Transcript (law)

A protocol maintains or sets the time at which or in which order process which was initiated by whom or by what. Logging denotes the resignation of the three parts of the protocol at the time, people and process involved. If the resignation in writing, one also speaks of writing. Colloquially, a written warning is called a protocol.

  • 5.1 logs in the telecommunications and computer science
  • 5.2 The protocol in diplomacy
  • 5.3 logs in the diplomacy
  • 5.4 Experimental protocol in research

Etymology

The word protocol is borrowed from the German standard vocabulary since the 16th century proved and from the Middle Latin protocollum, which in turn even from the Middle Greek πρωτόκολλον, protókollon ( from πρώτος protos " first" and κόλλα, Kolla, " adhesive, glue ") with the original meaning of " [ the official papyrus scrolls ] presized sheet" was borrowed. A prοtókollon was first a front pasted on papyrus leaf with bibliographic data, ie equal to the current file cover. Later, the term transferred to other chronological records, to the French diplomacy, where the word finally called a " set of rules ".

Classification

Protocols can be differentiated by the time of the creation on its content and on the type of stoppage.

Logging referred to in terms of time, three basic types:

  • The pre - protocol ("A priori logging " ), the control of a future process ( concept )
  • Now the logging, the direct observation of a current process (monitoring),
  • Memory protocol ("A posteriori logging " ), the list shall a gewesenen process.

Where a correct implementation -defined processes, even in retrospect to be testable, the pre - log is now connected to a protocol or memory protocol, for example in the form of a checklist.

In terms of their content history logs and records of results are distinguished. When at a meeting or hearing what is said accurately reproduced, it is called a verbatim record.

A classification of the protocols is also possible according to the nature of their resignation. If a protocol in longhand or shorthand customized, one also speaks of a transcript. Furthermore, protocols on a sound recording may be spoken or a sound-image recording can be made. A technical logging is possible by automatic stoppage of operations in a file (log file ) or any other technical recording. This type of logging is called in computer science as logging.

A log is made ​​by a secretary or clerk or a technical recording device.

Task

Logging allows to reconstruct events or plan to locate faults or malfunctions or avoid. In State and communication protocols, the establishment of procedures foreseeable error behavior or at least uncertainty in the parties or in the operations should help to avoid. In sequence or the technical logging protocols, possible mistakes or malfunctions that are not apparent in the presence or not directly treatable, can be analyzed at least in retrospect and attributed causally (error analysis). Communication protocols used in the broadest sense exclusively the observation, self- control and correction of transmission errors.

Insofar protocols be established wherever there as well with regular procedures but also errors, faults or deviations must be expected, since their occurrence is foreseeable. Protocols are used for control of processes or operations and entities, either in advance, or currently in arrears. In this respect, the above definition can be extended to the function played by the logging in general:

Logging is based on their data to observe addressable entities producing operations, or these can be observed in order to analyze deviations or present to detect or prevent the future.

Request to a protocol

Therefore, high demands are placed on a log in the sense of proof fixed recording. This includes in particular the following aspects:

Only with guarantee of these requirements can give reliable information a log. If there is a guarantee of content accuracy of the protocol, it comes to positive probative. The positive probative value is demonstrated that the logged events or results to have taken place as recorded. If the completeness ensures a protocol can also be a negative probative attributed. This is being proven that not authenticated transactions did not take place and not authenticated results not came about. Is related to the authenticity of the Protocol and shall make its entire evidence. The proof of forgery invalidates the entire log. The validity of a protocol is generally prepared with the signature or any other financial statements and identity marked the recording clerk or other responsible person.

These requirements must by the date of the creation ( now protocol is more reliable than a memory protocol), the way of logging ( technical device or secretary ) in the detection (sensors, objectivity ) and storage of data (archiving, stable medium with controlled accessibility) are met.

Protocol as a recording

As protocols such records are referred to, which are made according to a defined, usually consistent, scheme. As a classic paradigm for automated, evidential logging applies the flight recorder. This similar to the still under development, accident data storage in motor vehicles, can be reconstructed by the directions of movement in front of a traffic accident.

For sessions, meetings, negotiations, etc. a formal summary of the talks and events will be written. For this reason, clubs, associations and similar organizations appoint a clerk or secretary who is in charge. A distinction is made in these records between history log and record of results.

For computers, this is the log file ( the so-called log ), held at the events, such as the sending and receiving of e- mails or events during program execution, according to certain rules ( logged) are.

In scientific experiments and the corresponding experimental or laboratory protocols, are next to the name of that which performs the test, and noted the time and place, especially the experimental setup and the determined during the specified flow readings.

In the book, film by James Monaco understand such devices are referred to as protocol techniques by which audiovisual processes using film camera or projector and tape ( or their multimedia advancements ) automatically recorded and can be retrieved.

Protocol as transcript

Protocols have a fixed external form:

  • Protocol header: The head of the Protocol, which shall detail: Event ( event title, organizer )
  • Date, start and end, place, those present and those absent, distributors, secretary, presided over the meeting, issue and listing of the items on the agenda (agenda )

Types of writing protocols

Common: In the head are name and date of the meeting, beginning and end, to participants, Excused and distribution. In the text, sorted, perhaps also in the head, is the agenda. The scribe signs right, the chairman of the meeting left.

  • Word protocol: If a verbatim record of each predicted word co-written (eg German Bundestag ). Expressions of emotion, and multiply predicted words such as and, and, and; or, or; yes, yes, yes, however, are not recorded in the minutes. The creation of a word protocol is increasingly being adopted by writing interpreters who can write there the spoken word in real time using a Stenografietastatur or voice recognition software.
  • History Log: Exact reproduction of the course and outcome of a meeting. Short or detailed factual playback in the actual order; see also trace log. Tense: present tense, past tense is also possible;
  • Discussions: indirect speech ( conversation posts in reported speech )
  • Tense: present;

Applications

Protocols in the telecommunications and computer science

Main article: Communications protocol

Protocols in the telecommunications and computer science are rules that define the format, content, meaning and the order of messages sent between different instances ( the same layer ), see network protocols, protocol (database). These protocols regulate the flow, while maintaining its documentation safely.

Another basic function of the data processing is the log file ( event log ), which includes an automatic temporal preparation of certain operations.

The protocol in diplomacy

Main article: Diplomatic Protocol

In diplomacy, subject to all intergovernmental processes a number of rules that must be adhered to as closely as possible to initiate any diplomatic incident. For example, apply to the execution of a state visit, but also for the dress code, the seating arrangements, etc. binding rules.

The foreign ministries of most countries have employees that deal exclusively with the observance of diplomatic protocol and compliance with the protocol Aryan hierarchy, the precedence to deal. Additional Protocol places, there are usually at the Head of State, Ministry of the Interior (for the national protocol and ceremonial ) and the Ministry of Defence ( for the representation of military units or Garden). Not to the Protocol, although there also play a role, the manners ( etiquette ).

See also Agreed Minutes in matters concerning the European Union and third countries.

Protocols in the diplomacy

In the study of the documents of the Middle Ages and the early modern period are called protocols the formulaic introductory part of a document that contains frequently an invocation to God ( Invocatio ), the title of the issuer ( Intitulatio ) and an address of the recipient ( Salutatio ). For this text is also part of the term " input protocol " in use, which then corresponds to the " Final Protocol " at the end of the document.

Experimental protocol in research

Main article: experimental protocol

A test protocol describes the implementation of a scientific experiment documented and possible outcomes. It includes experimental procedure, if necessary observations and explanation and interpretation of results.

363485
de