitual residence, and the right to an effective judicial remedy in accordance 4.5.2016 L 119/25 Official Journal of the European Union EN with Article 47 of the Charter if the data subject considers that his or her rights under this Regulation are infringed or where the supervisory authority does not act on a complaint, partially or wholly rejects or dismisses a complaint or does not act where such action is necessary to protect the rights of the data subject. The investigation following a complaint should be carried out, subject to judicial review, to the extent that is appropriate in the specific case. The supervisory authority should inform the data subject of the progress and the outcome of the complaint within a reasonable period. If the case requires further investigation or coordination with another supervisory authority, intermed...</code> |
| <code>What did the evidence not indicate?</code> | <code>**Court (Civil/Criminal): Civil** <br>**Provisions:** <br>**Time of commission of the act:** <br>**Outcome (not guilty, guilty):** <br>**Reasoning:** Claim for compensation and monetary satisfaction due to moral damage against a mobile phone company and a credit institution within the framework of inadequate fulfillment of a payment services contract for "web banking." Appropriate actions for mobile phone companies in case of a request for a "sim" card replacement due to wear or loss. They must verify the customer's identity based on the personal details and identification information registered in their system but are not liable for any changes in the latter that were not timely communicated to them. Further security measures such as phone communication or sending an SMS to the mobile number holder are not required. Payment services under Law 4357/2018. Obligation of the payment service provider, such as banks, to inform the payer after receiving a relevant order for making a payment. The con...</code> |
| <code>What was the amount transferred from her account?</code> | <code>Court (Civil/Criminal): Criminal <br>Provisions: Article 42 paragraphs 1, 2, 3, and 7 of Law 4557/2018 <br>Time of commission of the act: <br>Outcome (not guilty, guilty): <br>Reasoning: Obligation of the payment service provider, such as banks, to inform their contracting customer after receiving a relevant order for a payment to be made on their behalf. Content of the above notification at the stage of receiving the payment order and during its execution. Terms of liability for the provider regarding compensation for non-execution, erroneous, or delayed execution of payment transactions. In particular, in the case of an unauthorized or erroneous payment, the user is required to notify the provider within a specified timeframe as soon as they become aware of the corresponding transaction. The provisions of Law 4357/2018 establish mandatory legal regulations in favor of users of payment services and cannot be contractually modified to their detriment, but only to their benefit. Defenses availa...</code> |
* Loss: [<code>MatryoshkaLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#matryoshkaloss) with these parameters:
```json
{
"loss": "MultipleNegativesRankingLoss",
"matryoshka_dims": [
1024,
768,
512,
256,
128,
64
],
"matryoshka_weights": [
1,
1,
1,
1,
1,
1
],
"n_dims_per_step": -1
}
```
### Training Hyperparameters
#### Non-Default Hyperparameters
- `eval_strategy`: epoch
- `per_device_train_batch_size`: 2
- `gradient_accumulation_steps`: 8
- `learning_rate`: 2e-05
- `num_train_epochs`: 12
- `lr_scheduler_type`: cosine
- `warmup_ratio`: 0.1
- `bf16`: True
- `tf32`: True
- `load_best_model_at_end`: True
- `optim`: adamw_torch_fused
- `batch_sampler`: no_duplicates
#### All Hyperparameters
<details><summary>Click to expand</summary>
- `overwrite_output_dir`: False
- `do_predict`: False
- `eval_strategy`: epoch
- `prediction_loss_only`: True
- `per_device_train_batch_size`: 2
- `per_device_eval_batch_size`: 8
- `per_gpu_train_batch_size`: None
- `per_gpu_eval_batch_size`: None
- `gradient_accumulation_steps`: 8
- `eval_accumulation_steps`: None
- `torch_empty_cache_steps`: None
- `learning_rate`: 2e-05
- `weight_decay`: 0.0
- `adam_beta1`: 0.9
- `adam_beta2`: 0.999
- `adam_epsilon`: 1e-08
- `max_grad_norm`: 1.0
- `num_train_epochs`: 12
- `max_steps`: -1
- `lr_scheduler_type`: cosine
- `lr_scheduler_kwargs`: {}
- `warmup_ratio`: 0.1
- `warmup_steps`: 0
- `log_level`: passive
- `log_level_replica`: warning
- `log_on_each_node`: True
- `logging_nan_inf_filter`: True
- `save_safetensors`: True
- `save_on_each_node`: False
- `save_only_model`: False
- `restore_callback_states_from_checkpoint`: False
- `no_cuda`: False
- `use_cpu`: False
- `use_mps_device`: False
- `seed`: 42
- `data_seed`: None
- `jit_mode_eval`: False
- `use_ipex`: False
- `bf16`: True
- `fp16`: False
- `fp16_opt_level`: O1
- `half_precision_backend`: auto
- `bf16_full_eval`: False
- `fp16_full_eval`: False
- `tf32`: True
- `local_rank`: 0
- `ddp_backend`: None
- `tpu_num_cores`: None
- `tpu_metrics_debug`: False
- `debug`: []
- `dataloader_drop_last`: False
- `dataloader_num_workers`: 0
- `dataloader_prefetch_factor`: None
- `past_index`: -1
- `disable_tqdm`: False
- `remove_unused_columns`: True
- `label_names`: None
- `load_best_model_at_end`: True
- `ignore_data_skip`: False
- `fsdp`: []
- `fsdp_min_num_params`: 0
- `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False}
- `tp_size`: 0
- `fsdp_transformer_layer_cls_to_wrap`: None
- `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None}
- `deepspeed`: None
- `label_smoothing_factor`: 0.0
- `optim`: adamw_torch_fused
- `optim_args`: None
- `adafactor`: False
- `group_by_length`: False
- `length_column_name`: length
- `ddp_find_unused_parameters`: None
- `ddp_bucket_cap_mb`: None
- `ddp_broadcast_buffers`: False
- `dataloader_pin_memory`: True
- `dataloader_persistent_workers`: False
- `skip_memory_metrics`: True
- `use_legacy_prediction_loop`: False
- `push_to_hub`: False
- `resume_from_checkpoint`: None
- `hub_model_id`: None
- `hub_strategy`: every_save
- `hub_private_repo`: None
- `hub_always_push`: False
- `gradient_checkpointing`: False
- `gradient_checkpointing_kwargs`: None
- `include_inputs_for_metrics`: False
- `include_for_metrics`: []
- `eval_do_concat_batches`: True
- `fp16_backend`: auto
- `push_to_hub_model_id`: None
- `push_to_hub_organization`: None
- `mp_parameters`:
- `auto_find_batch_size`: False
- `full_determinism`: False
- `torchdynamo`: None
- `ray_scope`: last
- `ddp_timeout`: 1800
- `torch_compile`: False
- `torch_compile_backend`: None
- `torch_compile_mode`: None
- `include_tokens_per_second`: False
- `include_num_input_tokens_seen`: False
- `neftune_noise_alpha`: None
- `optim_target_modules`: None
- `batch_eval_metrics`: False
- `eval_on_start`: False
- `use_liger_kernel`: False
- `eval_use_gather_object`: False
- `average_tokens_across_devices`: False
- `prompts`: None
- `batch_sampler`: no_duplicates
- `multi_dataset_batch_sampler`: proportional
- `router_mapping`: {}
- `learning_rate_mapping`: {}
</details>
### Training Logs
<details><summary>Click to expand</summary>
| Epoch | Step | Training Loss | dim_1024_cosine_ndcg@10 | dim_768_cosine_ndcg@10 | dim_512_cosine_ndcg@10 | dim_256_cosine_ndcg@10 | dim_128_cosine_ndcg@10 | dim_64_cosine_ndcg@10 |
|:----------:|:-------:|:-------------:|:-----------------------:|:----------------------:|:----------------------:|:----------------------:|:----------------------:|:---------------------:|
| -1 | -1 | - | 0.4214 | 0.4041 | 0.3894 | 0.3254 | 0.2396 | 0.1752 |
| 0.1013 | 10 | 20.5156 | - | - | - | - | - | - |
| 0.2025 | 20 | 19.5068 | - | - | - | - | - | - |
| 0.3038 | 30 | 17.3704 | - | - | - | - | - | - |
| 0.4051 | 40 | 17.1827 | - | - | - | - | - | - |
| 0.5063 | 50 | 16.6068 | - | - | - | - | - | - |
| 0.6076 | 60 | 16.4217 | - | - | - | - | - | - |
| 0.7089 | 70 | 15.5364 | - | - | - | - | - | - |
| 0.8101 | 80 | 13.3384 | - | - | - | - | - | - |
| 0.9114 | 90 | 15.6398 | - | - | - | - | - | - |
| 0.9924 | 98 | - | 0.4681 | 0.4793 | 0.4615 | 0.4166 | 0.3638 | 0.2744 |
| 1.0203 | 100 | 14.2832 | - | - | - | - | - | - |
| 1.1215 | 110 | 10.0518 | - | - | - | - | - | - |
| 1.2228 | 120 | 10.3808 | - | - | - | - | - | - |
| 1.3241 | 130 | 10.9265 | - | - | - | - | - | - |
| 1.4253 | 140 | 10.2787 | - | - | - | - | - | - |
| 1.5266 | 150 | 10.9999 | - | - | - | - | - | - |
| 1.6278 | 160 | 6.8139 | - | - | - | - | - | - |
| 1.7291 | 170 | 7.986 | - | - | - | - | - | - |
| 1.8304 | 180 | 9.2866 | - | - | - | - | - | - |
| 1.9316 | 190 | 9.2912 | - | - | - | - | - | - |
| 1.9924 | 196 | - | 0.4772 | 0.4612 | 0.4645 | 0.3945 | 0.3636 | 0.2986 |
| 2.0405 | 200 | 9.9778 | - | - | - | - | - | - |
| 2.1418 | 210 | 7.8425 | - | - | - | - | - | - |
| 2.2430 | 220 | 7.7307 | - | - | - | - | - | - |
| 2.3443 | 230 | 6.6603 | - | - | - | - | - | - |
| 2.4456 | 240 | 5.8628 | - | - | - | - | - | - |
| 2.5468 | 250 | 7.5488 | - | - | - | - | - | - |
| 2.6481 | 260 | 8.5646 | - | - | - | - | - | - |
| 2.7494 | 270 | 7.7542 | - | - | - | - | - | - |
| 2.8506 | 280 | 6.046 | - | - | - | - | - | - |
| 2.9519 | 290 | 4.2612 | - | - | - | - | - | - |
| 2.9924 | 294 | - | 0.4663 | 0.4403 | 0.4505 | 0.4067 | 0.3673 | 0.3267 |
| 3.0608 | 300 | 4.7943 | - | - | - | - | - | - |
| 3.1620 | 310 | 7.1236 | - | - | - | - | - | - |
| 3.2633 | 320 | 7.8359 | - | - | - | - | - | - |
| 3.3646 | 330 | 7.2883 | - | - | - | - | - | - |
| 3.4658 | 340 | 6.8383 | - | - | - | - | - | - |
| 3.5671 | 350 | 6.1145 | - | - | - | - | - | - |
| 3.6684 | 360 | 5.8697 | - | - | - | - | - | - |
| 3.7696 | 370 | 5.3551 | - | - | - | - | - | - |
| 3.8709 | 380 | 7.7562 | - | - | - | - | - | - |
| 3.9722 | 390 | 4.1286 | - | - | - | - | - | - |
| 3.9924 | 392 | - | 0.5004 | 0.4837 | 0.4654 | 0.4095 | 0.3771 | 0.3238 |
| 4.0810 | 400 | 6.6456 | - | - | - | - | - | - |
| 4.1823 | 410 | 7.8539 | - | - | - | - | - | - |
| 4.2835 | 420 | 5.2917 | - | - | - | - | - | - |
| 4.3848 | 430 | 5.5573 | - | - | - | - | - | - |
| 4.4861 | 440 | 6.957 | - | - | - | - | - | - |
| 4.5873 | 450 | 6.3068 | - | - | - | - | - | - |
| 4.6886 | 460 | 6.0006 | - | - | - | - | - | - |
| 4.7899 | 470 | 6.1419 | - | - | - | - | - | - |
| 4.8911 | 480 | 5.0808 | - | - | - | - | - | - |
| 4.9924 | 490 | 6.0219 | 0.4752 | 0.4754 | 0.4581 | 0.4243 | 0.3931 | 0.3410 |
| 5.1013 | 500 | 3.7305 | - | - | - | - | - | - |
| 5.2025 | 510 | 4.827 | - | - | - | - | - | - |
| 5.3038 | 520 | 3.1179 | - | - | - | - | - | - |
| 5.4051 | 530 | 6.141 | - | - | - | - | - | - |
| 5.5063 | 540 | 6.3686 | - | - | - | - | - | - |
| 5.6076 | 550 | 4.9029 | - | - | - | - | - | - |
| 5.7089 | 560 | 3.6987 | - | - | - | - | - | - |
| 5.8101 | 570 | 5.5046 | - | - | - | - | - | - |
| 5.9114 | 580 | 5.0166 | - | - | - | - | - | - |
| 5.9924 | 588 | - | 0.4737 | 0.4748 | 0.4567 | 0.4185 | 0.3890 | 0.3435 |
| 6.0203 | 590 | 3.9625 | - | - | - | - | - | - |
| 6.1215 | 600 | 6.7869 | - | - | - | - | - | - |
| 6.2228 | 610 | 3.6329 | - | - | - | - | - | - |
| 6.3241 | 620 | 6.2702 | - | - | - | - | - | - |
| 6.4253 | 630 | 3.3559 | - | - | - | - | - | - |
| 6.5266 | 640 | 4.0666 | - | - | - | - | - | - |
| 6.6278 | 650 | 3.5322 | - | - | - | - | - | - |
| 6.7291 | 660 | 4.8831 | - | - | - | - | - | - |
| 6.8304 | 670 | 6.6302 | - | - | - | - | - | - |
| 6.9316 | 680 | 5.7623 | - | - | - | - | - | - |
| 6.9924 | 686 | - | 0.4687 | 0.4713 | 0.4520 | 0.4194 | 0.3950 | 0.3338 |
| 7.0405 | 690 | 5.5453 | - | - | - | - | - | - |
| 7.1418 | 700 | 2.8097 | - | - | - | - | - | - |
| 7.2430 | 710 | 3.5171 | - | - | - | - | - | - |
| 7.3443 | 720 | 3.5449 | - | - | - | - | - | - |
| 7.4456 | 730 | 4.6169 | - | - | - | - | - | - |
| 7.5468 | 740 | 3.567 | - | - | - | - | - | - |
| 7.6481 | 750 | 5.7251 | - | - | - | - | - | - |
| 7.7494 | 760 | 3.7201 | - | - | - | - | - | - |
| 7.8506 | 770 | 3.1051 | - | - | - | - | - | - |
| 7.9519 | 780 | 3.9642 | - | - | - | - | - | - |
| **7.9924** | **784** | **-** | **0.4599** | **0.4717** | **0.4537** | **0.4262** | **0.4004** | **0.3306** |
| 8.0608 | 790 | 3.923 | - | - | - | - | - | - |
| 8.1620 | 800 | 3.52 | - | - | - | - | - | - |
| 8.2633 | 810 | 3.1567 | - | - | - | - | - | - |
| 8.3646 | 820 | 6.1725 | - | - | - | - | - | - |
| 8.4658 | 830 | 3.259 | - | - | - | - | - | - |
| 8.5671 | 840 | 6.6232 | - | - | - | - | - | - |
| 8.6684 | 850 | 3.7085 | - | - | - | - | - | - |
| 8.7696 | 860 | 4.0311 | - | - | - | - | - | - |
| 8.8709 | 870 | 7.2503 | - | - | - | - | - | - |
| 8.9722 | 880 | 2.2984 | - | - | - | - | - | - |
| 8.9924 | 882 | - | 0.4632 | 0.4752 | 0.4550 | 0.4247 | 0.3953 | 0.3281 |
| 9.0810 | 890 | 4.519 | - | - | - | - | - | - |
| 9.1823 | 900 | 2.99 | - | - | - | - | - | - |
| 9.2835 | 910 | 5.3026 | - | - | - | - | - | - |
| 9.3848 | 920 | 3.8492 | - | - | - | - | - | - |
| 9.4861 | 930 | 1.9454 | - | - | - | - | - | - |
| 9.5873 | 940 | 3.538 | - | - | - | - | - | - |
| 9.6886 | 950 | 4.1874 | - | - | - | - | - | - |
| 9.7899 | 960 | 4.2356 | - | - | - | - | - | - |
| 9.8911 | 970 | 4.5356 | - | - | - | - | - | - |
| 9.9924 | 980 | 4.0243 | 0.4665 | 0.4681 | 0.4507 | 0.4236 | 0.3937 | 0.3288 |
| -1 | -1 | - | 0.4599 | 0.4717 | 0.4537 | 0.4262 | 0.4004 | 0.3306 |
* The bold row denotes the saved checkpoint.
</details>
### Framework Versions
- Python: 3.12.11
- Sentence Transformers: 5.1.0
- Transformers: 4.51.3
- PyTorch: 2.8.0+cu126
- Accelerate: 1.10.1
- Datasets: 4.0.0
- Tokenizers: 0.21.4
## Citation
### BibTeX
#### Sentence Transformers
```bibtex
@inproceedings{reimers-2019-sentence-bert,
title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks",
author = "Reimers, Nils and Gurevych, Iryna",
booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing",
month = "11",
year = "2019",
publisher = "Association for Computational Linguistics",
url = "https://arxiv.org/abs/1908.10084",
}
```
#### MatryoshkaLoss
```bibtex
@misc{kusupati2024matryoshka,
title={Matryoshka Representation Learning},
author={Aditya Kusupati and Gantavya Bhatt and Aniket Rege and Matthew Wallingford and Aditya Sinha and Vivek Ramanujan and William Howard-Snyder and Kaifeng Chen and Sham Kakade and Prateek Jain and Ali Farhadi},
year={2024},
eprint={2205.13147},
archivePrefix={arXiv},
primaryClass={cs.LG}
}
```
#### MultipleNegativesRankingLoss
```bibtex
@misc{henderson2017efficient,
title={Efficient Natural Language Response Suggestion for Smart Reply},
author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil},
year={2017},
eprint={1705.00652},
archivePrefix={arXiv},
primaryClass={cs.CL}
}
```
<!--
## Glossary
*Clearly define terms in order to be accessible across audiences.*
-->
<!--
## Model Card Authors
*Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.*
-->
<!--
## Model Card Contact
*Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.*
--> |