Information technology law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford University Press
[2017]
|
Ausgabe: | Eighth edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xliii, 539 Seiten Diagramme 25 cm |
ISBN: | 9780198787556 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044467485 | ||
003 | DE-604 | ||
005 | 20171114 | ||
007 | t | ||
008 | 170830s2017 xxk|||| |||| 00||| eng d | ||
010 | |a 017934658 | ||
020 | |a 9780198787556 |9 978-0-19-878755-6 | ||
035 | |a (DE-599)BVBBV044467485 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-M382 | ||
050 | 0 | |a KD667.C65 | |
100 | 1 | |a Lloyd, Ian J. |d 1955- |0 (DE-588)12918893X |4 aut | |
245 | 1 | 0 | |a Information technology law |c Ian J. Lloyd, Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
250 | |a Eighth edition | ||
264 | 1 | |a Oxford |b Oxford University Press |c [2017] | |
300 | |a xliii, 539 Seiten |b Diagramme |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Recht | |
650 | 4 | |a Computers |x Law and legislation |z Great Britain | |
650 | 4 | |a Computer crimes |z Great Britain | |
650 | 4 | |a Data protection |x Law and legislation |z Great Britain | |
650 | 4 | |a Data transmission systems |x Law and legislation |z Great Britain | |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
651 | 4 | |a Großbritannien | |
651 | 7 | |a Großbritannien |0 (DE-588)4022153-2 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 1 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029867991 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177795644915712 |
---|---|
adam_text | INFORMATION TECHNOLOGY LAW
/ LLOYD, IAN J.YYEAUTHOR
: 2017
TABLE OF CONTENTS / INHALTSVERZEICHNIS
PRIVACY, TECHNOLOGY, AND SURVEILLANCE
THE ESERGENCE OF DATA PROTECTION
THE SCOPE OF DATA PROTECTION
SUPERVISORY AGENCIES
THE DATA PROTECTION PRINICIPLES
INDIVIDUAL RIGHTS AND REMEDIES
SECTORAL ASPECTS OF DATA PROTECTION
TRANSBORDER DATA FLOWS
NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME
SUBSTANTIVE CRIMINAL LAW PROVISIONS
COMPUTER FRAUD AND FORGERY
VIRTUAL CRIMINALITY
DETECTING AND PROSECUTING COMPUTER CRIME
KEY ELEMENTS OF THE PATENT SYSTEM
PATENTS
COPYRIGHT PROTECTION
ENFORCEMENT ISSUES
PROTECTION OF DATABASES
DESIGN RIGHTS
TRADE MARK AND DOMAIN-NAME ISSUES
INTERNET REGULATION AND DOMAIN NAMES
INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE
ELECTRONIC MONEY
CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
OUTLINE CONTENTS
LIST OF TABLES AND FIGURES XXI
LATE DEVELOPMENTS XXII
TABLE OF CASES XXVII
TABLE OF STATUTES XXXI
TABLE OF STATUTORY INSTRUMENTS XXXVII
TABLE OF EUROPEAN LEGISLATION XXXIX
TABLE OF CONVENTIONS AND OTHER ENACTMENTS XLII
PART 1 PRIVACY, ANONYMITY, AND DATA PROTECTION
1 PRIVACY, TECHNOLOGY, AND SURVEILLANCE 9
2 THE EMERGENCE OF DATA PROTECTION 30
3 THE SCOPE OF DATA PROTECTION 56
4 SUPERVISORY AGENCIES 75
5 THE DATA PROTECTION PRINCIPLES 96
6 INDIVIDUAL RIGHTS AND REMEDIES 124
7 SECTORAL ASPECTS OF DATA PROTECTION 153
8 TRANSBORDER DATA FLOWS 181
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 211
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 216
11 COMPUTER FRAUD AND FORGERY 236
12 VIRTUAL CRIMINALITY 244
13 DETECTING AND PROSECUTING COMPUTER CRIME 257
PART III INTELLECTUAL PROPERTY ISSUES
14 KEY ELEMENTS OF THE PATENT SYSTEM 283
15 PATENTS 300
16 COPYRIGHT PROTECTION 316
VIII OUTLINE CONTENTS
17 ENFORCEMENT ISSUES 366
18 PROTECTION OF DATABASES 382
19 DESIGN RIGHTS 401
20 TRADE MARK AND DOMAIN-NAME ISSUES 409
21 INTERNET REGULATION AND DOMAIN NAMES 432
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 459
23 ELECTRONIC MONEY 473
24 CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE 485
INDEX 527
DETAILED CONTENTS
LIST OF TABLES AND FIGURES XXI
LATE DEVELOPMENTS XXII
TABLE OF CASES XXVII
TABLE OF STATUTES XXXI
TABLE OF STATUTORY INSTRUMENTS XXXVII
TABLE OF EUROPEAN LEGISLATION XXXIX
TABLE OF CONVENTIONS AND OTHER ENACTMENTS XLII
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 PRIVACY, TECHNOLOGY, AND SURVEILLANCE 9
INTRODUCTION 9
SMOKE AND MIRRORS-FROM ECHELON TO PRISM 9
THE INVESTIGATORY POWERS BILL AND ACT 10
SCOPE OF THE LEGISLATION 12
INTERCEPTION OF COMMUNICATIONS 12
LOCATION AND COMMUNICATIONS DATA 13
INTERFERENCE WITH COMMUNICATIONS 15
BULK INTERCEPTION AND ACQUISITION ORDERS 16
PUBLIC AND PRIVATE SURVEILLANCE 17
FORMS OF SURVEILLANCE 19
SURVEILLANCE AND THE LAW 22
PRIVACY ISSUES 24
THE POST-SECOND WORLD WAR EXPANSION OF RIGHTS TO PRIVACY 24
PRIVACY AND SURVEILLANCE 27
CONCLUSIONS 29
2 THE EMERGENCE OF DATA PROTECTION 30
INTRODUCTION 30
THE DEVELOPMENT OF DATA PROTECTION LAWS 31
INTERNATIONAL DATA PROTECTION INITIATIVES 31
THE COUNCIL OF EUROPE 32
THE ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 34
THE ASIA-PACIFIC PRIVACY CHARTER INITIATIVE 36
THE UNITED NATIONS 36
THE DEVELOPMENT OF DATA PROTECTION LEGISLATION IN THE UNITED KINGDOM 37
THE COMMITTEE ON DATA PROTECTION 38
THE DATA PROTECTION ACT 1984 39
T DETAILED CONTENTS
THE EUROPEAN DATA PROTECTION DIRECTIVE AND THE DATA
PROTECTION ACT 1998 40
THE DATA PROTECTION ACT 1998 42
NEW DIRECTIONS FOR DATA PROTECTION? 43
PLUS CA CHANGE? 46
DATA PORTABILITY 51
DATA SECU RITY BREACHES 51
DATA PROTECTION OFFICERS 51
DATA PROTECTION BY DESIGN AND BY DEFAULT 52
SUBJECT RIGHTS 53
SUPERVISORY AUTHORITIES 53
TRANSBORDER DATA FLOWS 54
BINDING CORPORATE RULES 54
THE EUROPEAN DATA PROTECTION BOARD*AND CONSISTENCY 54
CONCLUSIONS 55
3 THE SCOPE OF DATA PROTECTION 56
INTRODUCTION 56
THE CONCEPT OF PERSONAL DATA 56
SENSITIVE PERSONAL DATA 58
PERSONAL DATA RELATING TO THE DATA SUBJECT 60
ISSUES OF IDENTIFICATION 64
THE CONCEPT OF PROCESSING 65
NON-AUTOMATED FILING SYSTEMS 66
DATA PROTECTION ACTORS 70
DATA CONTROLLERS 70
DATA PROCESSORS 71
DATA SUBJECTS 71
JURISDICTIONAL ISSUES 71
CONCLUSIONS 73
4 SUPERVISORY AGENCIES 75
INTRODUCTION 75
FORMS OF SUPERVISORY AGENCIES 76
KEY FUNCTIONS OF SUPERVISORY AGENCIES 77
THE INFORMATION COMMISSIONER AND THE INFORMATION TRIBUNAL 78
PROCEDURAL REQUIREMENTS FOR DATA CONTROLLERS 79
FROM REGISTRATION TO NOTIFICATION 80
EXEMPTIONS FROM THE REQUIREMENT TO NOTIFY 80
THE SCOPE OF THE EXEMPTIONS 81
STAFFADMINISTRATION 81
ADVERTISING, MARKETING, AND PUBLIC RELATIONS 82
ACCOUNTS AND RECORDS 82
NON-PROFIT-MAKING ORGANISATIONS 83
INDEPENDENT DATA PROTECTION SUPERVISORS 83
DETAILED CONTENTS XI
INFORMATION TO BE SUPPLIED ON NOTIFICATION 84
PRELIMINARY ASSESSMENTS 85
THE DATA PROTECTION REGISTER 85
ENFORCEMENT OF THE LEGISLATION 86
POWERS OF ENTRY AND INSPECTION 86
INFORMATION NOTICES 87
ENFORCEMENT NOTICES 88
UNDERTAKINGS 88
AUDITS 88
MONETARY PENALTIES 89
GENERAL DUTIES OF THE INFORMATION COMMISSIONER 90
DISSEMINATING INFORMATION 90
CODES OF PRACTICE 91
INTERNATIONAL COOPERATION 92
PROFESSIONAL SECRECY 92
APPELLATE BODIES 93
OTHER SUPERVISORY AGENCIES 94
CONCLUSIONS 94
5 THE DATA PROTECTION PRINCIPLES 96
INTRODUCTION 96
FAIRAND LAWFUL PROCESSING 97
FAIR PROCESSING 98
INFORMATION OBTAINED FROM THE DATA SUBJECT 98
INFORMATION NOT OBTAINED FROM THE DATA SUBJECT 99
UNFAIR PROCESSING SUBSEQUENT TO OBTAINING DATA 100
THE CREDIT REFERENCE AGENCY CASES 102
REQUIREMENTS FOR PROCESSING TO BE LAWFUL 105
SPECIFIC FACTORS LEGITIMISING PROCESSING 105
SUBJECT CONSENT 105
DURATION OF CONSENT 108
OTHERFACTORS LEGITIMISING PROCESSING 108
GENERAL DATA 108
NECESSITY FOR CONCLUDING OR PERFORMING A CONTRACT WITH THE DATA SUBJECT
108
NECESSITY FOR THE CONTROLLER TO COMPLY WITH A LEGAL OBLIGATION 108
NECESSITY TO PROTECT THE VITAL INTERESTS OF THE DATA SUBJECT 108
NECESSITY FOR THE ADMINISTRATION OF JUSTICE, ETC 109
LEGITIMATE INTERESTS OF THE CONTROLLER 109
FACTORS LEGITIMISING THE PROCESSING OF SENSITIVE DATA 110
EXPLICIT SUBJECT CONSENT 110
EMPLOYMENT-RELATED PROCESSING 110
VITAL INTERESTS 110
PROCESSING BY SPECIFIED BODIES 111
INFORMATION IN THE PUBLIC DOMAIN 111
LEGAL PROCEEDINGS AND THE ADMINISTRATION OF JUSTICE 111
PROCESSING FOR MEDICAL PURPOSES 112
ETHNIC MONITORING 112
XII DETAILED CONTENTS
ORDER OF THE SECRETARY OF STATE 112
POLITICAL DATA 113
EXCEPTIONS TO THE APPLICATION OF THE FIRST DATA PROTECTION PRINCIPLE
FOR LAW ENFORCEMENT AND REVENUE-GATHERING PURPOSES 114
THE SECOND DATA PROTECTION PRINCIPLE-PURPOSE LIMITATION 114
THE THIRD DATA PROTECTION PRINCIPLE*RELEVANCE 116
THE FOURTH DATA PROTECTION PRINCIPLE*ADEQUACY AND TIMEOUSNESS 120
THE FIFTH DATA PROTECTION PRINCIPLE-DURATION OF RECORD-KEEPING 121
THE SEVENTH DATA PROTECTION PRINCIPLE-DATA SECURITY 121
CODES OF PRACTICE 122
CONCLUSIONS 123
6 INDIVIDUAL RIGHTS AND REMEDIES 124
INTRODUCTION 124
SUBJECT ACCESS AND INFORMATION RIGHTS 124
ACCESS TIMETABLE 127
EXCEPTIONS TO THE SUBJECT ACCESS PROVISIONS 127
THIRD-PARTY DATA 128
NATIONAL SECURITY 131
DATA HELD FOR POLICING AND REVENUE-GATHERING PURPOSES 134
HEALTH DATA 136
EDUCATION AND SOCIAL WORK DATA 137
REGULATORY ACTIVITY 137
RESEARCH, HISTORY, AND STATISTICS 138
INFORMATION REQUIRED TO BE MADE AVAILABLE TO THE PUBLIC 138
MISCELLANEOUS EXCEPTIONS 138
CONFIDENTIAL REFERENCES 138
ARMED FORCES 139
JUDICIAL APPOINTMENTS AND HONOURS 139
CROWN EMPLOYMENT AND CROWN AND MINISTERIAL APPOINTMENTS 139
MANAGEMENT FORECASTS 139
CORPORATE FINANCE 139
NEGOTIATIONS 140
EXAMINATION MARKS AND EXAMINATION SCRIPTS 140
INFORMATION ABOUT HUMAN EMBRYOS 140
LEGAL PROFESSIONAL PRIVILEGE 140
SELF-INCRIMINATION 141
MATTERS ARISING SUBSEQUENT TO AN ACCESS REQUEST 141
DENIAL OF ACCESS 141
RECTIFICATION OF INACCURATE DATA 142
COMPENSATION 142
MISUSE OF PERSONAL INFORMATION 143
OTHER SUBJECT RIGHTS 147
RIGHT TO REQUEST AN ASSESSMENT OF PROCESSING 147
RIGHT TO RESIST ENFORCED SUBJECT ACCESS 147
RIGHT TO OBJECT TO DATA PROCESSING 149
DETAILED CONTENTS XIII
DIRECT MARKETING
OTHER FORMS OF PROCESSING
AUTOMATED DECISION-MAKING
CONCLUSIONS
7 SECTORAL ASPECTS OF DATA PROTECTION
INTRODUCTION
DATA PROTECTION AND THE MEDIA
SCOPE OF THE PROVISIONS
ACTIVITIES COVERED
SCOPE OF THE EXEMPTION
PROCEDURAL ASPECTS
SPECIAL INFORMATION NOTICES
ENFORCEMENT NOTICES
INDIVIDUAL RIGHTS AND REMEDIES
GRANTING OF ASSISTANCE BY THE COMMISSIONER
DATA PROTECTION IN THE ELECTRONIC COMMUNICATIONS SECTOR
THE DEVELOPMENT OF SECTOR-SPECIFIC LEGISLATION
THE PRIVACY AND ELECTRONIC COMMUNICATIONS DIRECTIVE AND REGULATIONS
OBLIGATIONS IMPOSED ON NETWORK AND SERVICE PROVIDERS
SECURITY AND CONFIDENTIALITY
BREACH NOTIFICATION
COOKIES
TRAFFIC AND LOCATION DATA
DATA RETENTION
ITEMISED BILLING
DIRECTORY INFORMATION
CALLING AND CONNECTED LINE IDENTIFICATION
UNSOLICITED COMMUNICATIONS
CONCLUSIONS
8 TRANSBORDER DATA FLOWS
INTRODUCTION
REGULATING TRANSBORDER DATA FLOWS
PROCEDURES FOR DETERMINING ADEQUACY
DEFINING ADEQUACY
ACTIVITY IN DETERMINING ADEQUACY
THE SAFE HARBOR AGREEMENT AND THE PRIVACY SHIELD
CONSEQUENCES OF A FINDING OF ADEQUACY
THE SWIFT CASE
AIR PASSENGER DATA
TRANSFERS WHEN AN ADEQUATE LEVEL OF PROTECTION IS NOT PROVIDED
THE ROLE OF CONTRACT
BINDING CORPORATE RULES
CONCLUSIONS
149
150
151
152
153
153
153
154
155
156
156
159
160
160
160
161
163
164
165
165
166
167
169
171
173
174
176
177
180
181
181
182
183
184
185
186
190
191
193
195
196
199
200
XIV DETAILED CONTENTS
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 211
INTRODUCTION 211
THE COUNCIL OF EUROPE CYBERCRIME CONVENTION 212
OECD GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS 213
EU INITIATIVES 214
CONCLUSIONS 215
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 216
INTRODUCTION 216
OFFENCES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
OF COMPUTER DATA AND SYSTEMS 216
ILLEGAL ACCESS 216
OBTAINING OR ENABLING ACCESS TO COMPUTERS OR DATA 218
WHEN IS ACCESS UNAUTHORISED? 220
UNAUTHORISED USE BY AUTHORISED USERS 221
INTERCEPTION OF COMMUNICATIONS 224
DATA AND SYSTEM INTERFERENCE 224
DAMAGE TO DATA 225
DENIAL-OF-SERVICE ATTACKS 228
MISUSE OF DEVICES 230
MALICIOUS COMMUNICATIONS 231
REVENGE PORNOGRAPHY 232
CONCLUSIONS 235
11 COMPUTER FRAUD AND FORGERY 236
INTRODUCTION 236
COMPUTER-RELATED FORGERY 237
COMPUTER-RELATED FRAUD 238
DECEPTION OF A MACHINE 239
THE DISHONEST OBTAINING OF SERVICES 242
CONCLUSIONS 243
12 VIRTUAL CRIMINALITY 244
INTRODUCTION 244
INTERNET PORNOGRAPHY 245
THE INTERNET AND CHILD PORNOGRAPHY 247
PHOTOGRAPHS AND PSEUDO-PHOTOGRAPHS 248
MULTIMEDIA PRODUCTS 250
JURISDICTIONAL ISSUES 252
WHERE NEXT FOR THE CRIMINAL LAW? 254
CONCLUSIONS 255
DETAILED CONTENTS XV
13 DETECTING AND PROSECUTING COMPUTER CRIME 257
INTRODUCTION 257
INTERCEPTION OF COMMUNICATIONS 258
INTERCEPTION OF CONTENT AND COMMUNICATIONS DATA 259
INTERCEPTION OF CONTENT 259
FINANCING INTERCEPTION 260
COMMUNICATIONS DATA 261
THE I NVESTIGATORY POWERS ACT 262
SCOPE OF THE LEGISLATION 264
INTERCEPTION OF COMMUNICATIONS 264
LOCATION AND COMMUNICATIONS DATA 265
INTERFERENCE WITH COMMUNICATIONS 268
BULK INTERCEPTION AND ACQUISITION ORDERS 268
SEARCH WARRANTS 269
COMPUTER EVIDENCE 271
JURISDICTIONAL ISSUES 272
EXTRADITION 273
PART III INTELLECTUAL PROPERTY ISSUES
14 KEY ELEMENTS OF THE PATENT SYSTEM 283
INTRODUCTION 283
PATENTS IN THE INTERNATIONAL ARENA 284
THE PATENT CO-OPERATION TREATY 285
THE EUROPEAN PATENT CONVENTION 285
THE UNITARY PATENT 286
INTELLECTUAL PROPERTY IN THE GATS AND WTO 287
REQUIREMENTS FOR PATENTABILITY 288
NOVELTY 288
INVENTIVE STEP 289
CAPACITY FOR INDUSTRIAL APPLICATION 290
MATTERS EXCLUDED FROM PATENT PROTECTION 291
PATENTING SOFTWARE 292
THE PROCESS OFOBTAININGANDENFORCINGA PATENT 293
THE APPLICATION 293
SPECIFICATION AND STATEMENT OF CLAIM 293
PRELIMINARY EXAMINATION 294
PUBLICATION OF THE APPLICATION 294
SUBSTANTIVE EXAMINATION 295
THIRD-PARTY INVOLVEMENT 295
AWARD OF A PATENT 295
INFRINGEMENT OF PATENTS 296
REMEDIES FOR INFRINGEMENT OF A PATENT 297
REVOCATION OF A PATENT 297
CONCLUSIONS 298
XVI DETAILED CONTENTS
15 PATENTS
INTRODUCTION
THE QUEST FOR A TECHNICAL CONTRIBUTION
PATENTS AND THE INTERNET
WHO GETS PATENTS?
THE SOFTWARE PATENT WARS
PATENT TROLLS
STANDARD ESSENTIAL PATENTS
CONCLUSIONS
16 COPYRIGHT PROTECTION
INTRODUCTION
COPYRIGHT BASICS
OBTAINING COPYRIGHT
FORMS OF PROTECTED WORK
THE REQUIREMENT OF ORIGINALITY
OWNERSHIP OF COPYRIGHT
EMPLOYEE-CREATED WORKS
COMPUTER-GENERATED WORKS
INFRINGEMENT OF COPYRIGHT
THE NATURE OF COPYING
HOW TEMPORARY IS TEMPORARY?
COMMUNICATION TO THE PUBLIC
THE LEGITIMACY OF PRIVATE COPYING
FAIR AND UNFAIR USE OF AN EARLIER WORK
OTHER RIGHTS BELONGING TO THE COPYRIGHT OWNER
COMMUNICATION TO THE PUBLIC
TO PERFORM, SHOW, OR PLAY THE WORK IN PUBLIC
TO BROADCAST THE WORK OR INCLUDE IT IN A CABLE PROGRAMME SERVICE
TO MAKE AN ADAPTATION OF THE WORK
THE DEVELOPMENT OF SOFTWARE COPYRIGHT
APPLYING COPYRIGHT PRINCIPLES TO SOFTWARE
SOFTWARE PIRACY
USER RIGHTS IN RESPECT OF SOFTWARE
FAIR DEALING
A USE RIGHT FOR SOFTWARE?
ERROR CORRECTION
BACK-UP COPIES
CACHING
COPY PROTECTION AND DIGITAL RIGHTS MANAGEMENT
REVERSE ENGINEERING AND DECOMPILATION
REVERSE ENGINEERING AND COMPUTER PROGRAMS
LITERAL AND NON-LITERAL COPYING
THE RISE AND FALL OF LOOK-AND-FEEL PROTECTION
THE COMPUTERISED PHARMACIST
AGRICULTURAL SOFTWARE
300
300
301
309
310
310
311
311
314
316
316
316
318
318
319
320
320
320
322
322
323
326
330
331
333
333
334
334
335
335
336
337
338
338
339
341
341
342
343
344
348
350
351
352
354
DETAILED CONTENTS XVII
FINANCIAL MARKETS 355
ARM S LENGTH REPRODUCTION 357
COMPUTER PROGRAMS AS VISUAL WORKS 360
NEW DIRECTIONS IN UK COPYRIGHT LAW 362
ORPHAN WORKS 362
HARVESTINGTHE INTERNET 363
CONCLUSIONS 364
17 ENFORCEMENT ISSUES 366
INTRODUCTION 366
THE DIRECTIVE ON COPYRIGHT IN THE INFORMATION SOCIETY 366
COPYRIGHT ENFORCEMENT 368
ENFORCEMENT OF COPYRIGHT 368
ACCOUNTING OF PROFITS 369
DELIVERY UP 369
FOLLOW THE MONEY 370
BLOCKING ORDERS 370
TWENTIETH CENTURY FOX V SKY UK AND BT (AND ORS) 372
BLOCKING ORDERS AND TRADE MARKS 374
LEGAL BASIS 376
DURATION OF INJUNCTIONS 376
COST ISSUES 377
NORWICH PHARMACAL ORDERS AND THREATS OF LITIGATION 378
CONCLUSIONS 379
18 PROTECTION OF DATABASES 382
INTRODUCTION 382
WHAT IS A DATABASE? 383
EXAMPLES OF DATABASES 383
DATABASES AND NEW TECHNOLOGY 384
TRADITIONAL FORMS OF PROTECTION FOR DATABASES 385
THE SWEAT OF THE BROW DOCTRINE 386
THE DATABASE REGIME 388
COPYRIGHT AND DATABASES 389
LICENSING AND DATABASES 390
OTHER COPYRIGHT CHANGES 391
THE DATABASE RIGHT 391
DURATION OF THE RIGHT 392
THE DATABASE RIGHT IN THE COURTS 393
FOOTBALL FIXTURE LISTS 396
HOW MUCH IS TOO MUCH? 397
CONCLUSIONS 399
19 DESIGN RIGHTS 401
INTRODUCTION 401
THE DEVELOPMENT OF DESIGN RIGHT AND KEY LEGISLATIVE INSTRUMENTS 401
REGISTERED DESIGN RIGHT PROTECTION 403
XVIII DETAILED CONTENTS
UNREGISTERED DESIGN RIGHT 403
DESIGN RIGHTS I N TABLET COM PUTERS 404
CONCLUSIONS 408
20 TRADE MARK AND DOMAIN-NAME ISSUES 409
INTRODUCTION 409
EFFECT OF TRADE MARKS 410
PASSING OFF 411
TRADE MARKS AND INFORMATION TECHNOLOGY 412
INTERNET-RELATED TRADE MARK DISPUTES 413
DOMAIN-NAME HIJACKING 413
HONEST CONCURRENT USE 417
REVERSE DOMAIN-NAME HIJACKING 419
THE UNIFORM DISPUTE RESOLUTION RULES 421
TRADE MARKS AND INTERNET SEARCH ENGINES 424
CONCLUSIONS 431
21 INTERNET REGULATION AND DOMAIN NAMES 432
INTRODUCTION 432
THE EMERGENCE OF INTERNET REGULATION 433
WHO GOVERNS THE INTERNET? 433
THE INTERNET OF THINGS 435
FROM IPV4 TO 6 436
ICANN 437
DOMAIN NAMES AND URLS 438
THE NATURE OF DOMAIN NAMES 438
TOP LEVEL GLOBAL (OR GENERIC) DOMAIN NAMES 439
A BRIEF HISTORY OF INTERNET GOVERNANCE 439
THE FUTURE OF ICANN AND INTERNET GOVERNANCE 442
SECOND (COUNTRY) LEVEL DOMAINS 443
THE NEW(ISH) TOP LEVEL DOMAIN POLICY 444
APPLYING TO ACT AS A DOMAIN NAME REGISTRY 445
THE NEW TOP LEVEL DOMAIN APPLICATION PROCESS 445
THE EVALUATION PROCESS 446
DOMAIN AUCTIONS 446
TRADE MARK ISSUES AND THE NEW DOMAINS 447
THE UNIFORM DISPUTE RESOLUTION RULES 447
RATIONALE AND CONTENT OF THE DOMAIN RESOLUTION RULES 449
DOT.SUCKS 449
ARBITRATION DECISIONS 450
NATIONAL DISPUTE RESOLUTION PROCEDURES 451
CONCLUSIONS 452
DETAILED CONTENTS XIX
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 459
INTRODUCTION 459
INTERNATIONAL INITIATIVES 459
KEY LEGAL INSTRUMENTS 461
THE DISTANCE SELLING DIRECTIVE 461
THE ELECTRONIC COMMERCE DIRECTIVE AND REGULATIONS 463
DEFENCES PROVIDED TO INFORMATION SERVICE PROVIDERS 464
SUBSTANTIVE PROVISIONS IN THE DIRECTIVE 467
WHEN AND WHERE IS A CONTRACT MADE? 467
CHOICE-OF-LAW ISSUES 470
ALTERNATIVE DISPUTE RESOLUTION 471
CONCLUSIONS 472
23 ELECTRONIC MONEY 473
INTRODUCTION 473
E-MONEY 474
NATIONAL AND EUROPEAN LEGISLATION 474
THE NATURE OF E-MONEY 475
E-MONEY ISSUERS AND SMALL E-MONEY ISSUERS 475
CRITERIA FOR ADMISSION TO THE REGISTER 476
SAFEGUARDING ARRANGEMENTS 476
PASSPORT RIGHTS 476
VIRTUAL CURRENCY 476
PEER-TO-PEER LENDING 478
CROWD FUNDING 480
CONCLUSIONS 484
24 CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE 485
INTRODUCTION 485
FORMS OF LIABILITY 486
THE NATURE OF SOFTWARE DEFECTS 487
FORMS OF SOFTWARE 488
THE LEGAL STATUS OF SOFTWARE AND SOFTWARE CONTRACTS 489
IMPLIED TERMS IN SOFTWARE CONTRACTS 491
TITLE IN SOFTWARE 492
DESCRIPTION 493
QUALITY 493
REMEDIES FOR BREACH OF THE IMPLIED TERMS 495
SOFTWARE QUALITY AND THE COURTS 497
QUESTIONS OF TIME 497
PROBLEMS WITH THE COMMUNITY CHARGE 500
WATER PRIVATISATION 501
THE MONDAY SOFTWARE PACKAGE 503
THE DOE WITH AN MBA 506
XX DETAILED CONTENTS
EXCLUSION OR LIMITATION OF LIABILITY 508
ENFORCEABILITY OF SHRINK-WRAP LICENCES 509
CONSUMER CONTRACTS 509
NON-CONSUMER CONTRACTS 510
THE REQUIREMENT OF REASONABLENESS 512
TOWARDS FAIR DEALING OBLIGATIONS IN CONTRACTUAL RELATIONSHIPS? 516
THE CONSUMER RIGHTS ACT 2015 518
BACKGROUND TO THE CONSUMER RIGHTS ACT 2015 519
QUESTIONS OF TIME 521
EXCLUSION OF LIABILITY 524
CONCLUSIONS 525
INDEX 527
|
any_adam_object | 1 |
author | Lloyd, Ian J. 1955- |
author_GND | (DE-588)12918893X |
author_facet | Lloyd, Ian J. 1955- |
author_role | aut |
author_sort | Lloyd, Ian J. 1955- |
author_variant | i j l ij ijl |
building | Verbundindex |
bvnumber | BV044467485 |
callnumber-first | K - Law |
callnumber-label | KD667 |
callnumber-raw | KD667.C65 |
callnumber-search | KD667.C65 |
callnumber-sort | KD 3667 C65 |
callnumber-subject | KD - United Kingdom and Ireland |
ctrlnum | (DE-599)BVBBV044467485 |
edition | Eighth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02507nam a2200553 c 4500</leader><controlfield tag="001">BV044467485</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171114 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170830s2017 xxk|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">017934658</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198787556</subfield><subfield code="9">978-0-19-878755-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044467485</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KD667.C65</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lloyd, Ian J.</subfield><subfield code="d">1955-</subfield><subfield code="0">(DE-588)12918893X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology law</subfield><subfield code="c">Ian J. Lloyd, Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Eighth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xliii, 539 Seiten</subfield><subfield code="b">Diagramme</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Großbritannien</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029867991</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
geographic | Großbritannien Großbritannien (DE-588)4022153-2 gnd |
geographic_facet | Großbritannien |
id | DE-604.BV044467485 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:53:45Z |
institution | BVB |
isbn | 9780198787556 |
language | English |
lccn | 017934658 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029867991 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | xliii, 539 Seiten Diagramme 25 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Oxford University Press |
record_format | marc |
spelling | Lloyd, Ian J. 1955- (DE-588)12918893X aut Information technology law Ian J. Lloyd, Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania Eighth edition Oxford Oxford University Press [2017] xliii, 539 Seiten Diagramme 25 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Informationstechnik (DE-588)4026926-7 gnd rswk-swf Recht (DE-588)4048737-4 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Großbritannien Großbritannien (DE-588)4022153-2 gnd rswk-swf Großbritannien (DE-588)4022153-2 g Informationstechnik (DE-588)4026926-7 s Recht (DE-588)4048737-4 s DE-604 Datenverarbeitung (DE-588)4011152-0 s 1\p DE-604 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Lloyd, Ian J. 1955- Information technology law Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Informationstechnik (DE-588)4026926-7 gnd Recht (DE-588)4048737-4 gnd Datenverarbeitung (DE-588)4011152-0 gnd |
subject_GND | (DE-588)4026926-7 (DE-588)4048737-4 (DE-588)4011152-0 (DE-588)4022153-2 |
title | Information technology law |
title_auth | Information technology law |
title_exact_search | Information technology law |
title_full | Information technology law Ian J. Lloyd, Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
title_fullStr | Information technology law Ian J. Lloyd, Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
title_full_unstemmed | Information technology law Ian J. Lloyd, Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
title_short | Information technology law |
title_sort | information technology law |
topic | Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Informationstechnik (DE-588)4026926-7 gnd Recht (DE-588)4048737-4 gnd Datenverarbeitung (DE-588)4011152-0 gnd |
topic_facet | Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Informationstechnik Datenverarbeitung Großbritannien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029867991&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lloydianj informationtechnologylaw |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis