default search action
Computer Law & Security Review, Volume 13
Volume 13, Number 1, January 1997
- Stephen Saxby:
The times they are A-changing. 2 - Eric R. Verheul, Bert-Jaap Koops, Henk van Tilborg:
Binding cryptography - A fraud-detectible alternative to Key-Escrow proposals. 3-14 - Peter Stone:
Lessons from America: Filtration of functionality from software copyright. 15-21 - Simon Newman:
Rights, freedoms and phonograms: Moral rights and adaptation rights in music and other copyright works. 22-28 - J. Dianne Brinson:
Multimedia Law and Business Handbook, J. Dianne Brinson, Mark F. Radcliffe. Ladera Press, NY (1996), 468, ISBN 096 391 7323 US $44.95. 28 - Robyn Durie:
The internet, trademarks and domain names. 29-33 - Lena Peters:
The future Unidroit database on uniform law. 34-41 - Joseph Norton:
Cross-Border Electronic Banking - Challenges and Opportunities, Joseph Norton, Chris Reed, Ian Walden (Eds.). Lloyds of London Press (1995), 303, 185044 8485. 41 - Simone van der Hof:
First results of The Dutch National Programme on Information Technology and Law. 42-45 - David Bainbridge:
Intellectual Property, 3rd Edition, David Bainbridge. Pitman Publishing (1996), 572, 0273 622 79X £27.99 soft-cover. 45 - Robert McCallough:
St Albans City and district council and International Computers Limited - "St Albans and Beyond". 46-48 - Glenn P. Jenkins:
Information Technology and Innovation in Tax Administration, Glenn P. Jenkins (Ed.). Kluwer Law International (1996), 213, NLG 125.00/US $84.00/£56.00, ISBN: 90 411 09668. 72
Volume 13, Number 2, March 1997
- Stephen Saxby:
Measured progress in geneva. 74 - Gillian Bull:
Market data rights bingo. 75-86 - Robert P. Bigelow:
A report from the United States - part II. 87-95 - Simon Newman:
Intellectual property law: Part II - The moral right of the author: The view from France, Germany and the United Kingdom. 96-101 - Clive Seddon:
IT project management: Partnering IT projects. 102-109 - James M. McCauley:
Internet regulation - I: Legal ethics and the internet: A US perspective. 110-114 - Kah Leng Ter:
Internet regulation II: Internet regulation in singapore. 115-119 - Andrew Charlesworth:
Law report - I: Glencore international A.G. and another v bank of China [1996] 1 Lloyd's law reports 135. (CA) decision of 8 november 1995. 120-122 - Conor Ward:
Law report - II: Online newspaper's hypertext links to rival prohibited. 123 - Jackie Wilson:
Electronic document management: Electronic documents. 124-125 - Mark D. Powell:
Technology transfer: The european commission's technology transfer regulation. 126-131
Volume 13, Number 3, May 1997
- Stephen Saxby:
Electronic commerce a step closer following adoption of OECD cryptography guidelines. 150
- Ulrich Sieber:
Criminal liability for the transfer of data in international networks - new challenges for the internet - part I. 151-157 - Irini E. Vassilaki:
Multimedia crime: Multimedia crime - Emergence, phenomena and legal questions of "metacomputer crime". 158-162
- David Flint:
Internet domain names: Proposal for a cybermark. 163-166 - Chris Reed:
Copyright in WWW pages: News from Shetland copyright in links to World Wide Web pages. 167-175 - Matthew Godfrey-Faussett:
Outsourcing: Telecommunications outsourcing - A legal perspective. 176-181 - Justice Michael Kirby:
Cryptography policy: OECD cryptography guidelines in context. 182-186 - David Wiseman:
Conference review: Legal aspects of global communications. 197-200 - Christopher Rees:
Computer Evidence: A Forensic Investigations Handbook by Edward Wilding Published by Sweet & Maxwell. 219
Volume 13, Number 4, July 1997
- Stephen Saxby:
Computer misuse act questioned again. 222 - Ulrich Sieber:
Criminal liability for the transfer of data in international networks - New challenges for the internet - Part II: Precedents. 223-233 - Cécile de Terwangne, Sophie Louveaux:
Data protection and online networks. 234-246 - Robert J. Hart:
The case for patent protection for computer program-related inventions. 247-252 - Stephan Beutler:
The protection of multimedia products under international copyright law. 253-260 - Steve A. Mandell, Edwin Y. Szeto, Eileen P. Cohen:
US update: Legal status of safeguarding proprietary information. 261-265 - Benjamin Wright:
Electronic commerce legislation - Frequently asked questions. 266-268 - Jackie Wilson:
In the matter of application no 9204959.2 by Fujitsu Ltd. 269-271 - Helena Davies:
Business transfers and outsourcing: The Süzen and Betts cases. 272-273 - Heather Rowe:
British telecom's operating licence - The new fair trading condition. 274-275 - Steve Orlowski:
OECD cryptography policy guidelines. 276-278
Volume 13, Number 5, September 1997
- Stephen Saxby:
Editorial. 302 - Andrew Horrocks, Kit Burden:
Domain names: Domain names - Fighting for identity. 303-306 - Heather Rosenblatt:
Protocol to the berne convention: The wipo diplomatic conference - the birth of two new treaties. 307-311 - Ulrich Sieber:
Internet law: Criminal liability for the transfer of data in international networks - New challenges for the internet - Part III: Precedents. 312-318 - Stephan Beutler:
Multimedia law: The protection of multimedia products under international copyright law - Part II. 319-324 - Assafa Endeshaw:
Commercial law: Assimilating software to 'goods' by analogy. 325-330 - Michael Sinclair:
IT management: Providing for information technology on sale of a business. 331-335 - David Davies, Aon Bain Hogg:
Risk management: Holistic risk management. 336-339 - Alexander de Daranyi:
Software law - Switzerland: An introduction to software protection under swiss law. 340-343 - Stuart MacDonald, Bernard Lefang:
Patent information survey: Information for innovation: Surveys of innovating and patenting small firms. 344-348 - Stephen Digby:
EURIM report: EURIM - European informatics market - The next phase. 349-351 - David Bainbridge:
Law report - I: Cannot employees also be hackers? 352-354 - Mark Taylor:
Law report- II: Pitman training ltd and ptc oxford ltd v nominet uk and pearson professional ltd. 355-356 - Gillian Bull:
Conference review: Cyberl@W, IBC UK conferences limited, Monday 23 June 1997, Strand Palace Hotel, London. 381-382 - Heather Rowe:
The report by the centre for the study of financial innovation (CSFI) on "the internet & financial services". 383-386 - Heather Rowe:
The laws of the internet by Clive Gringras of Nabarro Nathanson. 387
Volume 13, Number 6, November 1997
- Stephen Saxby:
Editorial. 390 - Heather Rowe:
It issues in monetary union: European monetary union - so why is it a technology issue? 391-397 - Robert T. J. Bond:
European union directive on the legal protection of databases. 401-412 - Ulrich Sieber:
Internet law: Criminal liability for the transfer of data in international networks - new challenges for the internet - part IV: Precedents. 413-418 - Simon Chalton:
Data protection: Data protection: The government's legislative proposals. 425-428 - Simon Davies:
Privacy law - Australia: The Australian federal government has abandoned its election promise to enact privacy legislation for business. 429-430 - Harry Small:
Commerce in cyberspace - I: Marketing on the internet. 431-435 - Scott Glickson:
Commerce in cyberspace - II: Point, click, and buy: Contracting for online products and services. 436-441 - David Judah:
Liability in cyberspace - I: Defamation in cyberspace. 442-446 - Jared Silverman:
Liability in cyberspace - II: Disclosure and securities fraud on the internet. 447-450 - Michael D. Scott:
Liability in cyberspace - III: Creating a corporate internet acceptable use policy. 451-453 - Dave Birch:
Secure electronic commerce - I: The certificate business public key infrastructure will be big business. 454-456 - Michael S. Baum:
Secure electronic commerce - II: The ABA digital signature guidelines. 457-458
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.