default search action
Computer Law & Security Review, Volume 20
Volume 20, Number 1, January 2004
- Stephen Saxby:
It's an e-Xmas and a spam new year. 3 - Andrew Sharpe:
Regulation of electronic communications networks and services in the UK - Part II. 4-11 - Alexander Batteson:
Draft directive on the patentability of computer-implemented inventions: The European Parliament's amendments - have the proposals been wrecked? 12-16 - Trevor Cook:
UK implementation of the Copyright in the Information Society Directive. 17-21 - Jean-Marc Dinant, Ewout Keuleers:
Data protection: Multi-application smart cards: the use of global unique identifiers for cross-profiling purposes - Part II: towards a privacy enhancing smart card engineering. 22-28 - Jan Grijpink:
Identity fraud as a challenge to the constitutional state. 29-36 - Derrick Grover:
Dual encryption and plausible deniability. 37-40 - Marc Dautlich:
Penetration testing - the legal implications. 41-43 - Malcolm Bain, Brian Subirana:
Towards legal programming: The incorporation of legal criteria in software agent design - Current proposals and future prospects. 44-52 - Phillip Rees:
Distance marketing of financial services - the regulatory mire. 53-56 - Justin Harrington:
An introduction to charging mechanisms in IT procurements. 57-60 - David Halliday, Miriam Andrews, Jo McGarvey, Kate Stephen:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 61-64 - Stephen Saxby:
News and comment on recent developments from around the world. 65-79
Volume 20, Number 2, March 2004
- Stephen Saxby:
Distance selling comes of age. 83 - Talitha Nabbali, Mark Perry:
Going for the throat: Carnivore in an ECHELON world - Part II. 84-97 - María Verónica Pérez Asinari, Yves Poullet:
The airline passenger data disclosure case and the EU-US debate. 98-116 - Md. Abdul Jalil, Leo D. Pointon:
Developments in electronic contract laws: A Malaysian perspective. 117-124 - Paul Mann:
Cybersecurity - the CTOSE project. 125-126 - Colleen Donovan:
Implementation of the e-Privacy Directive in the UK - understanding the new rules. 127-132 - Marcus Turle:
Durant v FSA - Court of Appeal's radical judgment on the Data Protection Act. 133-136 - Cameron Craig:
Zeta-Jones - so what's the damage? 137-138 - Miriam Andrews, David Halliday, Steve Holmes:
Baker & McKenzie's annual review of developments in EU law relating to IP, IT & telecommunications. 139-145 - Stephen Saxby:
News and comment on recent developments from around the world. 146-157
Volume 20, Number 3, May 2004
- Stephen Saxby:
EU gets tough on intellectual property piracy. 163 - Stephen Mason:
Validating identity for the electronic environment. 164-170 - Benjamin Wright:
Internet break-ins: new legal liability. 171-174 - Simon Chalton:
The Court of Appeal's interpretation of "personal data" in Durant v FSA - a welcome clarification, or a cat amongst the data protection pigeons? 175-181 - Alexander Zinser:
International data transfers between the United States and the European Union: are the procedural provisions of the Safe Harbor solution adequate? 182-184 - Hans-Werner Moritz:
The DaimlerChrysler codes of conduct: the ideal way for global companies to export personal data from Germany to countries outside the EU/EEA? 185-193 - Munir Abu Bakar, Siti Hajar Mohd. Yasin:
Access to communications data by public authorities. 194-199 - Joanne Harland:
Japan's new privacy legislation: are you ready? 200-203 - Kit Burden:
"The voice of reason" ... finding middle ground in IT contracts. 204-205 - Dennis W. K. Khong:
The problem of spam law: a comment on the Malaysian communications and multimedia commission's discussion paper on regulating unsolicited commercial messages. 206-212 - David Halliday, Miriam Andrews, Jonathan Sharp, Lily Williams, Harry Small, Don Jerrard:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 213-218 - Stephen Saxby:
News and comment on recent developments from around the world. 219-235
Volume 20, Number 4, July 2004
- Stephen Saxby:
Planning for digital television services gathers pace. 267 - David Taylor:
Internet Service Providers (ISPs) and their responsibility for content under the new French legal regime. 268-272 - Mark Turner, Dominic Callaghan:
Software licensing under the competition law spotlight - the new technology transfer block exemption. 273-280 - Thierry Maillard, Teddy Furon:
Towards digital rights and exemptions management systems. 281-287 - Jörg Hladjk:
The protection of databases under US and EU law - Sui generis right as an appropriate concept? - Part I - US law. 288-292 - Andrés Guadamuz González:
PayPal: the legal status of C2C payment systems. 293-299 - Simon Chalton:
It is impossible to control information by law, but the law can control the way people use information. 300-305 - Nick Graham:
Data protection and business sales - risks and solutions? 306-309 - Pierluigi Perri, Stefano Zanero:
Lessons learned from the Italian law on privacy - Part I. 310-313 - Marcus Turle:
Press reigned in by House of Lords decision. 314-316 - Colleen Donovan:
Personal data and ancillary information. 317-320 - Abida Chaudri, Ville Patja:
Windows v Lindows - have Microsoft won the battle only to lose the war? 321-323 - David Halliday, Miriam Andrews, Robert Coffey, Jonathan Sharp, Lily Williams:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 324-331 - Stephen Saxby:
News and comment on recent developments from around the world. 332-348
Volume 20, Number 5, September 2004
- Stephen Saxby:
Data protection law under scrutiny. 355 - Will James, Joel Smith, Herbert Smith:
Is further legislation really necessary to level the playing field? A UK perspective. 356-363 - David Bainbridge:
Using technology to protect copyright works. 364-369 - María Verónica Pérez Asinari, Yves Poullet:
Airline passengers' data: adoption of an adequacy decision by the European Commission. How will the story end? 370-376 - Jörg Hladjk:
The protection of databases under EU and US law - the sui generis right as an appropriate concept? Part II. 377-383 - Pierluigi Perri, Stefano Zanero:
Lessons learned from the Italian law on privacy - Part II. 384-389 - Nick Nykodym, Robert Taylor:
The world's current legislative efforts against cyber crime. 390-395 - Kah Leng Ter:
Who bears the risk of mistake? 396-399 - Alice Hardy, Heather Rowe:
When it is and isn't mobile. 400-401 - Abida Chaudri:
Metatags and banner advertisements - do they infringe trade mark rights? 402-404 - Charlie Everitt:
Database rights: The Advocate General issues her opinion in British Horseracing Board v. William Hill. 405-407 - Satish Khandke:
Sports body scores victory - Morris Communications Corp. v. PGA Tour (11thCir. CA). 408-410 - David Halliday, Miriam Andrews, Emily Keim, Amit Khanna, Harry Small:
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications. 411-414 - Stephen Saxby:
News and comment on recent developments from around the world. 415-429 - Book review: Managing Communications: Managing Communications in a Crises Peter Ruff and Khalid Asis, 2004, hard-cover, Gower Press, 176 pp., £55.00, ISBN 0 566 08294 2. 430
- Book review: Cryptography: Malicious Cryptography ? Exposing Cryptovirology Dr. Adam L. Young and Dr. Moti Yung, 2004, soft-cover, Wiley Publishing Inc., 392 pp., £29.99, ISBN 0 7645 4975 8.. 430
- Book review: Exploiting holes in software security: The Shellcoder's Handbook - Discovery and exploiting security holes, Koziol, Litchfield, Aitel, Anley, Eren, Mehta and Hassell, 2004, soft-cover, Wiley Publishing Inc., 620 pp., £33.99, ISBN 0 7645 4468 3. 430
- Book review: Security in data communications: Security in Fixed and Wireless Networks ? An introduction to securing data communications Gunter Schafer, 2003, hard-cover, Wiley Publishing, 382 pp., £65.00, ISBN 0 470 86370 6. 431
- Book review: Computer Law: Computer Law 5th Edition, edited by Chris Reed and John Angel, 2003, soft-cover, Oxford University Press, 501 pp., £32.50 ISBN 0 19 926 350 7. 431
- Book review: Computer Law: Introduction to Computer Law 5th Edition, David Bainbridge, 2004, soft-cover, Pearson Education, 553 pp., £29.99, ISBN 0 582 47365 9. 431
Volume 20, Number 6, November 2004
- Stephen Saxby:
EU sets out plans for Europe's information economy. 435 - Patricia Akester:
Authorship and authenticity in cyberspace. 436-444 - Yijun Tian:
Business implications of anti-circumvention legislation and recommendations. 445-452 - Nicholas Tyacke, Rohan Higgins:
Searching for trouble - keyword advertising and trade mark infringement. 453-465 - Paul O'Hare:
Allocating risk in IT contracts: A review of the case law on the enforceability of limitations and exclusions under the Unfair Contract Terms Act 1977. 466-471 - Tania S. L. Cheng:
Recent international attempts to can spam. 472-479 - Andrew McGinty, Donald Da Bona:
3G Licensing in China: a waiting game. 480-481 - Pat Treacy, Thomas Heide:
Compulsory licences of IP rights: easier to get after the IMS health decision? 482-485 - Colleen Donovan:
Data Protection and the retention of personal data - how long is too long? 486-487 - Harry Small, David Halliday, Miriam Andrews, Emily Keim, Robert Coffey:
Baker & McKenzie's column tracking recent developments in EU law relating to IP, IT & telecommunications. 488-492 - Stephen Saxby:
News and comment on recent developments from around the world. 493-510 - Book review: Copyright law: world copyright law, J.A.L. Sterling, 2003, hard-cover, Sweet & Maxwell, 1357 pp., £235, &&332, ISBN 0 421 79070 9. 511
- Book review: Telecommunications law: Professor E. Lloyd and Professor David Mellor, 2003, soft-cover, LexisNexis Butterworths, 320pp., £26.95, ISBN 0 406 94799 6. 511
- Book review: Telecoms law: telecommunications law, volumes I and II, second edition, David Gillies and Roger J.W. Marshal, 2003, hard-cover, Butterworth, LexisNexis, 518pp., £225, ISBN Vol. I - 0 406 96873 X; Vol. II - 0 406 96874 8. 511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.