Showing papers in "Computer Law & Security Review in 1997"
••
19 citations
••
TL;DR: Some of the ethical issues facing lawyers arising from the increasing use of the Internet by law firms are examined.
10 citations
••
TL;DR: This article examines the application of the EC Data Protection Directive to the protection of personal data in open networks such as the Internet and identifies a number of problems which have yet to be resolved.
8 citations
••
TL;DR: Singapore's concern about cyberspace abuse has resulted in attempts to regulate the information superhighway — the first country to do so since the US Federal Court rejected the Communications Decency Act in June 1996.
7 citations
••
TL;DR: The legal reality behind the hype of partnering agreements is unraveled and the relevance of partnering to IT projects generally and how the concept is beginning to be used in practice under various forms of contract is explained.
5 citations
••
TL;DR: Holistic Risk Management is the process by which an organization firstly identifies and quantifies all of the threats to its objectives, and having done so manages those threats within, or by adapting, its existing management structure.
5 citations
••
TL;DR: The internet has an estimated 30 to 35 million users in approximately 100 countries and is growing rapidly each month, and with limited and contradictory case law and jurisdictional issues unclear, it seems that some kind of harmonization with regard to trademark protection on the Internet is the way forward.
4 citations
••
4 citations
••
TL;DR: The law in Cyberspace poses many challenges precisely because of the radical departure of most of the authors' preconceived notions about business transactions: business dealings can occur across the globe in an instant, without paper, pen, or face-to-face contact.
3 citations
••
TL;DR: One of the first ‘mass’ market uses of public key certificate infrastructure is being driven by the implementation of the Secure Electronic Transaction standard, and it won't be long before an entirely new business sector emerges around the use of public keys and digital signatures.
3 citations
••
TL;DR: To ignore the existence of patents for computer program-related inventions can only be to the detriment of the future of the European Computer Software Industry.
••
TL;DR: In this paper, the authors examined the issues arising from that case, and tried to analyse how Uk copyright law applies to Web links and found that placing a link to another's web page from one's own page might, in some way, infringe a copyright of the author of the linked-to page.
••
••
••
••
TL;DR: The legal and jurisdictional issues of the Internet have been discussed in this article, where the authors argue that while the Internet may know no boundaries in terms of its technological capabilities, this also gives rise to some complicated legal and legal issues.
••
TL;DR: The German preliminary investigations instituted at the end of 1995 againstseveral service providers in the Internet for the dissemination of pornography and national-socialist ideology have brought to the public eye the fact that new technologies create new possibilities for misuse and that a number of unsettied legal questions exist.
••
TL;DR: Draft Digital Signature Guidelines (‘Guidelines’) are developed - an abstract statement of principles intended to serve as a long-term unifying foundation for digital signature law across varied legal settings either for adjudicatory use or legislative enactment.
••
TL;DR: This article, to be presented in two parts, examines the treatment of multimedia products under international copyright law with specific reference to the EC Database Directive, the Berne Convention, the GATT TRIPS Agreement, and the WIPO Draft Treaty on Intellectual Property Rights in respect of Databases.
••
TL;DR: A growing body of case law indicates that there are a number of areas in which an organizations may face potentially enormous liability for the online activities of its employees as mentioned in this paper, and a company cannot pull the plug on its connection to the Internet, or monitor all communications taking place online, but it can take reasonable steps to lower the risk that the company will be held liable for the improper (and sometimes illegal) conduct of their employees.
••
TL;DR: The Guidelines for Cryptography Policy Guidelines are examined and what they are expected to achieve are examined.
••
TL;DR: The difficulty with drafting an article on regulation of marketing on the Internet is that it is being written too early as discussed by the authors, although there are some common approaches beginning to show a common way that the majority of Western democracies may go.
••
••
TL;DR: Some of the legal considerations with which data security officers and other management personnel should be familiar are outlined: a checklist at the end of the article covers some of the points discussed.
••
TL;DR: Assafa Endeshaw discusses the fresh impetus given to the unresolved issue of whether a contract for the supply of software can be regarded as acontract for ‘services’ or ‘goods’ by the July 1996 decision of the Court of Appeal.
••
TL;DR: This project seeks to test the hypothesis that: the information that SMEs obtain from patent specifications makes a greater contribution to their innovation than the protection afforded by the patent system.
••
TL;DR: This article discusses the genesis of a new form of criminality which flourishes within the new communications medium of the digital network and the forms and the characteristics of the new criminal categories.
••
TL;DR: This paper draws on the author's wide experience with the Organization of Economic Cooperation and Development and outlines the broader considerations that he believes should be taken into account in developing international cryptography policy.