Information technology law:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford University Press
[2020]
|
Ausgabe: | Ninth edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xl, 483 Seiten 25 cm |
ISBN: | 9780198830559 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046880454 | ||
003 | DE-604 | ||
005 | 20200921 | ||
007 | t | ||
008 | 200902s2020 xxk |||| 00||| eng d | ||
020 | |a 9780198830559 |9 978-0-19-883055-9 | ||
035 | |a (OCoLC)1156627021 | ||
035 | |a (DE-599)BVBBV046880454 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-91 |a DE-M382 | ||
050 | 0 | |a KD667.C65 | |
084 | |a JUR 786 |2 stub | ||
084 | |a JUR 038 |2 stub | ||
100 | 1 | |a Lloyd, Ian J. |d 1955- |e Verfasser |0 (DE-588)12918893X |4 aut | |
245 | 1 | 0 | |a Information technology law |c Ian J. Lloyd, formerly Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
250 | |a Ninth edition | ||
264 | 1 | |a Oxford |b Oxford University Press |c [2020] | |
300 | |a xl, 483 Seiten |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Recht | |
650 | 4 | |a Computers |x Law and legislation |z Great Britain | |
650 | 4 | |a Computer crimes |z Great Britain | |
650 | 4 | |a Data protection |x Law and legislation |z Great Britain | |
650 | 4 | |a Data transmission systems |x Law and legislation |z Great Britain | |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
651 | 4 | |a Großbritannien | |
651 | 7 | |a Großbritannien |0 (DE-588)4022153-2 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032290464&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032290464 |
Datensatz im Suchindex
_version_ | 1804181737144582144 |
---|---|
adam_text | OUTLINE CONTENTS
LIST OF TABLES AND FIGURES XXIII
LATE DEVELOPMENTS XXV
TABLE OF CASES XXVII
TABLE OF LEGISLATION XXXI
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 THE DEATH OF PRIVACY AND THE GROWTH OF SURVEILLANCE 3
2 THE BEGINNINGS OF DATA PROTECTION 27
3 THE SCOPE OF DATA PROTECTION 39
4 SUPERVISORY AGENCIES 56
5 THE DATA PROTECTION PRINCIPLES 71
6 INDIVIDUAL RIGHTS AND REMEDIES 92
7 SECTORAL ASPECTS OF DATA PROTECTION 114
8 TRANSBORDER DATA FLOWS 138
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 161
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 173
11 VIRTUAL CRIMINALITY 189
12 DETECTING AND PROSECUTING COMPUTER CRIME 203
PART III INTELLECTUAL PROPERTY ISSUES
13 THE EMERGENCE AND FORMS OF INTELLECTUAL PROPERTY LAW 223
14 KEY ELEMENTS OF THE PATENT SYSTEM 230
15 SOFTWARE PATENTS 246
16 COPYRIGHT PROTECTION 271
17 ENFORCEMENT ISSUES 321
18 PROTECTION OF DATABASES 337
19 DESIGN RIGHTS 356
X OUTLINE CONTENTS
20 TRADE MARK ISSUES 364
21 INTERNET DOMAIN NAMES 377
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 393
23 ELECTRONIC MONEY 407
24 CONTRACTUAL ISSUES 425
INDEX 467
DETAILED CONTENTS
LIST OF TABLES AND FIGURES XXI I I
LATE DEVELOPMENTS XXV
TABLE OF CASES XXVII
TABLE OF LEGISLATION XXXI
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 THE DEATH OF PRIVACY AND THE GROWTH OF SURVEILLANCE 3
1.1 INTRODUCTION 3
1.2 THE DEVELOPMENT OF SURVEILLANCE TECHNOLOGY 4
1.3 COMMUNICATIONS DATA 7
1.3.1 ALEXA IS LISTENING 8
1.4 SURVEILLANCE LEGISLATION 8
1.5 SCOPE OF THE LEGISLATION 9
1.6 FORMS OF SURVEILLANCE 11
1.7 SURVEILLANCE AND THE LAW 14
1.8 THE EMERGENCE OF DATA PROTECTION 18
1.9 PERSONALITY PROFILING AND SOCIAL MEDIA 19
1.10 PERSONALITY TESTS 19
1.11 POLITICAL PROFILING 21
1.12 DATA PROTECTION IMPLICATIONS 21
1.13 THE (VOICE ASSISTANT) DOCTOR WILL SEE YOU NOW 22
1.14 MEDICINE AND THE INTERNET 23
1.15 DO PRIVACY POLICIES HELP? 25
1.16 CONCLUSIONS 25
2 THE BEGINNINGS OF DATA PROTECTION 27
2.1 INTRODUCTION 27
2.2 THE DEVELOPMENT OF DATA PROTECTION LAWS 28
2.2.1 INTERNATIONAL DATA PROTECTION INITIATIVES 28
2.2.2 THE COUNCIL OF EUROPE 29
2.2.3 THE ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 31
2.2.4 THE ASIA-PACIFIC PRIVACY CHARTER INITIATIVE 32
2.2.5 THE UNITED NATIONS 33
2.3 THE DEVELOPMENT OF DATA PROTECTION LEGISLATION IN
THE UNITED KINGDOM AND THE EUROPEAN UNION 34
2.3.1 THE EUROPEAN DATA PROTECTION DIRECTIVE AND THE DATA PROTECTION ACT
1998 35
2.3.2 THE GENERAL DATA PROTECTION REGULATION AND DATA PROTECTION ACT
2018 36
2.4 CONCLUSIONS 37
XII DETAILED CONTENTS
3 THE SCOPE OF DATA PROTECTION
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
INTRODUCTION
THE CONCEPT OF PERSONAL DATA
SENSITIVE PERSONAL DATA
PERSONAL DATA RELATINGTO THE DATA SUBJECT
ISSUES OF IDENTIFICATION-ANONYMITY AND PSEUDONYMITY
THE CONCEPT OF PROCESSING
DATA PROTECTION ACTORS
3.7.1 DATA CONTROLLERS
3.7.2 DATA PROCESSORS
3.7.3 DATA SUBJECTS
JURISDICTIONAL ISSUES
CONCLUSIONS
4 SUPERVISORY AGENCIES
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
4.11
INTRODUCTION
NATIONAL SUPERVISORY AGENCIES AND THE ROLE OF THE UK S INFORMATION
COMMISSIONER
STRUCTURES OF SUPERVISORY AGENCIES
KEY FUNCTIONS OF SUPERVISORY AGENCIES
FUNCTIONS OF THE SUPERVISORY AGENCY
ACCREDITATION AND CERTIFICATION
ENFORCEMENT OF THE LEGISLATION
4.7.1 POWERS OF ENTRY AND INSPECTION
4.7.2 INFORMATION NOTICES
4.7.3 ENFORCEMENT NOTICES
4.7.4 UNDERTAKINGS
4.7.5 AUDITS
4.7.6 MONETARY PENALTIES
GENERAL DUTIES OF THE INFORMATION COMMISSIONER
4.8.1 DISSEMINATING INFORMATION
4.8.2 CODES OF PRACTICE
4.8.3 INTERNATIONAL COOPERATION
4.8.4 PROFESSIONAL SECRECY
APPELLATE BODIES
OTHER SUPERVISORY AGENCIES
CONCLUSIONS
5 THE DATA PROTECTION PRINCIPLES
5.1
5.2
5.3
5.4
5.5
INTRODUCTION
FAIR AND LAWFUL PROCESSING
INFORMATION OBTAINED FROM THE DATA SUBJECT
5.3.1 INFORMATION NOT OBTAINED FROM THE DATA SUBJECT
THE NATURE OF CONSENT
5.4.1 DURATION OF CONSENT
OTHER FACTORS LEGITIMISING PROCESSING
39
39
39
41
42
49
51
52
52
53
54
54
54
56
56
57
58
60
60
62
63
63
63
64
65
65
66
67
67
67
68
68
69
69
70
71
71
72
74
74
75
76
77
DETAILED CONTENTS XIII
5.6 FACTORS LEGITIMISING THE PROCESSING OF SENSITIVE DATA 78
5.6.1 EXPLICIT SUBJECT CONSENT 79
5.6.2 OTHER GROUNDS LEGITIMISING PROCESSING 79
5.6.3 VITAL INTERESTS 80
5.6.4 PROCESSING BY SPECIFIED BODIES 80
5.6.5 INFORMATION IN THE PUBLIC DOMAIN 81
5.6.6 LEGAL PROCEEDINGS AND THE ADMINISTRATION OFJUSTICE 81
5.6.7 PROCESSINGFOR MEDICAL PURPOSES 81
5.6.8 ETHNIC MONITORING 81
5.6.9 POLITICAL DATA 82
5.7 EXCEPTIONS TO THE APPLICATION OF THE DATA PROTECTION PRINCIPLES
FOR LAW ENFORCEMENT AND REVENUE-GATHERING PURPOSES 82
5.8 THE SECOND DATA PROTECTION PRINCIPLE-PURPOSE LIMITATION 83
5.9 THE THIRD DATA PROTECT PRINCIPLE-RELEVANCE 84
5.10 THE FOURTH DATA PROTECTION PRINCIPLE*ADEQUACY AND TIMEOUSNESS 88
5.11 THE FIFTH DATA PROTECTION PRINCIPLE-DURATION OF RECORD-KEEPING 89
5.12 THE SEVENTH DATA PROTECTION PRINCIPLE-DATA SECURITY 89
5.13 CODES OF PRACTICE 90
5.14 CONCLUSIONS 91
6 INDIVIDUAL RIGHTS AND REMEDIES 92
6.1 INTRODUCTION 92
6.2 SUBJECT ACCESS AND INFORMATION RIGHTS 92
6.3 EXCEPTIONS TO THE SUBJECT ACCESS PROVISIONS 93
6.3.1 THIRD-PARTY DATA 93
6.3.2 NATIONAL SECURITY 97
6.3.3 DATA HELD FOR POLICING AND REVENUE-GATHERING PURPOSES 100
6.3.4 HEALTH DATA 101
6.3.5 SOCIAL WORK DATA 102
6.3.6 EDUCATIONAL RECORDS 103
6.3.7 REGULATORY ACTIVITY 103
6.3.8 RESEARCH, HISTORY, AND STATISTICS 104
6.3.9 INFORMATION REQUIRED TO BE MADE AVAILABLE TO THE PUBLIC 104
6.3.10 CONFIDENTIAL REFERENCES 104
6.3.11 JUDICIAL APPOINTMENTS, JUDICIAL INDEPENDENCE, AND JUDICIAL
PROCEEDINGS 104
6.3.12 CROWN HONOURS, DIGNITIES, AND APPOINTMENTS 104
6.3.13 MANAGEMENT FORECASTS AND CORPORATE FINANCE 105
6.3.14 NEGOTIATIONS 105
6.3.15 LEGAL PROFESSIONAL PRIVILEGE 105
6.3.16 SELF-INCRIMINATION 105
6.4 OTHER SUBJECT RIGHTS 105
6.4.1 RIGHTTO RESIST ENFORCED SUBJECT ACCESS 106
6.5 RIGHT TO OBJECT TO DATA PROCESSING 106
6.5.1 DIRECT MARKETING 106
6.5.2 OTHER FORMS OF PROCESSING 107
6.5.3 AUTOMATED DECISION-MAKING 108
6.6 THE RIGHT TO BE FORGOTTEN 108
XIV DETAILED CONTENTS
6.7 DATA PORTABILITY 110
6.8 DENIAL OF ACCESS REQUESTS 110
6.9 RECTIFICATION OF INACCURATE DATA 110
6.10 COMPENSATION 111
6.11 CRIMINAL OFFENCES ASSOCIATED WITH ACCESS 111
6.11.1 UNLAWFUL OBTAINING OF PERSONAL DATA 111
6.11.2 RE-IDENTIFICATION OF DE-IDENTIFIED PERSONAL DATA 112
6.11.3 ALTERATION OF PERSONAL DATA TO PREVENT DISCLOSURE 112
6.12 CONCLUSIONS 113
7 SECTORAL ASPECTS OF DATA PROTECTION 114
7.1 INTRODUCTION 114
7.2 DATA PROTECTION AND THE MEDIA 114
7.3 SCOPE OF THE MEDIA PROVISIONS 115
7.4 KEY ELEMENTS OF THE PROVISIONS 116
7.4.1 GRANT OF ASSISTANCE 116
7.5 PROCEDURAL ASPECTS 117
7.6 GUIDANCE ABOUT HOW TO SEEK REDRESS AGAINST MEDIA ORGANISATIONS
AND RELATED MATTERS 117
7.7 DATA PROTECTION IN THE ELECTRONIC COMMUNICATIONS SECTOR 118
7.8 THE DEVELOPMENT OF COMMUNICATIONS-SPECIFIC LEGISLATION 120
7.9 THE PRIVACY AND ELECTRONIC COMMUNICATIONS DIRECTIVE AND REGULATIONS
121
7.10 OBLIGATIONS IMPOSED ON NETWORK AND SERVICE PROVIDERS 122
7.10.1 SECURITY AND CONFIDENTIALITY 122
7.10.2 BREACH NOTIFICATION 123
7.10.3 COOKIES 124
7.11 TRAFFIC AND LOCATION DATA 126
7.12 DATA RETENTION 128
7.13 ITEMISED BILLING 130
7.14 DIRECTORY INFORMATION 131
7.15 CALLING AND CONNECTED LINE IDENTIFICATION 133
7.16 UNSOLICITED COMMUNICATIONS 134
7.17 CONCLUSIONS 136
8 TRANSBORDER DATA FLOWS 138
8.1 INTRODUCTION 138
8.2 REGULATING TRANSBORDER DATA FLOWS 139
8.3 PROCEDURES FOR DETERMINING ADEQUACY 140
8.3.1 DEFINING ADEQUACY 141
8.4 THE SAFE HARBOR AGREEMENT AND THE PRIVACY SHIELD 142
8.5 CONSEQUENCES OFA FINDING OF ADEQUACY 146
8.6 THE SWIFT CASE 147
8.7 AIR PASSENGER DATA 149
DETAILED CONTENTS XV
8.8 TRANSFERS WHEN AN ADEQUATE LEVEL OF PROTECTION IS NOT PROVIDED
BY NATIONAL LAW 151
8.8.1 NATIONAL APPROVALS OF CONTRACTUAL PROVISIONS 152
8.9 STANDARD CONTRACTUAL TERMS 153
8.10 BINDING CORPORATE RULES 155
8.11 CONCLUSIONS 157
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 161
9.1 INTRODUCTION 161
9.2 COMPUTER FRAUD 161
9.3 COMPUTER HACKING 163
9.4 FROM CYBERCRIME TO CYBERWARFARE AND CYBERTERRORISM 165
9.5 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 168
9.5.1 THE COUNCIL OF EUROPE CYBERCRIME CONVENTION 169
9.5.2 OECD GUIDELINES FORTHE SECURITY OF INFORMATION SYSTEMS 169
9.5.3 EU INITIATIVES 170
9.6 CONCLUSIONS 172
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 173
10.1 INTRODUCTION 173
10.2 OFFENCES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
OF COMPUTER DATA AND SYSTEMS 173
10.3 ILLEGAL ACCESS 174
10.4 OBTAINING OR ENABLING ACCESS TO COMPUTERS OR DATA 175
10.5 WHEN IS ACCESS UNAUTHORISED? 177
10.6 U NAUTHORISED USE BY AUTHORISED USERS 178
10.7 INTERCEPTION OF COMMUNICATIONS 181
10.8 DATA AND SYSTEM INTERFERENCE 181
10.9 DAMAGE TO DATA 182
10.10 DENIAL-OF-SERVICE ATTACKS 185
10.11 MISUSE OF DEVICES 187
10.12 CONCLUSIONS 188
11 VIRTUAL CRIMINALITY 189
11.1 INTRODUCTION 189
11.2 INTERNET PORNOGRAPHY 190
11.2.1 AGE VERIFICATION 192
11.3 THE INTERNET AND CHILD PORNOGRAPHY 193
11.4 PHOTOGRAPHS AND PSEUDO-PHOTOGRAPHS 194
11.5 REVENGE PORNOGRAPHY 196
11.6 JURISDICTIONAL ISSUES 199
11.7 CONCLUSIONS 201
XVI DETAILED CONTENTS
12 DETECTING AND PROSECUTING COMPUTER CRIME 203
12.1 INTRODUCTION 203
12.2 INTERCEPTION OF COMMUNICATIONS 204
12.2.1 SCOPE OF THE LEGISLATION 206
12.2.2 INTERCEPTION OF CONTENT 206
12.2.3 FINANCING INTERCEPTION 207
12.3 BULK INTERCEPTION AND ACQUISITION ORDERS 208
12.4 DATA RETENTION ISSUES 208
12.5 THE FUTURE OF DATA RETENTION 212
12.6 INTERFERENCE WITH COMMUNICATIONS 213
12.7 SEARCH WARRANTS 213
12.8 ENCRYPTION 215
12.9 COMPUTER EVIDENCE 216
12.10 JURISDICTIONAL ISSUES 217
12.11 EXTRADITION 219
PART III INTELLECTUAL PROPERTY ISSUES
13 THE EMERGENCE AND FORMS OF INTELLECTUAL PROPERTY LAW 223
13.1 INTRODUCTION 223
13.2 PATENTS 223
13.3 COPYRIGHT 225
13.4 OTHERFORMSOF INTELLECTUAL PROPERTY RIGHT 227
13.5 CONCLUSIONS 228
14 KEY ELEMENTS OF THE PATENT SYSTEM 230
14.1 INTRODUCTION 230
14.2 PATENTS IN THE INTERNATIONAL ARENA 231
14.3 THE PATENT CO-OPERATION TREATY 231
14.4 THE EUROPEAN PATENT CONVENTION 232
14.5 THE UNITARY PATENT 233
14.6 INTELLECTUAL PROPERTY IN THE GATS AND WTO 234
14.7 REQUIREMENTS FOR PATENTABILITY 235
14.7.1 NOVELTY 235
14.7.2 INVENTIVE STEP 236
14.7.3 CAPACITY FOR INDUSTRIAL APPLICATION 237
14.7.4 MATTERS EXCLUDED FROM PATENT PROTECTION 238
14.8 PATENTING SOFTWARE 239
14.9 THEPROCESSOFOBTAININGANDENFORCINGAPATENT 240
14.9.1 THE APPLICATION 240
14.9.2 SPECIFICATION AND STATEMENT OF CLAIM 240
14.9.3 PRELIMINARY EXAMINATION 241
14.9.4 SUBSTANTIVE EXAMINATION 241
14.9.5 AWARD OF A PATENT 242
DETAILED CONTENTS XVII
14.10 INFRINGEMENT OF PATENTS 242
14.11 REMEDIES FOR INFRINGEMENT OF A PATENT 243
14.12 REVOCATION OF A PATENT 243
14.13 CONCLUSIONS 244
15 SOFTWARE PATENTS 246
15.1 INTRODUCTION 246
15.2 THE QUEST FOR A TECHNICAL CONTRIBUTION 246
15.3 PATENTS AND THE INTERNET 254
15.4 WHO GETS PATENTS? 255
15.5 THE SOFTWARE PATENT WARS 255
15.6 PATENT TROLLS 256
15.7 STANDARD ESSENTIAL PATENTS 256
15.8 STANDARD ESSENTIAL PATENTS (SEPS) AND INTELLECTUAL PROPERTY 259
15.9 FRAND TERMS 261
15.10 SEPS BEFORE THE COURTS 263
15.11 WHERE NEXT FOR STANDARD ESSENTIAL PATENTS? 268
15.12 CONCLUSIONS 270
16 COPYRIGHT PROTECTION 271
16.1 INTRODUCTION 271
16.2 COPYRIGHT BASICS 271
16.3 FORMS OF PROTECTED WORK 273
16.3.1 THE REQUIREMENT OF ORIGINALITY 274
16.4 OWNERSHIP OF COPYRIGHT 275
16.4.1 EMPLOYEE-CREATED WORKS 275
16.4.2 COMPUTER-GENERATED WORKS 275
16.5 DURATION OF COPYRIGHT 276
16.6 INFRINGEMENT OF COPYRIGHT 277
16.6.1 THE NATURE OF REPRODUCTION 277
16.6.2 TEMPORARY REPRODUCTION 278
16.7 COMMUNICATION TO THE PUBLIC 281
16.8 THE LEGITIMACY OF PRIVATE COPYING 284
16.9 FAIRAND UNFAIR USE OF AN EARLIER WORK 286
16.10 OTHER RIGHTS BELONGING TO THE COPYRIGHT OWNER 288
16.10.1 COMMUNICATION TO THE PUBLIC 288
16.10.2 TO PERFORM, SHOW, OR PLAY THE WORK IN PUBLIC 289
16.10.3 TO BROADCAST THE WORK OR INCLUDE IT IN A CABLE PROGRAMME SERVICE
289
16.10.4 TO MAKE AN ADAPTATION OF THE WORK 289
16.11 THE DEVELOPMENT OF SOFTWARE COPYRIGHT 290
16.12 APPLYING COPYRIGHT PRINCIPLES TO SOFTWARE 291
16.13 SOFTWARE PIRACY 292
16.14 USER RIGHTS IN RESPECT OF SOFTWARE 293
XVIII DETAILED CONTENTS
16.15 FAIR DEALING 293
16.16 A USE RIGHT FOR SOFTWARE? 294
16.17 ERROR CORRECTION 296
16.18 BACK-UP COPIES 296
16.19 CACHING 297
16.20 COPY PROTECTION AND DIGITAL RIGHTS MANAGEMENT 298
16.21 REVERSE ENGINEERING AND DECOMPILATION 299
16.22 REVERSE ENGINEERING AND COMPUTER PROGRAMS 303
16.23 LITERAL AND NON-LITERAL COPYING 305
16.24 THE RISE AND FALL OF LOOK-AND-FEEL PROTECTION 306
16.25 THE COMPUTERISED PHARMACIST 307
16.26 AGRICULTURAL SOFTWARE 309
16.27 FINANCIAL MARKETS 310
16.28 ARM S LENGTH REPRODUCTION 312
16.29 COMPUTER PROGRAMS AS VISUAL WORKS 315
16.30 NEW DIRECTIONS IN UK COPYRIGHT LAW 317
16.31 ORPHAN WORKS 317
16.32 HARVESTING THE INTERNET 318
16.33 CONCLUSIONS 319
17 ENFORCEMENT ISSUES 321
17.1 INTRODUCTION 321
17.2 THE DIRECTIVE ON COPYRIGHT IN THE INFORMATION SOCIETY 321
17.3 ENFORCEMENT OF COPYRIGHT 323
17.4 ACCOUNTING OF PROFITS 324
17.5 DELIVERY UP 324
17.6 FOLLOW THE MONEY 325
17.7 BLOCKING ORDERS 325
17.7.1 TWENTIETH CENTURY FOX V SKY UK AND BT (AND ORS) 327
17.8 BLOCKING ORDERS AND TRADE MARKS 329
17.8.1 LEGAL BASIS 331
17.9 DURATION OF INJUNCTIONS 331
17.10 COST ISSUES 332
17.11 NORWICH PHARMACAL ORDERS AND THREATS OF LITIGATION 333
17.12 CONCLUSIONS 334
18 PROTECTION OF DATABASES 337
18.1 INTRODUCTION 337
18.2 WHAT IS A DATABASE? 338
18.2.1 EXAMPLES OF DATABASES 338
18.3 DATABASES AND NEW TECHNOLOGY 339
18.4 TRADITIONAL FORMS OF PROTECTION FOR DATABASES 340
DETAILED CONTENTS XIX
18.5 THE SWEAT OF THE BROW DOCTRINE 341
18.6 THE DATABASE REGIME 344
18.6.1 COPYRIGHT AND DATABASES 344
18.6.2 LICENSING AND DATABASES 345
18.6.3 OTHER COPYRIGHT CHANGES 346
18.7 THE DATABASE RIGHT 346
18.7.1 DURATION OF THE RIGHT 347
18.8 THE DATABASE RIGHT IN THE COURTS 348
18.8.1 FOOTBALL FIXTURE LISTS 351
18.9 HOW MUCH IS TOO MUCH? 352
18.10 CONCLUSIONS 354
19 DESIGN RIGHTS 356
19.1 INTRODUCTION 356
19.2 THE DEVELOPMENT OF DESIGN RIGHTAND KEY LEGISLATIVE INSTRUMENTS 356
19.3 REGISTERED DESIGN RIGHT PROTECTION 358
19.4 UNREGISTERED DESIGN RIGHT 359
19.5 DESIGN RIGHTS IN TABLET COMPUTERS 359
19.6 CONCLUSIONS 363
20 TRADE MARK ISSUES 364
20.1 INTRODUCTION 364
20.2 EFFECT OF TRADE MARKS 365
20.3 PASSING OFF 366
20.4 INTERNET MARKET PLACES AND TRADE MARKS 366
20.5 INTERFLORA V MARKS AND SPENCER AND GOOGLE 369
20.6 CARTIER AND OTHERS V BRITISH SKY BROADCASTING AND OTHERS 373
20.7 CONCLUSIONS 376
21 INTERNET DOMAIN NAMES 377
21.1 INTRODUCTION 377
21.2 NAMES AND NUMBERS 377
21.3 INTERNET ADDRESSES AND URLS 378
21.4 THENATUREOF DOMAIN NAMES 378
21.5 TOP-LEVEL (GLOBAL OR GENERIC) DOMAIN NAMES 379
21.6 A BRIEF HISTORY OF INTERNET GOVERNANCE 379
21.7 THEFUTUREOF ICANN AND INTERNET GOVERNANCE 381
21.8 SECOND (COUNTRY) LEVEL DOMAINS 382
21.9 THE REVISED DOMAIN NAME STRUCTURE 384
21.10 THE TOP-LEVEL DOMAIN APPLICATION PROCESS 385
21.11 THE UNIFORM DISPUTE RESOLUTION RULES 386
21.12 ARBITRATION DECISIONS 387
21.13 CONCLUSIONS 388
XX DETAILED CONTENTS
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 393
22.1 INTRODUCTION 393
22.2 INTERNATIONAL INITIATIVES 394
22.3 KEY LEGAL INSTRUMENTS 395
22.3.1 THE DISTANCE SELLING DIRECTIVE 395
22.3.2 THE ELECTRONIC COMMERCE DIRECTIVE AND REGULATIONS 397
22.3.3 DEFENCES PROVIDED TO INFORMATION SERVICE PROVIDERS 399
22.4 SUBSTANTIVE PROVISIONS IN THE DIRECTIVE 401
22.4.1 WHEN AND WHERE IS A CONTRACT MADE? 401
22.4.2 CHOICE-OF-LAW ISSUES 404
22.5 ALTERNATIVE DISPUTE RESOLUTION 405
22.6 CONCLUSIONS 406
23 ELECTRONIC MONEY 407
23.1 INTRODUCTION 407
23.2 THE NATURE OF MONEY 408
23.3 LEGAL TENDER AND THE CASHLESS SOCIETY 410
23.4 THE EMERGENCE OF CRYPTOCURRENCY 411
23.5 ISSUES WITH CRYPTOCURRENCY 413
23.6 BLOCKCHAIN 413
23.7 THE FUTURE OF CRYPTOCURRENCY 414
23.8 REGULATION OFTHE E-MONEY SECTOR 416
23.9 THE NATURE OF E-MONEY 417
23.10 E-MONEY ISSUERS AND SMALL E-MONEY ISSUERS 417
23.11 CRITERIA FOR ADMISSION TO THE REGISTER 418
23.11.1 SAFEGUARDING ARRANGEMENTS 418
23.11.2 PASSPORT RIGHTS 418
23.12 PEER-TO-PEER LENDING 418
23.13 CROWDFUNDING 420
23.14 CONCLUSIONS 424
24 CONTRACTUAL ISSUES 425
24.1 INTRODUCTION 425
24.2 LIABILITY AND SOFTWARE 425
24.3 FORMS OF SOFTWARE 426
24.4 THE LEGAL STATUS OF SOFTWARE AND SOFTWARE CONTRACTS 426
24.5 IMPLIED TERMS IN SOFTWARE CONTRACTS 429
24.5.1 TITLE IN SOFTWARE 430
24.5.2 DESCRIPTION 430
24.5.3 QUALITY 431
DETAILED CONTENTS XXI
24.6 REMEDIES FOR BREACH OF THE IMPLIED TERMS 433
24.7 SOFTWARE QUALITY AND THE COURTS 435
24.7.1 QUESTIONS OF TIME 435
24.7.2 PROBLEMS WITH THE COMMUNITY CHARGE 437
24.7.3 WATER PRIVATISATION 439
24.7.4 THE MONDAY SOFTWARE PACKAGE 440
24.7.5 THE DOG WITH AN MBA 443
24.8 EXCLUSION OR LIMITATION OF LIABILITY 445
24.8.1 ENFORCEABILITY OF SHRINK-WRAP LICENCES 446
24.9 CONSUMER CONTRACTS 447
24.10 NON-CONSUMER CONTRACTS 448
24.10.1 THE REQUIREMENT OF REASONABLENESS 450
24.11 TOWARDS FAIR DEALING OBLIGATIONS IN CONTRACTUAL RELATIONSHIPS? 453
24.12 THE CONSUMER RIGHTS ACT 2015 456
24.13 QUESTIONS OF TIME 458
24.14 EXCLUSION OF LIABILITY 461
24.15 CONCLUSIONS 462
INDEX 467
|
adam_txt |
OUTLINE CONTENTS
LIST OF TABLES AND FIGURES XXIII
LATE DEVELOPMENTS XXV
TABLE OF CASES XXVII
TABLE OF LEGISLATION XXXI
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 THE DEATH OF PRIVACY AND THE GROWTH OF SURVEILLANCE 3
2 THE BEGINNINGS OF DATA PROTECTION 27
3 THE SCOPE OF DATA PROTECTION 39
4 SUPERVISORY AGENCIES 56
5 THE DATA PROTECTION PRINCIPLES 71
6 INDIVIDUAL RIGHTS AND REMEDIES 92
7 SECTORAL ASPECTS OF DATA PROTECTION 114
8 TRANSBORDER DATA FLOWS 138
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 161
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 173
11 VIRTUAL CRIMINALITY 189
12 DETECTING AND PROSECUTING COMPUTER CRIME 203
PART III INTELLECTUAL PROPERTY ISSUES
13 THE EMERGENCE AND FORMS OF INTELLECTUAL PROPERTY LAW 223
14 KEY ELEMENTS OF THE PATENT SYSTEM 230
15 SOFTWARE PATENTS 246
16 COPYRIGHT PROTECTION 271
17 ENFORCEMENT ISSUES 321
18 PROTECTION OF DATABASES 337
19 DESIGN RIGHTS 356
X OUTLINE CONTENTS
20 TRADE MARK ISSUES 364
21 INTERNET DOMAIN NAMES 377
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 393
23 ELECTRONIC MONEY 407
24 CONTRACTUAL ISSUES 425
INDEX 467
DETAILED CONTENTS
LIST OF TABLES AND FIGURES XXI I I
LATE DEVELOPMENTS XXV
TABLE OF CASES XXVII
TABLE OF LEGISLATION XXXI
PART I PRIVACY, ANONYMITY, AND DATA PROTECTION
1 THE DEATH OF PRIVACY AND THE GROWTH OF SURVEILLANCE 3
1.1 INTRODUCTION 3
1.2 THE DEVELOPMENT OF SURVEILLANCE TECHNOLOGY 4
1.3 COMMUNICATIONS DATA 7
1.3.1 ALEXA IS LISTENING 8
1.4 SURVEILLANCE LEGISLATION 8
1.5 SCOPE OF THE LEGISLATION 9
1.6 FORMS OF SURVEILLANCE 11
1.7 SURVEILLANCE AND THE LAW 14
1.8 THE EMERGENCE OF DATA PROTECTION 18
1.9 PERSONALITY PROFILING AND SOCIAL MEDIA 19
1.10 PERSONALITY TESTS 19
1.11 POLITICAL PROFILING 21
1.12 DATA PROTECTION IMPLICATIONS 21
1.13 THE (VOICE ASSISTANT) DOCTOR WILL SEE YOU NOW 22
1.14 MEDICINE AND THE INTERNET 23
1.15 DO PRIVACY POLICIES HELP? 25
1.16 CONCLUSIONS 25
2 THE BEGINNINGS OF DATA PROTECTION 27
2.1 INTRODUCTION 27
2.2 THE DEVELOPMENT OF DATA PROTECTION LAWS 28
2.2.1 INTERNATIONAL DATA PROTECTION INITIATIVES 28
2.2.2 THE COUNCIL OF EUROPE 29
2.2.3 THE ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT 31
2.2.4 THE ASIA-PACIFIC PRIVACY CHARTER INITIATIVE 32
2.2.5 THE UNITED NATIONS 33
2.3 THE DEVELOPMENT OF DATA PROTECTION LEGISLATION IN
THE UNITED KINGDOM AND THE EUROPEAN UNION 34
2.3.1 THE EUROPEAN DATA PROTECTION DIRECTIVE AND THE DATA PROTECTION ACT
1998 35
2.3.2 THE GENERAL DATA PROTECTION REGULATION AND DATA PROTECTION ACT
2018 36
2.4 CONCLUSIONS 37
XII DETAILED CONTENTS
3 THE SCOPE OF DATA PROTECTION
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
INTRODUCTION
THE CONCEPT OF PERSONAL DATA
SENSITIVE PERSONAL DATA
PERSONAL DATA RELATINGTO THE DATA SUBJECT
ISSUES OF IDENTIFICATION-ANONYMITY AND PSEUDONYMITY
THE CONCEPT OF PROCESSING
DATA PROTECTION ACTORS
3.7.1 DATA CONTROLLERS
3.7.2 DATA PROCESSORS
3.7.3 DATA SUBJECTS
JURISDICTIONAL ISSUES
CONCLUSIONS
4 SUPERVISORY AGENCIES
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
4.9
4.10
4.11
INTRODUCTION
NATIONAL SUPERVISORY AGENCIES AND THE ROLE OF THE UK'S INFORMATION
COMMISSIONER
STRUCTURES OF SUPERVISORY AGENCIES
KEY FUNCTIONS OF SUPERVISORY AGENCIES
FUNCTIONS OF THE SUPERVISORY AGENCY
ACCREDITATION AND CERTIFICATION
ENFORCEMENT OF THE LEGISLATION
4.7.1 POWERS OF ENTRY AND INSPECTION
4.7.2 INFORMATION NOTICES
4.7.3 ENFORCEMENT NOTICES
4.7.4 UNDERTAKINGS
4.7.5 AUDITS
4.7.6 MONETARY PENALTIES
GENERAL DUTIES OF THE INFORMATION COMMISSIONER
4.8.1 DISSEMINATING INFORMATION
4.8.2 CODES OF PRACTICE
4.8.3 INTERNATIONAL COOPERATION
4.8.4 PROFESSIONAL SECRECY
APPELLATE BODIES
OTHER SUPERVISORY AGENCIES
CONCLUSIONS
5 THE DATA PROTECTION PRINCIPLES
5.1
5.2
5.3
5.4
5.5
INTRODUCTION
FAIR AND LAWFUL PROCESSING
INFORMATION OBTAINED FROM THE DATA SUBJECT
5.3.1 INFORMATION NOT OBTAINED FROM THE DATA SUBJECT
THE NATURE OF CONSENT
5.4.1 DURATION OF CONSENT
OTHER FACTORS LEGITIMISING PROCESSING
39
39
39
41
42
49
51
52
52
53
54
54
54
56
56
57
58
60
60
62
63
63
63
64
65
65
66
67
67
67
68
68
69
69
70
71
71
72
74
74
75
76
77
DETAILED CONTENTS XIII
5.6 FACTORS LEGITIMISING THE PROCESSING OF SENSITIVE DATA 78
5.6.1 EXPLICIT SUBJECT CONSENT 79
5.6.2 OTHER GROUNDS LEGITIMISING PROCESSING 79
5.6.3 VITAL INTERESTS 80
5.6.4 PROCESSING BY SPECIFIED BODIES 80
5.6.5 INFORMATION IN THE PUBLIC DOMAIN 81
5.6.6 LEGAL PROCEEDINGS AND THE ADMINISTRATION OFJUSTICE 81
5.6.7 PROCESSINGFOR MEDICAL PURPOSES 81
5.6.8 ETHNIC MONITORING 81
5.6.9 POLITICAL DATA 82
5.7 EXCEPTIONS TO THE APPLICATION OF THE DATA PROTECTION PRINCIPLES
FOR LAW ENFORCEMENT AND REVENUE-GATHERING PURPOSES 82
5.8 THE SECOND DATA PROTECTION PRINCIPLE-PURPOSE LIMITATION 83
5.9 THE THIRD DATA PROTECT PRINCIPLE-RELEVANCE 84
5.10 THE FOURTH DATA PROTECTION PRINCIPLE*ADEQUACY AND TIMEOUSNESS 88
5.11 THE FIFTH DATA PROTECTION PRINCIPLE-DURATION OF RECORD-KEEPING 89
5.12 THE SEVENTH DATA PROTECTION PRINCIPLE-DATA SECURITY 89
5.13 CODES OF PRACTICE 90
5.14 CONCLUSIONS 91
6 INDIVIDUAL RIGHTS AND REMEDIES 92
6.1 INTRODUCTION 92
6.2 SUBJECT ACCESS AND INFORMATION RIGHTS 92
6.3 EXCEPTIONS TO THE SUBJECT ACCESS PROVISIONS 93
6.3.1 THIRD-PARTY DATA 93
6.3.2 NATIONAL SECURITY 97
6.3.3 DATA HELD FOR POLICING AND REVENUE-GATHERING PURPOSES 100
6.3.4 HEALTH DATA 101
6.3.5 SOCIAL WORK DATA 102
6.3.6 EDUCATIONAL RECORDS 103
6.3.7 REGULATORY ACTIVITY 103
6.3.8 RESEARCH, HISTORY, AND STATISTICS 104
6.3.9 INFORMATION REQUIRED TO BE MADE AVAILABLE TO THE PUBLIC 104
6.3.10 CONFIDENTIAL REFERENCES 104
6.3.11 JUDICIAL APPOINTMENTS, JUDICIAL INDEPENDENCE, AND JUDICIAL
PROCEEDINGS 104
6.3.12 CROWN HONOURS, DIGNITIES, AND APPOINTMENTS 104
6.3.13 MANAGEMENT FORECASTS AND CORPORATE FINANCE 105
6.3.14 NEGOTIATIONS 105
6.3.15 LEGAL PROFESSIONAL PRIVILEGE 105
6.3.16 SELF-INCRIMINATION 105
6.4 OTHER SUBJECT RIGHTS 105
6.4.1 RIGHTTO RESIST ENFORCED SUBJECT ACCESS 106
6.5 RIGHT TO OBJECT TO DATA PROCESSING 106
6.5.1 DIRECT MARKETING 106
6.5.2 OTHER FORMS OF PROCESSING 107
6.5.3 AUTOMATED DECISION-MAKING 108
6.6 THE RIGHT TO BE FORGOTTEN 108
XIV DETAILED CONTENTS
6.7 DATA PORTABILITY 110
6.8 DENIAL OF ACCESS REQUESTS 110
6.9 RECTIFICATION OF INACCURATE DATA 110
6.10 COMPENSATION 111
6.11 CRIMINAL OFFENCES ASSOCIATED WITH ACCESS 111
6.11.1 UNLAWFUL OBTAINING OF PERSONAL DATA 111
6.11.2 RE-IDENTIFICATION OF DE-IDENTIFIED PERSONAL DATA 112
6.11.3 ALTERATION OF PERSONAL DATA TO PREVENT DISCLOSURE 112
6.12 CONCLUSIONS 113
7 SECTORAL ASPECTS OF DATA PROTECTION 114
7.1 INTRODUCTION 114
7.2 DATA PROTECTION AND THE MEDIA 114
7.3 SCOPE OF THE MEDIA PROVISIONS 115
7.4 KEY ELEMENTS OF THE PROVISIONS 116
7.4.1 GRANT OF ASSISTANCE 116
7.5 PROCEDURAL ASPECTS 117
7.6 GUIDANCE ABOUT HOW TO SEEK REDRESS AGAINST MEDIA ORGANISATIONS
AND RELATED MATTERS 117
7.7 DATA PROTECTION IN THE ELECTRONIC COMMUNICATIONS SECTOR 118
7.8 THE DEVELOPMENT OF COMMUNICATIONS-SPECIFIC LEGISLATION 120
7.9 THE PRIVACY AND ELECTRONIC COMMUNICATIONS DIRECTIVE AND REGULATIONS
121
7.10 OBLIGATIONS IMPOSED ON NETWORK AND SERVICE PROVIDERS 122
7.10.1 SECURITY AND CONFIDENTIALITY 122
7.10.2 BREACH NOTIFICATION 123
7.10.3 COOKIES 124
7.11 TRAFFIC AND LOCATION DATA 126
7.12 DATA RETENTION 128
7.13 ITEMISED BILLING 130
7.14 DIRECTORY INFORMATION 131
7.15 CALLING AND CONNECTED LINE IDENTIFICATION 133
7.16 UNSOLICITED COMMUNICATIONS 134
7.17 CONCLUSIONS 136
8 TRANSBORDER DATA FLOWS 138
8.1 INTRODUCTION 138
8.2 REGULATING TRANSBORDER DATA FLOWS 139
8.3 PROCEDURES FOR DETERMINING ADEQUACY 140
8.3.1 DEFINING ADEQUACY 141
8.4 THE'SAFE HARBOR'AGREEMENT AND THE PRIVACY SHIELD 142
8.5 CONSEQUENCES OFA FINDING OF ADEQUACY 146
8.6 THE SWIFT CASE 147
8.7 AIR PASSENGER DATA 149
DETAILED CONTENTS XV
8.8 TRANSFERS WHEN AN ADEQUATE LEVEL OF PROTECTION IS NOT PROVIDED
BY NATIONAL LAW 151
8.8.1 NATIONAL APPROVALS OF CONTRACTUAL PROVISIONS 152
8.9 STANDARD CONTRACTUAL TERMS 153
8.10 BINDING CORPORATE RULES 155
8.11 CONCLUSIONS 157
PART II COMPUTER-RELATED CRIME
9 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 161
9.1 INTRODUCTION 161
9.2 COMPUTER FRAUD 161
9.3 COMPUTER HACKING 163
9.4 FROM CYBERCRIME TO CYBERWARFARE AND CYBERTERRORISM 165
9.5 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 168
9.5.1 THE COUNCIL OF EUROPE CYBERCRIME CONVENTION 169
9.5.2 OECD GUIDELINES FORTHE SECURITY OF INFORMATION SYSTEMS 169
9.5.3 EU INITIATIVES 170
9.6 CONCLUSIONS 172
10 SUBSTANTIVE CRIMINAL LAW PROVISIONS 173
10.1 INTRODUCTION 173
10.2 OFFENCES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY
OF COMPUTER DATA AND SYSTEMS 173
10.3 ILLEGAL ACCESS 174
10.4 OBTAINING OR ENABLING ACCESS TO COMPUTERS OR DATA 175
10.5 WHEN IS ACCESS UNAUTHORISED? 177
10.6 U NAUTHORISED USE BY AUTHORISED USERS 178
10.7 INTERCEPTION OF COMMUNICATIONS 181
10.8 DATA AND SYSTEM INTERFERENCE 181
10.9 DAMAGE TO DATA 182
10.10 DENIAL-OF-SERVICE ATTACKS 185
10.11 MISUSE OF DEVICES 187
10.12 CONCLUSIONS 188
11 VIRTUAL CRIMINALITY 189
11.1 INTRODUCTION 189
11.2 INTERNET PORNOGRAPHY 190
11.2.1 AGE VERIFICATION 192
11.3 THE INTERNET AND CHILD PORNOGRAPHY 193
11.4 PHOTOGRAPHS AND PSEUDO-PHOTOGRAPHS 194
11.5 REVENGE PORNOGRAPHY 196
11.6 JURISDICTIONAL ISSUES 199
11.7 CONCLUSIONS 201
XVI DETAILED CONTENTS
12 DETECTING AND PROSECUTING COMPUTER CRIME 203
12.1 INTRODUCTION 203
12.2 INTERCEPTION OF COMMUNICATIONS 204
12.2.1 SCOPE OF THE LEGISLATION 206
12.2.2 INTERCEPTION OF CONTENT 206
12.2.3 FINANCING INTERCEPTION 207
12.3 BULK INTERCEPTION AND ACQUISITION ORDERS 208
12.4 DATA RETENTION ISSUES 208
12.5 THE FUTURE OF DATA RETENTION 212
12.6 INTERFERENCE WITH COMMUNICATIONS 213
12.7 SEARCH WARRANTS 213
12.8 ENCRYPTION 215
12.9 COMPUTER EVIDENCE 216
12.10 JURISDICTIONAL ISSUES 217
12.11 EXTRADITION 219
PART III INTELLECTUAL PROPERTY ISSUES
13 THE EMERGENCE AND FORMS OF INTELLECTUAL PROPERTY LAW 223
13.1 INTRODUCTION 223
13.2 PATENTS 223
13.3 COPYRIGHT 225
13.4 OTHERFORMSOF INTELLECTUAL PROPERTY RIGHT 227
13.5 CONCLUSIONS 228
14 KEY ELEMENTS OF THE PATENT SYSTEM 230
14.1 INTRODUCTION 230
14.2 PATENTS IN THE INTERNATIONAL ARENA 231
14.3 THE PATENT CO-OPERATION TREATY 231
14.4 THE EUROPEAN PATENT CONVENTION 232
14.5 THE UNITARY PATENT 233
14.6 INTELLECTUAL PROPERTY IN THE GATS AND WTO 234
14.7 REQUIREMENTS FOR PATENTABILITY 235
14.7.1 NOVELTY 235
14.7.2 INVENTIVE STEP 236
14.7.3 CAPACITY FOR INDUSTRIAL APPLICATION 237
14.7.4 MATTERS EXCLUDED FROM PATENT PROTECTION 238
14.8 PATENTING SOFTWARE 239
14.9 THEPROCESSOFOBTAININGANDENFORCINGAPATENT 240
14.9.1 THE APPLICATION 240
14.9.2 SPECIFICATION AND STATEMENT OF CLAIM 240
14.9.3 PRELIMINARY EXAMINATION 241
14.9.4 SUBSTANTIVE EXAMINATION 241
14.9.5 AWARD OF A PATENT 242
DETAILED CONTENTS XVII
14.10 INFRINGEMENT OF PATENTS 242
14.11 REMEDIES FOR INFRINGEMENT OF A PATENT 243
14.12 REVOCATION OF A PATENT 243
14.13 CONCLUSIONS 244
15 SOFTWARE PATENTS 246
15.1 INTRODUCTION 246
15.2 THE QUEST FOR A TECHNICAL CONTRIBUTION 246
15.3 PATENTS AND THE INTERNET 254
15.4 WHO GETS PATENTS? 255
15.5 THE SOFTWARE PATENT WARS 255
15.6 PATENT TROLLS 256
15.7 STANDARD ESSENTIAL PATENTS 256
15.8 STANDARD ESSENTIAL PATENTS (SEPS) AND INTELLECTUAL PROPERTY 259
15.9 FRAND TERMS 261
15.10 SEPS BEFORE THE COURTS 263
15.11 WHERE NEXT FOR STANDARD ESSENTIAL PATENTS? 268
15.12 CONCLUSIONS 270
16 COPYRIGHT PROTECTION 271
16.1 INTRODUCTION 271
16.2 COPYRIGHT BASICS 271
16.3 FORMS OF PROTECTED WORK 273
16.3.1 THE REQUIREMENT OF ORIGINALITY 274
16.4 OWNERSHIP OF COPYRIGHT 275
16.4.1 EMPLOYEE-CREATED WORKS 275
16.4.2 COMPUTER-GENERATED WORKS 275
16.5 DURATION OF COPYRIGHT 276
16.6 INFRINGEMENT OF COPYRIGHT 277
16.6.1 THE NATURE OF REPRODUCTION 277
16.6.2 TEMPORARY REPRODUCTION 278
16.7 COMMUNICATION TO THE PUBLIC 281
16.8 THE LEGITIMACY OF PRIVATE COPYING 284
16.9 FAIRAND UNFAIR USE OF AN EARLIER WORK 286
16.10 OTHER RIGHTS BELONGING TO THE COPYRIGHT OWNER 288
16.10.1 COMMUNICATION TO THE PUBLIC 288
16.10.2 TO PERFORM, SHOW, OR PLAY THE WORK IN PUBLIC 289
16.10.3 TO BROADCAST THE WORK OR INCLUDE IT IN A CABLE PROGRAMME SERVICE
289
16.10.4 TO MAKE AN ADAPTATION OF THE WORK 289
16.11 THE DEVELOPMENT OF SOFTWARE COPYRIGHT 290
16.12 APPLYING COPYRIGHT PRINCIPLES TO SOFTWARE 291
16.13 SOFTWARE PIRACY 292
16.14 USER RIGHTS IN RESPECT OF SOFTWARE 293
XVIII DETAILED CONTENTS
16.15 FAIR DEALING 293
16.16 A USE RIGHT FOR SOFTWARE? 294
16.17 ERROR CORRECTION 296
16.18 BACK-UP COPIES 296
16.19 CACHING 297
16.20 COPY PROTECTION AND DIGITAL RIGHTS MANAGEMENT 298
16.21 REVERSE ENGINEERING AND DECOMPILATION 299
16.22 REVERSE ENGINEERING AND COMPUTER PROGRAMS 303
16.23 LITERAL AND NON-LITERAL COPYING 305
16.24 THE RISE AND FALL OF LOOK-AND-FEEL PROTECTION 306
16.25 THE COMPUTERISED PHARMACIST 307
16.26 AGRICULTURAL SOFTWARE 309
16.27 FINANCIAL MARKETS 310
16.28 ARM'S LENGTH REPRODUCTION 312
16.29 COMPUTER PROGRAMS AS VISUAL WORKS 315
16.30 NEW DIRECTIONS IN UK COPYRIGHT LAW 317
16.31 ORPHAN WORKS 317
16.32 HARVESTING THE INTERNET 318
16.33 CONCLUSIONS 319
17 ENFORCEMENT ISSUES 321
17.1 INTRODUCTION 321
17.2 THE DIRECTIVE ON COPYRIGHT IN THE INFORMATION SOCIETY 321
17.3 ENFORCEMENT OF COPYRIGHT 323
17.4 ACCOUNTING OF PROFITS 324
17.5 DELIVERY UP 324
17.6 FOLLOW THE MONEY 325
17.7 BLOCKING ORDERS 325
17.7.1 TWENTIETH CENTURY FOX V SKY UK AND BT (AND ORS) 327
17.8 BLOCKING ORDERS AND TRADE MARKS 329
17.8.1 LEGAL BASIS 331
17.9 DURATION OF INJUNCTIONS 331
17.10 COST ISSUES 332
17.11 NORWICH PHARMACAL ORDERS AND THREATS OF LITIGATION 333
17.12 CONCLUSIONS 334
18 PROTECTION OF DATABASES 337
18.1 INTRODUCTION 337
18.2 WHAT IS A DATABASE? 338
18.2.1 EXAMPLES OF DATABASES 338
18.3 DATABASES AND NEW TECHNOLOGY 339
18.4 TRADITIONAL FORMS OF PROTECTION FOR DATABASES 340
DETAILED CONTENTS XIX
18.5 THE 'SWEAT OF THE BROW' DOCTRINE 341
18.6 THE DATABASE REGIME 344
18.6.1 COPYRIGHT AND DATABASES 344
18.6.2 LICENSING AND DATABASES 345
18.6.3 OTHER COPYRIGHT CHANGES 346
18.7 THE DATABASE RIGHT 346
18.7.1 DURATION OF THE RIGHT 347
18.8 THE DATABASE RIGHT IN THE COURTS 348
18.8.1 FOOTBALL FIXTURE LISTS 351
18.9 HOW MUCH IS TOO MUCH? 352
18.10 CONCLUSIONS 354
19 DESIGN RIGHTS 356
19.1 INTRODUCTION 356
19.2 THE DEVELOPMENT OF DESIGN RIGHTAND KEY LEGISLATIVE INSTRUMENTS 356
19.3 REGISTERED DESIGN RIGHT PROTECTION 358
19.4 UNREGISTERED DESIGN RIGHT 359
19.5 DESIGN RIGHTS IN TABLET COMPUTERS 359
19.6 CONCLUSIONS 363
20 TRADE MARK ISSUES 364
20.1 INTRODUCTION 364
20.2 EFFECT OF TRADE MARKS 365
20.3 PASSING OFF 366
20.4 INTERNET MARKET PLACES AND TRADE MARKS 366
20.5 INTERFLORA V MARKS AND SPENCER AND GOOGLE 369
20.6 CARTIER AND OTHERS V BRITISH SKY BROADCASTING AND OTHERS 373
20.7 CONCLUSIONS 376
21 INTERNET DOMAIN NAMES 377
21.1 INTRODUCTION 377
21.2 NAMES AND NUMBERS 377
21.3 INTERNET ADDRESSES AND URLS 378
21.4 THENATUREOF DOMAIN NAMES 378
21.5 TOP-LEVEL (GLOBAL OR GENERIC) DOMAIN NAMES 379
21.6 A BRIEF HISTORY OF INTERNET GOVERNANCE 379
21.7 THEFUTUREOF ICANN AND INTERNET GOVERNANCE 381
21.8 SECOND (COUNTRY) LEVEL DOMAINS 382
21.9 THE REVISED DOMAIN NAME STRUCTURE 384
21.10 THE TOP-LEVEL DOMAIN APPLICATION PROCESS 385
21.11 THE UNIFORM DISPUTE RESOLUTION RULES 386
21.12 ARBITRATION DECISIONS 387
21.13 CONCLUSIONS 388
XX DETAILED CONTENTS
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 393
22.1 INTRODUCTION 393
22.2 INTERNATIONAL INITIATIVES 394
22.3 KEY LEGAL INSTRUMENTS 395
22.3.1 THE DISTANCE SELLING DIRECTIVE 395
22.3.2 THE ELECTRONIC COMMERCE DIRECTIVE AND REGULATIONS 397
22.3.3 DEFENCES PROVIDED TO INFORMATION SERVICE PROVIDERS 399
22.4 SUBSTANTIVE PROVISIONS IN THE DIRECTIVE 401
22.4.1 WHEN AND WHERE IS A CONTRACT MADE? 401
22.4.2 CHOICE-OF-LAW ISSUES 404
22.5 ALTERNATIVE DISPUTE RESOLUTION 405
22.6 CONCLUSIONS 406
23 ELECTRONIC MONEY 407
23.1 INTRODUCTION 407
23.2 THE NATURE OF MONEY 408
23.3 LEGAL TENDER AND THE CASHLESS SOCIETY 410
23.4 THE EMERGENCE OF CRYPTOCURRENCY 411
23.5 ISSUES WITH CRYPTOCURRENCY 413
23.6 BLOCKCHAIN 413
23.7 THE FUTURE OF CRYPTOCURRENCY 414
23.8 REGULATION OFTHE E-MONEY SECTOR 416
23.9 THE NATURE OF E-MONEY 417
23.10 E-MONEY ISSUERS AND SMALL E-MONEY ISSUERS 417
23.11 CRITERIA FOR ADMISSION TO THE REGISTER 418
23.11.1 SAFEGUARDING ARRANGEMENTS 418
23.11.2 PASSPORT RIGHTS 418
23.12 PEER-TO-PEER LENDING 418
23.13 CROWDFUNDING 420
23.14 CONCLUSIONS 424
24 CONTRACTUAL ISSUES 425
24.1 INTRODUCTION 425
24.2 LIABILITY AND SOFTWARE 425
24.3 FORMS OF SOFTWARE 426
24.4 THE LEGAL STATUS OF SOFTWARE AND SOFTWARE CONTRACTS 426
24.5 IMPLIED TERMS IN SOFTWARE CONTRACTS 429
24.5.1 TITLE IN SOFTWARE 430
24.5.2 DESCRIPTION 430
24.5.3 QUALITY 431
DETAILED CONTENTS XXI
24.6 REMEDIES FOR BREACH OF THE IMPLIED TERMS 433
24.7 SOFTWARE QUALITY AND THE COURTS 435
24.7.1 QUESTIONS OF TIME 435
24.7.2 PROBLEMS WITH THE COMMUNITY CHARGE 437
24.7.3 WATER PRIVATISATION 439
24.7.4 THE MONDAY SOFTWARE PACKAGE 440
24.7.5 THE DOG WITH AN MBA 443
24.8 EXCLUSION OR LIMITATION OF LIABILITY 445
24.8.1 ENFORCEABILITY OF SHRINK-WRAP LICENCES 446
24.9 CONSUMER CONTRACTS 447
24.10 NON-CONSUMER CONTRACTS 448
24.10.1 THE REQUIREMENT OF REASONABLENESS 450
24.11 TOWARDS FAIR DEALING OBLIGATIONS IN CONTRACTUAL RELATIONSHIPS? 453
24.12 THE CONSUMER RIGHTS ACT 2015 456
24.13 QUESTIONS OF TIME 458
24.14 EXCLUSION OF LIABILITY 461
24.15 CONCLUSIONS 462
INDEX 467 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Lloyd, Ian J. 1955- |
author_GND | (DE-588)12918893X |
author_facet | Lloyd, Ian J. 1955- |
author_role | aut |
author_sort | Lloyd, Ian J. 1955- |
author_variant | i j l ij ijl |
building | Verbundindex |
bvnumber | BV046880454 |
callnumber-first | K - Law |
callnumber-label | KD667 |
callnumber-raw | KD667.C65 |
callnumber-search | KD667.C65 |
callnumber-sort | KD 3667 C65 |
callnumber-subject | KD - United Kingdom and Ireland |
classification_tum | JUR 786 JUR 038 |
ctrlnum | (OCoLC)1156627021 (DE-599)BVBBV046880454 |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
edition | Ninth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02000nam a2200493 c 4500</leader><controlfield tag="001">BV046880454</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200921 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200902s2020 xxk |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198830559</subfield><subfield code="9">978-0-19-883055-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1156627021</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046880454</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KD667.C65</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">JUR 786</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">JUR 038</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lloyd, Ian J.</subfield><subfield code="d">1955-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)12918893X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology law</subfield><subfield code="c">Ian J. Lloyd, formerly Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Ninth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xl, 483 Seiten</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Großbritannien</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032290464&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032290464</subfield></datafield></record></collection> |
geographic | Großbritannien Großbritannien (DE-588)4022153-2 gnd |
geographic_facet | Großbritannien |
id | DE-604.BV046880454 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:18:08Z |
indexdate | 2024-07-10T08:56:24Z |
institution | BVB |
isbn | 9780198830559 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032290464 |
oclc_num | 1156627021 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-M382 |
owner_facet | DE-91 DE-BY-TUM DE-M382 |
physical | xl, 483 Seiten 25 cm |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Oxford University Press |
record_format | marc |
spelling | Lloyd, Ian J. 1955- Verfasser (DE-588)12918893X aut Information technology law Ian J. Lloyd, formerly Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania Ninth edition Oxford Oxford University Press [2020] xl, 483 Seiten 25 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Recht (DE-588)4048737-4 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Großbritannien Großbritannien (DE-588)4022153-2 gnd rswk-swf Großbritannien (DE-588)4022153-2 g Informationstechnik (DE-588)4026926-7 s Recht (DE-588)4048737-4 s DE-604 SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032290464&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lloyd, Ian J. 1955- Information technology law Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Recht (DE-588)4048737-4 gnd Informationstechnik (DE-588)4026926-7 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4026926-7 (DE-588)4022153-2 |
title | Information technology law |
title_auth | Information technology law |
title_exact_search | Information technology law |
title_exact_search_txtP | Information technology law |
title_full | Information technology law Ian J. Lloyd, formerly Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
title_fullStr | Information technology law Ian J. Lloyd, formerly Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
title_full_unstemmed | Information technology law Ian J. Lloyd, formerly Senior Specialist, HSU, National Research University, Russian Federation and Visiting Professor, Open University of Tanzania |
title_short | Information technology law |
title_sort | information technology law |
topic | Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Recht (DE-588)4048737-4 gnd Informationstechnik (DE-588)4026926-7 gnd |
topic_facet | Recht Computers Law and legislation Great Britain Computer crimes Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Informationstechnik Großbritannien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032290464&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lloydianj informationtechnologylaw |