|
|
--- |
|
|
language: |
|
|
- en |
|
|
license: apache-2.0 |
|
|
tags: |
|
|
- sentence-transformers |
|
|
- sentence-similarity |
|
|
- feature-extraction |
|
|
- dense |
|
|
- generated_from_trainer |
|
|
- dataset_size:1580 |
|
|
- loss:MatryoshkaLoss |
|
|
- loss:MultipleNegativesRankingLoss |
|
|
base_model: intfloat/multilingual-e5-large |
|
|
widget: |
|
|
- source_sentence: When should supervisory authorities monitor the application of |
|
|
the provisions? |
|
|
sentences: |
|
|
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\ |
|
|
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Partially\ |
|
|
\ accepts the lawsuit. \n**Facts:** The plaintiff, who works as a lawyer, maintains\ |
|
|
\ a savings account with the defendant banking corporation under account number\ |
|
|
\ GR.............. Pursuant to a contract dated June 11, 2010, established in\ |
|
|
\ Thessaloniki between the defendant and the plaintiff, the plaintiff was granted\ |
|
|
\ access to the electronic banking system (e-banking) to conduct banking transactions\ |
|
|
\ remotely. On October 10, 2020, the plaintiff fell victim to electronic fraud\ |
|
|
\ through the \"phishing\" method, whereby an unknown perpetrator managed to extract\ |
|
|
\ and transfer €3,000.00 from the plaintiff’s account to another account of the\ |
|
|
\ same bank. Specifically, on that day at 6:51 a.m., the plaintiff received an\ |
|
|
\ email from the sender \".........\", with the address ..........., informing\ |
|
|
\ him that his debit card had been suspended and that online payments and cash\ |
|
|
\ withdrawals could not be made until the issue was resolved. The email urged\ |
|
|
\ him to confirm his details within the next 72 hours by following a link titled\ |
|
|
\ \"card activation.\" \nThe plaintiff read the above email on his mobile phone\ |
|
|
\ around 8:00 a.m., and believing it came from the defendant, he followed the\ |
|
|
\ instructions and accessed a website that was identical (a clone) to that of\ |
|
|
\ the defendant. On this page, he was asked to enter his login credentials to\ |
|
|
\ connect to the service, which he did, and he was subsequently asked to input\ |
|
|
\ his debit card details for the alleged activation, which he also provided. Then,\ |
|
|
\ to complete the process, a number was sent to his mobile phone at 8:07 a.m.\ |
|
|
\ from the sender ........, which he entered, and two minutes later he received\ |
|
|
\ a message from the same sender in English stating that the quick access code\ |
|
|
\ had been activated on his mobile. A few minutes later, at 8:18 a.m., he received\ |
|
|
\ an email from the defendant informing him of the transfer of €3,000.00 from\ |
|
|
\ his account to account number GR ........... held at the same bank, with the\ |
|
|
\ beneficiary's details being .......... As soon as the plaintiff read this, he\ |
|
|
\ immediately called the defendant's call center and canceled his debit card,\ |
|
|
\ the access codes for the service ......., and locked the application ..........\ |
|
|
\ At the same time, he verbally submitted a request to dispute and cancel the\ |
|
|
\ contested transaction, and in a subsequent phone call, he also canceled his\ |
|
|
\ credit card. On the same day, he also sent an email to the defendant informing\ |
|
|
\ them in writing of the above and requesting the cancellation of the transaction\ |
|
|
\ and the return of the amount of €3,000.00 to his account, as this transfer was\ |
|
|
\ not made by him but by an unknown perpetrator through electronic fraud and was\ |
|
|
\ not approved by him. It should also be noted that the plaintiff, as the sole\ |
|
|
\ beneficiary according to the aforementioned contract for using the defendant's\ |
|
|
\ Internet Banking service, never received any update via SMS or the VIBER application\ |
|
|
\ from the bank regarding the transaction details before its completion, nor did\ |
|
|
\ he receive a one-time code (OTP) to approve the contested transaction. He subsequently\ |
|
|
\ filed a complaint against unknown persons at the Cyber Crime Division for the\ |
|
|
\ crime of fraud. The defendant sent an email to the plaintiff on October 16,\ |
|
|
\ 2020, informing him that his request had been forwarded to the appropriate department\ |
|
|
\ of the bank for investigation, stating that the bank would never send him an\ |
|
|
\ email or SMS asking him to enter his personal data and that as of October 7,\ |
|
|
\ 2020, there was a notice posted for its customers regarding malicious attempts\ |
|
|
\ to steal personal data in the \"Our News\" section on ....... A month after\ |
|
|
\ the disputed incident, on November 10, 2020, an amount of €2,296.82 was transferred\ |
|
|
\ to the plaintiff's account from the account to which the fraudulent credit had\ |
|
|
\ been made. The plaintiff immediately sent an email to the defendant asking to\ |
|
|
\ be informed whether this transfer was a return of part of the amount that had\ |
|
|
\ been illegally withdrawn from his account and requested the return of the remaining\ |
|
|
\ amount of €703.18. In its response dated January 13, 2021, the defendant confirmed\ |
|
|
\ that the aforementioned amount indeed came from the account to which the fraudulent\ |
|
|
\ credit had been made, following a freeze of that account initiated by the defendant\ |
|
|
\ during the investigation of the incident, but refused to return the remaining\ |
|
|
\ amount, claiming it bore no responsibility for the leak of the personal codes\ |
|
|
\ to third parties, according to the terms of the service contract established\ |
|
|
\ between them. \nFrom the entirety of the evidence presented to the court, there\ |
|
|
\ is no indication of the authenticity of the contested transaction, as the plaintiff\ |
|
|
\ did not give his consent for the execution of the transfer of the amount of\ |
|
|
\ €3,000.00, especially in light of the provision in Article 72 paragraph 2 of\ |
|
|
\ Law 4537/2018 stating that the mere use of the Internet Banking service by the\ |
|
|
\ plaintiff does not necessarily constitute sufficient evidence that the payer\ |
|
|
\ approved the payment action. Specifically, it was proven that the contested\ |
|
|
\ transaction was not carried out following a strong identification of the plaintiff\ |
|
|
\ – the sole beneficiary of the account – and his approval, as the latter may\ |
|
|
\ have entered his personal codes on the counterfeit website; however, he was\ |
|
|
\ never informed, before the completion of the contested transaction, of the amount\ |
|
|
\ that would be transferred from his account to a third-party account, nor did\ |
|
|
\ he receive on his mobile phone, either via SMS or through the VIBER application\ |
|
|
\ or any other means, the one-time code - extra PIN for its completion, which\ |
|
|
\ he was required to enter to approve the contested transaction (payment action)\ |
|
|
\ and thus complete his identification, a fact that was not countered by any evidence\ |
|
|
\ from the defendant. Furthermore, it is noted that the defendant's claims that\ |
|
|
\ it bears no responsibility under the terms of the banking services contract,\ |
|
|
\ whereby it is not liable for any damage to its customer in cases of unauthorized\ |
|
|
\ use of their personal access codes to the Internet Banking service, are to be\ |
|
|
\ rejected as fundamentally unfounded. This is because the aforementioned contractual\ |
|
|
\ terms are invalid according to the provision of Article 103 of Law 4537/2018,\ |
|
|
\ as they contradict the provisions of Articles 71, 73, and 92 of the same Law,\ |
|
|
\ which provide for the provider's universal liability and its exemption only\ |
|
|
\ for unusual and unforeseen circumstances that are beyond the control of the\ |
|
|
\ party invoking them and whose consequences could not have been avoided despite\ |
|
|
\ all efforts to the contrary; these provisions establish mandatory law in favor\ |
|
|
\ of users, as according to Article 103 of Law 4537/2018, payment service providers\ |
|
|
\ are prohibited from deviating from the provisions to the detriment of payment\ |
|
|
\ service users, unless the possibility of deviation is explicitly provided and\ |
|
|
\ they can decide to offer only more favorable terms to payment service users;\ |
|
|
\ the aforementioned contractual terms do not constitute more favorable terms\ |
|
|
\ but rather disadvantageous terms for the payment service user. In this case,\ |
|
|
\ however, the defendant did not prove the authenticity of the transaction and\ |
|
|
\ its approval by the plaintiff and did not invoke, nor did any unusual and unforeseen\ |
|
|
\ circumstances beyond its control, the consequences of which could not have been\ |
|
|
\ avoided despite all efforts to the contrary, come to light. Therefore, the contested\ |
|
|
\ transaction transferring the amount of €3,000.00 is considered, in the absence\ |
|
|
\ of demonstrable consent from the plaintiff, unapproved according to the provisions\ |
|
|
\ of Article 64 of Law 4537/2018, and the defendant's contrary claims are rejected,\ |
|
|
\ especially since the plaintiff proceeded, according to Article 71 paragraph\ |
|
|
\ 1 of Law 4537/2018, without undue delay to notify the defendant regarding the\ |
|
|
\ contested unapproved payment action. Consequently, the defendant is liable for\ |
|
|
\ compensating the plaintiff for the positive damage he suffered under Article\ |
|
|
\ 73 of Law 4537/2018 and is obliged to pay him the requested amount of €703.18,\ |
|
|
\ while the plaintiff’s fault in the occurrence of this damage cannot be established,\ |
|
|
\ as he entered his personal details in an online environment that was a faithful\ |
|
|
\ imitation of that of the defendant, as evidenced by the comparison of the screenshots\ |
|
|
\ of the fake website and the real website provided by the plaintiff, a fact that\ |
|
|
\ he could not have known while being fully convinced that he was transacting\ |
|
|
\ with the defendant. Furthermore, the defendant’s liability to compensate the\ |
|
|
\ plaintiff is based on the provision of Article 8 of Law 2251/1994, which applies\ |
|
|
\ in this case, as the plaintiff's damage resulted from inadequate fulfillment\ |
|
|
\ of its obligations in the context of providing its services, but also on the\ |
|
|
\ provision of Article 914 of the Civil Code in the sense of omission on its part\ |
|
|
\ of unlawfully and culpably imposed actions. In this case, given that during\ |
|
|
\ the relevant period there had been a multitude of similar incidents of fraud\ |
|
|
\ against the defendant's customers, the latter, as a service provider to the\ |
|
|
\ consumer public and bearing transactional obligations of care and security towards\ |
|
|
\ them, displayed gross negligence regarding the security provided for electronic\ |
|
|
\ transaction services, which was compromised by the fraudulent theft of funds,\ |
|
|
\ as it did not comply with all required high-security measures for executing\ |
|
|
\ the contested transaction, failing to implement the strict customer identification\ |
|
|
\ verification process and to check the authenticity of the account to which the\ |
|
|
\ funds were sent, thus not assuming the suspicious nature of the transaction,\ |
|
|
\ did not adopt comprehensive and improved protective measures to fully protect\ |
|
|
\ its customers against malicious attacks and online fraud and to prevent the\ |
|
|
\ infiltration of unauthorized third parties, nor did it fulfill its obligations\ |
|
|
\ to inform, accurately inform, and warn its consumers - customers, as it failed\ |
|
|
\ to adequately inform them of attempts to steal their personal data through the\ |
|
|
\ sending of informative emails or SMS, while merely posting in a section rather\ |
|
|
\ than on a central banner (as it later did) does not constitute adequate information\ |
|
|
\ such that it meets the requirement of protecting its customers and the increased\ |
|
|
\ safeguarding of their interests. Although the plaintiff acted promptly and informed\ |
|
|
\ the defendant on the same day about the contested incident, the defendant did\ |
|
|
\ not act as promptly regarding the investigation of the incident and the freezing\ |
|
|
\ of the account that held the fraudulent credit to prevent the plaintiff's loss,\ |
|
|
\ but only returned part of the funds to the plaintiff a month later. This behavior,\ |
|
|
\ beyond being culpable due to gross negligence, was also unlawful, as it would\ |
|
|
\ have been illegal even without the contractual relationship, as contrary to\ |
|
|
\ the provisions of Law 4537/2018 and Law 2251/1994, regarding the lack of security\ |
|
|
\ of the services that the consumer is legitimately entitled to expect, as well\ |
|
|
\ as the building of trust that is essential in banking transactions, elements\ |
|
|
\ that it was obligated to provide within the sphere of the services offered,\ |
|
|
\ and contrary to the principles of good faith and commercial ethics, as crystallized\ |
|
|
\ in the provision of Article 288 of the Civil Code, as well as the general duty\ |
|
|
\ imposed by Article 914 of the Civil Code not to cause harm to another culpably.\ |
|
|
\ This resulted not only in positive damage to the plaintiff but also in causing\ |
|
|
\ him moral harm consisting of his mental distress and the disruption, agitation,\ |
|
|
\ and sorrow he experienced, for which he must be awarded financial compensation.\ |
|
|
\ Taking into account all the general circumstances of the case, the extent of\ |
|
|
\ the plaintiff's damage, the severity of the defendant's fault, the mental distress\ |
|
|
\ suffered by the plaintiff, the insecurity he felt regarding his deposits, the\ |
|
|
\ sorrow he experienced, and the stress caused by his financial loss, which occurred\ |
|
|
\ during the pandemic period when his earnings from his professional activity\ |
|
|
\ had significantly decreased, as well as the financial and social situation of\ |
|
|
\ the parties, it is the court's opinion that he should be granted, as financial\ |
|
|
\ compensation for his moral harm, an amount of €250.00, which is deemed reasonable\ |
|
|
\ and fair. Therefore, the total monetary amount that the plaintiff is entitled\ |
|
|
\ to for his positive damage and financial compensation for the moral harm suffered\ |
|
|
\ amounts to a total of (€703.18 + €250.00) = €953.18." |
|
|
- "Court (Civil/Criminal): Criminal \nProvisions: Article 42 paragraphs 1, 2, 3,\ |
|
|
\ and 7 of Law 4557/2018 \nTime of commission of the act: \nOutcome (not guilty,\ |
|
|
\ guilty): \nReasoning: Obligation of the payment service provider, such as banks,\ |
|
|
\ to inform their contracting customer after receiving a relevant order for a\ |
|
|
\ payment to be made on their behalf. Content of the above notification at the\ |
|
|
\ stage of receiving the payment order and during its execution. Terms of liability\ |
|
|
\ for the provider regarding compensation for non-execution, erroneous, or delayed\ |
|
|
\ execution of payment transactions. In particular, in the case of an unauthorized\ |
|
|
\ or erroneous payment, the user is required to notify the provider within a specified\ |
|
|
\ timeframe as soon as they become aware of the corresponding transaction. The\ |
|
|
\ provisions of Law 4357/2018 establish mandatory legal regulations in favor of\ |
|
|
\ users of payment services and cannot be contractually modified to their detriment,\ |
|
|
\ but only to their benefit. Defenses available to payment service providers to\ |
|
|
\ relieve them of liability. Burden of proof distribution between the parties.\ |
|
|
\ This responsibility of banks may also stem from Law 2251/1994, as they provide\ |
|
|
\ services to the public and are considered suppliers. Conditions for supplier\ |
|
|
\ liability under the aforementioned legislation. Distribution of the burden of\ |
|
|
\ proof between the litigants to demonstrate liability for compensation under\ |
|
|
\ Law 2251/1994. Terms of concurrency between contractual and tort liability for\ |
|
|
\ compensation. The court partially accepts the lawsuit. \nFacts: On 01/09/2021,\ |
|
|
\ an unknown perpetrator sent an email to her from the electronic address “...............”,\ |
|
|
\ in which they stated that for security reasons she needed to confirm her account\ |
|
|
\ with the bank ....... Not realizing that it was a scam, she followed the attached\ |
|
|
\ hyperlink, entered her personal information, resulting in an unknown perpetrator\ |
|
|
\ intercepting her online banking credentials and making a transfer totaling 7,000.00\ |
|
|
\ euros to account number ................ of the bank ......... \nC) The beneficiary\ |
|
|
\ of the aforementioned account is ......... born on 16/05/1995 in the Municipality\ |
|
|
\ of ........., residing at .............., with ID number ....................\ |
|
|
\ issued on 02/10/2009 by T.A .............. and tax number ............. from\ |
|
|
\ the tax office ................... \nD) The criminal proceeds reportedly arising\ |
|
|
\ from the above criminal activity amount to a total of seven thousand euros (7,000.00€).\ |
|
|
\ Following the above, serious suspicions arise that the aforementioned criminal\ |
|
|
\ proceeds transferred to the aforementioned bank account were unlawfully appropriated\ |
|
|
\ by her and subsequently mixed with other legally held assets, which she used\ |
|
|
\ in her overall economic activities, aiming to launder them, thus concealing\ |
|
|
\ their true origin and making it impossible for them to be seized. Therefore,\ |
|
|
\ there are reasonable suspicions that the aforementioned individual committed\ |
|
|
\ not only the primary offense but also the criminal act of “Money Laundering”\ |
|
|
\ (Article 2 §1 a, d of Law 4557/2018, in conjunction with Article 4 subparagraph\ |
|
|
\ z of the same law as it stands, as well as Article 39 paragraph 1 subparagraphs\ |
|
|
\ a & c of the same Law 4557/2018). Because there are serious suspicions that\ |
|
|
\ the bank account numbered .......... maintained at the bank .....................,\ |
|
|
\ whose beneficiary is ..... (Tax ID ....................), contains part of the\ |
|
|
\ monetary amount from the aforementioned criminal activity that was placed behind\ |
|
|
\ banking secrecy to conceal its true origin and ultimately to launder it. Because,\ |
|
|
\ in this case, part of the criminal proceeds has been found while the remainder\ |
|
|
\ has not been found in its entirety, there is a lawful reason and an urgent case\ |
|
|
\ for prohibiting the sale or any other transfer of the following assets, given\ |
|
|
\ that they are subject to seizure and forfeiture according to Articles 40 and\ |
|
|
\ 42 of Law 4557/2018 as they currently stand." |
|
|
- The supervisory authorities should monitor the application of the provisions pursuant |
|
|
to this Regulation and contribute to its consistent application throughout the |
|
|
Union, in order to protect natural persons in relation to the processing of their |
|
|
personal data and to facilitate the free flow of personal data within the internal |
|
|
market. For that purpose, the supervisory authorities should cooperate with each |
|
|
other and with the Commission, without the need for any agreement between Member |
|
|
States on the provision of mutual assistance or on such cooperation. |
|
|
- source_sentence: When can a data subject seek an effective judicial remedy? |
|
|
sentences: |
|
|
- '1.Without prejudice to any available administrative or non-judicial remedy, including |
|
|
the right to lodge a complaint with a supervisory authority pursuant to Article |
|
|
77, each data subject shall have the right to an effective judicial remedy where |
|
|
he or she considers that his or her rights under this Regulation have been infringed |
|
|
as a result of the processing of his or her personal data in non-compliance with |
|
|
this Regulation. |
|
|
|
|
|
2.Proceedings against a controller or a processor shall be brought before the |
|
|
courts of the Member State where the controller or processor has an establishment. |
|
|
Alternatively, such proceedings may be brought before the courts of the Member |
|
|
State where the data subject has his or her habitual residence, unless the controller |
|
|
or processor is a public authority of a Member State acting in the exercise of |
|
|
its public powers. 4.5.2016 L 119/80 (1) Regulation (EC) No 1049/2001 of the |
|
|
European Parliament and of the Council of 30 May 2001 regarding public access |
|
|
to European Parliament, Council and Commission documents (OJ L 145, 31.5.2001, |
|
|
p. 43).' |
|
|
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\ |
|
|
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Partially\ |
|
|
\ accepts the lawsuit. \n**Facts:** The plaintiff, who works as a lawyer, maintains\ |
|
|
\ a savings account with the defendant banking corporation under account number\ |
|
|
\ GR.............. Pursuant to a contract dated June 11, 2010, established in\ |
|
|
\ Thessaloniki between the defendant and the plaintiff, the plaintiff was granted\ |
|
|
\ access to the electronic banking system (e-banking) to conduct banking transactions\ |
|
|
\ remotely. On October 10, 2020, the plaintiff fell victim to electronic fraud\ |
|
|
\ through the \"phishing\" method, whereby an unknown perpetrator managed to extract\ |
|
|
\ and transfer €3,000.00 from the plaintiff’s account to another account of the\ |
|
|
\ same bank. Specifically, on that day at 6:51 a.m., the plaintiff received an\ |
|
|
\ email from the sender \".........\", with the address ..........., informing\ |
|
|
\ him that his debit card had been suspended and that online payments and cash\ |
|
|
\ withdrawals could not be made until the issue was resolved. The email urged\ |
|
|
\ him to confirm his details within the next 72 hours by following a link titled\ |
|
|
\ \"card activation.\" \nThe plaintiff read the above email on his mobile phone\ |
|
|
\ around 8:00 a.m., and believing it came from the defendant, he followed the\ |
|
|
\ instructions and accessed a website that was identical (a clone) to that of\ |
|
|
\ the defendant. On this page, he was asked to enter his login credentials to\ |
|
|
\ connect to the service, which he did, and he was subsequently asked to input\ |
|
|
\ his debit card details for the alleged activation, which he also provided. Then,\ |
|
|
\ to complete the process, a number was sent to his mobile phone at 8:07 a.m.\ |
|
|
\ from the sender ........, which he entered, and two minutes later he received\ |
|
|
\ a message from the same sender in English stating that the quick access code\ |
|
|
\ had been activated on his mobile. A few minutes later, at 8:18 a.m., he received\ |
|
|
\ an email from the defendant informing him of the transfer of €3,000.00 from\ |
|
|
\ his account to account number GR ........... held at the same bank, with the\ |
|
|
\ beneficiary's details being .......... As soon as the plaintiff read this, he\ |
|
|
\ immediately called the defendant's call center and canceled his debit card,\ |
|
|
\ the access codes for the service ......., and locked the application ..........\ |
|
|
\ At the same time, he verbally submitted a request to dispute and cancel the\ |
|
|
\ contested transaction, and in a subsequent phone call, he also canceled his\ |
|
|
\ credit card. On the same day, he also sent an email to the defendant informing\ |
|
|
\ them in writing of the above and requesting the cancellation of the transaction\ |
|
|
\ and the return of the amount of €3,000.00 to his account, as this transfer was\ |
|
|
\ not made by him but by an unknown perpetrator through electronic fraud and was\ |
|
|
\ not approved by him. It should also be noted that the plaintiff, as the sole\ |
|
|
\ beneficiary according to the aforementioned contract for using the defendant's\ |
|
|
\ Internet Banking service, never received any update via SMS or the VIBER application\ |
|
|
\ from the bank regarding the transaction details before its completion, nor did\ |
|
|
\ he receive a one-time code (OTP) to approve the contested transaction. He subsequently\ |
|
|
\ filed a complaint against unknown persons at the Cyber Crime Division for the\ |
|
|
\ crime of fraud. The defendant sent an email to the plaintiff on October 16,\ |
|
|
\ 2020, informing him that his request had been forwarded to the appropriate department\ |
|
|
\ of the bank for investigation, stating that the bank would never send him an\ |
|
|
\ email or SMS asking him to enter his personal data and that as of October 7,\ |
|
|
\ 2020, there was a notice posted for its customers regarding malicious attempts\ |
|
|
\ to steal personal data in the \"Our News\" section on ....... A month after\ |
|
|
\ the disputed incident, on November 10, 2020, an amount of €2,296.82 was transferred\ |
|
|
\ to the plaintiff's account from the account to which the fraudulent credit had\ |
|
|
\ been made. The plaintiff immediately sent an email to the defendant asking to\ |
|
|
\ be informed whether this transfer was a return of part of the amount that had\ |
|
|
\ been illegally withdrawn from his account and requested the return of the remaining\ |
|
|
\ amount of €703.18. In its response dated January 13, 2021, the defendant confirmed\ |
|
|
\ that the aforementioned amount indeed came from the account to which the fraudulent\ |
|
|
\ credit had been made, following a freeze of that account initiated by the defendant\ |
|
|
\ during the investigation of the incident, but refused to return the remaining\ |
|
|
\ amount, claiming it bore no responsibility for the leak of the personal codes\ |
|
|
\ to third parties, according to the terms of the service contract established\ |
|
|
\ between them. \nFrom the entirety of the evidence presented to the court, there\ |
|
|
\ is no indication of the authenticity of the contested transaction, as the plaintiff\ |
|
|
\ did not give his consent for the execution of the transfer of the amount of\ |
|
|
\ €3,000.00, especially in light of the provision in Article 72 paragraph 2 of\ |
|
|
\ Law 4537/2018 stating that the mere use of the Internet Banking service by the\ |
|
|
\ plaintiff does not necessarily constitute sufficient evidence that the payer\ |
|
|
\ approved the payment action. Specifically, it was proven that the contested\ |
|
|
\ transaction was not carried out following a strong identification of the plaintiff\ |
|
|
\ – the sole beneficiary of the account – and his approval, as the latter may\ |
|
|
\ have entered his personal codes on the counterfeit website; however, he was\ |
|
|
\ never informed, before the completion of the contested transaction, of the amount\ |
|
|
\ that would be transferred from his account to a third-party account, nor did\ |
|
|
\ he receive on his mobile phone, either via SMS or through the VIBER application\ |
|
|
\ or any other means, the one-time code - extra PIN for its completion, which\ |
|
|
\ he was required to enter to approve the contested transaction (payment action)\ |
|
|
\ and thus complete his identification, a fact that was not countered by any evidence\ |
|
|
\ from the defendant. Furthermore, it is noted that the defendant's claims that\ |
|
|
\ it bears no responsibility under the terms of the banking services contract,\ |
|
|
\ whereby it is not liable for any damage to its customer in cases of unauthorized\ |
|
|
\ use of their personal access codes to the Internet Banking service, are to be\ |
|
|
\ rejected as fundamentally unfounded. This is because the aforementioned contractual\ |
|
|
\ terms are invalid according to the provision of Article 103 of Law 4537/2018,\ |
|
|
\ as they contradict the provisions of Articles 71, 73, and 92 of the same Law,\ |
|
|
\ which provide for the provider's universal liability and its exemption only\ |
|
|
\ for unusual and unforeseen circumstances that are beyond the control of the\ |
|
|
\ party invoking them and whose consequences could not have been avoided despite\ |
|
|
\ all efforts to the contrary; these provisions establish mandatory law in favor\ |
|
|
\ of users, as according to Article 103 of Law 4537/2018, payment service providers\ |
|
|
\ are prohibited from deviating from the provisions to the detriment of payment\ |
|
|
\ service users, unless the possibility of deviation is explicitly provided and\ |
|
|
\ they can decide to offer only more favorable terms to payment service users;\ |
|
|
\ the aforementioned contractual terms do not constitute more favorable terms\ |
|
|
\ but rather disadvantageous terms for the payment service user. In this case,\ |
|
|
\ however, the defendant did not prove the authenticity of the transaction and\ |
|
|
\ its approval by the plaintiff and did not invoke, nor did any unusual and unforeseen\ |
|
|
\ circumstances beyond its control, the consequences of which could not have been\ |
|
|
\ avoided despite all efforts to the contrary, come to light. Therefore, the contested\ |
|
|
\ transaction transferring the amount of €3,000.00 is considered, in the absence\ |
|
|
\ of demonstrable consent from the plaintiff, unapproved according to the provisions\ |
|
|
\ of Article 64 of Law 4537/2018, and the defendant's contrary claims are rejected,\ |
|
|
\ especially since the plaintiff proceeded, according to Article 71 paragraph\ |
|
|
\ 1 of Law 4537/2018, without undue delay to notify the defendant regarding the\ |
|
|
\ contested unapproved payment action. Consequently, the defendant is liable for\ |
|
|
\ compensating the plaintiff for the positive damage he suffered under Article\ |
|
|
\ 73 of Law 4537/2018 and is obliged to pay him the requested amount of €703.18,\ |
|
|
\ while the plaintiff’s fault in the occurrence of this damage cannot be established,\ |
|
|
\ as he entered his personal details in an online environment that was a faithful\ |
|
|
\ imitation of that of the defendant, as evidenced by the comparison of the screenshots\ |
|
|
\ of the fake website and the real website provided by the plaintiff, a fact that\ |
|
|
\ he could not have known while being fully convinced that he was transacting\ |
|
|
\ with the defendant. Furthermore, the defendant’s liability to compensate the\ |
|
|
\ plaintiff is based on the provision of Article 8 of Law 2251/1994, which applies\ |
|
|
\ in this case, as the plaintiff's damage resulted from inadequate fulfillment\ |
|
|
\ of its obligations in the context of providing its services, but also on the\ |
|
|
\ provision of Article 914 of the Civil Code in the sense of omission on its part\ |
|
|
\ of unlawfully and culpably imposed actions. In this case, given that during\ |
|
|
\ the relevant period there had been a multitude of similar incidents of fraud\ |
|
|
\ against the defendant's customers, the latter, as a service provider to the\ |
|
|
\ consumer public and bearing transactional obligations of care and security towards\ |
|
|
\ them, displayed gross negligence regarding the security provided for electronic\ |
|
|
\ transaction services, which was compromised by the fraudulent theft of funds,\ |
|
|
\ as it did not comply with all required high-security measures for executing\ |
|
|
\ the contested transaction, failing to implement the strict customer identification\ |
|
|
\ verification process and to check the authenticity of the account to which the\ |
|
|
\ funds were sent, thus not assuming the suspicious nature of the transaction,\ |
|
|
\ did not adopt comprehensive and improved protective measures to fully protect\ |
|
|
\ its customers against malicious attacks and online fraud and to prevent the\ |
|
|
\ infiltration of unauthorized third parties, nor did it fulfill its obligations\ |
|
|
\ to inform, accurately inform, and warn its consumers - customers, as it failed\ |
|
|
\ to adequately inform them of attempts to steal their personal data through the\ |
|
|
\ sending of informative emails or SMS, while merely posting in a section rather\ |
|
|
\ than on a central banner (as it later did) does not constitute adequate information\ |
|
|
\ such that it meets the requirement of protecting its customers and the increased\ |
|
|
\ safeguarding of their interests. Although the plaintiff acted promptly and informed\ |
|
|
\ the defendant on the same day about the contested incident, the defendant did\ |
|
|
\ not act as promptly regarding the investigation of the incident and the freezing\ |
|
|
\ of the account that held the fraudulent credit to prevent the plaintiff's loss,\ |
|
|
\ but only returned part of the funds to the plaintiff a month later. This behavior,\ |
|
|
\ beyond being culpable due to gross negligence, was also unlawful, as it would\ |
|
|
\ have been illegal even without the contractual relationship, as contrary to\ |
|
|
\ the provisions of Law 4537/2018 and Law 2251/1994, regarding the lack of security\ |
|
|
\ of the services that the consumer is legitimately entitled to expect, as well\ |
|
|
\ as the building of trust that is essential in banking transactions, elements\ |
|
|
\ that it was obligated to provide within the sphere of the services offered,\ |
|
|
\ and contrary to the principles of good faith and commercial ethics, as crystallized\ |
|
|
\ in the provision of Article 288 of the Civil Code, as well as the general duty\ |
|
|
\ imposed by Article 914 of the Civil Code not to cause harm to another culpably.\ |
|
|
\ This resulted not only in positive damage to the plaintiff but also in causing\ |
|
|
\ him moral harm consisting of his mental distress and the disruption, agitation,\ |
|
|
\ and sorrow he experienced, for which he must be awarded financial compensation.\ |
|
|
\ Taking into account all the general circumstances of the case, the extent of\ |
|
|
\ the plaintiff's damage, the severity of the defendant's fault, the mental distress\ |
|
|
\ suffered by the plaintiff, the insecurity he felt regarding his deposits, the\ |
|
|
\ sorrow he experienced, and the stress caused by his financial loss, which occurred\ |
|
|
\ during the pandemic period when his earnings from his professional activity\ |
|
|
\ had significantly decreased, as well as the financial and social situation of\ |
|
|
\ the parties, it is the court's opinion that he should be granted, as financial\ |
|
|
\ compensation for his moral harm, an amount of €250.00, which is deemed reasonable\ |
|
|
\ and fair. Therefore, the total monetary amount that the plaintiff is entitled\ |
|
|
\ to for his positive damage and financial compensation for the moral harm suffered\ |
|
|
\ amounts to a total of (€703.18 + €250.00) = €953.18." |
|
|
- 'Whoever, without authorization, copies, uses, discloses to another person, or |
|
|
in any way violates data of a computer or a computer program, which belong to |
|
|
the realm of state secrets, private secrets, business secrets, trade secrets, |
|
|
or privacy, shall be punished by imprisonment from three months to five years. |
|
|
Private computer data or programs should be considered all the data and programs |
|
|
that the legal holder keeps secret with justified interest, especially if the |
|
|
owner had taken security measures. |
|
|
|
|
|
If the offender is in the service of the legal holder of the data, or the secret |
|
|
computer data and programs have a great economic value, the act shall be punished |
|
|
by imprisonment from one year to five years. |
|
|
|
|
|
If the secret computer data and programs belong to the realm of military or diplomatic |
|
|
secrets, or of the security of the state, the act shall be punished according |
|
|
to Articles 146–147. |
|
|
|
|
|
The offences of paragraphs 1–2 are prosecuted only upon complaint. |
|
|
|
|
|
' |
|
|
- source_sentence: What triggers the need for a review of processing operations? |
|
|
sentences: |
|
|
- The data subject should have the right not to be subject to a decision, which |
|
|
may include a measure, evaluating personal aspects relating to him or her which |
|
|
is based solely on automated processing and which produces legal effects concerning |
|
|
him or her or similarly significantly affects him or her, such as automatic refusal |
|
|
of an online credit application or e-recruiting practices without any human intervention. |
|
|
Such processing includes ‘profiling’ that consists of any form of automated processing |
|
|
of personal data evaluating the personal aspects relating to a natural person, |
|
|
in particular to analyse or predict aspects concerning the data subject's performance |
|
|
at work, economic situation, health, personal preferences or interests, reliability |
|
|
or behaviour, location or movements, where it produces legal effects concerning |
|
|
him or her or similarly significantly affects him or her. However, decision-making |
|
|
based on such processing, including profiling, should be allowed where expressly |
|
|
authorised by Union or Member State law to which the controller is subject, including |
|
|
for fraud and tax-evasion monitoring and prevention purposes conducted in accordance |
|
|
with the regulations, standards and recommendations of Union institutions or national |
|
|
oversight bodies and to ensure the security and reliability of a service provided |
|
|
by the controller, or necessary for the entering or performance of a contract |
|
|
between the data subject and a controller, or when the data subject has given |
|
|
his or her explicit consent. In any case, such processing should be subject to |
|
|
suitable safeguards, which should include specific information to the data subject |
|
|
and the right to obtain human intervention, to express his or her point of view, |
|
|
to obtain an explanation of the decision reached after such assessment and to |
|
|
challenge the decision. Such measure should not concern a child. In order to ensure |
|
|
fair and transparent processing in respect of the data subject, taking into account |
|
|
the specific circumstances and context in which the personal data are processed, |
|
|
the controller should use appropriate mathematical or statistical procedures for |
|
|
the profiling, implement technical and organisational measures appropriate to |
|
|
ensure, in particular, that factors which result in inaccuracies in personal data |
|
|
are corrected and the risk of errors is minimised, secure personal data in a manner |
|
|
that takes account of the potential risks involved for the interests and rights |
|
|
of the data subject and that prevents, inter alia, discriminatory effects on natural |
|
|
persons on the basis of racial or ethnic origin, political opinion, religion or |
|
|
beliefs, trade union membership, genetic or health status or sexual orientation, |
|
|
or that result in measures having such an effect. Automated decision-making and |
|
|
profiling based on special categories of personal data should be allowed only |
|
|
under specific conditions. |
|
|
- "Court (Civil/Criminal): Civil \nProvisions: Law 4537/2018. \nTime of commission\ |
|
|
\ of act: \nOutcome (not guilty, guilty): \nReasoning: PARTIALLY ACCEPTS the\ |
|
|
\ lawsuit. RECOGNIZES the obligation of the defendant (a) to pay the plaintiffs\ |
|
|
\ in full the amount of eight thousand eight hundred ninety (8,890) euros, with\ |
|
|
\ legal interest from December 2, 2021, and (b) to pay each of the plaintiffs\ |
|
|
\ the amount of five hundred (500) euros with legal interest from the service\ |
|
|
\ of the lawsuit. \nFacts: The plaintiffs claim that they are co-beneficiaries\ |
|
|
\ of a savings account held by the defendant, and that unknown perpetrators gained\ |
|
|
\ access to the aforementioned account via the internet, without the plaintiffs\ |
|
|
\ themselves having any fault regarding the safeguarding of the codes or the disclosure\ |
|
|
\ of the unique transaction codes (OTR). They assert that the defendant is responsible\ |
|
|
\ for the access gained by the unknown perpetrators to the savings account, as\ |
|
|
\ the defendant negligently violated the protective obligations it owed to the\ |
|
|
\ plaintiffs. They state that, due to the actions of the unknown perpetrators,\ |
|
|
\ gradual transfers of monetary amounts were made, resulting in the aforementioned\ |
|
|
\ savings account being depleted by the amount of 10,120 euros within a few minutes.\ |
|
|
\ They informed the defendant of the aforementioned actions through the appropriate\ |
|
|
\ channels; however, the defendant negligently delayed the necessary actions.\ |
|
|
\ The defendant denies any liability and the return of the aforementioned monetary\ |
|
|
\ amount." |
|
|
- "1.Where a type of processing in particular using new technologies, and taking\ |
|
|
\ into account the nature, scope, context and purposes of the processing, is likely\ |
|
|
\ to result in a high risk to the rights and freedoms of natural persons, the\ |
|
|
\ controller shall, prior to the processing, carry out an assessment of the impact\ |
|
|
\ of the envisaged processing operations on the protection of personal data. A\ |
|
|
\ single assessment may address a set of similar processing operations that present\ |
|
|
\ similar high risks.\n2.The controller shall seek the advice of the data protection\ |
|
|
\ officer, where designated, when carrying out a data protection impact assessment.\n\ |
|
|
3.A data protection impact assessment referred to in paragraph 1 shall in particular\ |
|
|
\ be required in the case of: (a) a systematic and extensive evaluation of personal\ |
|
|
\ aspects relating to natural persons which is based on automated processing,\ |
|
|
\ including profiling, and on which decisions are based that produce legal effects\ |
|
|
\ concerning the natural person or similarly significantly affect the natural\ |
|
|
\ person; (b) processing on a large scale of special categories of data referred\ |
|
|
\ to in Article 9(1), or of personal data relating to criminal convictions and\ |
|
|
\ offences referred to in Article 10; or (c) a systematic monitoring of a publicly\ |
|
|
\ accessible area on a large scale.\n4.The supervisory authority shall establish\ |
|
|
\ and make public a list of the kind of processing operations which are subject\ |
|
|
\ to the requirement for a data protection impact assessment pursuant to paragraph\ |
|
|
\ 1. The supervisory authority shall communicate those lists to the Board referred\ |
|
|
\ to in Article 68\n5.The supervisory authority may also establish and make public\ |
|
|
\ a list of the kind of processing operations for which no data protection impact\ |
|
|
\ assessment is required. The supervisory authority shall communicate those lists\ |
|
|
\ to the Board.\n6.Prior to the adoption of the lists referred to in paragraphs\ |
|
|
\ 4 and 5, the competent supervisory authority shall apply the consistency mechanism\ |
|
|
\ referred to in Article 63 where such lists involve processing activities which\ |
|
|
\ are related to the offering of goods or services to data subjects or to the\ |
|
|
\ monitoring of their behaviour in several Member States, or may substantially\ |
|
|
\ affect the free movement of personal data within the Union. 4.5.2016 L 119/53\ |
|
|
\ \n7.The assessment shall contain at least: (a) a systematic description of\ |
|
|
\ the envisaged processing operations and the purposes of the processing, including,\ |
|
|
\ where applicable, the legitimate interest pursued by the controller; (b) an\ |
|
|
\ assessment of the necessity and proportionality of the processing operations\ |
|
|
\ in relation to the purposes; (c) an assessment of the risks to the rights and\ |
|
|
\ freedoms of data subjects referred to in paragraph 1; and (d) the measures\ |
|
|
\ envisaged to address the risks, including safeguards, security measures and\ |
|
|
\ mechanisms to ensure the protection of personal data and to demonstrate compliance\ |
|
|
\ with this Regulation taking into account the rights and legitimate interests\ |
|
|
\ of data subjects and other persons concerned.\n8.Compliance with approved codes\ |
|
|
\ of conduct referred to in Article 40 by the relevant controllers or processors\ |
|
|
\ shall be taken into due account in assessing the impact of the processing operations\ |
|
|
\ performed by such controllers or processors, in particular for the purposes\ |
|
|
\ of a data protection impact assessment.\n9.Where appropriate, the controller\ |
|
|
\ shall seek the views of data subjects or their representatives on the intended\ |
|
|
\ processing, without prejudice to the protection of commercial or public interests\ |
|
|
\ or the security of processing operations.\n10.Where processing pursuant to point\ |
|
|
\ (c) or (e) of Article 6(1) has a legal basis in Union law or in the law of the\ |
|
|
\ Member State to which the controller is subject, that law regulates the specific\ |
|
|
\ processing operation or set of operations in question, and a data protection\ |
|
|
\ impact assessment has already been carried out as part of a general impact assessment\ |
|
|
\ in the context of the adoption of that legal basis, paragraphs 1 to 7 shall\ |
|
|
\ not apply unless Member States deem it to be necessary to carry out such an\ |
|
|
\ assessment prior to processing activities.\n11. Where necessary, the controller\ |
|
|
\ shall carry out a review to assess if processing is performed in accordance\ |
|
|
\ with the data protection impact assessment at least when there is a change of\ |
|
|
\ the risk represented by processing operations." |
|
|
- source_sentence: What elements does the Commission take into account when assessing |
|
|
the adequacy of the level of protection? |
|
|
sentences: |
|
|
- '**Court (Civil/Criminal): Civil** |
|
|
|
|
|
|
|
|
**Provisions:** |
|
|
|
|
|
|
|
|
**Time of commission of the act:** |
|
|
|
|
|
|
|
|
**Outcome (not guilty, guilty):** |
|
|
|
|
|
|
|
|
**Rationale:** |
|
|
|
|
|
|
|
|
**Facts:** |
|
|
|
|
|
The plaintiff holds credit card number ............ with the defendant banking |
|
|
corporation. Based on the application for alternative networks dated 19/7/2015 |
|
|
with number ......... submitted at a branch of the defendant, he was granted access |
|
|
to the electronic banking service (e-banking) to conduct banking transactions |
|
|
(debit, credit, updates, payments) remotely. On 30/11/2020, the plaintiff fell |
|
|
victim to electronic fraud through the "phishing" method, whereby an unknown perpetrator |
|
|
managed to withdraw a total amount of €3,121.75 from the aforementioned credit |
|
|
card. Specifically, the plaintiff received an email at 1:35 PM on 29/11/2020 from |
|
|
sender ...... with address ........, informing him that due to an impending system |
|
|
change, he needed to verify the mobile phone number linked to the credit card, |
|
|
urging him to complete the verification process within the next 24 hours by following |
|
|
a link titled ........; otherwise, his account would be locked for security reasons. |
|
|
The plaintiff read this email on the afternoon of 30 November 2020 and, believing |
|
|
it was from the defendant, followed the instructions and proceeded via the provided |
|
|
link to a website that was identical (a clone) to that of the defendant. On this |
|
|
page, he was asked to enter the six-digit security code (.........) that had just |
|
|
been sent to his mobile phone by the defendant at 3:41 PM, with the note that |
|
|
it was an activation code for his ........ card at ........., which he entered. |
|
|
|
|
|
|
|
|
Subsequently, the plaintiff received, according to his statements, a new email |
|
|
(not submitted), which requested him to enter the details of the aforementioned |
|
|
credit card, specifically the name of the cardholder and the card number, not |
|
|
the PIN, which he also entered, convinced that he was within the online environment |
|
|
of the defendant. Then, at 3:47 PM, he received a message on his mobile phone |
|
|
from the defendant containing the exact same content as the one he received at |
|
|
3:41 PM, while at 3:50 PM he received a message stating that the activation of |
|
|
his ......... card at ....... had been completed. Once the plaintiff read this, |
|
|
he became concerned that something was not right, and immediately called (at 4:41 |
|
|
PM) the defendant''s call center to inform them. There, the employees, with whom |
|
|
he finally connected at 5:04 PM due to high call center volume, advised him to |
|
|
delete the relevant emails, cancel his credit card, change his access passwords |
|
|
for the service, and submit a dispute request regarding the conducted transactions. |
|
|
The plaintiff electronically sent this request to the defendant, disputing the |
|
|
detailed transactions amounting to €3,121.75, which were conducted on 30/11/2020 |
|
|
during the time frame of 16:37:45-16:43:34 PM, arguing that he had neither performed |
|
|
them himself nor authorized anyone else to do so. The plaintiff specifically disputed |
|
|
the following transactions, as evidenced by the account activity of the disputed |
|
|
credit card during the aforementioned timeframe: a) transaction number ......... |
|
|
amounting to €150.62 conducted on 30/11/2020 at 4:43:34 PM, b) transaction number |
|
|
........ amounting to €293.20 conducted on 30/11/2020 at 4:42:40 PM, c) transaction |
|
|
number ............ amounting to €295.21 conducted on 30/11/2020 at 4:42:10 PM, |
|
|
d) transaction number .......... amounting to €299.22 conducted on 30/11/2020 |
|
|
at 4:41:31 PM, e) transaction number ........ amounting to €297.21 conducted on |
|
|
30/11/2020 at 4:41:01 PM, f) transaction number ........ amounting to €299.22 |
|
|
conducted on 30/11/2020 at 4:40:27 PM, g) transaction number ....... amounting |
|
|
to €299.22 conducted on 30/11/2020 at 4:39:55 PM, h) transaction number ...... |
|
|
amounting to €299.22 conducted on 30/11/2020 at 4:39:22 PM, i) transaction number |
|
|
......... amounting to €297.22 conducted on 30/11/2020 at 4:38:52 PM, j) transaction |
|
|
number ......... amounting to €295.21 conducted on 30/11/2020 at 4:38:17 PM, and |
|
|
k) transaction number ......... amounting to €296.21 conducted on 30/11/2020 at |
|
|
4:37:45 PM. In its response letter dated 21/12/2020, the defendant denied responsibility |
|
|
for the costs of the aforementioned transactions, placing the entire blame on |
|
|
the plaintiff for the leak of his card details and security code to the fraudulent |
|
|
page. The plaintiff, completely denying any fault for the conducted transactions, |
|
|
repeatedly contacted the defendant, both by phone and via email (see emails dated |
|
|
15/1/2021 and 11/2/2021), while on 2/3/2021, he electronically sent a report dated |
|
|
1/03/2021 to the Consumer Advocate’s email address, recounting the events and |
|
|
requesting that the aforementioned Independent Authority intervene to have the |
|
|
disputed debt canceled. In its letter with reference number ...../27.04.2021, |
|
|
the aforementioned Independent Authority informed the plaintiff that the case |
|
|
was outside its mediating role and was therefore archived. Subsequently, the plaintiff |
|
|
sent the defendant on 5/3/2021 his extrajudicial statement dated 4/3/2021, calling |
|
|
upon it to fully cancel the debt of €3,121.75 that had been unjustly incurred |
|
|
against him within two days and to immediately instruct the representatives of |
|
|
the collection agency working with it to cease contacting him regarding the disputed |
|
|
case. The defendant sent the plaintiff a message on his mobile phone on 20/04/2021 |
|
|
informing him that his case was still being processed due to lengthy operational |
|
|
requirements, while on 23/04/2021, via email, it informed him that considering |
|
|
their good cooperation and his efforts to keep them updated, it had reviewed his |
|
|
case and decided to refund him the amounts of the transactions that were conducted |
|
|
after his contact with their representatives on 30/11/2020 at 4:41 PM, totaling |
|
|
€1,038.25, specifically the following: a) transaction of €150.62 conducted on |
|
|
30/11/2020 at 4:43 PM, b) transaction of €295.21 conducted on 30/11/2020 at 4:42 |
|
|
PM, c) transaction of €293.20 conducted on 30/11/2020 at 4:42 PM, and d) transaction |
|
|
of €299.22 conducted on 30/11/2020 at 4:41 PM. Beyond this, the defendant refused |
|
|
to refund the plaintiff the amount of the remaining transactions conducted on |
|
|
30/11/2020, totaling €2,376.08 (and not €2,376.48 as incorrectly stated by the |
|
|
plaintiff in his lawsuit), which the plaintiff ultimately fully paid, transferring |
|
|
€2,342.77 to the defendant on 7/06/2021 and €33.31 on 15/06/2021 (see related |
|
|
deposit receipts).' |
|
|
- "**Court (Civil/Criminal): Civil** \n**Provisions:** \n**Time of commission\ |
|
|
\ of the act:** \n**Outcome (not guilty, guilty):** \n**Reasoning:** Claim for\ |
|
|
\ compensation and monetary satisfaction due to moral damage against a mobile\ |
|
|
\ phone company and a credit institution within the framework of inadequate fulfillment\ |
|
|
\ of a payment services contract for \"web banking.\" Appropriate actions for\ |
|
|
\ mobile phone companies in case of a request for a \"sim\" card replacement due\ |
|
|
\ to wear or loss. They must verify the customer's identity based on the personal\ |
|
|
\ details and identification information registered in their system but are not\ |
|
|
\ liable for any changes in the latter that were not timely communicated to them.\ |
|
|
\ Further security measures such as phone communication or sending an SMS to the\ |
|
|
\ mobile number holder are not required. Payment services under Law 4357/2018.\ |
|
|
\ Obligation of the payment service provider, such as banks, to inform the payer\ |
|
|
\ after receiving a relevant order for making a payment. The content of this varies\ |
|
|
\ per case, such as sending a personalized code to the user's mobile phone for\ |
|
|
\ transaction approval, as well as sending an email immediately after its completion.\ |
|
|
\ However, the bank is not liable for customer damage resulting from illicit electronic\ |
|
|
\ transactions due to third-party interception of either the access codes for\ |
|
|
\ electronic banking transactions or the sim card and the phone number to which\ |
|
|
\ the personalized codes for approving the aforementioned transactions are sent,\ |
|
|
\ within the framework of increased security protocols. Appropriate actions by\ |
|
|
\ banks upon diagnosing illicit banking transactions that may be fraudulent. Relevant\ |
|
|
\ criteria for consideration. The evidence did not indicate negligent and thus\ |
|
|
\ tortious behavior from all defendants. The claim is dismissed. \n\n**Facts:**\ |
|
|
\ In the present claim, upon due assessment of its content, the plaintiff states\ |
|
|
\ that he has a mobile phone subscription with the first defendant, a mobile phone\ |
|
|
\ company. On October 26, 2020, in the morning, he realized that his mobile phone\ |
|
|
\ was offline, and by noon, he received email notifications from Bank ..........\ |
|
|
\ and ............ (whose third and fourth defendants are de facto universal successors,\ |
|
|
\ respectively), with which he holds an account, regarding transactions he had\ |
|
|
\ made. From phone calls from his home phone to Bank .............. and ............\ |
|
|
\ Bank, he was informed that on the same day, in a very short period, four money\ |
|
|
\ transfers had been made from the account he maintains at Bank ..............,\ |
|
|
\ specifically, an amount of €15,000 was transferred to the account mentioned\ |
|
|
\ in the claim document under the name ..........., at ........ an amount of €15,000\ |
|
|
\ was transferred to the account mentioned in the claim document under the name\ |
|
|
\ ......... at ........... Bank, an amount of €15,000 was transferred to the plaintiff's\ |
|
|
\ account with his daughter as a co-holder at ......... Bank, and an amount of\ |
|
|
\ €6,700 was transferred from another of his accounts to the account from which\ |
|
|
\ the transfer to the aforementioned accounts of €45,000 was made. Additionally,\ |
|
|
\ from the plaintiff's account with his daughter as a co-holder at ..........\ |
|
|
\ Bank, an amount of €9,999 was transferred to an account under the name of ....\ |
|
|
\ . He attempted to log into the online banking service of Bank ......... from\ |
|
|
\ his home computer, but found that the service was locked, while regarding the\ |
|
|
\ corresponding service of ........... Bank, he requested alongside his daughter\ |
|
|
\ to 'lock' it. In a phone call with the call center of Bank ............, he\ |
|
|
\ was informed about the locking of his electronic account in the online banking\ |
|
|
\ service and was told to dispute the transactions, which he did immediately through\ |
|
|
\ ... banking, while his daughter communicated about this with ....... Bank. The\ |
|
|
\ transfer to the account with the beneficiary was canceled, and the amount of\ |
|
|
\ €15,000 was returned to the plaintiff. After his investigation, he discovered\ |
|
|
\ that an unknown individual appeared at the branch of the first defendant, served\ |
|
|
\ by the second defendant, who posed as the plaintiff and presented a forged military\ |
|
|
\ ID card of the plaintiff, requesting and receiving a new sim card, resulting\ |
|
|
\ in the deactivation of the plaintiff's sim card and gaining access to the codes\ |
|
|
\ sent to him by the banks for completing the transfers. Due to the negligence\ |
|
|
\ of the second defendant, he did not realize that the identity used was forged,\ |
|
|
\ as since 2010, when the plaintiff retired, he has had a police identification\ |
|
|
\ card. The first defendant does not have security protocols to prevent such incidents,\ |
|
|
\ which constitute the sim .... method, despite the issuance of a press release\ |
|
|
\ from the Attica Security and numerous publications regarding the aforementioned\ |
|
|
\ method, unlike other mobile phone companies, which implement a specific procedure\ |
|
|
\ for changing sim cards. The second defendant did not take the obvious step to\ |
|
|
\ check the functioning of the sim card before replacing it, where he would have\ |
|
|
\ realized that the plaintiff's mobile phone was functioning normally. Bank ..........\ |
|
|
\ and ........... Bank: a) accepted requests for transferring large amounts of\ |
|
|
\ money from accounts that had no similar activity in the past, while the plaintiff's\ |
|
|
\ online banking account with the above banks was locked quite some time later,\ |
|
|
\ b) sent email notifications regarding successful transactions in succession,\ |
|
|
\ under a single email, c) did not check the address ... of the perpetrators,\ |
|
|
\ which was different from that used by the plaintiff, and d) did not take necessary\ |
|
|
\ security measures to prevent fraud via sim ... against the plaintiff, as the\ |
|
|
\ security code (pin) sent by the banks via message to the mobile phone proved\ |
|
|
\ to be compromised. As a result of the above illegal and culpable behavior of\ |
|
|
\ the defendants, the plaintiff suffered property damage amounting to a total\ |
|
|
\ of €24,999, which constitutes the total amount of the transfers made by third\ |
|
|
\ unknown persons to accounts of unknown individuals, as stated above, and has\ |
|
|
\ not been refunded despite his repeated inquiries, while he also suffered distress\ |
|
|
\ and mental anguish, and his trust in the banks was shaken, thus entitling him\ |
|
|
\ to monetary compensation for his moral damage, amounting to €5,000." |
|
|
- '1.A transfer of personal data to a third country or an international organisation |
|
|
may take place where the Commission has decided that the third country, a territory |
|
|
or one or more specified sectors within that third country, or the international |
|
|
organisation in question ensures an adequate level of protection. Such a transfer |
|
|
shall not require any specific authorisation. |
|
|
|
|
|
2.When assessing the adequacy of the level of protection, the Commission shall, |
|
|
in particular, take account of the following elements: (a) the rule of law, respect |
|
|
for human rights and fundamental freedoms, relevant legislation, both general |
|
|
and sectoral, including concerning public security, defence, national security |
|
|
and criminal law and the access of public authorities to personal data, as well |
|
|
as the implementation of such legislation, data protection rules, professional |
|
|
rules and security measures, including rules for the onward transfer of personal |
|
|
data to another third country or international organisation which are complied |
|
|
with in that country or international organisation, case-law, as well as effective |
|
|
and enforceable data subject rights and effective administrative and judicial |
|
|
redress for the data subjects whose personal data are being transferred; (b) the |
|
|
existence and effective functioning of one or more independent supervisory authorities |
|
|
in the third country or to which an international organisation is subject, with |
|
|
responsibility for ensuring and enforcing compliance with the data protection |
|
|
rules, including adequate enforcement powers, for assisting and advising the data |
|
|
subjects in exercising their rights and for cooperation with the supervisory authorities |
|
|
of the Member States; and (c) the international commitments the third country |
|
|
or international organisation concerned has entered into, or other obligations |
|
|
arising from legally binding conventions or instruments as well as from its participation |
|
|
in multilateral or regional systems, in particular in relation to the protection |
|
|
of personal data. |
|
|
|
|
|
3.The Commission, after assessing the adequacy of the level of protection, may |
|
|
decide, by means of implementing act, that a third country, a territory or one |
|
|
or more specified sectors within a third country, or an international organisation |
|
|
ensures an adequate level of protection within the meaning of paragraph 2 of this |
|
|
Article. The implementing act shall provide for a mechanism for a periodic review, |
|
|
at least every four years, which shall take into account all relevant developments |
|
|
in the third country or international organisation. The implementing act shall |
|
|
specify its territorial and sectoral application and, where applicable, identify |
|
|
the supervisory authority or authorities referred to in point (b) of paragraph |
|
|
2 of this Article. The implementing act shall be adopted in accordance with the |
|
|
examination procedure referred to in Article 93(2). |
|
|
|
|
|
4.The Commission shall, on an ongoing basis, monitor developments in third countries |
|
|
and international organisations that could affect the functioning of decisions |
|
|
adopted pursuant to paragraph 3 of this Article and decisions adopted on the basis |
|
|
of Article 25(6) of Directive 95/46/EC. |
|
|
|
|
|
5.The Commission shall, where available information reveals, in particular following |
|
|
the review referred to in paragraph 3 of this Article, that a third country, a |
|
|
territory or one or more specified sectors within a third country, or an international |
|
|
organisation no longer ensures an adequate level of protection within the meaning |
|
|
of paragraph 2 of this Article, to the extent necessary, repeal, amend or suspend |
|
|
the decision referred to in paragraph 3 of this Article by means of implementing |
|
|
acts without retro-active effect. Those implementing acts shall be adopted in |
|
|
accordance with the examination procedure referred to in Article 93(2). On duly |
|
|
justified imperative grounds of urgency, the Commission shall adopt immediately |
|
|
applicable implementing acts in accordance with the procedure referred to in Article |
|
|
93(3). |
|
|
|
|
|
6.The Commission shall enter into consultations with the third country or international |
|
|
organisation with a view to remedying the situation giving rise to the decision |
|
|
made pursuant to paragraph 5 |
|
|
|
|
|
7.A decision pursuant to paragraph 5 of this Article is without prejudice to transfers |
|
|
of personal data to the third country, a territory or one or more specified sectors |
|
|
within that third country, or the international organisation in question pursuant |
|
|
to Articles 46 to 49 |
|
|
|
|
|
8.The Commission shall publish in the Official Journal of the European Union and |
|
|
on its website a list of the third countries, territories and specified sectors |
|
|
within a third country and international organisations for which it has decided |
|
|
that an adequate level of protection is or is no longer ensured. |
|
|
|
|
|
9.Decisions adopted by the Commission on the basis of Article 25(6) of Directive |
|
|
95/46/EC shall remain in force until amended, replaced or repealed by a Commission |
|
|
Decision adopted in accordance with paragraph 3 or 5 of this Article.' |
|
|
- source_sentence: What can the contract be based on, besides individual contracts, |
|
|
in part according to this excerpt? |
|
|
sentences: |
|
|
- '1.The Board shall draw up an annual report regarding the protection of natural |
|
|
persons with regard to processing in the Union and, where relevant, in third countries |
|
|
and international organisations. The report shall be made public and be transmitted |
|
|
to the European Parliament, to the Council and to the Commission. |
|
|
|
|
|
2.The annual report shall include a review of the practical application of the |
|
|
guidelines, recommendations and best practices referred to in point (l) of Article |
|
|
70(1) as well as of the binding decisions referred to in Article 65.' |
|
|
- '1.Where processing is to be carried out on behalf of a controller, the controller |
|
|
shall use only processors providing sufficient guarantees to implement appropriate |
|
|
technical and organisational measures in such a manner that processing will meet |
|
|
the requirements of this Regulation and ensure the protection of the rights of |
|
|
the data subject. |
|
|
|
|
|
2.The processor shall not engage another processor without prior specific or general |
|
|
written authorisation of the controller. In the case of general written authorisation, |
|
|
the processor shall inform the controller of any intended changes concerning the |
|
|
addition or replacement of other processors, thereby giving the controller the |
|
|
opportunity to object to such changes. |
|
|
|
|
|
3.Processing by a processor shall be governed by a contract or other legal act |
|
|
under Union or Member State law, that is binding on the processor with regard |
|
|
to the controller and that sets out the subject-matter and duration of the processing, |
|
|
the nature and purpose of the processing, the type of personal data and categories |
|
|
of data subjects and the obligations and rights of the controller. That contract |
|
|
or other legal act shall stipulate, in particular, that the processor: (a) processes |
|
|
the personal data only on documented instructions from the controller, including |
|
|
with regard to transfers of personal data to a third country or an international |
|
|
organisation, unless required to do so by Union or Member State law to which the |
|
|
processor is subject; in such a case, the processor shall inform the controller |
|
|
of that legal requirement before processing, unless that law prohibits such information |
|
|
on important grounds of public interest; (b) ensures that persons authorised |
|
|
to process the personal data have committed themselves to confidentiality or are |
|
|
under an appropriate statutory obligation of confidentiality; (c) takes all measures |
|
|
required pursuant to Article 32; (d) respects the conditions referred to in paragraphs |
|
|
2 and 4 for engaging another processor; (e) taking into account the nature of |
|
|
the processing, assists the controller by appropriate technical and organisational |
|
|
measures, insofar as this is possible, for the fulfilment of the controller''s |
|
|
obligation to respond to requests for exercising the data subject''s rights laid |
|
|
down in Chapter III; (f) assists the controller in ensuring compliance with the |
|
|
obligations pursuant to Articles 32 to 36 taking into account the nature of processing |
|
|
and the information available to the processor; (g) at the choice of the controller, |
|
|
deletes or returns all the personal data to the controller after the end of the |
|
|
provision of services relating to processing, and deletes existing copies unless |
|
|
Union or Member State law requires storage of the personal data; (h) makes available |
|
|
to the controller all information necessary to demonstrate compliance with the |
|
|
obligations laid down in this Article and allow for and contribute to audits, |
|
|
including inspections, conducted by the controller or another auditor mandated |
|
|
by the controller. 4.5.2016 L 119/49 With regard to point (h) of the first subparagraph, |
|
|
the processor shall immediately inform the controller if, in its opinion, an instruction |
|
|
infringes this Regulation or other Union or Member State data protection provisions. |
|
|
|
|
|
4.Where a processor engages another processor for carrying out specific processing |
|
|
activities on behalf of the controller, the same data protection obligations as |
|
|
set out in the contract or other legal act between the controller and the processor |
|
|
as referred to in paragraph 3 shall be imposed on that other processor by way |
|
|
of a contract or other legal act under Union or Member State law, in particular |
|
|
providing sufficient guarantees to implement appropriate technical and organisational |
|
|
measures in such a manner that the processing will meet the requirements of this |
|
|
Regulation. Where that other processor fails to fulfil its data protection obligations, |
|
|
the initial processor shall remain fully liable to the controller for the performance |
|
|
of that other processor''s obligations. |
|
|
|
|
|
5.Adherence of a processor to an approved code of conduct as referred to in Article |
|
|
40 or an approved certification mechanism as referred to in Article 42 may be |
|
|
used as an element by which to demonstrate sufficient guarantees as referred to |
|
|
in paragraphs 1 and 4 of this Article. |
|
|
|
|
|
6.Without prejudice to an individual contract between the controller and the processor, |
|
|
the contract or the other legal act referred to in paragraphs 3 and 4 of this |
|
|
Article may be based, in whole or in part, on standard contractual clauses referred |
|
|
to in paragraphs 7 and 8 of this Article, including when they are part of a certification |
|
|
granted to the controller or processor pursuant to Articles 42 and 43 |
|
|
|
|
|
7.The Commission may lay down standard contractual clauses for the matters referred |
|
|
to in paragraph 3 and 4 of this Article and in accordance with the examination |
|
|
procedure referred to in Article 93(2). |
|
|
|
|
|
8.A supervisory authority may adopt standard contractual clauses for the matters |
|
|
referred to in paragraph 3 and 4 of this Article and in accordance with the consistency |
|
|
mechanism referred to in Article 63 |
|
|
|
|
|
9.The contract or the other legal act referred to in paragraphs 3 and 4 shall |
|
|
be in writing, including in electronic form. |
|
|
|
|
|
10.Without prejudice to Articles 82, 83 and 84, if a processor infringes this |
|
|
Regulation by determining the purposes and means of processing, the processor |
|
|
shall be considered to be a controller in respect of that processing.' |
|
|
- In order to ensure consistent monitoring and enforcement of this Regulation throughout |
|
|
the Union, the supervisory authorities should have in each Member State the same |
|
|
tasks and effective powers, including powers of investigation, corrective powers |
|
|
and sanctions, and authorisation and advisory powers, in particular in cases of |
|
|
complaints from natural persons, and without prejudice to the powers of prosecutorial |
|
|
authorities under Member State law, to bring infringements of this Regulation |
|
|
to the attention of the judicial authorities and engage in legal proceedings. |
|
|
Such powers should also include the power to impose a temporary or definitive |
|
|
limitation, including a ban, on processing. Member States may specify other tasks |
|
|
related to the protection of personal data under this Regulation. The powers of |
|
|
supervisory authorities should be exercised in accordance with appropriate procedural |
|
|
safeguards set out in Union and Member State law, impartially, fairly and within |
|
|
a reasonable time. In particular each measure should be appropriate, necessary |
|
|
and proportionate in view of ensuring compliance with this Regulation, taking |
|
|
into account the circumstances of each individual case, respect the right of every |
|
|
person to be heard before any individual measure which would affect him or her |
|
|
adversely is taken and avoid superfluous costs and excessive inconveniences for |
|
|
the persons concerned. Investigatory powers as regards access to premises should |
|
|
be exercised in accordance with specific requirements in Member State procedural |
|
|
law, such as the requirement to obtain a prior judicial authorisation. Each legally |
|
|
binding measure of the supervisory authority should be in writing, be clear and |
|
|
unambiguous, indicate the supervisory authority which has issued the measure, |
|
|
the date of issue of the measure, bear the signature of the head, or a member |
|
|
of the supervisory authority authorised by him or her, give the reasons for the |
|
|
measure, and refer to the right of an effective remedy. This should not preclude |
|
|
additional requirements pursuant to Member State procedural law. The adoption |
|
|
of a legally binding decision implies that it may give rise to judicial review |
|
|
in the Member State of the supervisory authority that adopted the decision. |
|
|
pipeline_tag: sentence-similarity |
|
|
library_name: sentence-transformers |
|
|
metrics: |
|
|
- cosine_accuracy@1 |
|
|
- cosine_accuracy@3 |
|
|
- cosine_accuracy@5 |
|
|
- cosine_accuracy@10 |
|
|
- cosine_precision@1 |
|
|
- cosine_precision@3 |
|
|
- cosine_precision@5 |
|
|
- cosine_precision@10 |
|
|
- cosine_recall@1 |
|
|
- cosine_recall@3 |
|
|
- cosine_recall@5 |
|
|
- cosine_recall@10 |
|
|
- cosine_ndcg@10 |
|
|
- cosine_mrr@10 |
|
|
- cosine_map@100 |
|
|
model-index: |
|
|
- name: multilingual-e5-large |
|
|
results: |
|
|
- task: |
|
|
type: information-retrieval |
|
|
name: Information Retrieval |
|
|
dataset: |
|
|
name: dim 1024 |
|
|
type: dim_1024 |
|
|
metrics: |
|
|
- type: cosine_accuracy@1 |
|
|
value: 0.39646464646464646 |
|
|
name: Cosine Accuracy@1 |
|
|
- type: cosine_accuracy@3 |
|
|
value: 0.44191919191919193 |
|
|
name: Cosine Accuracy@3 |
|
|
- type: cosine_accuracy@5 |
|
|
value: 0.4772727272727273 |
|
|
name: Cosine Accuracy@5 |
|
|
- type: cosine_accuracy@10 |
|
|
value: 0.5303030303030303 |
|
|
name: Cosine Accuracy@10 |
|
|
- type: cosine_precision@1 |
|
|
value: 0.39646464646464646 |
|
|
name: Cosine Precision@1 |
|
|
- type: cosine_precision@3 |
|
|
value: 0.38636363636363635 |
|
|
name: Cosine Precision@3 |
|
|
- type: cosine_precision@5 |
|
|
value: 0.3681818181818182 |
|
|
name: Cosine Precision@5 |
|
|
- type: cosine_precision@10 |
|
|
value: 0.3290404040404041 |
|
|
name: Cosine Precision@10 |
|
|
- type: cosine_recall@1 |
|
|
value: 0.08304287864930793 |
|
|
name: Cosine Recall@1 |
|
|
- type: cosine_recall@3 |
|
|
value: 0.2081343496506072 |
|
|
name: Cosine Recall@3 |
|
|
- type: cosine_recall@5 |
|
|
value: 0.2835680574260267 |
|
|
name: Cosine Recall@5 |
|
|
- type: cosine_recall@10 |
|
|
value: 0.39409768094763203 |
|
|
name: Cosine Recall@10 |
|
|
- type: cosine_ndcg@10 |
|
|
value: 0.4598689419093947 |
|
|
name: Cosine Ndcg@10 |
|
|
- type: cosine_mrr@10 |
|
|
value: 0.42710938752605426 |
|
|
name: Cosine Mrr@10 |
|
|
- type: cosine_map@100 |
|
|
value: 0.5168519133450287 |
|
|
name: Cosine Map@100 |
|
|
- task: |
|
|
type: information-retrieval |
|
|
name: Information Retrieval |
|
|
dataset: |
|
|
name: dim 768 |
|
|
type: dim_768 |
|
|
metrics: |
|
|
- type: cosine_accuracy@1 |
|
|
value: 0.3939393939393939 |
|
|
name: Cosine Accuracy@1 |
|
|
- type: cosine_accuracy@3 |
|
|
value: 0.44191919191919193 |
|
|
name: Cosine Accuracy@3 |
|
|
- type: cosine_accuracy@5 |
|
|
value: 0.5025252525252525 |
|
|
name: Cosine Accuracy@5 |
|
|
- type: cosine_accuracy@10 |
|
|
value: 0.5505050505050505 |
|
|
name: Cosine Accuracy@10 |
|
|
- type: cosine_precision@1 |
|
|
value: 0.3939393939393939 |
|
|
name: Cosine Precision@1 |
|
|
- type: cosine_precision@3 |
|
|
value: 0.3855218855218855 |
|
|
name: Cosine Precision@3 |
|
|
- type: cosine_precision@5 |
|
|
value: 0.37626262626262624 |
|
|
name: Cosine Precision@5 |
|
|
- type: cosine_precision@10 |
|
|
value: 0.3446969696969697 |
|
|
name: Cosine Precision@10 |
|
|
- type: cosine_recall@1 |
|
|
value: 0.08168070862236515 |
|
|
name: Cosine Recall@1 |
|
|
- type: cosine_recall@3 |
|
|
value: 0.20453019286463223 |
|
|
name: Cosine Recall@3 |
|
|
- type: cosine_recall@5 |
|
|
value: 0.2832633651660053 |
|
|
name: Cosine Recall@5 |
|
|
- type: cosine_recall@10 |
|
|
value: 0.40242302005471103 |
|
|
name: Cosine Recall@10 |
|
|
- type: cosine_ndcg@10 |
|
|
value: 0.47166637655254595 |
|
|
name: Cosine Ndcg@10 |
|
|
- type: cosine_mrr@10 |
|
|
value: 0.4309634038800705 |
|
|
name: Cosine Mrr@10 |
|
|
- type: cosine_map@100 |
|
|
value: 0.5280748790211213 |
|
|
name: Cosine Map@100 |
|
|
- task: |
|
|
type: information-retrieval |
|
|
name: Information Retrieval |
|
|
dataset: |
|
|
name: dim 512 |
|
|
type: dim_512 |
|
|
metrics: |
|
|
- type: cosine_accuracy@1 |
|
|
value: 0.3787878787878788 |
|
|
name: Cosine Accuracy@1 |
|
|
- type: cosine_accuracy@3 |
|
|
value: 0.4318181818181818 |
|
|
name: Cosine Accuracy@3 |
|
|
- type: cosine_accuracy@5 |
|
|
value: 0.48484848484848486 |
|
|
name: Cosine Accuracy@5 |
|
|
- type: cosine_accuracy@10 |
|
|
value: 0.5303030303030303 |
|
|
name: Cosine Accuracy@10 |
|
|
- type: cosine_precision@1 |
|
|
value: 0.3787878787878788 |
|
|
name: Cosine Precision@1 |
|
|
- type: cosine_precision@3 |
|
|
value: 0.3728956228956229 |
|
|
name: Cosine Precision@3 |
|
|
- type: cosine_precision@5 |
|
|
value: 0.36060606060606065 |
|
|
name: Cosine Precision@5 |
|
|
- type: cosine_precision@10 |
|
|
value: 0.32601010101010097 |
|
|
name: Cosine Precision@10 |
|
|
- type: cosine_recall@1 |
|
|
value: 0.07971959353722971 |
|
|
name: Cosine Recall@1 |
|
|
- type: cosine_recall@3 |
|
|
value: 0.2026184382863416 |
|
|
name: Cosine Recall@3 |
|
|
- type: cosine_recall@5 |
|
|
value: 0.27887644095443376 |
|
|
name: Cosine Recall@5 |
|
|
- type: cosine_recall@10 |
|
|
value: 0.39430746021109475 |
|
|
name: Cosine Recall@10 |
|
|
- type: cosine_ndcg@10 |
|
|
value: 0.45372338563687165 |
|
|
name: Cosine Ndcg@10 |
|
|
- type: cosine_mrr@10 |
|
|
value: 0.414860910694244 |
|
|
name: Cosine Mrr@10 |
|
|
- type: cosine_map@100 |
|
|
value: 0.5082323561062431 |
|
|
name: Cosine Map@100 |
|
|
- task: |
|
|
type: information-retrieval |
|
|
name: Information Retrieval |
|
|
dataset: |
|
|
name: dim 256 |
|
|
type: dim_256 |
|
|
metrics: |
|
|
- type: cosine_accuracy@1 |
|
|
value: 0.3712121212121212 |
|
|
name: Cosine Accuracy@1 |
|
|
- type: cosine_accuracy@3 |
|
|
value: 0.398989898989899 |
|
|
name: Cosine Accuracy@3 |
|
|
- type: cosine_accuracy@5 |
|
|
value: 0.44191919191919193 |
|
|
name: Cosine Accuracy@5 |
|
|
- type: cosine_accuracy@10 |
|
|
value: 0.494949494949495 |
|
|
name: Cosine Accuracy@10 |
|
|
- type: cosine_precision@1 |
|
|
value: 0.3712121212121212 |
|
|
name: Cosine Precision@1 |
|
|
- type: cosine_precision@3 |
|
|
value: 0.3552188552188552 |
|
|
name: Cosine Precision@3 |
|
|
- type: cosine_precision@5 |
|
|
value: 0.33282828282828286 |
|
|
name: Cosine Precision@5 |
|
|
- type: cosine_precision@10 |
|
|
value: 0.29949494949494954 |
|
|
name: Cosine Precision@10 |
|
|
- type: cosine_recall@1 |
|
|
value: 0.07982818259272316 |
|
|
name: Cosine Recall@1 |
|
|
- type: cosine_recall@3 |
|
|
value: 0.1976196380449212 |
|
|
name: Cosine Recall@3 |
|
|
- type: cosine_recall@5 |
|
|
value: 0.26002173221499414 |
|
|
name: Cosine Recall@5 |
|
|
- type: cosine_recall@10 |
|
|
value: 0.36485373765457696 |
|
|
name: Cosine Recall@10 |
|
|
- type: cosine_ndcg@10 |
|
|
value: 0.4261612717180349 |
|
|
name: Cosine Ndcg@10 |
|
|
- type: cosine_mrr@10 |
|
|
value: 0.3972482764149431 |
|
|
name: Cosine Mrr@10 |
|
|
- type: cosine_map@100 |
|
|
value: 0.48924480926248376 |
|
|
name: Cosine Map@100 |
|
|
- task: |
|
|
type: information-retrieval |
|
|
name: Information Retrieval |
|
|
dataset: |
|
|
name: dim 128 |
|
|
type: dim_128 |
|
|
metrics: |
|
|
- type: cosine_accuracy@1 |
|
|
value: 0.33585858585858586 |
|
|
name: Cosine Accuracy@1 |
|
|
- type: cosine_accuracy@3 |
|
|
value: 0.37626262626262624 |
|
|
name: Cosine Accuracy@3 |
|
|
- type: cosine_accuracy@5 |
|
|
value: 0.41919191919191917 |
|
|
name: Cosine Accuracy@5 |
|
|
- type: cosine_accuracy@10 |
|
|
value: 0.4797979797979798 |
|
|
name: Cosine Accuracy@10 |
|
|
- type: cosine_precision@1 |
|
|
value: 0.33585858585858586 |
|
|
name: Cosine Precision@1 |
|
|
- type: cosine_precision@3 |
|
|
value: 0.32659932659932656 |
|
|
name: Cosine Precision@3 |
|
|
- type: cosine_precision@5 |
|
|
value: 0.3111111111111111 |
|
|
name: Cosine Precision@5 |
|
|
- type: cosine_precision@10 |
|
|
value: 0.2803030303030303 |
|
|
name: Cosine Precision@10 |
|
|
- type: cosine_recall@1 |
|
|
value: 0.07421363164771244 |
|
|
name: Cosine Recall@1 |
|
|
- type: cosine_recall@3 |
|
|
value: 0.18525500642088516 |
|
|
name: Cosine Recall@3 |
|
|
- type: cosine_recall@5 |
|
|
value: 0.25267706028894804 |
|
|
name: Cosine Recall@5 |
|
|
- type: cosine_recall@10 |
|
|
value: 0.35720405753526513 |
|
|
name: Cosine Recall@10 |
|
|
- type: cosine_ndcg@10 |
|
|
value: 0.4004282713649355 |
|
|
name: Cosine Ndcg@10 |
|
|
- type: cosine_mrr@10 |
|
|
value: 0.3674543049543049 |
|
|
name: Cosine Mrr@10 |
|
|
- type: cosine_map@100 |
|
|
value: 0.45757274754945104 |
|
|
name: Cosine Map@100 |
|
|
- task: |
|
|
type: information-retrieval |
|
|
name: Information Retrieval |
|
|
dataset: |
|
|
name: dim 64 |
|
|
type: dim_64 |
|
|
metrics: |
|
|
- type: cosine_accuracy@1 |
|
|
value: 0.2777777777777778 |
|
|
name: Cosine Accuracy@1 |
|
|
- type: cosine_accuracy@3 |
|
|
value: 0.31565656565656564 |
|
|
name: Cosine Accuracy@3 |
|
|
- type: cosine_accuracy@5 |
|
|
value: 0.3434343434343434 |
|
|
name: Cosine Accuracy@5 |
|
|
- type: cosine_accuracy@10 |
|
|
value: 0.38636363636363635 |
|
|
name: Cosine Accuracy@10 |
|
|
- type: cosine_precision@1 |
|
|
value: 0.2777777777777778 |
|
|
name: Cosine Precision@1 |
|
|
- type: cosine_precision@3 |
|
|
value: 0.2685185185185185 |
|
|
name: Cosine Precision@3 |
|
|
- type: cosine_precision@5 |
|
|
value: 0.253030303030303 |
|
|
name: Cosine Precision@5 |
|
|
- type: cosine_precision@10 |
|
|
value: 0.2222222222222222 |
|
|
name: Cosine Precision@10 |
|
|
- type: cosine_recall@1 |
|
|
value: 0.06505275009099755 |
|
|
name: Cosine Recall@1 |
|
|
- type: cosine_recall@3 |
|
|
value: 0.16288196174670413 |
|
|
name: Cosine Recall@3 |
|
|
- type: cosine_recall@5 |
|
|
value: 0.22036463456449257 |
|
|
name: Cosine Recall@5 |
|
|
- type: cosine_recall@10 |
|
|
value: 0.30790852718468 |
|
|
name: Cosine Recall@10 |
|
|
- type: cosine_ndcg@10 |
|
|
value: 0.3305966214431583 |
|
|
name: Cosine Ndcg@10 |
|
|
- type: cosine_mrr@10 |
|
|
value: 0.3029501362834696 |
|
|
name: Cosine Mrr@10 |
|
|
- type: cosine_map@100 |
|
|
value: 0.39861110645687153 |
|
|
name: Cosine Map@100 |
|
|
--- |
|
|
|
|
|
# multilingual-e5-large |
|
|
|
|
|
This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [intfloat/multilingual-e5-large](https://huggingface.co/intfloat/multilingual-e5-large). It maps sentences & paragraphs to a 1024-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more. |
|
|
|
|
|
## Model Details |
|
|
|
|
|
### Model Description |
|
|
- **Model Type:** Sentence Transformer |
|
|
- **Base model:** [intfloat/multilingual-e5-large](https://huggingface.co/intfloat/multilingual-e5-large) <!-- at revision 0dc5580a448e4284468b8909bae50fa925907bc5 --> |
|
|
- **Maximum Sequence Length:** 512 tokens |
|
|
- **Output Dimensionality:** 1024 dimensions |
|
|
- **Similarity Function:** Cosine Similarity |
|
|
<!-- - **Training Dataset:** Unknown --> |
|
|
- **Language:** en |
|
|
- **License:** apache-2.0 |
|
|
|
|
|
### Model Sources |
|
|
|
|
|
- **Documentation:** [Sentence Transformers Documentation](https://sbert.net) |
|
|
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers) |
|
|
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers) |
|
|
|
|
|
### Full Model Architecture |
|
|
|
|
|
``` |
|
|
SentenceTransformer( |
|
|
(0): Transformer({'max_seq_length': 512, 'do_lower_case': False, 'architecture': 'XLMRobertaModel'}) |
|
|
(1): Pooling({'word_embedding_dimension': 1024, 'pooling_mode_cls_token': False, 'pooling_mode_mean_tokens': True, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True}) |
|
|
(2): Normalize() |
|
|
) |
|
|
``` |
|
|
|
|
|
## Usage |
|
|
|
|
|
### Direct Usage (Sentence Transformers) |
|
|
|
|
|
First install the Sentence Transformers library: |
|
|
|
|
|
```bash |
|
|
pip install -U sentence-transformers |
|
|
``` |
|
|
|
|
|
Then you can load this model and run inference. |
|
|
```python |
|
|
from sentence_transformers import SentenceTransformer |
|
|
|
|
|
# Download from the 🤗 Hub |
|
|
model = SentenceTransformer("IoannisKat1/intfloat-multilingual-e5-large-new2") |
|
|
# Run inference |
|
|
sentences = [ |
|
|
'What can the contract be based on, besides individual contracts, in part according to this excerpt?', |
|
|
"1.Where processing is to be carried out on behalf of a controller, the controller shall use only processors providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject.\n2.The processor shall not engage another processor without prior specific or general written authorisation of the controller. In the case of general written authorisation, the processor shall inform the controller of any intended changes concerning the addition or replacement of other processors, thereby giving the controller the opportunity to object to such changes.\n3.Processing by a processor shall be governed by a contract or other legal act under Union or Member State law, that is binding on the processor with regard to the controller and that sets out the subject-matter and duration of the processing, the nature and purpose of the processing, the type of personal data and categories of data subjects and the obligations and rights of the controller. That contract or other legal act shall stipulate, in particular, that the processor: (a) processes the personal data only on documented instructions from the controller, including with regard to transfers of personal data to a third country or an international organisation, unless required to do so by Union or Member State law to which the processor is subject; in such a case, the processor shall inform the controller of that legal requirement before processing, unless that law prohibits such information on important grounds of public interest; (b) ensures that persons authorised to process the personal data have committed themselves to confidentiality or are under an appropriate statutory obligation of confidentiality; (c) takes all measures required pursuant to Article 32; (d) respects the conditions referred to in paragraphs 2 and 4 for engaging another processor; (e) taking into account the nature of the processing, assists the controller by appropriate technical and organisational measures, insofar as this is possible, for the fulfilment of the controller's obligation to respond to requests for exercising the data subject's rights laid down in Chapter III; (f) assists the controller in ensuring compliance with the obligations pursuant to Articles 32 to 36 taking into account the nature of processing and the information available to the processor; (g) at the choice of the controller, deletes or returns all the personal data to the controller after the end of the provision of services relating to processing, and deletes existing copies unless Union or Member State law requires storage of the personal data; (h) makes available to the controller all information necessary to demonstrate compliance with the obligations laid down in this Article and allow for and contribute to audits, including inspections, conducted by the controller or another auditor mandated by the controller. 4.5.2016 L 119/49 With regard to point (h) of the first subparagraph, the processor shall immediately inform the controller if, in its opinion, an instruction infringes this Regulation or other Union or Member State data protection provisions.\n4.Where a processor engages another processor for carrying out specific processing activities on behalf of the controller, the same data protection obligations as set out in the contract or other legal act between the controller and the processor as referred to in paragraph 3 shall be imposed on that other processor by way of a contract or other legal act under Union or Member State law, in particular providing sufficient guarantees to implement appropriate technical and organisational measures in such a manner that the processing will meet the requirements of this Regulation. Where that other processor fails to fulfil its data protection obligations, the initial processor shall remain fully liable to the controller for the performance of that other processor's obligations.\n5.Adherence of a processor to an approved code of conduct as referred to in Article 40 or an approved certification mechanism as referred to in Article 42 may be used as an element by which to demonstrate sufficient guarantees as referred to in paragraphs 1 and 4 of this Article.\n6.Without prejudice to an individual contract between the controller and the processor, the contract or the other legal act referred to in paragraphs 3 and 4 of this Article may be based, in whole or in part, on standard contractual clauses referred to in paragraphs 7 and 8 of this Article, including when they are part of a certification granted to the controller or processor pursuant to Articles 42 and 43\n7.The Commission may lay down standard contractual clauses for the matters referred to in paragraph 3 and 4 of this Article and in accordance with the examination procedure referred to in Article 93(2).\n8.A supervisory authority may adopt standard contractual clauses for the matters referred to in paragraph 3 and 4 of this Article and in accordance with the consistency mechanism referred to in Article 63\n9.The contract or the other legal act referred to in paragraphs 3 and 4 shall be in writing, including in electronic form.\n10.Without prejudice to Articles 82, 83 and 84, if a processor infringes this Regulation by determining the purposes and means of processing, the processor shall be considered to be a controller in respect of that processing.", |
|
|
'1.The Board shall draw up an annual report regarding the protection of natural persons with regard to processing in the Union and, where relevant, in third countries and international organisations. The report shall be made public and be transmitted to the European Parliament, to the Council and to the Commission.\n2.The annual report shall include a review of the practical application of the guidelines, recommendations and best practices referred to in point (l) of Article 70(1) as well as of the binding decisions referred to in Article 65.', |
|
|
] |
|
|
embeddings = model.encode(sentences) |
|
|
print(embeddings.shape) |
|
|
# [3, 1024] |
|
|
|
|
|
# Get the similarity scores for the embeddings |
|
|
similarities = model.similarity(embeddings, embeddings) |
|
|
print(similarities) |
|
|
# tensor([[1.0000, 0.4491, 0.1215], |
|
|
# [0.4491, 1.0000, 0.2320], |
|
|
# [0.1215, 0.2320, 1.0000]]) |
|
|
``` |
|
|
|
|
|
<!-- |
|
|
### Direct Usage (Transformers) |
|
|
|
|
|
<details><summary>Click to see the direct usage in Transformers</summary> |
|
|
|
|
|
</details> |
|
|
--> |
|
|
|
|
|
<!-- |
|
|
### Downstream Usage (Sentence Transformers) |
|
|
|
|
|
You can finetune this model on your own dataset. |
|
|
|
|
|
<details><summary>Click to expand</summary> |
|
|
|
|
|
</details> |
|
|
--> |
|
|
|
|
|
<!-- |
|
|
### Out-of-Scope Use |
|
|
|
|
|
*List how the model may foreseeably be misused and address what users ought not to do with the model.* |
|
|
--> |
|
|
|
|
|
## Evaluation |
|
|
|
|
|
### Metrics |
|
|
|
|
|
#### Information Retrieval |
|
|
|
|
|
* Dataset: `dim_1024` |
|
|
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"truncate_dim": 1024 |
|
|
} |
|
|
``` |
|
|
|
|
|
| Metric | Value | |
|
|
|:--------------------|:-----------| |
|
|
| cosine_accuracy@1 | 0.3965 | |
|
|
| cosine_accuracy@3 | 0.4419 | |
|
|
| cosine_accuracy@5 | 0.4773 | |
|
|
| cosine_accuracy@10 | 0.5303 | |
|
|
| cosine_precision@1 | 0.3965 | |
|
|
| cosine_precision@3 | 0.3864 | |
|
|
| cosine_precision@5 | 0.3682 | |
|
|
| cosine_precision@10 | 0.329 | |
|
|
| cosine_recall@1 | 0.083 | |
|
|
| cosine_recall@3 | 0.2081 | |
|
|
| cosine_recall@5 | 0.2836 | |
|
|
| cosine_recall@10 | 0.3941 | |
|
|
| **cosine_ndcg@10** | **0.4599** | |
|
|
| cosine_mrr@10 | 0.4271 | |
|
|
| cosine_map@100 | 0.5169 | |
|
|
|
|
|
#### Information Retrieval |
|
|
|
|
|
* Dataset: `dim_768` |
|
|
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"truncate_dim": 768 |
|
|
} |
|
|
``` |
|
|
|
|
|
| Metric | Value | |
|
|
|:--------------------|:-----------| |
|
|
| cosine_accuracy@1 | 0.3939 | |
|
|
| cosine_accuracy@3 | 0.4419 | |
|
|
| cosine_accuracy@5 | 0.5025 | |
|
|
| cosine_accuracy@10 | 0.5505 | |
|
|
| cosine_precision@1 | 0.3939 | |
|
|
| cosine_precision@3 | 0.3855 | |
|
|
| cosine_precision@5 | 0.3763 | |
|
|
| cosine_precision@10 | 0.3447 | |
|
|
| cosine_recall@1 | 0.0817 | |
|
|
| cosine_recall@3 | 0.2045 | |
|
|
| cosine_recall@5 | 0.2833 | |
|
|
| cosine_recall@10 | 0.4024 | |
|
|
| **cosine_ndcg@10** | **0.4717** | |
|
|
| cosine_mrr@10 | 0.431 | |
|
|
| cosine_map@100 | 0.5281 | |
|
|
|
|
|
#### Information Retrieval |
|
|
|
|
|
* Dataset: `dim_512` |
|
|
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"truncate_dim": 512 |
|
|
} |
|
|
``` |
|
|
|
|
|
| Metric | Value | |
|
|
|:--------------------|:-----------| |
|
|
| cosine_accuracy@1 | 0.3788 | |
|
|
| cosine_accuracy@3 | 0.4318 | |
|
|
| cosine_accuracy@5 | 0.4848 | |
|
|
| cosine_accuracy@10 | 0.5303 | |
|
|
| cosine_precision@1 | 0.3788 | |
|
|
| cosine_precision@3 | 0.3729 | |
|
|
| cosine_precision@5 | 0.3606 | |
|
|
| cosine_precision@10 | 0.326 | |
|
|
| cosine_recall@1 | 0.0797 | |
|
|
| cosine_recall@3 | 0.2026 | |
|
|
| cosine_recall@5 | 0.2789 | |
|
|
| cosine_recall@10 | 0.3943 | |
|
|
| **cosine_ndcg@10** | **0.4537** | |
|
|
| cosine_mrr@10 | 0.4149 | |
|
|
| cosine_map@100 | 0.5082 | |
|
|
|
|
|
#### Information Retrieval |
|
|
|
|
|
* Dataset: `dim_256` |
|
|
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"truncate_dim": 256 |
|
|
} |
|
|
``` |
|
|
|
|
|
| Metric | Value | |
|
|
|:--------------------|:-----------| |
|
|
| cosine_accuracy@1 | 0.3712 | |
|
|
| cosine_accuracy@3 | 0.399 | |
|
|
| cosine_accuracy@5 | 0.4419 | |
|
|
| cosine_accuracy@10 | 0.4949 | |
|
|
| cosine_precision@1 | 0.3712 | |
|
|
| cosine_precision@3 | 0.3552 | |
|
|
| cosine_precision@5 | 0.3328 | |
|
|
| cosine_precision@10 | 0.2995 | |
|
|
| cosine_recall@1 | 0.0798 | |
|
|
| cosine_recall@3 | 0.1976 | |
|
|
| cosine_recall@5 | 0.26 | |
|
|
| cosine_recall@10 | 0.3649 | |
|
|
| **cosine_ndcg@10** | **0.4262** | |
|
|
| cosine_mrr@10 | 0.3972 | |
|
|
| cosine_map@100 | 0.4892 | |
|
|
|
|
|
#### Information Retrieval |
|
|
|
|
|
* Dataset: `dim_128` |
|
|
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"truncate_dim": 128 |
|
|
} |
|
|
``` |
|
|
|
|
|
| Metric | Value | |
|
|
|:--------------------|:-----------| |
|
|
| cosine_accuracy@1 | 0.3359 | |
|
|
| cosine_accuracy@3 | 0.3763 | |
|
|
| cosine_accuracy@5 | 0.4192 | |
|
|
| cosine_accuracy@10 | 0.4798 | |
|
|
| cosine_precision@1 | 0.3359 | |
|
|
| cosine_precision@3 | 0.3266 | |
|
|
| cosine_precision@5 | 0.3111 | |
|
|
| cosine_precision@10 | 0.2803 | |
|
|
| cosine_recall@1 | 0.0742 | |
|
|
| cosine_recall@3 | 0.1853 | |
|
|
| cosine_recall@5 | 0.2527 | |
|
|
| cosine_recall@10 | 0.3572 | |
|
|
| **cosine_ndcg@10** | **0.4004** | |
|
|
| cosine_mrr@10 | 0.3675 | |
|
|
| cosine_map@100 | 0.4576 | |
|
|
|
|
|
#### Information Retrieval |
|
|
|
|
|
* Dataset: `dim_64` |
|
|
* Evaluated with [<code>InformationRetrievalEvaluator</code>](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"truncate_dim": 64 |
|
|
} |
|
|
``` |
|
|
|
|
|
| Metric | Value | |
|
|
|:--------------------|:-----------| |
|
|
| cosine_accuracy@1 | 0.2778 | |
|
|
| cosine_accuracy@3 | 0.3157 | |
|
|
| cosine_accuracy@5 | 0.3434 | |
|
|
| cosine_accuracy@10 | 0.3864 | |
|
|
| cosine_precision@1 | 0.2778 | |
|
|
| cosine_precision@3 | 0.2685 | |
|
|
| cosine_precision@5 | 0.253 | |
|
|
| cosine_precision@10 | 0.2222 | |
|
|
| cosine_recall@1 | 0.0651 | |
|
|
| cosine_recall@3 | 0.1629 | |
|
|
| cosine_recall@5 | 0.2204 | |
|
|
| cosine_recall@10 | 0.3079 | |
|
|
| **cosine_ndcg@10** | **0.3306** | |
|
|
| cosine_mrr@10 | 0.303 | |
|
|
| cosine_map@100 | 0.3986 | |
|
|
|
|
|
<!-- |
|
|
## Bias, Risks and Limitations |
|
|
|
|
|
*What are the known or foreseeable issues stemming from this model? You could also flag here known failure cases or weaknesses of the model.* |
|
|
--> |
|
|
|
|
|
<!-- |
|
|
### Recommendations |
|
|
|
|
|
*What are recommendations with respect to the foreseeable issues? For example, filtering explicit content.* |
|
|
--> |
|
|
|
|
|
## Training Details |
|
|
|
|
|
### Training Dataset |
|
|
|
|
|
#### Unnamed Dataset |
|
|
|
|
|
* Size: 1,580 training samples |
|
|
* Columns: <code>anchor</code> and <code>positive</code> |
|
|
* Approximate statistics based on the first 1000 samples: |
|
|
| | anchor | positive | |
|
|
|:--------|:----------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------| |
|
|
| type | string | string | |
|
|
| details | <ul><li>min: 7 tokens</li><li>mean: 17.21 tokens</li><li>max: 43 tokens</li></ul> | <ul><li>min: 27 tokens</li><li>mean: 373.71 tokens</li><li>max: 512 tokens</li></ul> | |
|
|
* Samples: |
|
|
| anchor | positive | |
|
|
|:--------------------------------------------------------------------------------------------------------------|:---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| |
|
|
| <code>What measures should each supervisory authority take to facilitate the submission of complaints?</code> | <code>Every data subject should have the right to lodge a complaint with a single supervisory authority, in particular in the Member State of his or her habitual residence, and the right to an effective judicial remedy in accordance 4.5.2016 L 119/25 Official Journal of the European Union EN with Article 47 of the Charter if the data subject considers that his or her rights under this Regulation are infringed or where the supervisory authority does not act on a complaint, partially or wholly rejects or dismisses a complaint or does not act where such action is necessary to protect the rights of the data subject. The investigation following a complaint should be carried out, subject to judicial review, to the extent that is appropriate in the specific case. The supervisory authority should inform the data subject of the progress and the outcome of the complaint within a reasonable period. If the case requires further investigation or coordination with another supervisory authority, intermed...</code> | |
|
|
| <code>What did the evidence not indicate?</code> | <code>**Court (Civil/Criminal): Civil** <br>**Provisions:** <br>**Time of commission of the act:** <br>**Outcome (not guilty, guilty):** <br>**Reasoning:** Claim for compensation and monetary satisfaction due to moral damage against a mobile phone company and a credit institution within the framework of inadequate fulfillment of a payment services contract for "web banking." Appropriate actions for mobile phone companies in case of a request for a "sim" card replacement due to wear or loss. They must verify the customer's identity based on the personal details and identification information registered in their system but are not liable for any changes in the latter that were not timely communicated to them. Further security measures such as phone communication or sending an SMS to the mobile number holder are not required. Payment services under Law 4357/2018. Obligation of the payment service provider, such as banks, to inform the payer after receiving a relevant order for making a payment. The con...</code> | |
|
|
| <code>What was the amount transferred from her account?</code> | <code>Court (Civil/Criminal): Criminal <br>Provisions: Article 42 paragraphs 1, 2, 3, and 7 of Law 4557/2018 <br>Time of commission of the act: <br>Outcome (not guilty, guilty): <br>Reasoning: Obligation of the payment service provider, such as banks, to inform their contracting customer after receiving a relevant order for a payment to be made on their behalf. Content of the above notification at the stage of receiving the payment order and during its execution. Terms of liability for the provider regarding compensation for non-execution, erroneous, or delayed execution of payment transactions. In particular, in the case of an unauthorized or erroneous payment, the user is required to notify the provider within a specified timeframe as soon as they become aware of the corresponding transaction. The provisions of Law 4357/2018 establish mandatory legal regulations in favor of users of payment services and cannot be contractually modified to their detriment, but only to their benefit. Defenses availa...</code> | |
|
|
* Loss: [<code>MatryoshkaLoss</code>](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#matryoshkaloss) with these parameters: |
|
|
```json |
|
|
{ |
|
|
"loss": "MultipleNegativesRankingLoss", |
|
|
"matryoshka_dims": [ |
|
|
1024, |
|
|
768, |
|
|
512, |
|
|
256, |
|
|
128, |
|
|
64 |
|
|
], |
|
|
"matryoshka_weights": [ |
|
|
1, |
|
|
1, |
|
|
1, |
|
|
1, |
|
|
1, |
|
|
1 |
|
|
], |
|
|
"n_dims_per_step": -1 |
|
|
} |
|
|
``` |
|
|
|
|
|
### Training Hyperparameters |
|
|
#### Non-Default Hyperparameters |
|
|
|
|
|
- `eval_strategy`: epoch |
|
|
- `per_device_train_batch_size`: 2 |
|
|
- `gradient_accumulation_steps`: 8 |
|
|
- `learning_rate`: 2e-05 |
|
|
- `num_train_epochs`: 12 |
|
|
- `lr_scheduler_type`: cosine |
|
|
- `warmup_ratio`: 0.1 |
|
|
- `bf16`: True |
|
|
- `tf32`: True |
|
|
- `load_best_model_at_end`: True |
|
|
- `optim`: adamw_torch_fused |
|
|
- `batch_sampler`: no_duplicates |
|
|
|
|
|
#### All Hyperparameters |
|
|
<details><summary>Click to expand</summary> |
|
|
|
|
|
- `overwrite_output_dir`: False |
|
|
- `do_predict`: False |
|
|
- `eval_strategy`: epoch |
|
|
- `prediction_loss_only`: True |
|
|
- `per_device_train_batch_size`: 2 |
|
|
- `per_device_eval_batch_size`: 8 |
|
|
- `per_gpu_train_batch_size`: None |
|
|
- `per_gpu_eval_batch_size`: None |
|
|
- `gradient_accumulation_steps`: 8 |
|
|
- `eval_accumulation_steps`: None |
|
|
- `torch_empty_cache_steps`: None |
|
|
- `learning_rate`: 2e-05 |
|
|
- `weight_decay`: 0.0 |
|
|
- `adam_beta1`: 0.9 |
|
|
- `adam_beta2`: 0.999 |
|
|
- `adam_epsilon`: 1e-08 |
|
|
- `max_grad_norm`: 1.0 |
|
|
- `num_train_epochs`: 12 |
|
|
- `max_steps`: -1 |
|
|
- `lr_scheduler_type`: cosine |
|
|
- `lr_scheduler_kwargs`: {} |
|
|
- `warmup_ratio`: 0.1 |
|
|
- `warmup_steps`: 0 |
|
|
- `log_level`: passive |
|
|
- `log_level_replica`: warning |
|
|
- `log_on_each_node`: True |
|
|
- `logging_nan_inf_filter`: True |
|
|
- `save_safetensors`: True |
|
|
- `save_on_each_node`: False |
|
|
- `save_only_model`: False |
|
|
- `restore_callback_states_from_checkpoint`: False |
|
|
- `no_cuda`: False |
|
|
- `use_cpu`: False |
|
|
- `use_mps_device`: False |
|
|
- `seed`: 42 |
|
|
- `data_seed`: None |
|
|
- `jit_mode_eval`: False |
|
|
- `use_ipex`: False |
|
|
- `bf16`: True |
|
|
- `fp16`: False |
|
|
- `fp16_opt_level`: O1 |
|
|
- `half_precision_backend`: auto |
|
|
- `bf16_full_eval`: False |
|
|
- `fp16_full_eval`: False |
|
|
- `tf32`: True |
|
|
- `local_rank`: 0 |
|
|
- `ddp_backend`: None |
|
|
- `tpu_num_cores`: None |
|
|
- `tpu_metrics_debug`: False |
|
|
- `debug`: [] |
|
|
- `dataloader_drop_last`: False |
|
|
- `dataloader_num_workers`: 0 |
|
|
- `dataloader_prefetch_factor`: None |
|
|
- `past_index`: -1 |
|
|
- `disable_tqdm`: False |
|
|
- `remove_unused_columns`: True |
|
|
- `label_names`: None |
|
|
- `load_best_model_at_end`: True |
|
|
- `ignore_data_skip`: False |
|
|
- `fsdp`: [] |
|
|
- `fsdp_min_num_params`: 0 |
|
|
- `fsdp_config`: {'min_num_params': 0, 'xla': False, 'xla_fsdp_v2': False, 'xla_fsdp_grad_ckpt': False} |
|
|
- `tp_size`: 0 |
|
|
- `fsdp_transformer_layer_cls_to_wrap`: None |
|
|
- `accelerator_config`: {'split_batches': False, 'dispatch_batches': None, 'even_batches': True, 'use_seedable_sampler': True, 'non_blocking': False, 'gradient_accumulation_kwargs': None} |
|
|
- `deepspeed`: None |
|
|
- `label_smoothing_factor`: 0.0 |
|
|
- `optim`: adamw_torch_fused |
|
|
- `optim_args`: None |
|
|
- `adafactor`: False |
|
|
- `group_by_length`: False |
|
|
- `length_column_name`: length |
|
|
- `ddp_find_unused_parameters`: None |
|
|
- `ddp_bucket_cap_mb`: None |
|
|
- `ddp_broadcast_buffers`: False |
|
|
- `dataloader_pin_memory`: True |
|
|
- `dataloader_persistent_workers`: False |
|
|
- `skip_memory_metrics`: True |
|
|
- `use_legacy_prediction_loop`: False |
|
|
- `push_to_hub`: False |
|
|
- `resume_from_checkpoint`: None |
|
|
- `hub_model_id`: None |
|
|
- `hub_strategy`: every_save |
|
|
- `hub_private_repo`: None |
|
|
- `hub_always_push`: False |
|
|
- `gradient_checkpointing`: False |
|
|
- `gradient_checkpointing_kwargs`: None |
|
|
- `include_inputs_for_metrics`: False |
|
|
- `include_for_metrics`: [] |
|
|
- `eval_do_concat_batches`: True |
|
|
- `fp16_backend`: auto |
|
|
- `push_to_hub_model_id`: None |
|
|
- `push_to_hub_organization`: None |
|
|
- `mp_parameters`: |
|
|
- `auto_find_batch_size`: False |
|
|
- `full_determinism`: False |
|
|
- `torchdynamo`: None |
|
|
- `ray_scope`: last |
|
|
- `ddp_timeout`: 1800 |
|
|
- `torch_compile`: False |
|
|
- `torch_compile_backend`: None |
|
|
- `torch_compile_mode`: None |
|
|
- `include_tokens_per_second`: False |
|
|
- `include_num_input_tokens_seen`: False |
|
|
- `neftune_noise_alpha`: None |
|
|
- `optim_target_modules`: None |
|
|
- `batch_eval_metrics`: False |
|
|
- `eval_on_start`: False |
|
|
- `use_liger_kernel`: False |
|
|
- `eval_use_gather_object`: False |
|
|
- `average_tokens_across_devices`: False |
|
|
- `prompts`: None |
|
|
- `batch_sampler`: no_duplicates |
|
|
- `multi_dataset_batch_sampler`: proportional |
|
|
- `router_mapping`: {} |
|
|
- `learning_rate_mapping`: {} |
|
|
|
|
|
</details> |
|
|
|
|
|
### Training Logs |
|
|
<details><summary>Click to expand</summary> |
|
|
|
|
|
| Epoch | Step | Training Loss | dim_1024_cosine_ndcg@10 | dim_768_cosine_ndcg@10 | dim_512_cosine_ndcg@10 | dim_256_cosine_ndcg@10 | dim_128_cosine_ndcg@10 | dim_64_cosine_ndcg@10 | |
|
|
|:----------:|:-------:|:-------------:|:-----------------------:|:----------------------:|:----------------------:|:----------------------:|:----------------------:|:---------------------:| |
|
|
| -1 | -1 | - | 0.4214 | 0.4041 | 0.3894 | 0.3254 | 0.2396 | 0.1752 | |
|
|
| 0.1013 | 10 | 20.5156 | - | - | - | - | - | - | |
|
|
| 0.2025 | 20 | 19.5068 | - | - | - | - | - | - | |
|
|
| 0.3038 | 30 | 17.3704 | - | - | - | - | - | - | |
|
|
| 0.4051 | 40 | 17.1827 | - | - | - | - | - | - | |
|
|
| 0.5063 | 50 | 16.6068 | - | - | - | - | - | - | |
|
|
| 0.6076 | 60 | 16.4217 | - | - | - | - | - | - | |
|
|
| 0.7089 | 70 | 15.5364 | - | - | - | - | - | - | |
|
|
| 0.8101 | 80 | 13.3384 | - | - | - | - | - | - | |
|
|
| 0.9114 | 90 | 15.6398 | - | - | - | - | - | - | |
|
|
| 0.9924 | 98 | - | 0.4681 | 0.4793 | 0.4615 | 0.4166 | 0.3638 | 0.2744 | |
|
|
| 1.0203 | 100 | 14.2832 | - | - | - | - | - | - | |
|
|
| 1.1215 | 110 | 10.0518 | - | - | - | - | - | - | |
|
|
| 1.2228 | 120 | 10.3808 | - | - | - | - | - | - | |
|
|
| 1.3241 | 130 | 10.9265 | - | - | - | - | - | - | |
|
|
| 1.4253 | 140 | 10.2787 | - | - | - | - | - | - | |
|
|
| 1.5266 | 150 | 10.9999 | - | - | - | - | - | - | |
|
|
| 1.6278 | 160 | 6.8139 | - | - | - | - | - | - | |
|
|
| 1.7291 | 170 | 7.986 | - | - | - | - | - | - | |
|
|
| 1.8304 | 180 | 9.2866 | - | - | - | - | - | - | |
|
|
| 1.9316 | 190 | 9.2912 | - | - | - | - | - | - | |
|
|
| 1.9924 | 196 | - | 0.4772 | 0.4612 | 0.4645 | 0.3945 | 0.3636 | 0.2986 | |
|
|
| 2.0405 | 200 | 9.9778 | - | - | - | - | - | - | |
|
|
| 2.1418 | 210 | 7.8425 | - | - | - | - | - | - | |
|
|
| 2.2430 | 220 | 7.7307 | - | - | - | - | - | - | |
|
|
| 2.3443 | 230 | 6.6603 | - | - | - | - | - | - | |
|
|
| 2.4456 | 240 | 5.8628 | - | - | - | - | - | - | |
|
|
| 2.5468 | 250 | 7.5488 | - | - | - | - | - | - | |
|
|
| 2.6481 | 260 | 8.5646 | - | - | - | - | - | - | |
|
|
| 2.7494 | 270 | 7.7542 | - | - | - | - | - | - | |
|
|
| 2.8506 | 280 | 6.046 | - | - | - | - | - | - | |
|
|
| 2.9519 | 290 | 4.2612 | - | - | - | - | - | - | |
|
|
| 2.9924 | 294 | - | 0.4663 | 0.4403 | 0.4505 | 0.4067 | 0.3673 | 0.3267 | |
|
|
| 3.0608 | 300 | 4.7943 | - | - | - | - | - | - | |
|
|
| 3.1620 | 310 | 7.1236 | - | - | - | - | - | - | |
|
|
| 3.2633 | 320 | 7.8359 | - | - | - | - | - | - | |
|
|
| 3.3646 | 330 | 7.2883 | - | - | - | - | - | - | |
|
|
| 3.4658 | 340 | 6.8383 | - | - | - | - | - | - | |
|
|
| 3.5671 | 350 | 6.1145 | - | - | - | - | - | - | |
|
|
| 3.6684 | 360 | 5.8697 | - | - | - | - | - | - | |
|
|
| 3.7696 | 370 | 5.3551 | - | - | - | - | - | - | |
|
|
| 3.8709 | 380 | 7.7562 | - | - | - | - | - | - | |
|
|
| 3.9722 | 390 | 4.1286 | - | - | - | - | - | - | |
|
|
| 3.9924 | 392 | - | 0.5004 | 0.4837 | 0.4654 | 0.4095 | 0.3771 | 0.3238 | |
|
|
| 4.0810 | 400 | 6.6456 | - | - | - | - | - | - | |
|
|
| 4.1823 | 410 | 7.8539 | - | - | - | - | - | - | |
|
|
| 4.2835 | 420 | 5.2917 | - | - | - | - | - | - | |
|
|
| 4.3848 | 430 | 5.5573 | - | - | - | - | - | - | |
|
|
| 4.4861 | 440 | 6.957 | - | - | - | - | - | - | |
|
|
| 4.5873 | 450 | 6.3068 | - | - | - | - | - | - | |
|
|
| 4.6886 | 460 | 6.0006 | - | - | - | - | - | - | |
|
|
| 4.7899 | 470 | 6.1419 | - | - | - | - | - | - | |
|
|
| 4.8911 | 480 | 5.0808 | - | - | - | - | - | - | |
|
|
| 4.9924 | 490 | 6.0219 | 0.4752 | 0.4754 | 0.4581 | 0.4243 | 0.3931 | 0.3410 | |
|
|
| 5.1013 | 500 | 3.7305 | - | - | - | - | - | - | |
|
|
| 5.2025 | 510 | 4.827 | - | - | - | - | - | - | |
|
|
| 5.3038 | 520 | 3.1179 | - | - | - | - | - | - | |
|
|
| 5.4051 | 530 | 6.141 | - | - | - | - | - | - | |
|
|
| 5.5063 | 540 | 6.3686 | - | - | - | - | - | - | |
|
|
| 5.6076 | 550 | 4.9029 | - | - | - | - | - | - | |
|
|
| 5.7089 | 560 | 3.6987 | - | - | - | - | - | - | |
|
|
| 5.8101 | 570 | 5.5046 | - | - | - | - | - | - | |
|
|
| 5.9114 | 580 | 5.0166 | - | - | - | - | - | - | |
|
|
| 5.9924 | 588 | - | 0.4737 | 0.4748 | 0.4567 | 0.4185 | 0.3890 | 0.3435 | |
|
|
| 6.0203 | 590 | 3.9625 | - | - | - | - | - | - | |
|
|
| 6.1215 | 600 | 6.7869 | - | - | - | - | - | - | |
|
|
| 6.2228 | 610 | 3.6329 | - | - | - | - | - | - | |
|
|
| 6.3241 | 620 | 6.2702 | - | - | - | - | - | - | |
|
|
| 6.4253 | 630 | 3.3559 | - | - | - | - | - | - | |
|
|
| 6.5266 | 640 | 4.0666 | - | - | - | - | - | - | |
|
|
| 6.6278 | 650 | 3.5322 | - | - | - | - | - | - | |
|
|
| 6.7291 | 660 | 4.8831 | - | - | - | - | - | - | |
|
|
| 6.8304 | 670 | 6.6302 | - | - | - | - | - | - | |
|
|
| 6.9316 | 680 | 5.7623 | - | - | - | - | - | - | |
|
|
| 6.9924 | 686 | - | 0.4687 | 0.4713 | 0.4520 | 0.4194 | 0.3950 | 0.3338 | |
|
|
| 7.0405 | 690 | 5.5453 | - | - | - | - | - | - | |
|
|
| 7.1418 | 700 | 2.8097 | - | - | - | - | - | - | |
|
|
| 7.2430 | 710 | 3.5171 | - | - | - | - | - | - | |
|
|
| 7.3443 | 720 | 3.5449 | - | - | - | - | - | - | |
|
|
| 7.4456 | 730 | 4.6169 | - | - | - | - | - | - | |
|
|
| 7.5468 | 740 | 3.567 | - | - | - | - | - | - | |
|
|
| 7.6481 | 750 | 5.7251 | - | - | - | - | - | - | |
|
|
| 7.7494 | 760 | 3.7201 | - | - | - | - | - | - | |
|
|
| 7.8506 | 770 | 3.1051 | - | - | - | - | - | - | |
|
|
| 7.9519 | 780 | 3.9642 | - | - | - | - | - | - | |
|
|
| **7.9924** | **784** | **-** | **0.4599** | **0.4717** | **0.4537** | **0.4262** | **0.4004** | **0.3306** | |
|
|
| 8.0608 | 790 | 3.923 | - | - | - | - | - | - | |
|
|
| 8.1620 | 800 | 3.52 | - | - | - | - | - | - | |
|
|
| 8.2633 | 810 | 3.1567 | - | - | - | - | - | - | |
|
|
| 8.3646 | 820 | 6.1725 | - | - | - | - | - | - | |
|
|
| 8.4658 | 830 | 3.259 | - | - | - | - | - | - | |
|
|
| 8.5671 | 840 | 6.6232 | - | - | - | - | - | - | |
|
|
| 8.6684 | 850 | 3.7085 | - | - | - | - | - | - | |
|
|
| 8.7696 | 860 | 4.0311 | - | - | - | - | - | - | |
|
|
| 8.8709 | 870 | 7.2503 | - | - | - | - | - | - | |
|
|
| 8.9722 | 880 | 2.2984 | - | - | - | - | - | - | |
|
|
| 8.9924 | 882 | - | 0.4632 | 0.4752 | 0.4550 | 0.4247 | 0.3953 | 0.3281 | |
|
|
| 9.0810 | 890 | 4.519 | - | - | - | - | - | - | |
|
|
| 9.1823 | 900 | 2.99 | - | - | - | - | - | - | |
|
|
| 9.2835 | 910 | 5.3026 | - | - | - | - | - | - | |
|
|
| 9.3848 | 920 | 3.8492 | - | - | - | - | - | - | |
|
|
| 9.4861 | 930 | 1.9454 | - | - | - | - | - | - | |
|
|
| 9.5873 | 940 | 3.538 | - | - | - | - | - | - | |
|
|
| 9.6886 | 950 | 4.1874 | - | - | - | - | - | - | |
|
|
| 9.7899 | 960 | 4.2356 | - | - | - | - | - | - | |
|
|
| 9.8911 | 970 | 4.5356 | - | - | - | - | - | - | |
|
|
| 9.9924 | 980 | 4.0243 | 0.4665 | 0.4681 | 0.4507 | 0.4236 | 0.3937 | 0.3288 | |
|
|
| -1 | -1 | - | 0.4599 | 0.4717 | 0.4537 | 0.4262 | 0.4004 | 0.3306 | |
|
|
|
|
|
* The bold row denotes the saved checkpoint. |
|
|
</details> |
|
|
|
|
|
### Framework Versions |
|
|
- Python: 3.12.11 |
|
|
- Sentence Transformers: 5.1.0 |
|
|
- Transformers: 4.51.3 |
|
|
- PyTorch: 2.8.0+cu126 |
|
|
- Accelerate: 1.10.1 |
|
|
- Datasets: 4.0.0 |
|
|
- Tokenizers: 0.21.4 |
|
|
|
|
|
## Citation |
|
|
|
|
|
### BibTeX |
|
|
|
|
|
#### Sentence Transformers |
|
|
```bibtex |
|
|
@inproceedings{reimers-2019-sentence-bert, |
|
|
title = "Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks", |
|
|
author = "Reimers, Nils and Gurevych, Iryna", |
|
|
booktitle = "Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing", |
|
|
month = "11", |
|
|
year = "2019", |
|
|
publisher = "Association for Computational Linguistics", |
|
|
url = "https://arxiv.org/abs/1908.10084", |
|
|
} |
|
|
``` |
|
|
|
|
|
#### MatryoshkaLoss |
|
|
```bibtex |
|
|
@misc{kusupati2024matryoshka, |
|
|
title={Matryoshka Representation Learning}, |
|
|
author={Aditya Kusupati and Gantavya Bhatt and Aniket Rege and Matthew Wallingford and Aditya Sinha and Vivek Ramanujan and William Howard-Snyder and Kaifeng Chen and Sham Kakade and Prateek Jain and Ali Farhadi}, |
|
|
year={2024}, |
|
|
eprint={2205.13147}, |
|
|
archivePrefix={arXiv}, |
|
|
primaryClass={cs.LG} |
|
|
} |
|
|
``` |
|
|
|
|
|
#### MultipleNegativesRankingLoss |
|
|
```bibtex |
|
|
@misc{henderson2017efficient, |
|
|
title={Efficient Natural Language Response Suggestion for Smart Reply}, |
|
|
author={Matthew Henderson and Rami Al-Rfou and Brian Strope and Yun-hsuan Sung and Laszlo Lukacs and Ruiqi Guo and Sanjiv Kumar and Balint Miklos and Ray Kurzweil}, |
|
|
year={2017}, |
|
|
eprint={1705.00652}, |
|
|
archivePrefix={arXiv}, |
|
|
primaryClass={cs.CL} |
|
|
} |
|
|
``` |
|
|
|
|
|
<!-- |
|
|
## Glossary |
|
|
|
|
|
*Clearly define terms in order to be accessible across audiences.* |
|
|
--> |
|
|
|
|
|
<!-- |
|
|
## Model Card Authors |
|
|
|
|
|
*Lists the people who create the model card, providing recognition and accountability for the detailed work that goes into its construction.* |
|
|
--> |
|
|
|
|
|
<!-- |
|
|
## Model Card Contact |
|
|
|
|
|
*Provides a way for people who have updates to the Model Card, suggestions, or questions, to contact the Model Card authors.* |
|
|
--> |