default search action
Computer Law & Security Review, Volume 10
Volume 10, Number 1, January 1994
- Michael Kirby:
Biotechnology and the law. 2-9 - Michael A. Heather:
Challenges for the law from cyberspace and virtual worlds. 17-21 - Katherine C. Spelman, John Moss:
The intellectual property inventory: Why do it? 22-24 - Wendy London:
Information security I. 29-30 - Neil A. McEvoy:
Information security II. 31-32 - Ian J. Lloyd:
European information market. 33-34 - David Marsh:
EDI 1993; The UK National EDI Conference; Birmingham October 4th - 7th. 35 - Simon Davies:
The Fifteenth Annual Conference of Privacy and Data Protection Commissioners. 36-37 - Heather Rowe:
Data protection. 47
Volume 10, Number 2, March 1994
- Gillian Bull:
Licensing and distribution of market data. 50-55 - Wendy R. London:
Harmonization of IT laws. 64-75 - Moira Sympson:
999 !: My computer's stopped breathing ! 76-81 - Gary Lea:
Passing off and the protection of program look & feel. 82-83 - Graham J. H. Smith:
When is a computer not a computer? 84-85 - Colin Tapper:
The law commission's report on the reform of the hearsay rule: Its impact upon the reception of computer output. 86-88 - Jean-Bernard Condat:
Toll fraud on french PBX systems. 89-91 - Alastair Ross:
The essentials of EDI law - A Straightforward legal framework to protect your business: Peter Jones and David Marsh 1993 Softcover 141p. 91 - Jørgen Klaveness:
Practical use of spreadsheets in the analysis of bankruptcies. 92-93 - Guy Lougher:
Commercial agency contracts: implementation of the EC directive. 94-95 - Bernard P. Zajac Jr.:
Clinton administration proposes national telecommunications policy. 96 - David Davies:
Managing crisis - a live simulation. 108
Volume 10, Number 3, May 1994
- Jeremy R. C. Brown:
Technology licensing. 110-120 - Robert Strivens:
EC competition law. 121-122 - John Worthy:
Software law. 123-126 - Rory Graham:
Database law. 127-130 - Robert McCallough:
Evidential issues in cases of infringement of copyright in software. 134-135
Volume 10, Number 4, July 1994
- Gyorgy Palos:
The impact of the Hungarian - USA agreement on the Hungarian intellectual property law. 185-188 - Georgi Sarakinov:
New law on copyright and neighbouring rights in Bulgaria. 189-190 - August Bequai:
Update on US congressional efforts to regulate electronic monitoring. 203-205
Volume 10, Number 5, September 1994
- Jeremy R. C. Brown:
Reconsideration of licence agreements in Europe: Implications of the '1991' programme, the single market, EC enlargement and the EEA treaty for technology transfer - part II Jeremy Brown's analysis of EC licensing policy. 222-225 - Wendy London:
EC information security legislation: Where now? 226-233 - Thomas Mandeville, Donald McLean Lamberton, Stuart MacDonald:
Marketing public sector information: Some issues. 234-237 - Irini E. Vassilaki:
Interception of telecommunications for criminal investigation - a comparative analysis. 238-242 - Harvey Freeman:
Satellite services - the future of the signatory affairs office. 243-244 - C. Ian Kyer:
Software piracy & corporate compliance. 245-246 - Peter Brownlow, John Reynolds:
Copyright protection for printed circuit board designs - diagrams as literary works. 258-259 - David Bainbridge:
Innovations (mail order) LTD v data protection registrar - data protection tribunal, 29 September 1993 (case DA/92 31/49/1). 260-261 - Richard McD. Bridge, Shelley Lane:
Format rights. 277 - Heather Rowe:
Draft UK data protection bill. 280
Volume 10, Number 6, November 1994
- Jeremy R. C. Brown:
Technology licensing. 282-284 - Conor Ward:
Cheating at cards, plastic fraud: Sharp Practices and naive systems: Naive Systems by Bryan Clough, 1994, Soft Cover, 154pp., ISBN 090 792 3283. 284 - Robert Hart:
Software patentability. 296-303 - Gary Lea:
Intellectual property. 304-306 - Stephen Castell:
Digital broadcasting. 307-310 - Benjamin Wright:
Electronic commerce. 311-312 - David Davies:
Computer insurance. 313-316 - Bernard P. Zajac Jr.:
US focus. 322-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.