The alternative methods of dispute resolution are new field of study in Latvia. In most cases procedurial issues of these methods and their real practical application are outside any legal regulation. One of these alternative dispute resolution methods is called mediation. Person, who is responsible for the management of this process, is called mediator. The meaning of this term is known from the ancient civilization times. It is useful to understand the initial comprehension of mediation in order to sucessfully implement this process in the legal system of modern society. Nevertheless the elaboration of mediation procedure asks serious evalution of possibilites in order to completely evolve basic principles of alternative dispute resolution methods in the legal system of any country. Answering on question whether it is possible to completely realize the concept of mediation, it is necessary clearly understand, what it is and how you can use the advantages of this process in real life.
In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.