default search action
Computer Law & Security Review, Volume 18
Volume 18, Number 1, January 2002
- Stephen Saxby:
Editorial: What Next for UK Crown Copyright? 2 - David L. Hayes:
Internet Copyright: Advanced Copyright Issues on the Internet - Part VIII. 3-10 - Marie d'Udekem-Gevers, Yves Poullet:
Internet Content Regulation: Concerns from a European User Empowerment Perspective about Internet Content Regulation: An analysis of some Recent Statements - Part II. 11-23 - Patrick Vittet-Philippe:
EU Policy for the E-Economy: Europe in the E-Economy: Challenges for EU Enterprises and Policies. 24-28 - Nancy Muenchinger, Adam Mekaoui:
Electronic Signatures: Regulation Aspects of Electronic Signatures. 29-30 - Lucas Bergkamp:
EU Data Protection Policy: The Privacy Fallacy: Adverse Effects of Europe's Data Protection Policy in an Information-Driven Economy. 31-47 - Alexander Skoblo:
Copyright Law - Russian Federation: Recognition and Protection of Copyright in Computer Software and Databases on the Territory of the Russian Federation. 48-52 - Julia Whybrow, Chris Reed:
Internet Law: Will Online Gambling become Lawful? 53-55 - Lee A. Bygrave:
Data Protection Law - Sweden: Balancing Data Protection and Freedom of Expression in the Context of Website Publishing - Recent Swedish Case Law. 56-58
Volume 18, Number 2, March 2002
- Indira Mahalingam Carr, Katherine S. Williams:
Draft Cyber-Crime Convention: Criminalization and The Council of Europe (Draft) Convention on Cyber-Crime. 83-90 - Gabriela Kennedy:
E-Learning. 91-98 - M. Y. Schaub:
Unsolicited Email: Does Europe allow Spam? The State of the Art of the European Legislation with regard to Unsolicited Commercial Communications. 99-105 - John Worthy, Nicholas Graham:
Electronic Marketing: New Rules for Electronic Marketing - An Obstacle to M-Commerce? 106-108 - Colette Fenn, Robert Shooter, Ken Allan:
IT Security Outsourcing: How Safe is your IT Security? 109-111 - Peter Carey, David Berry:
Data Protection - Security: Data Security - The Key to Privacy. 112-113 - Jan-Malte Niemann:
Monitoring Internet and Email Usage - Germany: Surfing into Unemployment? Private Internet Use and Emailing under German Labour Law. 114-116 - David Davies:
World Trade Center Lessons: Risk Management Lessons from the World Trade Center. 117-119 - Edward Alder:
Smart Card Technology - Hong Kong: Legal Issues in Smart Card Technology. 120-123 - Gabriela Kennedy, Adam Salter:
Virtual Networks - Hong Kong: Rolling the Dice on Mobile Virtual Networks: The 3G Environment in Hong Kong. 124-127 - Heather Rowe:
E-Commerce - UK: UK Consultation on the Implementation of the Electronic Eommerce Directive. 128-129 - Stephen Saxby:
CLSR Briefing: News and Comment on Recent Developments from around the World. 134-151
Volume 18, Number 3, May 2002
- Stephen Saxby:
Editorial: Privacy and Data Sharing: The Way forward for Public Services? 154 - Julia Hörnle:
E-Commerce - Competition: Competition and E-Commerce. 155-163 - Stephen Rawson:
E-Commerce - Mobile Transactions: Mobility and Liability: The Hazards of Handhelds. 164-171 - Stephen Ketteley:
E-Commerce - UK Implementation: The E-Commerce Directive - Thoughts on Issues Raised During the Government's Recent Consultation, Conducted Prior to the Implementation of the E-Commerce Directive. 172-174 - Stephen Mason:
Electronic Signatures - Evidence: The Evidential Issues Relating to Electronic Signatures - Part 1. 175-180 - Mark Turner, Adam Smith, Herbert Smith:
IT Outsourcing: The Challenge of Changing Technology in IT Outsourcing Agreements. 181-186 - Robert T. J. Bond, Hobson Audley, Rainer S. Knyrim:
Data Protection - Third Country Transfers. 187-190 - Dan Svantesson:
Jurisdictional Issues in Cyberspace: At the Crossroads - The Proposed Hague Convention and the Future of Internet Defamation. 191-196 - Trevor Cook:
EC Draft Patent Directive: "I wouldn't Start from here if I were you" - Intellectual Property Protection for Computer Software in Europe and the Proposed new Directive on Computer-Implemented Inventions. 197-200 - Kate Brimsted:
Domain Name Disputes: UK Domain Name Disputes - Still a Cybersquatter's Charter? 201-204 - Philip Westmacott:
Anti-Terrorism Legislation - UK: Big Brother never Forgets - The Data Retention Provisions of the Anti-Terrorism, Crime and Security Act 2001. 205-207 - Stephen Saxby:
CLSR Briefing: News and Comment on Recent Developments from around the World. 212-232
Volume 18, Number 4, July 2002
- Stephen Saxby:
Editorial: EU Policy on exploitation of public sector information shapes up. 232 - Simon Newman, Gavin Sutter:
Electronic Payments - The Smart Card: Smart Cards, e-Payments, & Law - Part I. 235-240 - Stephen Mason:
Electronic Signatures - Evidence: The evidential issues relating to electronic signatures - PART II. 241-248 - Heather Rowe:
E-Commerce Directive - UK Implementation. 249-251 - Louise Krosch:
E-Commerce Regulations 2002 - UK: The Electronic Commerce (EC Directive) Regulations 2002. 252-258 - Jacqui Walker, Andrew Sharpe:
Intellectual Property - Rights Management. 259-263 - Patrick Vittet-Philippe:
A European Research Area: The International Dimension fo Research: New Strategies for the European Research Area. 264-266 - Kit Burden:
Euro Compliance Risks. 267-268 - David Davies:
People Management - Corporate Bullying. 269-271 - Harry S. K. Tan:
Electronic Transactions Regulation - Singapore. 272-277 - Gabriela Kennedy:
Domain Names DRS - Hong Kong. 278-279 - Nicola Wise:
Case Report: Angry Consumers V Kodak and Other E-Tailers. 280-281 - Stephen Saxby:
CLSR Briefing. 285-302 - Heather Rowe:
Book Review: Internet Law and Regulation. 303-304
Volume 18, Number 5, October 2002
- Stephen Saxby:
Editorial: UK Implements E-Commerce Directive. 306 - Simon Newman, Gavin Sutter:
Electronic Payments - The Smart Card: Smart Cards, e-Payments, & Law - Part II. 307-313 - Paul Randle:
Rights Management: When the Chips are Down: Law and Technology can Potentially Prevent the Circumvention of Copy Protection. 314-317 - Ravinder Chahil:
Technology Transfer Regulation. 318-321 - Bert-Jaap Koops, Anton Vedder:
Privacy in Criminal Investigations - A Survey: Criminal investigation and privacy: Opinions of citizens. 322-326 - Jan Grijpink:
Personal number management. 327-332 - Rowan Middleton, Herbert Smith:
Data Retention Policies after Enron: Damnes if you do, Damned if you don't? A Look at Data Retention Policies in the Aftermath of Enron. 333-337 - Jason Saiban, John Sykes:
UK Anti-Terrorism Act 2001 & ISP's: A Cyber Check-Point Charlie? 338-339 - Dan Svantesson:
Hague Convention: Kanitz V Rogers Cable Inc - Time to rethink Article 4 of the proposed Hague Convention? 340-344 - Harry S. K. Tan:
Electronic Transactions Regulation - Singapore: The Impact of the Singapore Electronic Transactions Act on the Formation of E-Contracts - Part II. 345-351 - Assafa Endeshaw:
E-Commerce Regulation - Indonesia: Regulating E-Commerce in Indonesia: Lessons from ASEAN and Beyondx. 352-355 - Gabriela Kennedy:
Telecoms Regulation - Hong Kong: Hong Kong's Code of Practice on Protection of Customer Information for Fixed and Mobile Service Operators. 356-358 - Hamish Porter, Edward Pitt, Iain Connor:
Case Report: Getmapping PLC V Ordnance Survey. 359-361 - Stephen Saxby:
CLSR Briefing: News and Comment on Recent Developments from Around the World. 366-382 - Keith Foggon:
Information Security Seminar: Information Security and the Law Seminar; Stirling University Management Centre, Tuesday 23rd April 2002. 383
Volume 18, Number 6, November 2002
- Stephen Saxby:
Editorial: Privacy for the Individual in the Digital Age. 386 - Jan Grijpink:
Personal Number Management: Personal Numbers and Identity Fraud - Number Strategies for Security and Privacy in an Information Society - Part II. 387-395 - Mark Turner, Mary Traynor, Herbert Smith:
E-Commerce Directive - UK Implementation: Electronic Commerce (EC Directive) Regulations 2002 - Worth the Wait? 396-403 - Adam Gatt:
Electronic Commerce - Click-Wrap Agreements: The Enforceability of Click-Wrap Agreements. 404-410 - Kirsty Rowan, Tuvi Keinan:
IT PFI Projects: Technology Obsolescence and PFI - An Uneasy Union? 411-413 - David Davies:
Risk Management - Protecting Reputation: Reputation Risk Management - The Holistic Approach. 414-420 - Nancy Muenchinger:
Workplace Privacy - France: Electronic Workplace Privacy in France. 421-426 - Alexander Menais, Marie Marcoux:
Virtual Casinos: Virtual Casinos at the Frontiers of the Law. 427-429 - Nigel Wildish, Marcus Turle:
Case Report: Mirror image: DPA first as supermodel Campbell sues newspaper over photographs. 430-432 - Yaman Akdeniz:
Case report: Court of Appeal clarifies the law on downloading pornography from the Web. 433-435 - Heather Rowe:
case Report - : BT Hyperlink Patent Dispute - Dit BT Invent the Hyperlink? Obviously not as the US Courts have said so. 439-441 - Stephen Saxby:
CLSR Briefing: News and Comment on Recend Developments from Around the World. 446-463
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.