default search action
Computer Law & Security Review, Volume 9
Volume 9, Number 1, January 1993
- Editorial Board. I
- The proposed EC database directive - I: Sinking the data pirates. 1
- Information technology resources utilization and management: Issues and trends: Edited by Mehdi Khosrowpour and Gayle Yaverbaum (1990), idea Group Publishing, Hard-cover, 471 p, (£42.50), ISBN 1-878289-00-4. 2-3
- The proposed EC database directive - II: British computer society intellectual property committe comments on the EC proposal for a council directive on the legal protection of databases. 3
- UK telecoms developments: Oftel consultative document on "the citizens charter" in the context of telecommunications standards. 4-10
- EC database directive - a US perspective: Database protection: The old world heads off in a new direction. 10
- Computer security, crime and privacy in the USA - a status report part III. 11-14
- International year book of law, computers & technology: Volume 6, 1992, edited by Kenneth Russell, Carfax Publishing Company, Hard-cover, 250 p (£48.00, post free, individuals £28.00), ISBN 0902 879 057, ISSN 0965-528 X. 15-24
- Blackstone's statutes on intellectual property: by Andrew Christie & Stephen Gare (1992), Blackstone Press Ltd, Soft-cover, 308 p (£14.50), ISBN 1-85431-186-7. 24
- The benefits of involving law enforcement in trade secret theft cases - Part II. 24
- Contracts without paper. 25-29
- An empirical survey of cases concerning the transborder flow of personal data. 30-32
- Automation of legal reasoning - A study on artificial intelligence and law: by P Wahlgren (1992), Computer law series no 11, Kluwer law and taxation publishers, soft-cover, 436 p, ISBN 90-6544-661-3. 33-37
- The debate on the digital signature algorithm. 37
- Computer viruses and anti-virus warfare: 2nd revised edition, by Jan Hruska (1992), Ellis Horwood limited, soft-cover, 224 p (£19.95), ISBN 0-13-036-377-4. 38-39
- News and comment on recent developments from around the world. 39
- International computer executives, lawyers to meet April 25-28, 1993 to discuss business, legal and marketing issues of international trade. 40-48
Volume 9, Number 2, March 1993
- Robert P. Bigelow:
Computer security, crime and privacy in USA - a status report - part IV: Privacy. 50-57 - Report from Norway. 57
- Shelley Einfeld:
Importing the genuine article - recent developments in computer software and circuit layouts. 58-63 - The most restrictive credit reference laws in the western world. 64-65
- An action report from the office of the data protection registrar. 66-67
- Books received. 67
- Part I - the problems. 68-73
- Practical intellectual property: by Solicitors Denton Hall Burgin & Warrens (1992), published by GEE - a division of Professional Publishing Ltd, Loose-leaf (£95.00), ISBN 85258 909 3. 73
- CBI executive summary on the amended proposal for a council directive on the protection of individuals in relation to the processing of personal data. 74-77
- Correspondents. 77
- The US experience in computer crime. 78-79
- R v Shephard, house of lords, 16 December 1992 (unreported). 79
- International computer crime conference: Würzburg, Germany 5-7 October, 1992. 80-83
- World trends in computer law. 84-86
- Scott on computer law: 2nd Edition, by Michael D Scott (1992), Prentice Hall Law & Business, Two Volumes, Loose-leaf US $195, ISBN 0 13 799347 1. 86
- The Delaware valley disaster recovery information exchange group. 87-89
- Current legal protection for computer programs in the republic of Croatia. 89
- News and comment on recent developments from around the world. 90-96
Volume 9, Number 3, May 1993
- Editorial. 97
- Recent American case law on copyright in computer programs. 98-104
- John Richardson computers Ltd v Flanders and Chemtec Ltd. 105-112
- New exceptions to copyright infringement for computer programs. 113-119
- Combatting the cost of software in Australia. 120-122
- Computer security. 122
- Finding a balance: Computer software, intellectual property and the challenge of technology. 123-126
- ICCP report no 29 - Telecommunications and broadcasting: Convergence or collision?: (1992), OECD, Paris, Soft-cover, 287 p (£40; US $60; F 250; DM 100), ISBN 92 64 13764 5. 126
- Information networks and new technologies: Opportunities and policy implications for the 1990s: OECD, Paris, 1992, Loose-leaf, 78 p (#10; US $19; F 70; DM 29), ISBN 92 64 13768 8. 126
- Part II - The solutions. 127-129
- Statement of the International Chamber of Commerce. 130-131
- Information security - Dictionary of concepts, standards and terms: by Dennis Longley, Michael Shain and William Caelli, 1992, (Macmillan-Stockton Press), Hard-cover, 620 p, £65.00, ISBN 0 333 546 989. 131
- SPAG1 - The open communications systems catalyst. 132-133
- CLSR is pleased to welcome James Fitzsimons to the correspondents panel of the report. 133
- Centralization and standardization the security risks and opportunities. 134-136
- News and comment on recent developments from around the world. 137-142
- IT security: The need for international co-operation: Edited by Guy Gable and William Caelli, 1992, softcover (North-Holland), 495 p, US$125.50 / dfl.220.00, ISBN 0 444 896 996. 142
- 15th National Computer Security Conference - Security made out of building blocks, Baltimore, USA. 143-144
- International bank secrecy: General Editor, Dennis Campbell (1992), Hard-cover, Sweet & Maxwell, 767 p, £100.00, ISBN 0 421 472 502. 144
- ICCP reviews of information and communications policies: Finland: 1992, Softcover (OECD), 201 p, FF100, ISBN 92-64-03703-9. 144
Volume 9, Number 4, July 1993
- Editorial. 145
- Back to the future: The impact of automation on office employment in the next decade CIRCA 1960-1970. 146-148
- Technology and the challenge for law - I: Hard and soft machines. 149-151
- Technology and the challenge for law: Random thoughts on problems with new technology. 152-154
- Managing the internal audit - A practical handbook, : by Ian Beale and Roy H Bradford (1993), Kogan Page, soft-cover, 161 p. £18.95, ISBN 0 7494 0892 8. 154
- Technology and the challenge for law - III: Computers trusted, and found wanting. 155-156
- Telecoms liberalization - UK: Recent developments in liberalization of the UK international telecommunications services. 157-158
- Usage indicators - A new foundation for information technology policies: (1993), OECD, 127 p, FF 100, ISBN 9264138145. 158
- Economic and trade issues in the Computerised database market: (1993), soft-cover, 213 p, FF 180, ISBN 9264138307. 158
- Intellectual property and competition policy: Software interfaces, intellectual property, and competition policy. 159-163
- Intellectual property concepts - authorship and orginality - I: Author's own intellectual creation - computer generated works. 164-166
- Intellectual property concepts - authorship and originality - II: The criterion of originality for copyright in computer programs and databases: A galloping trojan horse. 167-169
- Software copyright and reverse engineering - Australia: High court of Australia revisits autodesk. 170-172
- Computer contracts-negotiating drafting: by Robert P. Bigelow (1987 - to date), Matthew Bender, four volumes, loose-leaf, Library of Congress Catalogue No 86-072664. 172
- Software copywright and non-literal copying - Canada: Canadian court adopts us approach to "look and feel". 173-175
- International computer law - a practical guide to the international distribution and protection of software and integrated circuits: by Jozef A Keustermans and Ingrid M Arckens (1988 - to date), Matthew Bender, loose-leaf, ISBN 0 8205 1318 1. 175
- EC Software directive - implementation policy compared: The german implementation of the EC directive on software protection. 176-179
- Intellectual property law - central and Eastern Europe: Protection of intellectual property in the countries of central and Eastern Europe. 180-182
- Competiting in the Electronics Industry - The experience of Newly industrialising economies: by Dieta Ernst and David O'Connor, 1992, Soft-cover (OECD), 303 p, FF180, ISBN 9264136509. 182
- Liability issues - software engineering: Software engineering - what are the legal pitfalls? 183-186
- Intellectual property in the public sector research base, cabinet office report, : September 1992, softcover, 55p, £10.50, ISBN 0114300712. 186
- Software evaluation and certification: Some intellectual problems in evaluation and certification of computer software. 187-189
- Security of information systems: The OECD guidelines for the security of information systems. 190-193
- Practical computer security: Shopping for computer security. 194
- Risk management: Up the creek? A major new survey of the preparedness of UK companies for computer related disaster. 195-196
- Software licensing policy - A US perspective: Current developments in computer software licensing practices in the US. 197-198
- Book review. 198
- The Law of Privacy in a Nutshell: by Robert Ellis Smith (1993), published by Privacy Journal, pamphlet, 57 p, ISBN 0 930072103. 198
- IT procurement - Australia: Australian government IT procurement contracts. 199-202
- Information Computer Communications/Policy Series: Communications Outlook 1993 Soft cover (OECD)156p FF180: £32, US$42, DM74; ISBN 92-64-13841-2. 202
- Information computer communications/policy series: Communication outlook 1993 soft cover (OECD) 156p FF180: US$42, DM74; ISBN 92-64-13841-2. 202
- Privacy law reform - Hong Kong. 203-204
- Book review. 204
- Handbook of personal data protection: by Wayne Madsen (1992), Macmillan, hard-cover, 1026 p, £85.00, ISBN: 0 333 560202. 204
Volume 9, Number 5, September 1993
- Editorial. 205
- Licensing embedded programs. 206-213
- The EEC directive of July 25, 1985 on liability for defective products and its application to computer programs. 214-226
- Controlling computer security: A guide for financial institutions: by James Essinger (FT Business Information Ltd, 1992 ISBN 1-85334-163-0). 226
- The commercialization of data held by the public sector. 227-233
- ATM fraud: The meaning of 'prejudice'. 234-235
- Intellectual property world desk reference - A guide to practice by country, state, and province: edited by Thomas N S Hemnes, 1992, loose-leaf (Kluwer Law and Taxation Publishers), US $125.00 or Dfl 200.00, ISBN 90 6544 906X. 235
- Re-examination of re-reversal of reverse engineering decision resolved. 236-239
- The online searcher: edited by Ethel Auster, 1990, soft-cover (Neal-Schuman Publishers, London), 397 p, ISBN 1-55570-066-3. 239
- News and comment on recent developments from around the world. 240-251
- Computer software protection/liability/law/forms: by L J Kutten, release bulletins 10 and 11, December 1992-April 1993, loose-leaf (Clark Boardman Callaghan). 251
- Books received. 251
- The 1992 PC security and viruses conference Tuesday 24th November 1992, London, Cafe Royal. IBC technical services limited. 252
Volume 9, Number 6, November 1993
- Editorial. 253
- Drafting software licenses in light of the EEC competition rules. 254-261
- The law of high technology innovation: by Aryeh S Friedman, 1992, loose-leaf, £65.00, ISBN 0 880 63359x. 261
- Intellectual property protection in Asia: edited by Arthur Wineburg, loose-leaf, £91.00 (+ £68.00 for the first issue published in December 1992) ISBN 0880632941. 261
- International legal protection for software. 262-273
- A handbook of European software law: edited by Michael Lehmann and Colin Tapper, 1993, loose-leaf (Oxford University Press), 239 p, £150.00, ISBN 0-19-825754-6. 273
- Correction. 273
- Deborah Fisch Nigri:
Computer crime: Why should we still care? 274-280 - The international emergence of criminal information law: by Ulrich Sieber, 1992, hard-cover (Carl Heymanns Verlagg KG), 144 p, ISBN 3-452-22346-9. 280
- Securing confidential information for competitive advantage. 281-285
- Copinger & Skone-James on copyright, 13th Edition, : by E P Skone-James, Sir John Mummery, J E Rayner-James and K M Garnett, 1991, hard-cover (Sweet & Maxwell), 1598 p, £160.00, ISBN 0-421-39200-2. 285
- Steve Jackson games v US secret service: An update. 286-287
- AS/400 security audit and control: by Keith Lester, 1993, soft-cover (Elsevier Advanced Technology), 147 p, £145.00, ISBN 1-85617-182-5. 287
- Books received. 287
- A summary of the ninth report of the data protection registrar, June 1993. 288-289
- Understanding information business, technology and geography: edited by Kevin Robins, 1992, hard-cover, 210 p, £39.50, ISBN 185293 109 4. 289
- News and comment on recent developments from around the world. 290-300
- Ensuring compliance with the new EC rules for the purchase or lease of computers, software, it equipment and services. 300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.