scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2001"


Journal ArticleDOI
TL;DR: The central issue taken up in this paper concerns the extent to which Art. 15 of the 1995 EC Directive may have a meaningful impact on automated profiling practices.

59 citations


Journal ArticleDOI
TL;DR: In this article, the authors analyze the recent developments in relation to Internet content regulation and argue that there is too much unwarranted anxiety about what is and what is not available over the Internet, and that specific technical solutions offered within different foras for the availability of illegal and harmful content may not be the right solutions to pursue as there remains serious concerns for cyber-speech.

35 citations


Journal ArticleDOI
TL;DR: Jan Grijpink clarifies which concepts and practical applications biometrics relates to and a number of practical basic rules are given as a guide to proceeding in a legally acceptable manner when applyingBiometrics.

17 citations


Journal ArticleDOI
TL;DR: The various kinds of agents (passive agents, active agents, transaction agents) that can be distinguished, the relationships between users and suppliers of agents, and the transaction model that will serve as a guide for the legal definition of the use of intelligent agents are examined.

16 citations


Journal ArticleDOI
TL;DR: Some of the papers presented at the Second International Workshop on Information Hiding, IH'98, Portland, Oregon, USA are reviewed to consider the robustness of marks and methods of attack to remove the hidden information.

9 citations


Journal ArticleDOI
TL;DR: The authors analyse the method, interests and limits of the self-regulatory model proposed by the European Institutions, bearing in mind the perspective of user empowerment.

6 citations


Journal ArticleDOI
TL;DR: This article compares the United States ESIGN Act with the European Union Electronic Signatures Directive and provides a brief assessment of where the two sides “got it right” as legislative drivers of enhanced electronic signature use and acceptance.

6 citations


Journal ArticleDOI
TL;DR: The most recent changes to the US export controls on encryption items (referred to herein as the “US Regulations”) were published in the US Federal Register on 19 October, 2000 as discussed by the authors.

5 citations


Journal ArticleDOI
TL;DR: In this article, the authors consider the scope and legal background to the information society services defined in both the Electronic Commerce and the Conditional Access Directives and propose a definition of Information Society Services.

5 citations


Journal ArticleDOI
TL;DR: In this article, the most important conclusions of the first stage of a study into the dimensions of digital anonymity are presented, which is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity.

5 citations


Journal ArticleDOI
TL;DR: Requests to EU entities from US group members to transfer personal data to the USA in order to assist with their compliance with US laws should be treated with circumspection, as such compliance may not be reconcilable with EU personal data protection compliance.

Journal ArticleDOI
TL;DR: The Council Regulation (EC) No 44/2001 of 22 December 2000 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters (the Regulation) is an important measure approved by the European Union to simplify rules of jurisdiction and recognition of judgments for the benefit of the Internal Market.

Journal ArticleDOI
TL;DR: The study examines how commercial exploitation could help to maximize the value of public sector information to governments, citizens and businesses alike and gives an update on both the EC and Member States governments’ policy initiatives especially in terms of legislation on freedom of information.

Journal ArticleDOI
TL;DR: In this paper, the Treasury Taskforce has recently released long-awaited IT Guidelines for PFI contracts, which are not always suitable for IT contracts and given the growing importance of such contracts to the Government's PFI agenda and plans for E-government.

Journal ArticleDOI
TL;DR: The various copyright rights that may be implicated by transmissions and use of works on the Internet are considered, as well as certain limitations on liability for online service providers afforded under federal statutes.

Journal ArticleDOI
TL;DR: The issues involved in identifying and protecting the information and systems that are critical for national security and societal and economic well-being will require a high level of cooperation between the public and private sectors and between countries.

Journal ArticleDOI
TL;DR: This article looks at the concept information privacy and how the Data Protection Directive seeks to regulate the position.

Journal ArticleDOI
TL;DR: Wernick et al. as mentioned in this paper argued that failure to respond properly and expeditiously to even an imperfect DMCA notification is at the ISP's peril, and the decision was later reversed by the United States Court of Appeals.

Journal ArticleDOI
TL;DR: In this article, the authors explore these criticisms and examine how they might affect the IT industry in the UK and examine the impact of failed tenderers and the European Commission in respect of their method of adherence to these regulations.

Journal ArticleDOI
TL;DR: In 2000, the Government of Hong Kong established an Inter-departmental Working Group on Computer Related Crime (the Working Group) as mentioned in this paper, with representatives from various Government bureaux and departments.

Journal ArticleDOI
TL;DR: The established difficulties of identifying a satisfactory legal status for websites and the recent European approach of classifying a website as a database are examined.

Journal ArticleDOI
TL;DR: In this paper, the authors explain what businesses can and cannot do in terms of monitoring their staff to reduce the risks associated with E-mail communications and summarize several relevant pieces of UK legislation which have an impact on such activities.

Journal ArticleDOI
TL;DR: New mobile telecommunications technologies are expected to enable the location of more or less the exact positioning of a mobile user’s terminal equipment and this technology should not be allowed to create a situation where mobile users are under ‘constant surveillance’.

Journal ArticleDOI
TL;DR: The IT Law Unit has been helping Arium to develop a legal risk management model for the Internet, providing data input and insight into the various aspects of e-commerce, and validating the model structure in light of specialist legal knowledge.


Journal ArticleDOI
TL;DR: This article provides a guide to countries disposing of spectrum and focuses on the disposal of licences for 3G mobile services and BFW services.


Journal ArticleDOI
TL;DR: The Combined Code and ‘Turnbull’ — the commonly used abbreviation for the Stock Exchange’s committee on corporate governance, chaired by Nigel Turnbull, are looked at a year on.

Journal ArticleDOI
TL;DR: The German Department of Trade and Industry has issued a first Draft for the implementation of the E-Commerce Directive (2000/31/EC dated 8 June 2000). The Draft called ‘Electronic Commerce Act’ (dated 1 December 2000) mainly provides for changes and amendments to the German Teleservices Act from 1997 as discussed by the authors.

Journal ArticleDOI
TL;DR: In 2000, the Government of Malta published a "White Paper on the Legislative Framework for Information Practices" as discussed by the authors, which was open for comment from the public until the end of June and it is expected that the draft Bills contained in the White Paper, after having been appropriately amended following the public comments, will be presented before the Maltese Parliament in Autumn 2000.