Information technology law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford [u.a.]
Oxford Univ. Press
2014
|
Ausgabe: | 7. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XLVIII, 546 S. |
ISBN: | 9780198702320 0198702329 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042095458 | ||
003 | DE-604 | ||
005 | 20150108 | ||
007 | t | ||
008 | 140929s2014 |||| 00||| eng d | ||
015 | |a GBB467565 |2 dnb | ||
020 | |a 9780198702320 |c pbk |9 978-0-19-870232-0 | ||
020 | |a 0198702329 |c pbk |9 0198702329 | ||
035 | |a (OCoLC)915571422 | ||
035 | |a (DE-599)BVBBV042095458 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-188 |a DE-M382 | ||
100 | 1 | |a Lloyd, Ian J. |d 1955- |e Verfasser |0 (DE-588)12918893X |4 aut | |
245 | 1 | 0 | |a Information technology law |c Ian J. Lloyd |
250 | |a 7. ed. | ||
264 | 1 | |a Oxford [u.a.] |b Oxford Univ. Press |c 2014 | |
300 | |a XLVIII, 546 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computers / Law and legislation / Great Britain | |
650 | 4 | |a Computer crimes / Great Britain | |
650 | 4 | |a Data protection / Law and legislation / Great Britain | |
650 | 4 | |a Data transmission systems / Law and legislation / Great Britain | |
650 | 4 | |a Recht | |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
651 | 4 | |a Großbritannien | |
651 | 7 | |a Großbritannien |0 (DE-588)4022153-2 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 1 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027536238&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027536238 |
Datensatz im Suchindex
_version_ | 1804152555890016256 |
---|---|
adam_text | OUTLINE CONTENTS
LATE DEVELOPMENTS XXIII
LIST OF TABLES AND FIGURES XXXI I
TABLE OF CASES XXXIII
TABLE OF STATUTES XXXVII
TABLE OF STATUTORY INSTRUMENTS XLII
TABLE OF EUROPEAN LEGISLATION XLIV
TABLE OF CONVENTIONS AND OTHER ENACTMENTS XLVII
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 PRIVACY, TECHNOLOGY, AND SURVEILLANCE 7
2 THE EMERGENCE OF DATA PROTECTION 26
3 THE SCOPE OF DATA PROTECTION 42
4 SUPERVISORY AGENCIES 62
5 THE DATA PROTECTION PRINCIPLES 83
6 INDIVIDUAL RIGHTS AND REMEDIES 1 12
7 SECTORAL ASPECTS OF DATA PROTECTION 138
8 TRANSBORDER DATA FLOWS 167
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 197
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 202
11 COMPUTER FRAUD AND FORGERY 221
12 VIRTUAL CRIMINALITY 229
13 DETECTING AND PROSECUTING COMPUTER CRIME 243
PART III INTELLECTUAL PROPERTY ISSUES
14 KEY ELEMENTS OF THE PATENT SYSTEM 263
15 PATENTS AND SOFTWARE 280
X OUTLINE CONTENTS
16 COPYRIGHT PROTECTION 309
17 COPYRIGHT IN THE INFORMATION SOCIETY 348
18 PROTECTION OF DATABASES 372
19 DESIGN RIGHTS 392
20 TRADE MARK AND DOMAIN-NAME ISSUES 400
PART IV E-COMMERCE
21 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 427
22 CRYPTOGRAPHY, ELECTRONIC SIGNATURES, AND THE ELECTRONIC
COMMUNICATIONS ACT 2000 442
23 ELECTRONIC MONEY AND ONLINE GAMBLING 459
24 CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE 469
PARTV INTERNET-SPECIFIC ISSUES
25 SOCIAL NETWORKING, DEFAMATION, AND THE INTERNET 505
26 INTERNET REGULATION AND DOMAIN NAMES 526
INDEX 535
DETAILED CONTENTS
LATE DEVELOPMENTS XXI I I
LIST OF TABLES AND FIGURES XXXII
TABLE OF CASES XXXII I
TABLE OF STATUTES XXXVII
TABLE OF STATUTORY INSTRUMENTS XLII
TABLE OF EUROPEAN LEGISLATION XLIV
TABLE OF CONVENTIONS AND OTHER ENACTMENTS XLVII
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 PRIVACY, TECHNOLOGY, AND SURVEILLANCE 7
INTRODUCTION 7
SMOKE AND MIRRORS*FROM ECHELON TO PRISM 7
PUBLIC AND PRIVATE SURVEILLANCE 9
FORMS OF SURVEILLANCE 11
LIVING IN THE SURVEILLANCE SOCIETY 12
SURVEILLANCE AND THE LAW 15
PRIVACY ISSUES 17
THE POST-SECOND WORLD WAR EXPANSION OF RIGHTS TO PRIVACY 17
SURVEILLANCE-BASED LEGISLATION 20
PRIVACY AND SURVEILLANCE 22
CONCLUSIONS 24
2 THE EMERGENCE OF DATA PROTECTION 26
INTRODUCTION 26
EARLY DATA PROTECTION LAWS 27
INTERNATIONAL DATA PROTECTION INITIATIVES 27
THE COUNCIL OF EUROPE 28
THE ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT (OECD) 30
THE ASIA-PACIFIC PRIVACY CHARTER INITIATIVE 32
THE UN 32
THE DEVELOPMENT OF DATA PROTECTION IN THE UNITED KINGDOM 33
THE COMMITTEE ON DATA PROTECTION 34
THE DATA PROTECTION ACT 1984 35
THE EUROPEAN DATA PROTECTION DIRECTIVE AND THE DATA PROTECTION ACT 1998
36
THE DATA PROTECTION ACT 1998 38
CONCLUSIONS 39
XII DETAILED CONTENTS
3 THE SCOPE OF DATA PROTECTION 42
INTRODUCTION 42
THE CONCEPT OF PERSONAL DATA 42
SENSITIVE PERSONAL DATA 44
PERSONAL DATA RELATING TO THE DATA SUBJECT 46
ISSUES OF IDENTIFICATION 50
THE CONCEPT OF PROCESSING 52
NON-AUTOMATED FILING SYSTEMS 53
DATA PROTECTION ACTORS 56
DATA CONTROLLERS 56
DATA PROCESSORS 57
DATA SUBJECTS 58
JURISDICTIONAL ISSUES 58
CONCLUSIONS 60
4 SUPERVISORY AGENCIES 62
INTRODUCTION 62
FORMS OF SUPERVISORY AGENCIES 62
KEY FUNCTIONS OF SUPERVISORY AGENCIES 64
THE INFORMATION COMMISSIONER AND THE INFORMATION TRIBUNAL 65
PROCEDURAL REQUIREMENTS FOR DATA CONTROLLERS 66
FROM REGISTRATION TO NOTIFICATION 66
EXEMPTIONS FROM THE REQUIREMENT TO NOTIFY 67
THE SCOPE OF THE EXEMPTIONS 68
STAFFADMINISTRATION 68
ADVERTISING, MARKETING, AND PUBLIC RELATIONS 69
ACCOUNTS AND RECORDS 69
NON-PROFIT-MAKING ORGANISATIONS 70
INDEPENDENT DATA PROTECTION SUPERVISORS 70
INFORMATION TO BE SUPPLIED ON NOTIFICATION 71
PRELIMINARY ASSESSMENTS 72
THE DATA PROTECTION REGISTER 72
ENFORCEMENT OF THE LEGISLATION 73
POWERS OF ENTRY AND INSPECTION 73
INFORMATION NOTICES 74
ENFORCEMENT NOTICES 75
UNDERTAKINGS 75
AUDITS 75
MONETARY PENALTIES 77
GENERAL DUTIES OF THE INFORMATION COMMISSIONER 77
DISSEMINATING INFORMATION 77
CODES OF PRACTICE 78
INTERNATIONAL COOPERATION 79
DETAILED CONTENTS XIII
PROFESSIONAL SECRECY 80
APPELLATE BODIES 80
OTHER SUPERVISORY AGENCIES 81
CONCLUSIONS 81
5 THE DATA PROTECTION PRINCIPLES 83
INTRODUCTION 83
FAIR AND LAWFUL PROCESSING 85
REQUIREMENTS FOR PROCESSING TO BE FAIR 85
INFORMATION OBTAINED FROM THE DATA SUBJECT 86
INFORMATION NOT OBTAINED FROM THE DATA SUBJECT 86
UNFAIR PROCESSING SUBSEQUENT TO OBTAINING DATA 87
THE CREDIT REFERENCE AGENCY CASES 89
REQUIREMENTS FOR PROCESSING TO BE LAWFUL 92
SPECIFIC FACTORS LEGITIMISING PROCESSING 92
SUBJECT CONSENT 93
DURATION OF CONSENT 95
OTHER FACTORS LEGITIMISING PROCESSING 95
GENERAL DATA 95
NECESSITY FOR CONCLUDING OR PERFORMING A CONTRACT WITH THE DATA SUBJECT
95
NECESSITY FOR THE CONTROLLER TO COMPLY WITH A LEGAL OBLIGATION 96
NECESSITYTO PROTECT THE VITAL INTERESTS OF THE DATA SUBJECT 96
NECESSITY FOR THE ADMINISTRATION OF JUSTICE, ETC. 96
LEGITIMATE INTERESTS OF THE CONTROLLER 96
FACTORS LEGITIMISINGTHE PROCESSING OF SENSITIVE DATA 97
EXPLICIT SUBJECT CONSENT 97
EMPLOYMENT-RELATED PROCESSING 98
VITAL INTERESTS 98
PROCESSING BY SPECIFIED BODIES 98
INFORMATION IN THE PUBLIC DOMAIN 99
LEGAL PROCEEDINGS AND THE ADMINISTRATION OF JUSTICE 99
PROCESSINGFOR MEDICAL PURPOSES 99
ETHNIC MONITORING 99
ORDER OF THE SECRETARY OF STATE 100
POLITICAL DATA 101
EXCEPTIONS TO THE APPLICATION OF THE FIRST DATA PROTECTION PRINCIPLE FOR
LAW
ENFORCEMENT AND REVENUE-GATHERING PURPOSES 101
THE SECOND DATA PROTECTION PRINCIPLE-PURPOSE LIMITATION 102
THE THIRD DATA PROTECTION PRINCIPLE-RELEVANCE 103
THE FOURTH DATA PROTECTION PRINCIPLE-ADEQUACY AND TIMEOUSNESS 107
THE FIFTH DATA PROTECTION PRINCIPLE-DURATION OF RECORD-KEEPING 108
THE SEVENTH DATA PROTECTION PRINCIPLE-DATA SECURITY 109
CODES OF PRACTICE 110
CONCLUSIONS 110
XIV DETAILED CONTENTS
6 INDIVIDUAL RIGHTS AND REMEDIES 112
INTRODUCTION 112
SUBJECT ACCESS AND INFORMATION RIGHTS 112
ACCESS TIMETABLE 115
EXCEPTIONS TO THE SUBJECT ACCESS PROVISIONS 115
THIRD-PARTY DATA 116
NATIONAL SECURITY 119
DATA HELD FOR POLICING AND REVENUE-GATHERING PURPOSES 122
HEALTH DATA 124
EDUCATION AND SOCIAL-WORK DATA 125
REGULATORY ACTIVITY 126
RESEARCH, HISTORY, AND STATISTICS 126
INFORMATION REQUIRED TO BE MADE AVAILABLE TO THE PUBLIC 126
MISCELLANEOUS EXCEPTIONS 126
CONFIDENTIAL REFERENCES 127
ARMED FORCES 127
JUDICIAL APPOINTMENTS AND HONOURS 127
CROWN EMPLOYMENT AND CROWN AND MINISTERIAL APPOINTMENTS 127
MANAGEMENT FORECASTS 127
CORPORATE FINANCE 127
NEGOTIATIONS 128
EXAMINATION MARKS AND EXAMINATION SCRIPTS 128
INFORMATION ABOUT HUMAN EMBRYOS 128
LEGAL PROFESSIONAL PRIVILEGE 129
SELF-INCRIMINATION 129
MATTERS ARISING SUBSEQUENT TO AN ACCESS REQUEST 129
DENIAL OF ACCESS 129
RECTIFICATION OF INACCURATE DATA 130
COMPENSATION 130
OTHER SUBJECT RIGHTS 131
RIGHTTO REQUEST AN ASSESSMENT OF PROCESSING 131
RIGHT TO RESIST ENFORCED SUBJECT ACCESS 132
RIGHT TO OBJECT TO DATA PROCESSING 133
DIRECT MARKETING 133
OTHER FORMS OF PROCESSING 135
AUTOMATED DECISION-MAKING 135
CONCLUSIONS 136
7 SECTORAL ASPECTS OF DATA PROTECTION 138
INTRODUCTION 138
DATA PROTECTION AND THE MEDIA 138
SCOPE OF THE PROVISIONS 140
ACTIVITIES COVERED 140
SCOPE OF THE EXEMPTION 141
PROCEDURAL ASPECTS 142
SPECIAL INFORMATION NOTICES 145
ENFORCEMENT NOTICES 146
DETAILED CONTENTS XV
INDIVIDUAL RIGHTS AND REMEDIES 146
GRANTING OF ASSISTANCE BY THE COMMISSIONER 146
DATA PROTECTION IN THE ELECTRONIC COMMUNICATIONS SECTOR 146
THE DEVELOPMENT OF SECTOR-SPECIFIC LEGISLATION 149
THE PRIVACY AND ELECTRONIC COMMUNICATIONS DIRECTIVE AND REGULATIONS 150
OBLIGATIONS IMPOSED ON NETWORK AND SERVICE PROVIDERS 1 50
SECURITY AND CONFIDENTIALITY 151
BREACH NOTIFICATION 1 52
COOKIES 153
TRAFFIC AND LOCATION DATA 1 55
DATA RETENTION 157
ITEMISED BILLING 159
DIRECTORY INFORMATION 160
CALLING AND CONNECTED LINE IDENTIFICATION 162
UNSOLICITED COMMUNICATIONS 163
CONCLUSIONS 166
8 TRANSBORDER DATA FLOWS 167
INTRODUCTION 167
REGULATING TRANSBORDER DATA FLOWS 168
PROCEDURES FOR DETERMINING ADEQUACY 169
DEFINING ADEQUACY 170
ACTIVITY IN DETERMINING ADEQUACY 171
THE SAFE HARBOR AGREEMENT 172
CONSEQUENCES OF A FINDING OF ADEQUACY 175
THE SWIFT CASE 176
AIR PASSENGER DATA 178
TRANSFERS WHEN AN ADEQUATE LEVEL OF PROTECTION IS NOT PROVIDED 180
THE ROLE OF CONTRACT 182
BINDING CORPORATE RULES 185
CONCLUSIONS 186
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 197
INTRODUCTION 197
THE COUNCIL OF EUROPE CYBERCRIME CONVENTION 198
OECD GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS 199
EU INITIATIVES 200
CONCLUSIONS 201
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 202
INTRODUCTION 202
OFFENCES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF
COMPUTER DATA AND SYSTEMS 202
XVI DETAILED CONTENTS
ILLEGAL ACCESS 203
OBTAINING OR ENABLING ACCESS TO COMPUTERS OR DATA 204
WHEN IS ACCESS UNAUTHORISED? 206
UNAUTHORISED USE BY AUTHORISED USERS 207
INTERCEPTION OF COMMUNICATIONS 210
DATA AND SYSTEM INTERFERENCE 211
DAMAGE TO DATA 212
DENIAL-OF-SERVICE ATTACKS 214
MISUSE OF DEVICES 216
MALICIOUS COMMUNICATIONS 217
CONCLUSIONS 219
11 COMPUTER FRAUD AND FORGERY 221
INTRODUCTION 221
COMPUTER-RELATED FORGERY 222
COMPUTER-RELATED FRAUD 223
DECEPTION OF A MACHINE 224
THE DISHONEST OBTAINING OF SERVICES 227
CONCLUSIONS 228
12 VIRTUAL CRIMINALITY 229
INTRODUCTION 229
INTERNET PORNOGRAPHY 230
THE INTERNET AND CHILD PORNOGRAPHY 232
PHOTOGRAPHS AND PSEUDO-PHOTOGRAPHS 233
MULTIMEDIA PRODUCTS 235
JURISDICTIONAL ISSUES 237
WHERE NEXT FOR THE CRIMINAL LAW? 239
REVENGE PORNOGRAPHY 240
CONCLUSIONS 242
13 DETECTING AND PROSECUTING COMPUTER CRIME 243
INTRODUCTION 243
INTERCEPTION OF COMMUNICATIONS 244
INTERCEPTION OFCONTENTAND COMMUNICATIONS DATA 245
INTERCEPTION OF CONTENT 245
FINANCING INTERCEPTION 246
COMMUNICATIONS DATA 247
SEARCH WARRANTS 248
COMPUTER EVIDENCE 250
JURISDICTIONAL ISSUES 251
EXTRADITION 253
DETAILED CONTENTS XVII
PART III INTELLECTUAL PROPERTY ISSUES
14 KEY ELEMENTS OF THE PATENT SYSTEM 263
INTRODUCTION 263
PATENTS IN THE INTERNATIONAL ARENA 264
THE PATENT COOPERATION TREATY 265
THE EUROPEAN PATENT CONVENTION 265
THE UNITARY PATENT 266
INTELLECTUAL PROPERTY IN THE GATS AND WTO 267
REQUIREMENTS FOR PATENTABILITY 268
NOVELTY 268
INVENTIVE STEP 269
CAPACITY FOR INDUSTRIAL APPLICATION 270
MATTERS EXCLUDED FROM PATENT PROTECTION 271
PATENTING SOFTWARE 272
THE PROCESS OF OBTAINING AND ENFORCING A PATENT 273
THE APPLICATION 273
SPECIFICATION AND STATEMENT OF CLAIM 273
PRELIMINARY EXAMINATION 274
PUBLICATION OF THE APPLICATION 274
SUBSTANTIVE EXAMINATION 275
THIRD-PARTY INVOLVEMENT 275
AWARD OF A PATENT 275
INFRINGEMENT OF PATENTS 276
REMEDIES FOR INFRINGEMENT OF A PATENT 277
REVOCATION OF A PATENT 277
CONCLUSIONS 278
15 PATENTS AND SOFTWARE 280
INTRODUCTION 280
THE PATENTS ACT 1977 AND THE EUROPEAN PATENT CONVENTION 282
THE QUEST FOR A TECHNICAL CONTRIBUTION 284
THE DEVELOPMENT OF SOFTWARE PATENT JURISPRUDENCE 289
NEW MILLENNIUM, NEW PATENT LAW? 292
IBM S APPLICATION 292
PENSIONS BENEFITS 294
HITACHI 295
MICROSOFT 296
LET A THOUSAND FLOWERS BLOOM? 296
SCHEMES FOR PERFORMING MENTAL ACTS 301
THE MOBILE-PHONE PATENT WARS 302
ISSUES OF PRIORITY 303
CONCLUSIONS 305
XVIII DETAILED CONTENTS
16 COPYRIGHT PROTECTION 309
INTRODUCTION 309
COPYRIGHT BASICS 309
OBTAINING COPYRIGHT 311
FORMS OF PROTECTED WORK 311
THE REQUIREMENT OF ORIGINALITY 312
OWNERSHIP OF COPYRIGHT 313
EMPLOYEE-CREATED WORKS 313
COMPUTER-GENERATED WORKS 313
INFRINGEMENT OF COPYRIGHT 315
THE NATURE OF COPYING 315
HOW TEMPORARY IS TEMPORARY? 316
FAIRAND UNFAIR USE OF AN EARLIERWORK 319
OTHER RIGHTS BELONGING TO THE COPYRIGHT OWNER 321
TO ISSUE COPIES OF THE WORK TO THE PUBLIC 321
TO PERFORM, SHOW, OR PLAY THE WORK IN PUBLIC 322
TO BROADCAST THE WORK OR INCLUDE IT IN A CABLE PROGRAMME SERVICE 322
TO MAKE AN ADAPTATION OF THE WORK 322
THE DEVELOPMENT OF SOFTWARE COPYRIGHT 323
APPLYING COPYRIGHT PRINCIPLES TO SOFTWARE 324
SOFTWARE PIRACY 325
USER RIGHTS IN RESPECT OF SOFTWARE 326
FAIR DEALING 326
A USE RIGHT FOR SOFTWARE? 327
ERROR CORRECTION 329
BACK-UP COPIES 329
REVERSE ENGINEERING AND DECOMPILATION 330
REVERSE ENGINEERING AND COMPUTER PROGRAMS 333
LITERAL AND NON-LITERAL COPYING 335
THE RISE AND FALL OF IOOK-AND-FEEL PROTECTION 337
THE COMPUTERISED PHARMACIST 337
AGRICULTURAL SOFTWARE 339
FINANCIAL MARKETS 340
ARM S LENGTH REPRODUCTION 343
COMPUTER PROGRAMS AS VISUAL WORKS 346
CONCLUSIONS 347
17 COPYRIGHT IN THE INFORMATION SOCIETY 348
INTRODUCTION 348
THE DIRECTIVE ON COPYRIGHT IN THE INFORMATION SOCIETY 349
CACHING 350
COPY PROTECTION AND DIGITAL RIGHTS MANAGEMENT (DRM) 351
PRIVATE COPYING IN THE DIGITAL AGE 353
COPYRIGHT ENFORCEMENT 354
NORWICH PBARMACAL ORDERS AND THREATS OF LITIGATION 355
DETAILED CONTENTS
19
THE DIGITAL ECONOMY ACT 2010
ONLINE INFRINGEMENT OF COPYRIGHT
THE INITIAL OBLIGATIONS CODE
INITIAL OBLIGATIONS CODE BY OFCOM IN THE ABSENCE OF AN APPROVED CODE
NOTIFICATION REPORTS
COPYRIGHT INFRINGEMENT LISTS
PROGRESS REPORTS
OBLIGATIONS TO LIMIT INTERNET ACCESS
CODE BY OFCOM ABOUT OBLIGATIONS TO LIMIT INTERNET ACCESS
CONTENTS OF CODE ABOUT OBLIGATIONS TO LIMIT INTERNET ACCESS
LEGAL CHALLENGES TO THE DIGITAL ECONOMY ACT
THE E-COMMERCE DIRECTIVE
DATA PROTECTION ISSUES
WHERE NOW FOR THE DIGITAL ECONOMY ACT?
BLOCKING ORDERS
NEW DIRECTIONS IN UK COPYRIGHT LAW
ORPHAN WORKS
HARVESTING THE INTERNET
CONCLUSIONS
PROTECTION OF DATABASES
INTRODUCTION
WHAT IS A DATABASE?
EXAMPLES OF DATABASES
DATABASES AND NEW TECHNOLOGY
TRADITIONAL FORMS OF PROTECTION FOR DATABASES
THE SWEAT OF THE BROW DOCTRINE
THE DATABASE REGIME
COPYRIGHT AND DATABASES
LICENSING AND DATABASES
OTHER COPYRIGHT CHANGES
THE DATABASE RIGHT
DURATION OF THE RIGHT
THE DATABASE RIGHT IN THE COURTS
FOOTBALL FIXTURE LISTS
HOW MUCH IS TOO MUCH?
CONCLUSIONS
DESIGN RIGHTS
INTRODUCTION
THE DEVELOPMENT OF DESIGN RIGHT AND KEY LEGISLATIVE INSTRUMENTS
REGISTERED DESIGN RIGHT PROTECTION
UNREGISTERED DESIGN RIGHT
DESIGN RIGHTS IN TABLET COMPUTERS
CONCLUSIONS
356
357
357
358
359
359
359
360
360
361
362
362
363
364
365
367
367
368
369
372
372
373
373
374
375
376
378
379
380
381
381
382
383
386
387
390
392
392
392
394
394
395
399
XX DETAILED CONTENTS
20 TRADE MARK AND DOMAIN-NAME ISSUES 400
INTRODUCTION 400
EFFECT OF TRADE MARKS 401
PASSING OFF 402
TRADE MARKS AND INFORMATION TECHNOLOGY 403
INTERNET-RELATED TRADE MARK DISPUTES 404
DOMAIN-NAME HIJACKING 404
HONEST CONCURRENT USE 408
REVERSE DOMAIN-NAME HIJACKING 410
THE UNIFORM DISPUTE RESOLUTION RULES 412
TRADE MARKS AND INTERNET SEARCH ENGINES 415
CONCLUSIONS 422
PART IV E-COMMERCE
21 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 427
INTRODUCTION 427
INTERNATIONAL INITIATIVES 427
KEY LEGAL INSTRUMENTS 428
THE DISTANCE SELLING DIRECTIVE 429
THE ELECTRONIC COMMERCE DIRECTIVE AND REGULATIONS 431
DEFENCES PROVIDED TO INFORMATION SERVICE PROVIDERS 432
SUBSTANTIVE PROVISIONS IN THE DIRECTIVE 435
WHEN AND WHERE IS A CONTRACT MADE? 435
CHOICE-OF-LAW ISSUES 438
ALTERNATIVE DISPUTE RESOLUTION 439
CONCLUSIONS 440
22 CRYPTOGRAPHY, ELECTRONIC SIGNATURES, AND THE ELECTRONIC
COMMUNICATIONS ACT 2000 442
INTRODUCTION 442
THE NATURE OF ENCRYPTION 443
ENTER TRUSTED THIRD PARTIES 446
LEGAL APPROACHES 447
BACKGROUND TO THE ELECTRONIC COMMUNICATIONS ACT 2000 AND
E-COMMERCE DIRECTIVE 448
THE BASIS OF REQUIREMENTS FOR WRITING 449
ELECTRONIC DOCUMENTS AND THE REQUIREMENTS FOR WRITING 453
ELECTRONIC SIGNATURES AND THE ELECTRONIC COMMUNICATIONS ACT 2000 455
ELECTRONIC SIGNATURES 455
CRYPTOGRAPHY SERVICE PROVIDERS 456
CONCLUSIONS 457
23 ELECTRONIC MONEY AND ONLINE GAMBLING 459
INTRODUCTION 459
DETAILED CONTENTS XXI
E-MONEY 460
NATIONAL AND EUROPEAN LEGISLATION 460
THE NATURE OF E-MONEY 461
E-MONEY ISSUERS AND SMALL E-MONEY ISSUERS 462
CRITERIA FOR ADMISSION TO THE REGISTER 462
SAFEGUARDING ARRANGEMENTS 462
PASSPORT RIGHTS 462
VIRTUAL CURRENCY 462
PEER-TO-PEER LENDING 465
ONLINE GAMBLING 466
INTRODUCTION 466
THE GAMBLING ACT 2005 467
LICENCING OF REMOTE GAMBLING ACTIVITIES 467
TECHNICAL STANDARDS 468
CONCLUSIONS 468
24 CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE 469
INTRODUCTION 469
FORMS OF LIABILITY 470
THE NATURE OF SOFTWARE DEFECTS 471
FORMS OF SOFTWARE 472
THE LEGAL STATUS OF SOFTWARE AND SOFTWARE CONTRACTS 473
IMPLIED TERMS IN SOFTWARE CONTRACTS 475
TITLE IN SOFTWARE 476
DESCRIPTION 477
QUALITY 477
REMEDIES FOR BREACH OF THE IMPLIED TERMS 480
SOFTWARE QUALITY AND THE COURTS 481
QUESTIONS OF TIME 481
PROBLEMS WITH THE COMMUNITY CHARGE 484
WATER PRIVATISATION 485
THE MONDAY SOFTWARE PACKAGE 487
THE DOG WITH AN MBA 490
EXCLUSION OR LIMITATION OF LIABILITY 492
ENFORCEABILITY OF SHRINK-WRAP LICENCES 493
CONSUMER CONTRACTS 494
NON-CONSUMER CONTRACTS 495
THE REQUIREMENT OF REASONABLENESS 497
CONCLUSIONS 500
PARTV INTERNET-SPECIFIC ISSUES
25 SOCIAL NETWORKING, DEFAMATION, AND THE INTERNET 505
INTRODUCTION 505
THE NATURE OF DEFAMATION 508
THE LAW ON DEFAMATION 508
XXII DETAILED CONTENTS
WHO IS LIABLE FOR DEFAMATORY COMMENTS? 509
EMPLOYER S LIABILITY 513
LIABILITY OF ISPS AS PUBLISHERS 514
SINGLE OR MULTIPLE PUBLICATIONS? 519
JURISDICTIONAL ISSUES 522
ISPS AND THE ELECTRONIC COMMERCE DIRECTIVE 523
CONCLUSIONS 524
26 INTERNET REGULATION AND DOMAIN NAMES 526
INTRODUCTION 526
THE EMERGENCE OF INTERNET REGULATION 527
DOMAIN NAMES 529
REGULATION OF THE DOMAIN-NAME SYSTEM 530
THE DOMAIN-NAME STRUCTURE 531
NATIONAL DOMAIN NAMES 532
CONCLUSIONS 533
INDEX 535
|
any_adam_object | 1 |
author | Lloyd, Ian J. 1955- |
author_GND | (DE-588)12918893X |
author_facet | Lloyd, Ian J. 1955- |
author_role | aut |
author_sort | Lloyd, Ian J. 1955- |
author_variant | i j l ij ijl |
building | Verbundindex |
bvnumber | BV042095458 |
ctrlnum | (OCoLC)915571422 (DE-599)BVBBV042095458 |
edition | 7. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02013nam a2200517 c 4500</leader><controlfield tag="001">BV042095458</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150108 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140929s2014 |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB467565</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198702320</subfield><subfield code="c">pbk</subfield><subfield code="9">978-0-19-870232-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0198702329</subfield><subfield code="c">pbk</subfield><subfield code="9">0198702329</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)915571422</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042095458</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-188</subfield><subfield code="a">DE-M382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lloyd, Ian J.</subfield><subfield code="d">1955-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)12918893X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology law</subfield><subfield code="c">Ian J. Lloyd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">7. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XLVIII, 546 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Großbritannien</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027536238&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027536238</subfield></datafield></record></collection> |
geographic | Großbritannien Großbritannien (DE-588)4022153-2 gnd |
geographic_facet | Großbritannien |
id | DE-604.BV042095458 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:12:35Z |
institution | BVB |
isbn | 9780198702320 0198702329 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027536238 |
oclc_num | 915571422 |
open_access_boolean | |
owner | DE-188 DE-M382 |
owner_facet | DE-188 DE-M382 |
physical | XLVIII, 546 S. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | Lloyd, Ian J. 1955- Verfasser (DE-588)12918893X aut Information technology law Ian J. Lloyd 7. ed. Oxford [u.a.] Oxford Univ. Press 2014 XLVIII, 546 S. txt rdacontent n rdamedia nc rdacarrier Computers / Law and legislation / Great Britain Computer crimes / Great Britain Data protection / Law and legislation / Great Britain Data transmission systems / Law and legislation / Great Britain Recht Recht (DE-588)4048737-4 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Großbritannien Großbritannien (DE-588)4022153-2 gnd rswk-swf Großbritannien (DE-588)4022153-2 g Informationstechnik (DE-588)4026926-7 s Recht (DE-588)4048737-4 s DE-604 Datenverarbeitung (DE-588)4011152-0 s SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027536238&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lloyd, Ian J. 1955- Information technology law Computers / Law and legislation / Great Britain Computer crimes / Great Britain Data protection / Law and legislation / Great Britain Data transmission systems / Law and legislation / Great Britain Recht Recht (DE-588)4048737-4 gnd Datenverarbeitung (DE-588)4011152-0 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4011152-0 (DE-588)4026926-7 (DE-588)4022153-2 |
title | Information technology law |
title_auth | Information technology law |
title_exact_search | Information technology law |
title_full | Information technology law Ian J. Lloyd |
title_fullStr | Information technology law Ian J. Lloyd |
title_full_unstemmed | Information technology law Ian J. Lloyd |
title_short | Information technology law |
title_sort | information technology law |
topic | Computers / Law and legislation / Great Britain Computer crimes / Great Britain Data protection / Law and legislation / Great Britain Data transmission systems / Law and legislation / Great Britain Recht Recht (DE-588)4048737-4 gnd Datenverarbeitung (DE-588)4011152-0 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Computers / Law and legislation / Great Britain Computer crimes / Great Britain Data protection / Law and legislation / Great Britain Data transmission systems / Law and legislation / Great Britain Recht Datenverarbeitung Informationstechnik Großbritannien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027536238&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lloydianj informationtechnologylaw |