default search action
Computer Law & Security Review, Volume 19
Volume 19, Number 2, March 2003
- Stephen Saxby:
Biggest reform of sexual offences legislation in a generation. 91 - Carter H. Manny:
Personal privacy - transatlantic perspectives: European and American privacy: commerce, rights and justice - part II. 92-100 - Jessica Haixia Jia:
Internet copyright regulation - China: Copyright infringement in the network environment - China's perspective. 101-111 - Mark Turner, Mary Traynor, Herbert Smith:
UK E-commerce liability: Ignorance is bliss. 112-120 - John Worthy, Nicholas Graham, Robert Finney:
E-commerce for financial services: E-commerce for financial services: working with the new UK rules. 121-123 - David Bainbridge:
Internet law - UK: Infringement of trademarks on web pages. 124-130 - Claire Coleman:
Cyberspace security: Securing cyberspace - new laws and developing strategies. 131-136 - David Knight, Emma Riach:
Case report - UK: Can the global nature of the Internet circumvent international patent systems? 137-139 - Gabriela Kennedy:
Case report - Hong Kong: First decisions issued by the Hong Kong office of the Asian Domain Name Dispute Resolution Centre. 140-141 - Jonathan Westwell, Sophie Malloch, Amina Mansoor:
EU update: Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 142-145 - Stephen Saxby:
CLSR briefing: News and comment on recent developments from around the world. 146-164
Volume 19, Number 3, May 2003
- Stephen Saxby:
Editorial: Challenging regulatory agenda ahead for EU electronic communications sector. 191 - Isabel Hernando:
Introduction to technology law: The legal protection of IT components - Part I. 192-200 - Malcolm Bain, Brian Subirana:
E-commerce oriented software agents: Towards legal programming: a legal analysis of ecommerce and personal assistant agents using a process/IT view of the firm. 201-211 - Nancy Muenchinger, Denton Salès:
E-commerce - France: France: a new draft implementation of the electronic commerce directive under consideration. 212-215 - Rowan Middleton, Herbert Smith:
Data protection - retention policies: Data retention policies - data protection considerations. 216-221 - Kit Burden, Creole Palmer:
Internet crime: Cyber Crime - A new breed of criminal? 222-227 - Stephen Castell:
Role of the IT expert witness: The role of the IT expert witness in software and systems development/implementation contract disputes and litigation. 228-231 - Marcus Turle:
Case report 1 - UK: Courts show reluctance to order data protection compliance: R v Wozencroft and Durant v Financial Services Authority. 232-235 - John Warchus:
Case report 3 - UK: Cable & Wireless Plc v IBM United Kingdom Limited - mediation comes of age. 238-239 - Abida Chaudri:
Case report 4 - United States: A window of opportunity? Microsoft v Lindows.com. 240-241 - Mark Perry:
Conference report: "In search of security: an international conference on policing & security". February 19-22, 2003 in Montréal, Québec Canada. 242-243 - Peter O'Byrne, Russell Garner, Amina Mansoor, Rebecca Peer, Jonathan Westwell:
EU update: Baker & McKenzie's regular column tracking developments in EU law relating to IP, IT & telecommunications. 244-249 - Stephen Saxby:
CLSR briefing: News and comment on recent developments around the world. 250-265
Volume 19, Number 4, July 2003
- Stephen Saxby:
Data protection directive gets its first progress report. 271 - Isabel Hernando:
Introduction to technology law: The legal protection of IT components Part II - other intellectual property laws applicable to IT components. 272-281 - Malcolm Bain, Brian Subirana:
E-commerce oriented software agents: Some legal challenges of advertising and semi-autonomous contracting Agents. 282-288 - Mike Conradi:
ISP liability - UK: Liability of an ISP for allowing access to file sharing networks. 289-294 - Mavis Tan:
NSP liability - Singapore. 295-298 - Mark Crichard:
Privacy and electronic communications. 299-303 - Christine Ecob, Daniel Cootes:
An overview of the Australian import regime for copyright material. 304-306 - Cameron Craig:
Zeta-Jones - what does it mean? 307-310 - Katie Landeryou:
Interpretation of software contracts - SAM Business Systems Limited v Hedley and Company. 311-313 - Peter Knight:
In any IT implementation what are the responsibilities of the customer? - RACV v Unisys. 314-320 - David Halliday, Rebecca Peer, Peter O'Byrne, Jonathan Westwell:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 321-327 - Stephen Saxby:
News and comment on recent developments from around the world. 328-347
Volume 19, Number 5, September 2003
- Cameron Craig, Richard Graham:
Rights management in the digital world. 356-362 - Isabel Hernando:
Electronic commerce. 363-374 - Malcolm Bain, Brian Subirana:
Legalising autonomous shopping agent processes. 375-387 - Mike Butler:
Spam - the meat of the problem. 388-391 - Jon Edgell:
Offshoring - which way to India? 392-393 - Leif Gamertsfelder:
Software reverse engineering - the current state of Australian law. 394-400 - Paul Barton, Viv Nissanka:
Cyber-crime - criminal offence or civil wrong? 401-405 - Keith Buzzard:
"Adequate" security - what exactly do you mean? 406-410 - Andrew Sharpe:
Private rights and public policy. 411-415 - Peter O'Byrne, David Halliday, Rebecca Peer, Tineke Knigge:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 416-420 - Stephen Saxby:
News and comment on recent developments around the world. 421-437
Volume 19, Number 6, December 2003
- Stephen Saxby:
New copyright regulations make their debut. 443 - Andrew Sharpe, Charles Russell:
Regulation of electronic communications networks and services in the UK - Part I. 444-455 - Talitha Nabbali, Mark Perry:
Going for the throat: Carnivore in an Echelon World1 - Part I. 456-467 - Andrés Guadamuz González:
eBay Law: The legal implications of the C2C electronic commerce model. 468-473 - Justin Harrington:
Practical guidelines on incorporating "partnering" within IT agreements for public sector bodies. 474-477 - Kit Burden:
"We're in it to win it"- negotiating successful outsourcing transactions Introduction. 478-479 - Ewout Keuleers, Jean-Marc Dinant:
Multi application smart card schemes: Data protection: multi-application smart cards: the use of global unique identifiers for cross-profiling purposes - Part I1. 480-486 - Brian Esler:
Copyright in DVD's: Is there a right to make "back-up" copies of DVDs in the UK? 487-489 - Heather Rowe:
Data transfer to third countries: Transfers of personal data to third countries: the role of binding corporate rules. 490-496 - David Halliday, Peter O'Byrne, Sam Jardine, Helen Kemmitt:
EU update: Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 497-499 - Stephen Saxby:
CLSR briefing: News and comment on recent developments from around the world. 500-517
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.