default search action
Computer Law & Security Review, Volume 7
Volume 7, Number 1, May 1991
- F. H. Charbon, H. K. W. Kaspersen:
Summary of the report "computer crime in the Netherlands". 2-6 - Chris Hennessy:
Proposal for a [European community] council decision in the field of information security. 27 - David Lindsay:
Encryption and regulatory controls in Europe. 28-30 - Elissa Soave, Rosin Wilson:
Software and the law: The producer's viewpoint - A report on project scope study for the EC. 31-32 - Gordon Hughes:
Hughes v Canon Australia Pty Ltd - a case of loose promises. 33-34 - David P. Lewis:
Application of anti-piracy provisions of the copyright act 1968. 35-36
Volume 7, Number 2, July 1991
- Chris White:
The EC software directive: A user's perspective. 50-51 - Robert Hart:
Maintenance under the EEC directive on the legal protection of computer programs. 51-52 - Vivien Irish:
Protecting business ideas - an introduction. 60-61 - Alan S. Wernick:
How to perfect security interest in software. 61-62 - Drakulic der Mirjana:
Information law. 63-65 - L. L. M. Nelka Fikeys Krmic:
The first personal data protection act in Yugoslavia. 66-67 - Heather Rowe:
The EC commission green paper on satellite communications. 68-69 - Heather Rowe:
The United Kingdom Duopoly review. 70-71 - Alastair MacWillson, Ian Beale:
System development auditing: A risk based approach. 72-74 - Michael Bowles:
Security precautions for the disposal of confidential data. 75-76 - Bernard P. Zajac Jr.:
Managing information security - A non-technical management guide: by Ken Wong and Steve Watt 1990 (Elsevier Advance Technology & Computer Weekly Publications, 327pp) UK £85.00/US $ 153.00 ISBN: 0-946395-63-2. 76 - Bernard P. Zajac Jr.:
Computer viral risks - is the worst yet to come? an eerie look into the future. 77-78 - Gordon Hughes:
Australian computer virus prosecution Lynn v Barylak (February 1991) county court victoria. 79-81 - David Davies:
A review of the new Lloyds electronic and computer crime policy. 82 - Bernard P. Zajac Jr.:
Ethics and computing (Part II). 83 - August Bequai:
Legislative/regulatory developments in information technology and law from the US. 84-85 - Mark Lewis:
European initiatives in public procurement: Editor: Mark Meredith (Worldwide Information Inc. European Community Law Series, 1990, ISBN 2-88316-004-X). 95-96
Volume 7, Number 3, September 1991
- Roy N. Freed:
Computer law. 107-111 - Robin Preston:
Report on the 20th anniversary meeting of the US computer law association. 111-112 - Richard Stephens, Stephenson Harwood:
Consultancy contracts. 113-116 - Nicholas Frome, Heather Rowe:
Database law. 117-122 - Angela Kolb:
Data protection - Germany. 123-126 - Peter G. Leonard, Peter Waters:
Telecommunications. 127-130 - Bernard P. Zajac Jr.:
US focus. 131 - Julian P. Thurston:
Facilities management: Outsourcing your information technology needs. 141-142 - Christopher Rees:
Second annual conference on the supply of computer systems and software held at Cafe Royal London 8 July 1991. 142-143
Volume 7, Number 4, November 1991
- Graham J. H. Smith:
Comments and recommendations by the intellectual property committee, British Computer Society. 146-151 - Quentin Archer:
New rental, lending and neighbouring rights directive. 152-154 - Roy N. Freed:
The birth, life, and death of computer law - part II. 155-160 - David Davies:
The nature of computer dependency risks. 161-164 - Richard Dedman:
Developments. 165-168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.