Information Technology and Traditional Legal Concepts
portes grátis
Information Technology and Traditional Legal Concepts
Jones, Richard; Moore, Roksana
Taylor & Francis Ltd
10/2024
176
Mole
9781032928913
15 a 20 dias
Descrição não disponível.
1. Introduction: An uncomfortable marriage: The challenges 'new' technology is posing to 'old' or established legal concepts? Richard Jones and Roksana Moore
2. Law shaping technology: Technology shaping the law David Flint
3. Protecting 'privacy' through control of 'personal' data processing: A flawed approach Karen McCullagh
4. Is it possible to define 'privacies' within the law? Reflections on the 'securitisation' debate and the interception of communications Dan Ritchie
5. Children's data protection vs marketing companies Emmanuelle Bartoli
6. The UK 2007-2008 data protection fiasco: Moving on from bad policy and bad law? Joseph A. Cannataci and Jeanne Pia Mifsud Bonnici
7. Is identity theft really theft? Clare Sullivan
8. 'Spam, spam, spam, spam . . . Lovely spam!' Why is Bluespam different? Eleni Kosta, Peggy Valcke and David Stevens
9. Agents, Trojans and tags: The next generation of investigators Wiebke Abel
10. Technology and the cultural appropriation of music Richard Jones
11. Decentralised P2P technology: Can the unruly be ruled? Hasina Haque
12. The future of copyright in the age of convergence: Is a new approach needed for the new media world? Neal Geach
13. Copyright, contract and the protection of computer programs Ruth Dawn Atkins
2. Law shaping technology: Technology shaping the law David Flint
3. Protecting 'privacy' through control of 'personal' data processing: A flawed approach Karen McCullagh
4. Is it possible to define 'privacies' within the law? Reflections on the 'securitisation' debate and the interception of communications Dan Ritchie
5. Children's data protection vs marketing companies Emmanuelle Bartoli
6. The UK 2007-2008 data protection fiasco: Moving on from bad policy and bad law? Joseph A. Cannataci and Jeanne Pia Mifsud Bonnici
7. Is identity theft really theft? Clare Sullivan
8. 'Spam, spam, spam, spam . . . Lovely spam!' Why is Bluespam different? Eleni Kosta, Peggy Valcke and David Stevens
9. Agents, Trojans and tags: The next generation of investigators Wiebke Abel
10. Technology and the cultural appropriation of music Richard Jones
11. Decentralised P2P technology: Can the unruly be ruled? Hasina Haque
12. The future of copyright in the age of convergence: Is a new approach needed for the new media world? Neal Geach
13. Copyright, contract and the protection of computer programs Ruth Dawn Atkins
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
data;protection;personal;subject;copyright;infringement;holder;secondary;computer;ePrivacy Directive;misuse;UK Information Commissioner;Interactive Computer Service Providers;Standard Investigation Method;Da Ta;UK Court;Inducement Theory;UK's Data Protection Act;AVMS Directive;DRM;Secondary Infringement;UK Law;Interactive Computer Service;DRM Technology;Creative Commons Approach;Home Town;CBS Song;Mandatory Self-regulation;UK Data Protection;Liability Regime;Secondary Liability;Decentralised P2P;Special Liability Regime;Current Liability Regime
1. Introduction: An uncomfortable marriage: The challenges 'new' technology is posing to 'old' or established legal concepts? Richard Jones and Roksana Moore
2. Law shaping technology: Technology shaping the law David Flint
3. Protecting 'privacy' through control of 'personal' data processing: A flawed approach Karen McCullagh
4. Is it possible to define 'privacies' within the law? Reflections on the 'securitisation' debate and the interception of communications Dan Ritchie
5. Children's data protection vs marketing companies Emmanuelle Bartoli
6. The UK 2007-2008 data protection fiasco: Moving on from bad policy and bad law? Joseph A. Cannataci and Jeanne Pia Mifsud Bonnici
7. Is identity theft really theft? Clare Sullivan
8. 'Spam, spam, spam, spam . . . Lovely spam!' Why is Bluespam different? Eleni Kosta, Peggy Valcke and David Stevens
9. Agents, Trojans and tags: The next generation of investigators Wiebke Abel
10. Technology and the cultural appropriation of music Richard Jones
11. Decentralised P2P technology: Can the unruly be ruled? Hasina Haque
12. The future of copyright in the age of convergence: Is a new approach needed for the new media world? Neal Geach
13. Copyright, contract and the protection of computer programs Ruth Dawn Atkins
2. Law shaping technology: Technology shaping the law David Flint
3. Protecting 'privacy' through control of 'personal' data processing: A flawed approach Karen McCullagh
4. Is it possible to define 'privacies' within the law? Reflections on the 'securitisation' debate and the interception of communications Dan Ritchie
5. Children's data protection vs marketing companies Emmanuelle Bartoli
6. The UK 2007-2008 data protection fiasco: Moving on from bad policy and bad law? Joseph A. Cannataci and Jeanne Pia Mifsud Bonnici
7. Is identity theft really theft? Clare Sullivan
8. 'Spam, spam, spam, spam . . . Lovely spam!' Why is Bluespam different? Eleni Kosta, Peggy Valcke and David Stevens
9. Agents, Trojans and tags: The next generation of investigators Wiebke Abel
10. Technology and the cultural appropriation of music Richard Jones
11. Decentralised P2P technology: Can the unruly be ruled? Hasina Haque
12. The future of copyright in the age of convergence: Is a new approach needed for the new media world? Neal Geach
13. Copyright, contract and the protection of computer programs Ruth Dawn Atkins
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
data;protection;personal;subject;copyright;infringement;holder;secondary;computer;ePrivacy Directive;misuse;UK Information Commissioner;Interactive Computer Service Providers;Standard Investigation Method;Da Ta;UK Court;Inducement Theory;UK's Data Protection Act;AVMS Directive;DRM;Secondary Infringement;UK Law;Interactive Computer Service;DRM Technology;Creative Commons Approach;Home Town;CBS Song;Mandatory Self-regulation;UK Data Protection;Liability Regime;Secondary Liability;Decentralised P2P;Special Liability Regime;Current Liability Regime