scispace - formally typeset
Search or ask a question

Showing papers in "Computer Law & Security Review in 2004"


Journal ArticleDOI
TL;DR: The present paper will analyse the C2C payment system exemplified by PayPal, and it will explore some of the most pressing legal questions which need answering, such as the regulatory status of PayPal.

45 citations



Journal ArticleDOI
TL;DR: E-contract laws in Malaysia based on Contracts Act 1950 and Digital Signature Act 1997 are discussed and recommendations as to how Malaysian law could be amended to conform more closely to international developments in this area are concluded.

15 citations


Journal ArticleDOI
TL;DR: It is explained that not only the arsenal of identity instruments, but also their identity verification methods have to change if the authors are to meet the challenge of identity fraud in the future.

13 citations


Journal ArticleDOI
TL;DR: For years, Internet search companies have relied on the sale of advertising to provide a revenue stream but over time, efforts have been made to increasingly tailor such advertising to the individual user and, more recently, to the “keyword” searched by the user.

9 citations


Journal ArticleDOI
TL;DR: The EU Directive on measures and procedures to ensure the enforcement of intellectual property rights, 1 (“the Directive”) came into force on 20 May 2004.

9 citations


Journal ArticleDOI
TL;DR: A system needs to be developed that will allow nation victims of cyber crime to swiftly prosecute these criminals without stepping on the toes of another nation's sovereignty; a system that allows for collaboration with other countries.

9 citations




Journal ArticleDOI
TL;DR: This article will consider some of the implications surrounding the issues relating to the identification of a person, but does not consider the authentication of the computer application.

8 citations



Journal ArticleDOI
TL;DR: This article is about that recurring email in your inbox, extolling the benefits of Viagra-like tablets which promises wonders for your recreational life, and you question why someone out there in the cyber-world feels so strongly that you are in need of such assistance.

Journal ArticleDOI
TL;DR: The necessity of tackling the exemptions to copyright from a technical-based approach and the need for moving into Digital Rights and Exemptions Management Systems (DREMS) protection schemes are introduced.

Journal ArticleDOI
TL;DR: California's Database Breach Notification Act dramatically escalates the need for companies to secure their key customer data, and represents a wave of new law that penalizes the failure to secure databases containing personally identifiable information.

Journal ArticleDOI
TL;DR: The authors will analyse the EU position, its claim for adequate personal data protection to be ensured by the US authorities and the legal grounds for this position, and a synthetic approach to the adequacy of the US decisions vis-a-vis the EU legal provisions will be proposed.

Journal ArticleDOI
TL;DR: China has postponed any definitive decision on when it will issue 3G licences to telecoms carriers, saying when and how depended on the maturity of the technology and market demand.

Journal ArticleDOI
TL;DR: This update considers the recent adequacy Decision on the subject from the Commission and other developments in the ongoing discussions across the Atlantic.

Journal ArticleDOI
TL;DR: Concerns about authenticity in sources are not new but with the ubiquity of digital representations and the proliferation of source information on the Internet, these issues are further complicated.

Journal ArticleDOI
TL;DR: The potential for decoding encrypted data in two ways; one to reveal the secret message and the other to show an innocuous message is considered.

Journal ArticleDOI
TL;DR: The Malaysian Communications and Multimedia Commission published a discussion paper on Regulating Unsolicited Commercial Messages in early August 2003 as discussed by the authors, which was undertaken as a precursor to a law to control the problem of junk mails or spam on the Internet and other electronic media.

Journal ArticleDOI
TL;DR: To demonstrate that multi-application smart card technology can be reconciled with the principles of data protection legislation, in particular with the requirements that personal data be processed fairly and lawfully, three technical solutions are presented.

Journal ArticleDOI
TL;DR: In this article, the authors discuss the legal challenges of ecommerce oriented software agents and present a brief roadmap indicating potential paths towards creating legally compliant agent systems, including modelling and ontologies and protocols.

Journal ArticleDOI
David Taylor1
TL;DR: It is looked at how the LEN seeks to define their liability and thereby clarify the role and responsibility of ISPs, whose potential liability has been in the balance for a number of years now in many countries including France.


Journal ArticleDOI
Simon Chalton1
TL;DR: The effect of the Court of Appeal's judgment in Durant v FSA on the scope of data protection regulation, and the possibility of conflict with EU Directive 95/46, is considered.

Journal ArticleDOI
TL;DR: The current system does not really safeguard compliance with the Safe Harbor principles, and it is concluded that data transfers out of the European Union is only admissible if the third country ensures an adequate level of protection.

Journal ArticleDOI
TL;DR: An EU initiative designed to combat fraud in online transactions by securing electronic evidence of online criminal behaviour is reviewed.

Journal ArticleDOI
TL;DR: The anti-circumvention provisions in both the WIPO Internet Treaties and the US Digital Millennium Copyright Act are introduced and compared and specific suggestions for the reform of the US anti- Circumvention legislation are offered.

Journal ArticleDOI
TL;DR: The principal developments which took place in 2003 that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas and which were reported on in this column in 2003 are summarized.

Journal ArticleDOI
TL;DR: The Italian privacy law, and its technical regulations, in the framework of various European Directives, is analyzed, pointing out both its strong points and its flaws, and the difficulties found in its real-world implementations.