Showing papers in "Computer Law & Security Review in 2007"
••
TL;DR: It is argued that users/consumers of RFID systems should be given the mandate to have control over their products and systems and in order to fully address solution to the security concerns.
61 citations
••
TL;DR: The UK government has estimated that by 2008 compliance with WEEE obligations will cost the UK in excess of £100 million annually, although the new legislation is due to begin in January 2007.
30 citations
••
TL;DR: The Batteries Directive as mentioned in this paper aims to reduce the amount of harmful substances that leak from used batteries when they are dumped with regular trash in landfill, which poses dangers to human health and the environment.
30 citations
••
TL;DR: The Review was published on 6th December 2006 and the following is an assessment of the main recommendations.
27 citations
••
TL;DR: It is argued that the landscape of e-signatures regulations is divergent and fragmentary, which, to some extent, impedes the flow of international e-commerce.
20 citations
••
TL;DR: It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising and the consumer willingness to accept mobile advertising will increase.
18 citations
••
TL;DR: Olsen et al. as mentioned in this paper proposed a framework for identity management in the context of European data protection law, which involves both identity providers and other service providers, and analyzed how to ensure a compliant interaction with the end-user.
14 citations
••
TL;DR: It is concluded that the reciprocities within and between the judiciary's sub-organisations represent great interest, and how dependent the judiciary is becoming upon its information services is examined.
14 citations
••
TL;DR: This paper examines the legal aspects of UK corporate computer forensic investigations for incidents such as fraud, money laundering, accessing or distributing indecent images, harassment, industrial spying and identity theft.
12 citations
••
TL;DR: The legal issues surrounding the development of RFID enabled smart cards can transform the delivery of services and goods, through the automated identification and verification of customers, resulting in significant efficiency gains and ultimately lower costs for consumers.
12 citations
••
TL;DR: In this article, the authors draw a blueprint of such a system, which basically includes three schemes, namely the self-help communication mechanism, the alternative dispute resolution scheme, and the judicial procedure.
••
TL;DR: Examination of intellectual property (“IP”) strategy and best business practices for research and development services in China finds that there is more practical control over the results of the R&D and IP can be better protected.
••
TL;DR: Since the 1990 Act came into force, there have been relatively few prosecutions under the Act but new forms of abuse have appeared such as the use of spyware and the activity of ‘phishing’.
••
TL;DR: The Human Services (Enhanced Service Delivery) Bill 2007 as discussed by the authors was introduced into Parliament to establish Australia's Access Card ID system, which is only half of the blueprint for the ID system: the other half is yet to come in a Bill or Bills not yet seen.
••
TL;DR: This paper looks into the history of this discussion and suggests that the ID card issue is now very clearly back on the agenda.
••
TL;DR: This article seeks to address issues from the perspective of European data protection law, addressing the roles and responsibilities of collaborators and will analyse how to ensure a compliant interaction with the end-user.
••
TL;DR: This article explores new computer misuse provisions by way of amendment to the Computer Misuse Act 1990 in the context of ‘denial-of-service’ attacks.
••
TL;DR: The emerging body of jurisprudence relating to s.40 of FOIA demonstrates that assessing the operation of the exemption requires a degree of sophistication, balancing the rights of FOIA applicants and the public with the privacy rights of public officials.
••
[...]
TL;DR: In this article, the authors examine a number of UK copyright law issues relevant to providers and users of IPTV services and examine how copyright impacts on what end-users can do with IPTV content they receive and what consequences this may have for IPTV providers.
••
TL;DR: This article attempts to show that the coding of law into applications is haphazard, and investigates why some laws receive significant attention from software makers and others do not.
••
••
TL;DR: The privacy concerns facing search engines, Google's current approach to privacy, and the work it has to do to convince European privacy regulators that this approach really does comply with data protection legislation are looked at.
••
TL;DR: This paper analyses the proposed Payment Services Directive, which has been further weakened by the introduction of new amendments that reduced the payment provider's obligation by the European Parliament, after intense lobbying from the powerful banking institutions.
••
TL;DR: This article defines and summarises the various types of domain names, how they are registered, the legal effects of registration, the WHOIS databases and, briefly, the interaction between domain names and intellectual property.
••
TL;DR: An analysis of the UIGEA and its effects on Internet gambling firms, as well as related businesses is provided, suggesting that this legislation has reduced Internet gambling in publicly traded firms.
••
TL;DR: Issues arising in developing country markets, particularly those where voice service competition is limited, are examined.
••
TL;DR: UK law and practice on software inventions no longer reflects current thinking at the EPO, and that could have grave economic consequences for the software industry.
••
TL;DR: To effectively harmonize IT law in different countries, it is argued that new legislation with respect to IT products, as well as the attempt to create a more general harmonization of copyright, has led to ‘disharmonization’, while the social problems arising from information technology have hardly been dealt with.