Cyber law in Australia:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Austin, Tex. [u.a.]
Wolters Kluwer Law & Business
2010
|
Schriftenreihe: | Kluwer law international
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | "Originally published as a monograph in the International encyclopaedia of laws/Cyber law." Includes bibliographical references (p. 53-58) and index |
Beschreibung: | 422 S. |
ISBN: | 9789041133502 904113350X |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV036756158 | ||
003 | DE-604 | ||
005 | 20110428 | ||
007 | t | ||
008 | 101104s2010 ne |||| 00||| eng d | ||
010 | |a 2010455853 | ||
020 | |a 9789041133502 |c pbk. : acidfree paper |9 978-90-411-3350-2 | ||
020 | |a 904113350X |9 90-411-3350-X | ||
035 | |a (OCoLC)699813533 | ||
035 | |a (DE-599)BVBBV036756158 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-703 |a DE-M382 | ||
050 | 0 | |a KU80.C65 | |
084 | |a PU 9800 |0 (DE-625)140753: |2 rvk | ||
245 | 1 | 0 | |a Cyber law in Australia |c Eugene Clark ... |
264 | 1 | |a Austin, Tex. [u.a.] |b Wolters Kluwer Law & Business |c 2010 | |
300 | |a 422 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Kluwer law international | |
500 | |a "Originally published as a monograph in the International encyclopaedia of laws/Cyber law." | ||
500 | |a Includes bibliographical references (p. 53-58) and index | ||
650 | 4 | |a Recht | |
650 | 4 | |a Computer networks |x Law and legislation |z Australia | |
650 | 4 | |a Internet |x Law and legislation |z Australia | |
650 | 4 | |a Electronic commerce |x Law and legislation |z Australia | |
650 | 4 | |a Copyright and electronic data procesing |z Australia | |
650 | 4 | |a Data protection |x Law and legislation |z Australia | |
651 | 4 | |a Australien | |
700 | 1 | |a Clark, Edward Eugene |e Sonstige |4 oth | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020673325&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-020673325 |
Datensatz im Suchindex
_version_ | 1804143421499113472 |
---|---|
adam_text | TABLE OF CONTENTS THE AUTHORS 3 PREFACE 25 GENERAL INTRODUCTION 27
CHAPTER 1. GENERAL BACKGROUND OF THE COUNTRY 27 §1. GEOGRAPHY 27 §2.
CULTURAL COMPOSITION 27 §3. POLITICAL SYSTEM 27 I. CONSTITUTION AND
THREE POWERS 27 II. REFORM OF THE CONSTITUTION 28 III. STATES AND
TERRITORIES 29 IV. THE JUDICIAL POWER 29 V. POLITICAL PARTIES 29 §4.
POPULATION AND EMPLOYMENT STATISTICS 30 §5. ECONOMY 30 §6. SOCIAL,
ECONOMIC, AND CULTURAL VALUES 31 CHAPTER 2. THE INFORMATION AND
COMMUNICATIONS TECHNOLOGY INFRASTRUCTURE AND MARKET 32 §1. DEFINITION OF
E-COMMERCE 32 §2. AUSTRALIA S COMPETITIVE ADVANTAGE IN THE INFORMATION
ECONOMY 32 §3. E-COMMERCE OPPORTUNITIES 33 §4. EXPANDING E-COMMERCE
MARKETS 34 §5. CONVERGENCE OF ICT MEDIA AND MARKETS? 35 TABLE OF
CONTENTS §6. CONTINUING INFRASTRUCTURE CHALLENGES 35 §7. GROWTH
POTENTIAL 35 CHAPTER 3. E-COMMERCE: FACTS AND FIGURES 37 §1.
INTRODUCTION 37 §2. GROWTH OF E-BUSINESS IN AUSTRALIA 37 I. SPENDING ON
IT 37 II. VALUE OF THE INTERNET ECONOMY IN AUSTRALIA 38 III. INDUSTRY
PARTICIPATION IN THE INTERNET ECONOMY 38 §3. GOVERNMENT S ROLE IN
PROMOTING E-BUSINESS 39 CHAPTER 4. E-GOVERNMENT AND ICT INFRASTRUCTURE
41 §1. INTRODUCTION 41 §2. GOVERNMENT POLICY FRAMEWORK AND STRATEGY 41
§3. SOME KEY GOVERNMENT AGENCIES INVOLVED IN PROMOTING E-COMMERCE 47 I.
COMMONWEALTH 47 II. STATE GOVERNMENT INITIATIVES 49 §4. CRITICAL
INFRASTRUCTURE 49 §5. PUBLIC-PRIVATE SECTOR PARTNERSHIPS 50 §6.
AUSTRALIAN BROADBAND 50 §7. LEGAL INFRASTRUCTURE 51 §8. GOVERNMENT
FUNDING ASSISTANCE FOR E-BUSINESS 52 §9. CONCLUSION 52 SELECTED
BIBLIOGRAPHY 53 PART I. TELECOMMUNICATIONS REGULATION 59 CHAPTER 1.
INTRODUCTION AND BACKGROUND 59 § 1. GEOGRAPHY AND MARKET 59 §2. ORIGINS
OF LEGISLATION 60 TABLE OF CONTENTS CHAPTER 2. INDUSTRY STRUCTURE AND
REGULATORY ENTITIES 63 §1. CARRIERS, SERVICE PROVIDERS AND NETWORK UNITS
63 CHAPTER 3. ACCESS REGULATION: PART XIC TPA 64 §1. INTRODUCTION 64 §2.
OBJECTS 64 §3. SERVICE DECLARATION 65 §4. EXEMPTIONS FROM STANDARD
ACCESS OBLIGATIONS 66 §5. TERMS AND CONDITIONS 66 §6. COMMERCIAL
NEGOTIATION 66 §7. UNDERTAKING 66 §8. TELECOMMUNICATIONS ACCESS CODE 67
§9. ARBITRATION 68 §10. TELECOMMUNICATIONS ACCESS FORUM 69 §11.
MINISTERIAL PRICING PRINCIPLES 69 CHAPTER 4. REGULATION OF
ANTI-COMPETITIVE CONDUCT 70 §1. INTRODUCTION 70 §2. THE TRADE PRACTICES
ACT 71 §3. THE COMPETITION NOTICE REGIME 71 §4. TELECOMMUNICATIONS
MARKET 75 CHAPTER 5. REGULATION OF CONSUMER PROTECTION IN
TELECOMMUNICATIONS SECTOR 88 §1. INTRODUCTION 88 §2. UNIVERSAL SERVICE
OBLIGATION 88 §3. CUSTOMER SERVICE GUARANTEE 89 TABLE OF CONTENTS §4.
PRIVACY AND CONFIDENTIALITY 90 §5. TELECOMMUNICATIONS INDUSTRY OMBUDSMAN
90 CHAPTER 6. TELECOMMUNICATIONS REFORMS 92 §1. INTRODUCTION 92 §2.
STRUCTURAL SEPARATION OF TELSTRA 92 §3. REFORMS TO THE COMPETITION
REGIME 93 §4. CONSUMER SAFEGUARDS 93 PART II. PROTECTION OF INTELLECTUAL
PROPERTY RIGHTS IN THE ICT SECTOR 95 CHAPTER 1. APPLICATION OF COPYRIGHT
IN THE AREA OF ICT 95 §1. INTRODUCTION 95 I. PROPERTY AND KNOWLEDGE
MANAGEMENT 95 §2. WHAT ARE INTELLECTUAL PROPERTY RIGHTS? 95 §3. THE ROLE
OF CONTRACTING IN ENSURING A HIGH LEVEL OF PROTECTION FROM THE OUTSET 97
§4. CORRECTLY CATEGORIZING INTELLECTUAL PROPERTY 99 §5. COPYRIGHT LAW
100 I. AN OVERVIEW OF COPYRIGHT AND THE DIGITAL REVOLUTION 100 II.
INTELLECTUAL PROPERTY AND THE LAW OF COPYRIGHT 101 III. RECENT
DEVELOPMENTS IN COPYRIGHT LAW 101 IV. INFRINGEMENT 106 V. INTERNATIONAL
COPYRIGHT PROTECTION 106 VI. THE TRADE-RELATED INTELLECTUAL PROPERTY
RIGHTS TREATY 107 CHAPTER 2. LEGAL PROTECTION OF SOFTWARE OTHER THAN
THROUGH THE LAW OF COPYRIGHT 109 CHAPTER 3. LEGAL PROTECTION OF
DATABASES 111 CHAPTER 4. LEGAL PROTECTION OF COMPUTER CHIPS 113 §1.
HISTORY OF CIRCUIT LAYOUT PROTECTION 113 10 TABLE OF CONTENTS I. SUE
GENERIS SCHEME 113 II. A BRIEF OVERVIEW OF INTEGRATED CIRCUITS
TECHNOLOGY 113 III. RELATIONSHIP WITH OTHER AREAS OF INTELLECTUAL
PROPERTY 113 IV. ORIGINS OF CIRCUIT LAYOUT PROTECTION 115 §2. PROTECTION
UNDER THE CIRCUIT LAYOUTS ACT 116 I. CRITERIA FOR PROTECTION 116 A.
CIRCUIT LAYOUT 116 B. ORIGINALITY 116 C. ELIGIBLE PERSON/ELIGIBLE
FOREIGN COUNTRY 116 D. ELIGIBLE LAYOUT (EL) RIGHTS 117 II. NATURE OF
PROTECTION 117 III. LENGTH OF PROTECTION 118 §3. COMMERCIAL DEALINGS 118
I. ASSIGNMENT AND LICENSE OF EL RIGHT 118 II. PROSPECTIVE OWNERSHIP 119
III. ADVANTAGES OF MARKING ] 19 IV. FIRST SALE DOCTRINE AND PARALLEL
IMPORTATION OF INTEGRATED CIRCUITS 120 V. PARALLEL IMPORTATION OF
SOFTWARE 120 §4. ACTS OF INFRINGEMENT 121 I. ELEMENTS OF INFRINGEMENT
121 II. SUBSTANTIAL PART 122 §5. DEFENCES 123 I. IN GENERAL 123 II.
STATUTORY DEFENCES 123 A. INNOCENT COMMERCIAL EXPLOITATION 123 B.
COPYING FOR PRIVATE USE 124 C. COPYING FOR TEACHING OR RESEARCH PURPOSES
124 D. EVALUATION OR ANALYSIS 124 E. PERMITTED USE UNDER LICENSE 125 F.
FOR PURPOSES OF DEFENCE OR SECURITY 125 III. COMMON LAW DEFENCES 125 §6.
REMEDIES FOR INFRINGEMENTS 126 I. WHO MAY BRING AN ACTION 126 II.
AVAILABLE REMEDIES 126 III. GROUNDLESS THREATS OF LEGAL PROCEEDINGS 127
§7. PROCEDURAL MATTERS 127 I. LIMITATION OF ACTIONS; JOINDER 127 II.
PROOF OF FACTS 127 III. JURISDICTION AND APPEALS 128 CHAPTER 5. PATENT
PROTECTION 129 11 TABLE OF CONTENTS §1. ORIGINS OF PATENT LAW 129 §2.
WHAT MAY BE PATENTED 130 §3. STANDARD PATENTS 131 §4. PATENTS OF
ADDITION (TO STANDARD PATENTS) 132 §5. INNOVATION PATENTS 133 §6.
BUSINESS SYSTEM (METHOD) PATENTS 134 §7. THREE TYPES OF PATENT
APPLICATIONS 136 §8. EXTENSION OF TERM OF STANDARD PATENTS 137 §9.
REVOCATION OF PATENTS 137 §10. REMEDIES FOR PATENT INFRINGEMENT 137 §11.
INTERNATIONAL REGISTRATION OF PATENTS 138 CHAPTER 6. DESIGNS LAW 139
CHAPTER 7. TRADE SECRECY 140 CHAPTER 8. TRADEMARKS 142 §1. DEFINITION
AND PURPOSE 142 §2. TRADEMARK LEGISLATION 142 §3. RESTRICTIONS AGAINST
USE OF CERTAIN WORDS 143 §4. INTERNATIONAL PROTECTION OF TRADEMARKS 143
CHAPTER 9. BUSINESS NAMES AND INTERNET DOMAIN NAME REGISTRATION 144 §1.
REGISTRATION OF BUSINESS NAMES 144 CHAPTER 10. DOMAIN NAMES 146 §1.
DEFINITION 146 §2. TYPOLOGY OF DOMAINS 146 12 TABLE OF CONTENTS §3.
ADMINISTRATION OF DOMAIN NAMES 147 §4. REGISTRATION IN AUSTRALIA 149 I.
GENERAL CONTEXT 149 II. DOMAIN NAME REGISTRATION 149 III. UNASSIGNABLE
LICENSE 150 §5. DOMAIN NAME DISPUTE RESOLUTION PROCEDURE 151 I. DOMAIN
NAME VERSUS TRADEMARK 151 II. AUSTRALIAN DOMAIN NAME DISPUTE RESOLUTION
PROCEDURE 151 III. CRITICISM OF THE UDRP REGARDING CYBERSQUATTING 151
§6. REFORM 152 I. REFORM OF ICANN 152 PART III. ICT CONTRACTS 153 §1.
INTRODUCTION 153 CHAPTER 1. PRINCIPLES OF CONTRACT LAW 154 §1. ELEMENTS
OF A CONTRACT 154 §2. OFFER AND ACCEPTANCE 155 §3. VALUABLE
CONSIDERATION 159 §4. CONSENSUS 160 §5. IS A WRITTEN DOCUMENT ALWAYS
REQUIRED? 160 I. QUASI CONTRACT 162 II. TERMS OF A CONTRACT 162 A.
EXPRESS TERMS 162 B. IMPLIED TERMS 164 C. FORCE MAJEURE 167 D.
SHRINK-WRAP AND WEBWRAP TERMS 167 §6. CONTRACT ISSUES IN E-COMMERCE 169
CHAPTER 2. HARDWARE CONTRACTS 171 CHAPTER 3. SOFTWARE CONTRACTS 173 §1.
BESPOKE SOFTWARE 174 CHAPTER 4. SOFTWARE DISTRIBUTION AGREEMENTS 176 13
TABLE OF CONTENTS CHAPTER 5. MAINTENANCE CONTRACTS 177 §1. PERSONNEL
CONTRACTS: EMPLOYEE VERSUS INDEPENDENT CONTRACTOR 177 CHAPTER 6.
FACILITIES MANAGEMENT 180 CHAPTER 7. NETWORK SERVICES 181 §1. COMPUTER
SERVICE BUREAU CONTRACTS 181 CHAPTER 8. GOVERNMENT CONTRACTS 182 CHAPTER
9. DAMAGES 183 CHAPTER 10. COLLATERAL ISSUES 186 § 1. LIABILITY AND
OWNERSHIP OF PROPERTY 186 §2. CONSUMER CREDIT 187 §3. MINORS AND AGENTS
187 §4. CONSUMER PROTECTION 188 §5. REMEDIES 189 §6. ANTON PILLER ORDER
189 §7. MAREVA INJUNCTION 189 §8. POSTSCRIPT 190 PART IV. ELECTRONIC
TRANSACTIONS 191 CHAPTER 1. LEGAL STATUS OF ELECTRONIC TRANSACTIONS 191
§1. INTRODUCTION 191 §2. E-COMMERCE AND THE INTERNET 192 §3. THE ETA:
WHAT AND WHY? 194 §4. AN EVALUATION AND ANALYSIS 199 I. WORKABILITY 202
II. PRACTICALITY 203 14 TABLE OF CONTENTS III. TECHNICALITY 205 IV. A
NOTE ON DIGITAL SIGNATURES 205 §5. SUMMARY AND CONCLUSIONS 206 CHAPTER
2. REGULATION OF CRYPTOGRAPHY, ELECTRONIC SIGNATURES, AND CERTIFICATION
SERVICES 209 §1. INTRODUCTION 209 §2. PUBLIC KEY INFRASTRUCTURE 209 I.
DEVELOPMENT IN AUSTRALIA 209 II. DEFINITION 210 III. COMPONENTS 210 IV.
AUTHENTICITY, CONFIDENTIALITY, INTEGRITY, AND NON-REPUDIATION 210 V.
WORKABILITY PROBLEMS WITH AND FUTURE OF PKI 212 §3. DIGITAL SIGNATURES
213 §4. DIGITAL CERTIFICATES AND E-PROCUREMENT 213 §5. OTHER E-COMMERCE
TRUST MECHANISMS AND SECURITY TOOLS 214 I. RELATIONSHIP WITH PKI 214 II.
SECURE SOCKETS LAYER (SSL) 214 III. SECURE ELECTRONIC TRANSACTION (SET)
PROTOCOL 215 IV. VIRTUAL PRIVATE NETWORKS 216 V. PASSWORDS 216 §6.
EXPORT OF ENCRYPTION TECHNOLOGY: DUAL USE PROBLEM 216 §7. CONCLUSION 217
CHAPTER 3. INFORMATION COMMUNICATIONS TECHNOLOGY AND CIVIL PROCEDURE 218
§1. INTRODUCTION 218 §2. JURISDICTION: GENERAL PRINCIPLES 218 I.
DEFINITION 218 II. GENERAL VERSUS SPECIFIC OR SPECIAL JURISDICTION 219
III. JURISDICTION CLAUSE 219 IV. TERRITORIAL RESTRICTIONS ON LAWS 219 V.
IN PERSONAM AND IN REM JURISDICTION: SERVICE OF PROCESS 220 VI. SUBJECT
MATTER JURISDICTION 221 §3. JURISDICTION IN AN ICT CONTEXT 221 15 TABLE
OF CONTENTS I. IN AUSTRALIA 221 II. LESSONS FROM THE UNITED STATES 223
A. US LAW ON JURISDICTION 223 B. PASSIVE WEBSITE 224 C. CAUSE OF ACTION
RELATED TO WEBSITE ACTIVITY 225 D. CONDUCT SPECIFICALLY TARGETING THE
JURISDICTION 225 E. GREATER LIKELIHOOD OF EXERCISE OF JURISDICTION IN
RELATION TO CRIMINAL MATTERS 226 F. EXISTENCE OF A BUSINESS RELATIONSHIP
226 G. NATURE AND QUALITY OF THE CONTACTS 227 H. BULLETIN BOARDS 227 I.
E-MAIL MESSAGES 228 J. OPERATION OF A WEB PORTAL 228 K. OUT OF STATE
SERVERS WITH INSTATE EFFECTS 229 L. OUT OF COUNTRY ACTIONS WITH
IN-COUNTRY EFFECTS 229 III. LESSONS FROM THE EUROPEAN UNION 230 IV. A
TECHNOLOGICAL SOLUTION? 231 V. THE INTERNET: A NEW AND SEPARATE LEGAL
FRONTIER? 231 §4. VENUE 231 §5. CHOICE OF LAW 231 §6. CONFLICT OF LAWS
232 I. NATURE OF THE CONFLICT 232 II. CATEGORIZING THE CAUSE OF ACTION
232 III. APPLYING THE CONFLICT RULE 232 IV. RECOMMENDATIONS FOR REFORM
233 A. WITHIN THE AUSTRALIAN LEGAL SYSTEM 233 B. INTERNATIONAL REFORM
233 §7. DISCOVERY AND RULES OF EVIDENCE 234 §8. DISPUTE RESOLUTION 235
I. USE OF TECHNOLOGY BY AUSTRALIAN COURTS 235 II. MEDIATION AND
ARBITRATION 235 A. COMMERCIAL ARBITRATION REGIME 236 B. COMMERCIAL
ARBITRATION FACILITIES 236 C. MEDIATION 237 D. ONLINE DISPUTE RESOLUTION
(ODR) 238 §9. RECIPROCITY AND NATIONAL TREATMENT 240 CHAPTER 4. LEGAL
ASPECTS OF ELECTRONIC BANKING AND PAYMENTS SYSTEMS 241 16 TABLE OF
CONTENTS §1. INTRODUCTION 241 I. NEED FOR THIRD-PARTY ASSURANCE OF
WEB-BASED ELECTRONIC COMMERCE 242 II. ELECTRONIC FINANCIAL TRANSACTIONS
AND PAYMENTS SYSTEMS 242 A. CHARGE CARDS AND CREDIT CARDS 245 B. SMART
CARDS 246 III. AREAS NEEDING ASSURANCE 246 §2. ELECTRONIC PAYMENTS
METHODS AND SERVICES 247 I. INTERNET BANKING 247 II. ELECTRONIC PAYMENTS
SYSTEMS (EPS) 248 III. DIGITAL CASH (DC) 251 IV. DIGITAL CHEQUES 251 V.
STORED-VALUE SMART CARDS (SVC) 252 VI. CREDIT CARD PAYMENTS 252 A. SET
PROTOCOL 252 B. TELSTRA SURELINK 253 §3. SECURITY AND CONTROL OF
PAYMENTS METHODS 253 I. CHARACTERISTICS OF SECURITY AND CONTROL OF
PAYMENTS METHODS 253 II. CLEARING AND SETTLEMENT 254 III. NETTING
ARRANGEMENTS 254 IV. EXPOSURE RISKS 255 V. BANKING ACT ISSUE 255 VI.
HERSTATT RISKS 255 VII. APPLICATION TO DIGITAL CASH 256 VIII. CONTROL OF
THE PAYMENTS SYSTEMS 256 A. PAYMENTS SYSTEM (REGULATION) ACT 1998 (CTH)
256 B. SEIGNIORAGE 256 C. UNCLAIMED MONEY 257 D. DORMANT ACCOUNTS 257 E.
MONEY LAUNDERING 258 F. AUSTRALIAN SOLUTIONS 258 G. CRIME AND DIGICASH
259 H. OTHER CRIMINAL ACTIVITY 259 §4. THE IMPACT OF E-CASH 260 §5.
PROTECTING CONSUMER RIGHTS: PRIVACY 260 §6. AUSTRALIAN REGULATORY
RESPONSES TO E-CASH 261 §7. APPROPRIATE REGULATORY RESPONSES TO
E-PAYMENTS SYSTEMS 262 §8. INTERNATIONAL REGULATORY RESPONSES TO
E-PAYMENTS SYSTEMS 263 §9. CONCLUSION 263 17 TABLE OF CONTENTS CHAPTER
5. PROTECTION OF USERS OF ICT 265 §1. INTRODUCTION 265 §2. OVERVIEW OF
CONSUMER PROTECTION REGIMES 265 I. IN GENERAL 265 II. TRADE PRACTICES
ACT (TPA) AND FAIR TRADING LEGISLATION 266 III. OTHER CONSUMER
PROTECTION PROVISIONS OF THE TPA 267 IV. ENFORCEMENT, REMEDIES, AND
STATUTE OF LIMITATIONS UNDER THE TPA 267 V. DEFENCES UNDER THE TPA 269
VI. OTHER CONSUMER-RELATED COMMONWEALTH LEGISLATION 270 VII. STATE AND
TERRITORY LEGISLATION 270 §3. CONSUMER LAW GOVERNING THE QUALITY OF
GOODS AND SERVICES 271 I. GOODS 271 II. SERVICES 273 III. CONSUMER
CONTRACTS 273 A. IN GENERAL 273 B. UNCONSCIONABILITY UNDER THE TRADE
PRACTICES ACT 273 C. STATE LEGISLATION DEALING WITH UNCONSCIONABILITY
274 D. EXCLUSION CLAUSES 275 E. CLASSIFICATION OF TERMS 275 §4. SALES
PROMOTION AND COMMERCIAL PRACTICES 276 I. UNDER THE TRADE PRACTICES ACT,
SECTION 52 276 II. TRADE PRACTICES ACT, SECTIONS 53-64 277 III. STATE
LEGISLATION DEALING WITH SHARP PRACTICES 278 §5. CONSUMER CREDIT 280 I.
OUTLINE OF THE CONSUMER CREDIT CODE PROVISIONS 280 II. CONSUMER CREDIT
INSURANCE 283 §6. VOLUNTARY CODES 283 §7. CONSUMER REDRESS 284 §8.
REPRESENTATION OF CONSUMER INTEREST AND CONSUMER INFORMATION 285 §9.
TOWARD INTERNATIONAL STANDARDS FOR CONSUMER PROTECTION IN CYBERSPACE 285
CHAPTER 6. TAXATION OF E-COMMERCE 290 §1. IN GENERAL 290 §2. TRANSFER
PRICING 292 18 TABLE OF CONTENTS §3. DOUBLE TAXATION AGREEMENTS 293 §4.
OECD CLARIFICATION OF E-TAX ISSUES 293 §5. CONCLUSION 295 PART V.
NON-CONTRACTUAL LIABILITY 297 CHAPTER 1. CIVIL OBLIGATIONS GENERALLY 297
§1. INTRODUCTION 297 §2. NATURE OF TORT 298 §3. EXTENT OF LIABILITY IN
TORT/JURISDICTION IN TORT CASES 299 §4. CATEGORIES OF TORT: OVERVIEW 299
§5. CATEGORIES OF TORT: INTENTIONAL TORTS 300 I. DEFINITION AND EXAMPLE
300 II. FRAUDULENT MISREPRESENTATION 301 III. DEFAMATION 301 IV.
INJURIOUS FALSEHOOD (SOMETIMES KNOWN AS TRADE LIBEL OR SLANDER OF TITLE
OF GOODS) 302 V. NUISANCE 303 VI. PASSING-OFF GOODS AS THOSE OF ANOTHER
303 VII. INTERFERENCE WITH CONTRACTUAL RELATIONS, CONSPIRACY,
INTIMIDATION 303 VIII. DEFENCES TO THE INTENTIONAL TORTS 304 §6.
CATEGORIES OF TORT: NEGLIGENCE 304 I. GROWTH OF TORT AS GENERAL CIVIL
REMEDY 304 II. DOCTRINE OF NEGLIGENCE 305 III. NEGLIGENT MISSTATEMENT
307 IV. NEGLIGENCE REFORM 308 V. DEFENCES TO NEGLIGENCE 309 §7.
CATEGORIES OF TORT: BREACH OF STATUTORY DUTY 310 §8. CATEGORIES OF TORT:
STRICT LIABILITY 311 §9. VICARIOUS LIABILITY 311 §10. REMEDIES IN TORT
311 §11. RESTITUTION 312 CHAPTER 2. LIABILITY OF ISPS AND NETWORK
SERVICE PROVIDERS 314 19 TABLE OF CONTENTS §1. INTRODUCTION 314 §2.
CONTRACTUAL LIABILITY AND ITS RELATION TO OTHER CLAIMS 314 §3. STATUTORY
DUTY 314 §4. LIABILITY FOR DEFAMATION 316 §5. LIABILITY FOR NEGLIGENT
PROVISION OF INFORMATION 318 §6. LIABILITY FOR BREACH OF OTHER
INTELLECTUAL PROPERTY LAWS 319 §7. LIABILITY FOR RACIAL OR HATE SPEECH
319 §8. ISP LIABILITY IN SPECIAL CONTEXTS 319 §9. CONCLUSION 320 CHAPTER
3. PRODUCT SAFETY AND LIABILITY 321 §1. INTRODUCTION 321 §2. PRODUCT
SAFETY LAWS 321 §3. LABELLING, PACKAGING, AND WARNINGS 324 §4. STRICT
LIABILITY 326 §5. ENFORCEMENT AND REMEDIES 328 §6. EXCLUSION CLAUSES 331
PART VI. PRIVACY, TECHNOLOGY AND THE INTERNET 333 CHAPTER 1. REGULATING
PERSONAL INFORMATION 333 §1. INTRODUCTION 333 I. DEFINITION OF PRIVACY
333 II. PRIVACY, TECHNOLOGY, AND THE INTERNET 334 III. PRIVACY ABUSE 335
IV. BALANCING INTERESTS 337 V. AUSTRALIA S INTERNATIONAL OBLIGATIONS IN
RELATION TO PRIVACY PROTECTION 338 §2. COMMONWEALTH PRIVACY ACT 339 I.
SCOPE OF PRIVACY ACT 339 20 TABLE OF CONTENTS II. PRIVACY AND THE
PRIVATE SECTOR 340 A. PRIVATE SECTOR: WHO S IN AND WHO S OUT 340 B.
PERSONAL AND SENSITIVE INFORMATION 342 C. IMPORTANCE OF CONSENT 342 III.
TAX FILE NUMBERS AND PRIVACY 343 IV. DATA-MATCHING GUIDELINES AND
PRIVACY 343 V. CREDIT REPORTING AND PRIVACY 344 VI. PRIVACY CODES 345
VII. THE PRIVACY COMMISSIONER: COMPLAINTS 346 VIII. PRIVACY AND
OUTSOURCING 346 IX. PRIVACY AUDITS 347 X. ALRC PRIVACY REPORT:
RECOMMENDATIONS 347 §3. PRIVACY LEGISLATION IN THE STATES AND
TERRITORIES 348 §4. RELATED LAWS: OTHER POSSIBLE LEGAL REMEDIES 349 §5.
INDUSTRY CODES AND THIRD-PARTY VERIFICATION OF PRIVACY PROTECTION 350 I.
INDUSTRY CODES 350 II. THIRD-PARTY VERIFICATION 352 §6. OTHER NON-LEGAL
MEANS OF PRIVACY PROTECTION 353 I. TECHNICAL SOLUTIONS 353 II. EDUCATION
353 §7. CONCLUSION 353 §8. FREEDOM OF INFORMATION LEGISLATION
(COMMONWEALTH AND STATE) 354 I. COMMONWEALTH FOI ACT 354 A. GENERAL
OUTLINE 354 B. FOI ACT EXCEPTIONS 354 C. DEFINITION OF DOCUMENT 355 D.
COSTS 356 II. EVALUATION OF FOI 356 III. FOI REFORMS 356 CHAPTER 2.
PRIVACY IN TELECOMMUNICATIONS 358 §1. INTRODUCTION 358 §2.
TELECOMMUNICATIONS ACT 358 I. COMMONWEALTH TELECOMMUNICATIONS
LEGISLATION 358 A. IN GENERAL 358 B. DEFINITIONS 358 21 TABLE OF
CONTENTS C. DUTY TO INTERCEPT AND SPECIAL ASSISTANCE 359 D. LIABILITY OF
ISPS FOR INTERCEPTION 359 §3. OTHER COMMONWEALTH AND STATE LEGISLATION
360 §4. CRIMINAL LAWS 361 I. COMMONWEALTH CRIMINAL LAWS 361 II. STATE
CRIMINAL LAWS 361 §5. INDUSTRY CODES 362 §6. SPECIFIC APPLICATIONS 363
I. SPAM 363 A. PROBLEM OF SPAM 363 B. SPAM LEGISLATION 363 C. OTHER
SOLUTIONS TO FIGHT SPAM 364 II. COOKIES 366 III. WEB BUGS, SPIDERS, DATA
AGGREGATION OR SCREEN SCRAPING, AND DATA MINING 367 IV. UNAUTHORIZED
ACCESS TO E-MAIL 367 §7. CONCLUSION 368 PART VII. COMPUTER-RELATED CRIME
371 CHAPTER 1. GENERAL LEGAL DEVELOPMENT OF CRIMINAL LAW 371 §1.
INTRODUCTION 371 §2. DEFINITION, ELEMENTS OF A CRIME, AIMS OF PUNISHMENT
371 §3. SOURCES OF CRIMINAL LAW: CLASSIFICATION OF OFFENCES 372 §4.
PRINCIPLES OF CRIMINAL LIABILITY 373 §5. ESTABLISHING CRIMINAL LIABILITY
373 §6. CAPACITY TO COMMIT A CRIME 374 §7. CRIMINAL PROCEDURE 374
CHAPTER 2. APPLICATION OF SUBSTANTIVE AND PROCEDURAL CRIMINAL LAW IN THE
AREA OF ICT 376 §1. INTRODUCTION 376 §2. DEFINITION AND EXTENT OF
CYBERCRIME 376 22 TABLE §3. COMMONWEALTH CYBERCRIME LEGISLATION I.
COMMONWEALTH CRIMINAL LAWS §4. TELECOMMUNICATIONS CRIME §5. STATE
CYBERCRIME LEGISLATION §6. SPECIFIC CYBERCRIMES: THEFT, FRAUD, CRIMES
RELATED TO FINANCIAL INFORMATION GENERALLY I. THEFT II. COMPUTER AND/OR
INTERNET FRAUD A. IN GENERAL B. COMPUTER FRAUD AS A CIVIL WRONG C.
EXTENT OF COMPUTER FRAUD §7. SPECIFIC CYBERCRIMES: IDENTITY THEFT §8.
SPECIFIC CYBERCRIMES: HACKING OR CRACKING, DENIAL OF SERVICE ATTACKS,
VIRUSES, PASSWORD SNIFFING, SPOOFING, AND PAGEJACKING I. HACKING OR
CRACKING II. DENIAL OF SERVICE ATTACKS III. VIRUSES IV. PASSWORD
SNIFFING V. SPOOFING VI. PAGEJACKING OF CONTENTS 377 377 379 379 381 381
381 381 383 384 385 387 387 387 388 388 389 389 §9. SPECIFIC
CYBERCRIMES: CYBERSTALKING 389 §10. SPECIFIC CYBERCRIMES: ONLINE
GAMBLING 390 I. EXTENT OF GAMBLING IN AUSTRALIA 390 II. INTERACTIVE
GAMBLING ACT 390 §11. SPECIFIC CYBERCRIMES: OBSCENITY AND PORNOGRAPHY
392 I. SUMMARY OF ISSUES 392 II. ONLINE PRIVACY PROTECTION OF CHILDREN
393 III. INDUSTRY CODES AND INTERNATIONAL COOPERATION 394 §12. SPECIFIC
CYBERCRIMES: SUICIDE-RELATED MATERIAL 395 §13. SPECIFIC CYBERCRIMES:
ANTI-VILIFICATION 395 §14. TERRORISM 395 CHAPTER 3. LAW ENFORCEMENT
EFFORTS TO PREVENT AND PROSECUTE CYBERCRIME 398 23 TABLE OF CONTENTS §1.
INTRODUCTION 398 §2. NEED FOR COOPERATION BETWEEN INDUSTRY AND POLICE
398 §3. PRIVATE ACTION TO PREVENT CRIME 399 §4. INTERNATIONAL
DEVELOPMENTS 400 I. INTERNATIONAL COOPERATION 400 II. RACIST WEBSITES
400 III. CONVENTION ON CYBERCRIME 400 PART VIII. NANOTECHNOLOGY 403
CHAPTER 1. INTRODUCTION 403 CHAPTER 2. GOVERNMENT REGULATION OF
NANOTECHNOLOGY 404 CHAPTER 3. GOVERNMENT NANOTECHNOLOGY INITIATIVES 405
CHAPTER 4. OTHER LAWS IMPACTING REGULATION OF NANOTECHNOLOGY 407 PART
IX. GENE TECHNOLOGY 409 CHAPTER 1. LEGISLATIVE FRAMEWORK 409 CHAPTER 2.
PURPOSE OF THE LEGISLATION 410 CHAPTER 3. ADVISORY GROUPS TO GUIDE GENE
TECHNOLOGY DEVELOPMENT 411 CHAPTER 4. INTERNATIONAL AGREEMENTS RELATED
TO GENE TECHNOLOGY 412 PART X. E-WASTE: PRODUCT STEWARDSHIP 413 PART XI.
CONCLUSION 415 INDEX 417 24
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036756158 |
callnumber-first | K - Law |
callnumber-label | KU80 |
callnumber-raw | KU80.C65 |
callnumber-search | KU80.C65 |
callnumber-sort | KU 280 C65 |
classification_rvk | PU 9800 |
ctrlnum | (OCoLC)699813533 (DE-599)BVBBV036756158 |
discipline | Rechtswissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01745nam a2200445zc 4500</leader><controlfield tag="001">BV036756158</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110428 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">101104s2010 ne |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2010455853</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789041133502</subfield><subfield code="c">pbk. : acidfree paper</subfield><subfield code="9">978-90-411-3350-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">904113350X</subfield><subfield code="9">90-411-3350-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)699813533</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036756158</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KU80.C65</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PU 9800</subfield><subfield code="0">(DE-625)140753:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber law in Australia</subfield><subfield code="c">Eugene Clark ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Austin, Tex. [u.a.]</subfield><subfield code="b">Wolters Kluwer Law & Business</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">422 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Kluwer law international</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Originally published as a monograph in the International encyclopaedia of laws/Cyber law."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 53-58) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Australia</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Australia</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Australia</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Copyright and electronic data procesing</subfield><subfield code="z">Australia</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Australia</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Australien</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clark, Edward Eugene</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020673325&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020673325</subfield></datafield></record></collection> |
geographic | Australien |
geographic_facet | Australien |
id | DE-604.BV036756158 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:47:24Z |
institution | BVB |
isbn | 9789041133502 904113350X |
language | English |
lccn | 2010455853 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020673325 |
oclc_num | 699813533 |
open_access_boolean | |
owner | DE-703 DE-M382 |
owner_facet | DE-703 DE-M382 |
physical | 422 S. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wolters Kluwer Law & Business |
record_format | marc |
series2 | Kluwer law international |
spelling | Cyber law in Australia Eugene Clark ... Austin, Tex. [u.a.] Wolters Kluwer Law & Business 2010 422 S. txt rdacontent n rdamedia nc rdacarrier Kluwer law international "Originally published as a monograph in the International encyclopaedia of laws/Cyber law." Includes bibliographical references (p. 53-58) and index Recht Computer networks Law and legislation Australia Internet Law and legislation Australia Electronic commerce Law and legislation Australia Copyright and electronic data procesing Australia Data protection Law and legislation Australia Australien Clark, Edward Eugene Sonstige oth SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020673325&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Cyber law in Australia Recht Computer networks Law and legislation Australia Internet Law and legislation Australia Electronic commerce Law and legislation Australia Copyright and electronic data procesing Australia Data protection Law and legislation Australia |
title | Cyber law in Australia |
title_auth | Cyber law in Australia |
title_exact_search | Cyber law in Australia |
title_full | Cyber law in Australia Eugene Clark ... |
title_fullStr | Cyber law in Australia Eugene Clark ... |
title_full_unstemmed | Cyber law in Australia Eugene Clark ... |
title_short | Cyber law in Australia |
title_sort | cyber law in australia |
topic | Recht Computer networks Law and legislation Australia Internet Law and legislation Australia Electronic commerce Law and legislation Australia Copyright and electronic data procesing Australia Data protection Law and legislation Australia |
topic_facet | Recht Computer networks Law and legislation Australia Internet Law and legislation Australia Electronic commerce Law and legislation Australia Copyright and electronic data procesing Australia Data protection Law and legislation Australia Australien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020673325&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT clarkedwardeugene cyberlawinaustralia |