Checkpoints in cyberspace: best practices to avert liability in cross-border transactions
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Chicago, Ill.
Section of Business Law, American Bar Association
2005
|
Schlagworte: | |
Online-Zugang: | Table of contents Inhaltsverzeichnis |
Beschreibung: | XLIII, 494 S. Ill. |
ISBN: | 1590314298 9781590314296 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV021749949 | ||
003 | DE-604 | ||
005 | 20070209 | ||
007 | t | ||
008 | 060929s2005 xxua||| |||| 00||| eng d | ||
010 | |a 2004025371 | ||
020 | |a 1590314298 |9 1-590-31429-8 | ||
020 | |a 9781590314296 |9 978-1-590-31429-6 | ||
035 | |a (DE-599)BVBBV021749949 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-M382 | ||
050 | 0 | |a KF889 | |
100 | 1 | |a Trope, Roland L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Checkpoints in cyberspace |b best practices to avert liability in cross-border transactions |c Roland L. Trope and Gregory E. Upchurch |
264 | 1 | |a Chicago, Ill. |b Section of Business Law, American Bar Association |c 2005 | |
300 | |a XLIII, 494 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Recht | |
650 | 4 | |a Electronic commerce |x Law and legislation |z United States | |
650 | 4 | |a Foreign trade regulation |z United States | |
650 | 4 | |a Export sales contracts |z United States | |
650 | 4 | |a Electronic commerce |x Law and legislation | |
650 | 4 | |a Foreign trade regulation | |
651 | 4 | |a USA | |
700 | 1 | |a Upchurch, Gregory E. |e Sonstige |0 (DE-588)130035130 |4 oth | |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip052/2004025371.html |3 Table of contents | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014963178&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014963178 |
Datensatz im Suchindex
_version_ | 1804135606562848768 |
---|---|
adam_text | CHECKPOINTS IN CYBERSPACE*.** BEST PRACTICES TO AVERT LIABILITY 0 IN
CROSS-BORDER TRANSACTIONS ROLAND L. TROPE AND GREGORY E. UPCHURCH R ABA
SECTION OF BUSINESS LAW PRACTICAL RESOURCES FOR THE BUSINESS LAWYER
AMERICAN BAR ASSOCIATION DEFENDING LIBERTY PURSUING JUSTICE CONTENTS
DEDICATION III ACKNOWLEDGMENTS IV SUMMARY OF CHAPTERS V GLOSSARY XIII
INTRODUCTION XVII CHAPTER 1: THE CASE FOR MAPPING RISK POINTS AND
DEPLOYING CHECKPOINTS 1 1.0 TRADE ROUTE OF CYBERSPACE. 1 1.1
PREMISE:*THE NEED FOR INCREASED USE OF TRANSACTIONAL CHECKPOINTS WHEN
DEALING THROUGH THE CYBERSPACE TRADE ROUTE. 3 1.2 HYPOTHETICAL: A
CROSS-BORDER, CYBER-DRIVEN ACQUISITION BY AGILE-WING. 11 1.2.1 RECENT
CHANGES IN THE ENFORCEMENT ENVIRONMENT AT THE DEPARTMENTS OF STATE,
TREASURY, AND COMMERCE. 14 1.2.2 AGILE S RESPONSE TO THE NEW ENFORCEMENT
ENVIRONMENT*ENHANCED DUE DILIGENCE BEFORE SIGNING THE DEFINITIVE
ACQUISITION AGREEMENT. 20 1.2.3 TROLL S RESPONSE TO A REQUEST FOR
ENHANCED DUE DILIGENCE. 24 1.2.4 FINDINGS AND CONSEQUENCES OF THE
ENHANCED DUE DILIGENCE. 24 VN VIII CONTENTS 1.3 EVIDENCE THAT CYBERSPACE
VENDORS APPEAR TO UNDERESTIMATE THE RISKS OF VIOLATING THE TSR AND EAR.
26 1.4 MISCONCEPTIONS THAT OBSCURE THE RISK OF VIOLATING THE EAR AND
TSR. 33 1.5 EMERGING NEED TO DEPLOY CHECKPOINTS SUFFICIENTLY EARLY TO
DETECT AND DEFUSE THE ACCESS CONTROL LAW RISK IN CYBERSPACE. 39 1.6
CHALLENGES OF IMPLEMENTING CHECKPOINTS FOR THE , ACCESS CONTROL LAWS. 44
1.7 POSITIONING A FIRM TO QUALIFY FOR MITIGATING FACTORS AND TO
DISTANCE IT FROM AGGRAVATING FACTORS UNDER THE TSR. 47 1.8 CHANGES TO
THE EAR ENFORCEMENT POLICIES AND PROCEDURES INCREASE THE NEED FOR A
COMPLIANCE PROGRAM THAT INCLUDES A TRANSACTIONAL CHECKPOINT EAR. 57
1.9 PROPOSED AMENDMENTS TO THE U.S. SENTENCING GUIDELINES CONCERNING AN
EFFECTIVE COMPLIANCE PROGRAM. 72 1.10 PROPOSED AMENDMENTS TO THE
SENTENCING GUIDELINES. 86 1.11 SUMMARY OF PROPOSED AMENDMENTS TO
SENTENCING GUIDELINES. 90 1.12 POTENTIAL PROBLEMS IN PROPOSED AMENDMENTS
TO THE SENTENCING GUIDELINES*RISKS TO THE ATTORNEY- CLIENT RELATIONSHIP.
94 1.13 ARMAGEDDON SCENARIOS HIGHLIGHT NEED FOR PRE- NEGOTIATION
CHECKPOINTS. 96 1.14 TEN RECENT DEVELOPMENTS THAT HAVE RAISED THE RISKS
OF LIABILITY FOR CYBERSPACE. TRANSACTORS AND CYBER-DRIVEN TRANSACTIONS.
97 1.14.1 HEIGHTENED SCRUTINY OF CROSS-BORDER TRANSACTIONS. 98 1.14.2
INCREASINGLY AGGRESSIVE ACTION AGAINST INFRINGERS OF INTELLECTUAL
PROPERTY. 104 1.14.3 TOUGHER ENFORCEMENT ACTION FOR FAILURE TO SAFEGUARD
PRIVACY AND PERSONAL DATA. 110 1.14.4 PROLIFERATION OF MALICIOUS CODE.
114 1.14.5 INCREASED ABILITY TO INTERDICT PROHIBITED TRANSACTIONS. 122
CONTENTS IX 1.14.6 INCREASED SURVEILLANCE BY LAW ENFORCEMENT AGENCIES.
124 1.14.7 MULTI-LATERAL INITIATIVES INCREASE SCOPE AND DEPTH OF DUE
DILIGENCE OBLIGATIONS. 127 1.14.8 INCREASED DUTY TO IDENTIFY FINANCIAL
CUSTOMERS. 130 1.14.9 INCREASED IMPORTANCE OF COMPLIANCE PROGRAMS. 133
1.14.10 HEIGHTENED ENFORCEMENT OF THE ACCESS V CONTROL LAWS. 134 CHAPTER
2: CHECKPOINT: TRADE SANCTION REGULATIONS 145 2.0 AGILE S TRANSACTION AT
CHECKPOINT TSR. 145 2.1 DEFINITION OF TARGETED COUNTRY OR ORGANIZATION.
147 2.2 IDENTIFICATION OF PERSONS TARGETED BY A TSR. 150 2.3
IDENTIFICATION OF BENEFITS OFAC SEEKS TO INTERDICT. 153 2.4 MAPPING THE
TSR RISK POINTS OF AGILE S TRANSACTION. 156 2.5 PROBLEMS FOUND AT THE
CHECKPOINT FOR TSR THAT TARGET IRAN. 160 2.5.1 ACTIVITY: SALE OF TROLL
PRODUCTS TO THIRD PARTIES FOR REEXPORT TO IRAN. 161 2.5.2 ACTIVITY: SALE
OF TROLL PRODUCTS TO THIRD COUNTRIES FOR INCORPORATION INTO OTHER
PRODUCTS FOR DELIVERY TO IRAN. 161 2.5.3 ACTIVITY: REEXPORTATION OF
TROLL PRODUCTS BY PERSONS OTHER THAN UNITED STATES PERSONS. 162 2.6
RISKS INHERENT IN LETTERS OF CREDIT AND STAND-BY LETTERS OF CREDIT. 169
2.7 RISKS INHERENT IN DISENGAGEMENT. 171 2.8 GLOBAL TERRORISTS. 175 2.9
DISENGAGEMENTS REQUIRED BY IMPLEMENTATION OF THE SYRIAN ACCOUNTABILITY
AND LEBANESE SOVEREIGNTY ACT OF 2003. 176 2.10 GLOBAL SOLUTION: SHOULD
AGILE VOLUNTARILY DISCLOSE VIOLATIONS DISCOVERED BY ENHANCED DUE
DILIGENCE? 184 2.11 RISKS FROM LAWS BLOCKING COMPLIANCE WITH THE TSR AND
PROVIDING CLAWBACK REMEDIES. 185 2.12 PROVISION OF INTERNET
CONNECTIVITY SERVICES TO IRAN. 189 CHAPTER 3: CHECKPOINT: EXPORT
ADMINISTRATION REGULATIONS 193 CONTENTS 3.0 AGILE S TRANSACTION AT
CHECKPOINT EAR. 193 3.1 ANALYTIC APPROACH TO EAR COMPLIANCE. 197 3.2
CHECKPOINT FOR PRE-SIGNING EAR RISKS. 198 3.3 PERIOD FROM SIGNING UNTIL
CLOSING. 204 3.4 ADDITIONAL EAR-RELATED RISK POINTS. 224 3.4.1 ACTIVITY:
EXPORT, REEXPORT OR TRANSFER OF ITEMS CONTROLLED BY TWO OR MORE U.S.
GOVERNMENT AGENCIES OR AGENCIES OTHER THAN BIS. 228 CHAPTER 4:
CHECKPOINT: INTERNATIONAL TRAFFIC IN ARMS REGULATIONS 233 4.0 AGILE S
TRANSACTION AT CHECKPOINT ITAR. 233 4.1 AGILE S INTEREST IN LEVERAGING
TROLL S SKILLS IN DEFENSE AND HOMELAND SECURITY TECHNOLOGIES. 248
CHAPTER 5: CHECKPOINT: PERSONAL DATA PROTECTION 277 5.0 AGILE S
TRANSACTION IN LIGHT OF THE PERSONAL DATA PROTECTION LAWS OF MULTIPLE
JURISDICTIONS. 277 5.1 IJSSELMEER S COLLECTION AND PROCESSING OF
PERSONAL DATA. 280 5.2 COMPLIANCE WITH THE DUTCH PERSONAL DATA ,
PROTECTION ACT. 289 5.2.1 ACTIVITY. 291 5.3 COMPLIANCE WITH CANADA S
PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT. 303 5.4
CHECKING COMPLIANCE WITH PRIVACY LAWS IN JAPAN. 328 5.5 CHECKING
COMPLIANCE WITH PRIVACY LAWS IN NORWAY. 331 5.6 NORWEGIAN REGULATORY
REVIEW OF AGILE S ACQUISITION VS. U.S. REVIEW OF NORWEGIAN ACQUISITION
OF HIGH TECH FIRM*CHECKPOINT CFIUS. 336 CHAPTER 6: CHECKPOINT:
INFORMATION SECURITY 347 6.0 AGILE S TRANSACTION AT CHECKPOINT
INFORMATION SECURITY. 347 6.1 RISK OF LIABILITY FOR BREACH OF, OR
DEFICIENCIES IN, INFORMATION SECURITY. 379 6.2 INFORMATION SECURITY
OBLIGATIONS IMPOSED BY THE EAR*ISSUES RAISED BY OUTSOURCING. 404
CONTENTS XI 6.3 INFORMATION SECURITY REQUIREMENTS IMPOSED BY THE TSR AND
ITAR. 412 6.4 INFORMATION SECURITY REQUIREMENTS IMPOSED BY PERSONAL DATA
PROTECTION LAWS. 413 6.5 RECOMMENDATIONS FROM THE DMZ DESIGN. 416 6.6
ADJUST PRECAUTIONS TO MINIMIZE RISKS FROM THE EXPANDED USE OF HIGHLY
VULNERABLE TELECOMMUNICATIONS TECHNOLOGIES*INSTANT MESSAGING AND VOIP. ,
418 6.7 ADJUST PRECAUTIONS TO AVERT WORST-CASE RISKS FROM CYBER-ATTACKS.
439 CHAPTER 7: CHECKPOINT: PATENT 445 7.0 AGILE S TRANSACTION AT
CHECKPOINT PATENT. 445 CONCLUSION 459 INDEX 473 ABOUT THE AUTHORS 495
|
adam_txt |
CHECKPOINTS IN CYBERSPACE*.** BEST PRACTICES TO AVERT LIABILITY 0 IN
CROSS-BORDER TRANSACTIONS ROLAND L. TROPE AND GREGORY E. UPCHURCH R ABA
SECTION OF BUSINESS'LAW PRACTICAL RESOURCES FOR THE BUSINESS LAWYER
AMERICAN BAR ASSOCIATION DEFENDING LIBERTY PURSUING JUSTICE CONTENTS
DEDICATION III ACKNOWLEDGMENTS IV SUMMARY OF CHAPTERS V GLOSSARY XIII
INTRODUCTION XVII CHAPTER 1: THE CASE FOR MAPPING RISK POINTS AND
DEPLOYING CHECKPOINTS 1 1.0 TRADE ROUTE OF CYBERSPACE. 1 1.1
PREMISE:*THE NEED FOR INCREASED USE OF TRANSACTIONAL CHECKPOINTS WHEN
DEALING THROUGH THE CYBERSPACE TRADE ROUTE. 3 1.2 HYPOTHETICAL: A
CROSS-BORDER, CYBER-DRIVEN ACQUISITION BY AGILE-WING. 11 1.2.1 RECENT
CHANGES IN THE ENFORCEMENT ENVIRONMENT AT THE DEPARTMENTS OF STATE,
TREASURY, AND COMMERCE. 14 1.2.2 AGILE'S RESPONSE TO THE NEW ENFORCEMENT
ENVIRONMENT*ENHANCED DUE DILIGENCE BEFORE SIGNING THE DEFINITIVE
ACQUISITION AGREEMENT. 20 1.2.3 TROLL'S RESPONSE TO A REQUEST FOR
ENHANCED DUE DILIGENCE. ' 24 1.2.4 FINDINGS AND CONSEQUENCES OF THE
ENHANCED DUE DILIGENCE. 24 VN VIII CONTENTS 1.3 EVIDENCE THAT CYBERSPACE
VENDORS APPEAR TO UNDERESTIMATE THE RISKS OF VIOLATING THE TSR AND EAR.
26 1.4 MISCONCEPTIONS THAT OBSCURE THE RISK OF VIOLATING THE EAR AND
TSR. 33 1.5 EMERGING NEED TO DEPLOY CHECKPOINTS SUFFICIENTLY EARLY TO
DETECT AND DEFUSE THE ACCESS CONTROL LAW RISK IN CYBERSPACE. 39 1.6
CHALLENGES OF IMPLEMENTING CHECKPOINTS FOR THE , ACCESS CONTROL LAWS. 44
1.7 POSITIONING A FIRM TO QUALIFY FOR "MITIGATING" FACTORS AND TO
DISTANCE IT FROM "AGGRAVATING" FACTORS UNDER THE TSR. 47 1.8 CHANGES TO
THE EAR ENFORCEMENT POLICIES AND PROCEDURES INCREASE THE NEED FOR A
COMPLIANCE PROGRAM THAT INCLUDES A "TRANSACTIONAL CHECKPOINT EAR." 57
1.9 PROPOSED AMENDMENTS TO THE U.S. SENTENCING GUIDELINES CONCERNING AN
"EFFECTIVE COMPLIANCE PROGRAM." 72 1.10 PROPOSED AMENDMENTS TO THE
SENTENCING GUIDELINES. 86 1.11 SUMMARY OF PROPOSED AMENDMENTS TO
SENTENCING GUIDELINES. 90 1.12 POTENTIAL PROBLEMS IN PROPOSED AMENDMENTS
TO THE SENTENCING GUIDELINES*RISKS TO THE ATTORNEY- CLIENT RELATIONSHIP.
94 1.13 "ARMAGEDDON" SCENARIOS HIGHLIGHT NEED FOR PRE- NEGOTIATION
CHECKPOINTS. 96 1.14 TEN RECENT DEVELOPMENTS THAT HAVE RAISED THE RISKS
OF LIABILITY FOR CYBERSPACE. TRANSACTORS AND CYBER-DRIVEN TRANSACTIONS.
97 1.14.1 HEIGHTENED SCRUTINY OF CROSS-BORDER TRANSACTIONS. 98 1.14.2
INCREASINGLY AGGRESSIVE ACTION AGAINST INFRINGERS OF INTELLECTUAL
PROPERTY. 104 1.14.3 TOUGHER ENFORCEMENT ACTION FOR FAILURE TO SAFEGUARD
PRIVACY AND PERSONAL DATA. 110 1.14.4 PROLIFERATION OF MALICIOUS CODE.
114 1.14.5 INCREASED ABILITY TO INTERDICT PROHIBITED TRANSACTIONS. 122
CONTENTS IX 1.14.6 INCREASED SURVEILLANCE BY LAW ENFORCEMENT AGENCIES.
124 1.14.7 MULTI-LATERAL INITIATIVES INCREASE SCOPE AND DEPTH OF DUE
DILIGENCE OBLIGATIONS. 127 1.14.8 INCREASED DUTY TO IDENTIFY FINANCIAL
CUSTOMERS. 130 1.14.9 INCREASED IMPORTANCE OF COMPLIANCE PROGRAMS. 133
1.14.10 HEIGHTENED ENFORCEMENT OF THE ACCESS V CONTROL LAWS. 134 CHAPTER
2: CHECKPOINT: TRADE SANCTION REGULATIONS 145 2.0 AGILE'S TRANSACTION AT
CHECKPOINT TSR. 145 2.1 DEFINITION OF TARGETED COUNTRY OR ORGANIZATION.
147 2.2 IDENTIFICATION OF PERSONS TARGETED BY A TSR. 150 2.3
IDENTIFICATION OF BENEFITS OFAC SEEKS TO INTERDICT. 153 2.4 MAPPING THE
TSR RISK POINTS OF AGILE'S TRANSACTION. 156 2.5 PROBLEMS FOUND AT THE
CHECKPOINT FOR TSR THAT TARGET IRAN. 160 2.5.1 ACTIVITY: SALE OF TROLL
PRODUCTS TO THIRD PARTIES FOR REEXPORT TO IRAN. 161 2.5.2 ACTIVITY: SALE
OF TROLL PRODUCTS TO THIRD COUNTRIES FOR INCORPORATION INTO OTHER
PRODUCTS FOR DELIVERY TO IRAN. 161 2.5.3 ACTIVITY: REEXPORTATION OF
TROLL PRODUCTS BY PERSONS OTHER THAN UNITED STATES PERSONS. 162 2.6
RISKS INHERENT IN LETTERS OF CREDIT AND STAND-BY LETTERS OF CREDIT. 169
2.7 RISKS INHERENT IN DISENGAGEMENT. 171 2.8 GLOBAL TERRORISTS. 175 2.9
DISENGAGEMENTS REQUIRED BY IMPLEMENTATION OF THE SYRIAN ACCOUNTABILITY
AND LEBANESE SOVEREIGNTY ACT OF 2003. 176 2.10 GLOBAL SOLUTION: SHOULD
AGILE VOLUNTARILY DISCLOSE VIOLATIONS DISCOVERED BY ENHANCED DUE
DILIGENCE? 184 2.11 RISKS FROM LAWS BLOCKING COMPLIANCE WITH THE TSR AND
PROVIDING "CLAWBACK" REMEDIES. 185 2.12 PROVISION OF INTERNET
CONNECTIVITY SERVICES TO IRAN. 189 CHAPTER 3: CHECKPOINT: EXPORT
ADMINISTRATION REGULATIONS 193 CONTENTS 3.0 AGILE'S TRANSACTION AT
CHECKPOINT EAR. 193 3.1 ANALYTIC APPROACH TO EAR COMPLIANCE. 197 3.2
CHECKPOINT FOR PRE-SIGNING EAR RISKS. 198 3.3 PERIOD FROM SIGNING UNTIL
CLOSING. 204 3.4 ADDITIONAL EAR-RELATED RISK POINTS. 224 3.4.1 ACTIVITY:
EXPORT, REEXPORT OR TRANSFER OF ITEMS CONTROLLED BY TWO OR MORE U.S.
GOVERNMENT AGENCIES OR AGENCIES OTHER THAN BIS. 228 CHAPTER 4:
CHECKPOINT: INTERNATIONAL TRAFFIC IN ARMS REGULATIONS 233 4.0 AGILE'S
TRANSACTION AT CHECKPOINT ITAR. 233 4.1 AGILE'S INTEREST IN LEVERAGING
TROLL'S SKILLS IN DEFENSE AND HOMELAND SECURITY TECHNOLOGIES. 248
CHAPTER 5: CHECKPOINT: PERSONAL DATA PROTECTION 277 5.0 AGILE'S
TRANSACTION IN LIGHT OF THE PERSONAL DATA PROTECTION LAWS OF MULTIPLE
JURISDICTIONS. 277 5.1 IJSSELMEER'S COLLECTION AND PROCESSING OF
PERSONAL DATA. 280 5.2 COMPLIANCE WITH THE DUTCH PERSONAL DATA ,
PROTECTION ACT. 289 5.2.1 ACTIVITY. 291 5.3 COMPLIANCE WITH CANADA'S
PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT. 303 5.4
CHECKING COMPLIANCE WITH PRIVACY LAWS IN JAPAN. 328 5.5 CHECKING
COMPLIANCE WITH PRIVACY LAWS IN NORWAY. 331 5.6 NORWEGIAN REGULATORY
REVIEW OF AGILE'S ACQUISITION VS. U.S. REVIEW OF NORWEGIAN ACQUISITION
OF HIGH TECH FIRM*CHECKPOINT CFIUS. 336 CHAPTER 6: CHECKPOINT:
INFORMATION SECURITY 347 6.0 AGILE'S TRANSACTION AT CHECKPOINT
INFORMATION SECURITY. 347 6.1 RISK OF LIABILITY FOR BREACH OF, OR
DEFICIENCIES IN, INFORMATION SECURITY. 379 6.2 INFORMATION SECURITY
OBLIGATIONS IMPOSED BY THE EAR*ISSUES RAISED BY OUTSOURCING. 404
CONTENTS XI 6.3 INFORMATION SECURITY REQUIREMENTS IMPOSED BY THE TSR AND
ITAR. 412 6.4 INFORMATION SECURITY REQUIREMENTS IMPOSED BY PERSONAL DATA
PROTECTION LAWS. 413 6.5 RECOMMENDATIONS FROM THE DMZ DESIGN. 416 6.6
ADJUST PRECAUTIONS TO" MINIMIZE RISKS FROM THE EXPANDED USE OF HIGHLY
VULNERABLE TELECOMMUNICATIONS TECHNOLOGIES*INSTANT MESSAGING AND VOIP. ,
418 6.7 ADJUST PRECAUTIONS TO AVERT WORST-CASE RISKS FROM CYBER-ATTACKS.
439 CHAPTER 7: CHECKPOINT: PATENT 445 7.0 AGILE'S TRANSACTION AT
CHECKPOINT PATENT. 445 CONCLUSION 459 INDEX 473 ABOUT THE AUTHORS 495 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Trope, Roland L. |
author_GND | (DE-588)130035130 |
author_facet | Trope, Roland L. |
author_role | aut |
author_sort | Trope, Roland L. |
author_variant | r l t rl rlt |
building | Verbundindex |
bvnumber | BV021749949 |
callnumber-first | K - Law |
callnumber-label | KF889 |
callnumber-raw | KF889 |
callnumber-search | KF889 |
callnumber-sort | KF 3889 |
callnumber-subject | KF - United States |
ctrlnum | (DE-599)BVBBV021749949 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01636nam a2200409zc 4500</leader><controlfield tag="001">BV021749949</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070209 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">060929s2005 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2004025371</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1590314298</subfield><subfield code="9">1-590-31429-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781590314296</subfield><subfield code="9">978-1-590-31429-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021749949</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KF889</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Trope, Roland L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Checkpoints in cyberspace</subfield><subfield code="b">best practices to avert liability in cross-border transactions</subfield><subfield code="c">Roland L. Trope and Gregory E. Upchurch</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chicago, Ill.</subfield><subfield code="b">Section of Business Law, American Bar Association</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XLIII, 494 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Foreign trade regulation</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Export sales contracts</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Foreign trade regulation</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Upchurch, Gregory E.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)130035130</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip052/2004025371.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014963178&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014963178</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV021749949 |
illustrated | Illustrated |
index_date | 2024-07-02T15:32:00Z |
indexdate | 2024-07-09T20:43:11Z |
institution | BVB |
isbn | 1590314298 9781590314296 |
language | English |
lccn | 2004025371 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014963178 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | XLIII, 494 S. Ill. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Section of Business Law, American Bar Association |
record_format | marc |
spelling | Trope, Roland L. Verfasser aut Checkpoints in cyberspace best practices to avert liability in cross-border transactions Roland L. Trope and Gregory E. Upchurch Chicago, Ill. Section of Business Law, American Bar Association 2005 XLIII, 494 S. Ill. txt rdacontent n rdamedia nc rdacarrier Recht Electronic commerce Law and legislation United States Foreign trade regulation United States Export sales contracts United States Electronic commerce Law and legislation Foreign trade regulation USA Upchurch, Gregory E. Sonstige (DE-588)130035130 oth http://www.loc.gov/catdir/toc/ecip052/2004025371.html Table of contents GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014963178&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Trope, Roland L. Checkpoints in cyberspace best practices to avert liability in cross-border transactions Recht Electronic commerce Law and legislation United States Foreign trade regulation United States Export sales contracts United States Electronic commerce Law and legislation Foreign trade regulation |
title | Checkpoints in cyberspace best practices to avert liability in cross-border transactions |
title_auth | Checkpoints in cyberspace best practices to avert liability in cross-border transactions |
title_exact_search | Checkpoints in cyberspace best practices to avert liability in cross-border transactions |
title_exact_search_txtP | Checkpoints in cyberspace best practices to avert liability in cross-border transactions |
title_full | Checkpoints in cyberspace best practices to avert liability in cross-border transactions Roland L. Trope and Gregory E. Upchurch |
title_fullStr | Checkpoints in cyberspace best practices to avert liability in cross-border transactions Roland L. Trope and Gregory E. Upchurch |
title_full_unstemmed | Checkpoints in cyberspace best practices to avert liability in cross-border transactions Roland L. Trope and Gregory E. Upchurch |
title_short | Checkpoints in cyberspace |
title_sort | checkpoints in cyberspace best practices to avert liability in cross border transactions |
title_sub | best practices to avert liability in cross-border transactions |
topic | Recht Electronic commerce Law and legislation United States Foreign trade regulation United States Export sales contracts United States Electronic commerce Law and legislation Foreign trade regulation |
topic_facet | Recht Electronic commerce Law and legislation United States Foreign trade regulation United States Export sales contracts United States Electronic commerce Law and legislation Foreign trade regulation USA |
url | http://www.loc.gov/catdir/toc/ecip052/2004025371.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014963178&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT troperolandl checkpointsincyberspacebestpracticestoavertliabilityincrossbordertransactions AT upchurchgregorye checkpointsincyberspacebestpracticestoavertliabilityincrossbordertransactions |