scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 1997"



Journal ArticleDOI
TL;DR: Some of the ethical issues facing lawyers arising from the increasing use of the Internet by law firms are examined.

10 citations


Journal ArticleDOI
TL;DR: This article examines the application of the EC Data Protection Directive to the protection of personal data in open networks such as the Internet and identifies a number of problems which have yet to be resolved.

8 citations


Journal ArticleDOI
TL;DR: Singapore's concern about cyberspace abuse has resulted in attempts to regulate the information superhighway — the first country to do so since the US Federal Court rejected the Communications Decency Act in June 1996.

7 citations


Journal ArticleDOI
TL;DR: The legal reality behind the hype of partnering agreements is unraveled and the relevance of partnering to IT projects generally and how the concept is beginning to be used in practice under various forms of contract is explained.

5 citations


Journal ArticleDOI
TL;DR: Holistic Risk Management is the process by which an organization firstly identifies and quantifies all of the threats to its objectives, and having done so manages those threats within, or by adapting, its existing management structure.

5 citations


Journal ArticleDOI
TL;DR: The internet has an estimated 30 to 35 million users in approximately 100 countries and is growing rapidly each month, and with limited and contradictory case law and jurisdictional issues unclear, it seems that some kind of harmonization with regard to trademark protection on the Internet is the way forward.

4 citations



Journal ArticleDOI
TL;DR: The law in Cyberspace poses many challenges precisely because of the radical departure of most of the authors' preconceived notions about business transactions: business dealings can occur across the globe in an instant, without paper, pen, or face-to-face contact.

3 citations


Journal ArticleDOI
TL;DR: One of the first ‘mass’ market uses of public key certificate infrastructure is being driven by the implementation of the Secure Electronic Transaction standard, and it won't be long before an entirely new business sector emerges around the use of public keys and digital signatures.

3 citations


Journal ArticleDOI
TL;DR: To ignore the existence of patents for computer program-related inventions can only be to the detriment of the future of the European Computer Software Industry.

Journal ArticleDOI
TL;DR: In this paper, the authors examined the issues arising from that case, and tried to analyse how Uk copyright law applies to Web links and found that placing a link to another's web page from one's own page might, in some way, infringe a copyright of the author of the linked-to page.





Journal ArticleDOI
TL;DR: The legal and jurisdictional issues of the Internet have been discussed in this article, where the authors argue that while the Internet may know no boundaries in terms of its technological capabilities, this also gives rise to some complicated legal and legal issues.

Journal ArticleDOI
TL;DR: The German preliminary investigations instituted at the end of 1995 againstseveral service providers in the Internet for the dissemination of pornography and national-socialist ideology have brought to the public eye the fact that new technologies create new possibilities for misuse and that a number of unsettied legal questions exist.

Journal ArticleDOI
TL;DR: Draft Digital Signature Guidelines (‘Guidelines’) are developed - an abstract statement of principles intended to serve as a long-term unifying foundation for digital signature law across varied legal settings either for adjudicatory use or legislative enactment.

Journal ArticleDOI
TL;DR: This article, to be presented in two parts, examines the treatment of multimedia products under international copyright law with specific reference to the EC Database Directive, the Berne Convention, the GATT TRIPS Agreement, and the WIPO Draft Treaty on Intellectual Property Rights in respect of Databases.

Journal ArticleDOI
TL;DR: A growing body of case law indicates that there are a number of areas in which an organizations may face potentially enormous liability for the online activities of its employees as mentioned in this paper, and a company cannot pull the plug on its connection to the Internet, or monitor all communications taking place online, but it can take reasonable steps to lower the risk that the company will be held liable for the improper (and sometimes illegal) conduct of their employees.

Journal ArticleDOI
TL;DR: The Guidelines for Cryptography Policy Guidelines are examined and what they are expected to achieve are examined.

Journal ArticleDOI
TL;DR: The difficulty with drafting an article on regulation of marketing on the Internet is that it is being written too early as discussed by the authors, although there are some common approaches beginning to show a common way that the majority of Western democracies may go.


Journal ArticleDOI
TL;DR: Some of the legal considerations with which data security officers and other management personnel should be familiar are outlined: a checklist at the end of the article covers some of the points discussed.

Journal ArticleDOI
TL;DR: Assafa Endeshaw discusses the fresh impetus given to the unresolved issue of whether a contract for the supply of software can be regarded as acontract for ‘services’ or ‘goods’ by the July 1996 decision of the Court of Appeal.

Journal ArticleDOI
TL;DR: This project seeks to test the hypothesis that: the information that SMEs obtain from patent specifications makes a greater contribution to their innovation than the protection afforded by the patent system.


Journal ArticleDOI
TL;DR: This article discusses the genesis of a new form of criminality which flourishes within the new communications medium of the digital network and the forms and the characteristics of the new criminal categories.

Journal ArticleDOI
TL;DR: This paper draws on the author's wide experience with the Organization of Economic Cooperation and Development and outlines the broader considerations that he believes should be taken into account in developing international cryptography policy.