


default search action
Computer Law & Security Review, Volume 2
Volume 2, Number 1, May 1986
- David Marshall:
Introduction to the law on software licences part I: The basics. 2-3 - John Railton:
Banking technology. 27-28
Volume 2, Number 2, July 1986
- David Marshall:
Introduction to the law on software licences part II: The specifics. 2-3 - David W. Greaves:
Atwater 1986 conference on the world information economy: Risks and opportunities: 4-7 November, 1986. Montreal, Quebec, Canada Organisers: International Institute for Information and communications. 3-4 - Alan S. Wernick:
Whan a software licensor files for bankruptcy the license may lose rights. 4-5 - Edward Sambridge:
Model conditions for software development. 5-6 - John J. Borking:
Software copyright part II: The new German legislation. 6 - Colin Long:
Mercury and British telecom - interconnection part I: The story so far. 7-8 - David Davies:
Professional indemnity insurance: A new nightmare for the professions. 8-10 - David Davies:
Computer insurance: Part III - Consequential loss. 10-12 - William Farquhar:
Micro secure: A guide to computer security part II: Recovery and control. 12-14 - Stephen Saxby:
Data protection act 1984: Security and accuracy of data. 14 - Tony Stayton-Davis:
But is it admissible as evidence? 14-15 - John Cartwright:
Copyright and computer output. 15-17 - Bernard P. Zajac Jr.:
The latest news from the US. 17-18 - Charles P. Lickson:
Reform of intellectual property: Laws could follow US report. 18-19 - Charles Christian:
Lex ex machina. 19-20 - David Yates:
Technology and revolution in a changing city. 20-21 - John Railton:
Cheque truncation. 21-22 - David W. Greaves:
Computer services association - legal affairs group. 22-23
Volume 2, Number 3, September 1986
- David Marshall:
Introduction to the law on software licences part III: Mistake and fraud. 2-3 - Don Jerrard:
Current development in computer contracts. 3-5 - Davies Greaves:
A UK perspective. 5-6 - Reginald H. Weller, Shelley F. Wall:
Software escrow: A practical primer. 6-9 - Colin Long:
Mercury and British telecom interconnection part II: Regulation and competition. 9-10 - Robert Hay:
Software piracy in the U.K. - A review. 10-12 - Nigel Savage:
The data protection act - policies and experience to date: A review of the second annual report of the data protection registrar. 15-16 - Gavin Morisson:
A practica man's guide to living with the act. 16-18 - John E. Appleton:
Expert systems and intellectual property law - Some unlikely thoughts on some likely problems that expert systems are likely to generate. 19-20 - David Davies:
The Nature of computer crime - a risk management perspective. 20-21 - Yvo Heaton:
The human risks - an auditors point of view. 21-23 - Charles Christian:
Lex ex machina. 25-26 - David Davies:
New highlights. 26-32
Volume 2, Number 4, November 1986
- Martin Edwards:
Introduction to the law on software licenses Part IV: Performance and breach. 8-11 - Nicholas Green Barrister:
Voluntary industry standards for a hardware-based software protection system: Antitrust implications. 11-12 - L. J. Kutten:
Software and the copyright notice. 12-13 - Ian Beale:
Computer eavesdropping - Fact or fantasy. 14-15 - Richard Sizer:
Registered purposes: The implications. 15-16 - John Sutcliffe:
Preparing for subject access. 17-18 - John Railton:
EFT: The report of the secretary-general to the 19th session of the UN commission on international trade law. 18-21 - Charles Christian:
Lex ex machina. 23
Volume 2, Number 5, January 1987
- Stephen Saxby:
Software copyright - the outstanding questions. 4-7 - David W. Greaves:
Sources to structures - whelan V jaslow and its implications for software developers. 7-8 - David Marshall:
Software licences. 8-10 - Yvo Henniker-Heaton:
Risk management. 10-13 - Richard Sizer:
Data protection. 13-15 - Julian Burnside:
Electronic fund transfers. 15-19 - L. J. Kutten:
Feedback. 19-21 - Alistair Kelman:
Computer fraud. 21-22 - Fred Greguras:
US focus. 22-26 - Charles Christian:
Behind the news. 27 - Chris Hennessy:
Current awareness. 28-32
Volume 2, Number 6, March 1987
- Alan S. Wernick:
Computer contracts. 2-4 - David Davies:
Risk management. 14-16 - John Railton:
Banking technology. 16-17 - Bernard P. Zajac Jr.:
US focus. 17-18 - Charles Christian:
Behind the news. 18-19 - David W. Greaves:
Law reports update. 19-22

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.