LawCite Search |
LawCite Markup Tool |
Help |
Feedback
Law Cite |
Journal Article Title | Citation(s) | Author | Jurisdiction | Date | Full Text | Citation Index † | |
Japan's New Privacy Legislation: Are You Ready? ’ | (2004) 20 Computer Law & Security Report 200 | Computer Law & Security Report | Australia | circa 2004 |
|
||
(2004) 20 Computer Law & Security Report 175 | (2004) 20 Computer Law & Security Report 175 | Computer Law & Security Report | Australia | circa 2004 |
|
||
"Regulation of electronic communications networks and services in the Uk — Part Ii" | (2004) 20 Computer Law & Security Review 4 | Andrew Sharpe | Netherlands | circa 2004 |
|
||
"Business Implications of Anti-Circumvention Legislation & Recommendations for Copyright Users" | (2004) 20 Computer Law & Security Report 445 | Tian, G | Australia | circa 2004 |
|
||
"Uk implementation of the Copyright in the Information Society Directive" | (2004) 20 Computer Law & Security Review 17 | Trevor Cook | Netherlands | circa 2004 |
|
||
"Data protection: Multi-application smart cards: the use of global unique identifiers for cross-profiling purposes - Part Ii: towards a privacy enhancing smart card engineering" | (2004) 20 Computer Law & Security Review 22 | Jean-Marc Dinant, Ewout Keuleers | Netherlands | circa 2004 |
|
||
"Draft directive on the patentability of computer-implemented inventions: The European Parliament's amendments - have the proposals been wrecked?" | (2004) 20 Computer Law & Security Review 12 | Alexander Batteson | Netherlands | circa 2004 |
|
||
"Dual encryption and plausible deniability" | (2004) 20 Computer Law & Security Review 37 | Derrick Grover | Netherlands | circa 2004 |
|
||
"Penetration testing — the legal implications" | (2004) 20 Computer Law & Security Review 41 | Marc Dautlich | Netherlands | circa 2004 |
|
||
"Identity fraud as a challenge to the constitutional state[]" | (2004) 20 Computer Law & Security Review 29 | Jan Grijpink | Netherlands | circa 2004 |
|
||
"Distance marketing of financial services — the regulatory mire" | (2004) 20 Computer Law & Security Review 53 | Phillip Rees | Netherlands | circa 2004 |
|
||
"An introduction to charging mechanisms in It procurements" | (2004) 20 Computer Law & Security Review 57 | Justin Harrington | Netherlands | circa 2004 |
|
||
"Towards legal programming: The incorporation of legal criteria in software agent design - Current proposals and future prospects" | (2004) 20 Computer Law & Security Review 44 | Malcolm Bain, Brian Subirana | Netherlands | circa 2004 |
|
||
"News and comment on recent developments from around the world" | (2004) 20 Computer Law & Security Review 65 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Distance selling comes of age" | (2004) 20 Computer Law & Security Review 83 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" | (2004) 20 Computer Law & Security Review 61 | David Halliday, Miriam Andrews, Jo McGarvey, Kate Stephen | Netherlands | circa 2004 |
|
||
"The airline passenger data disclosure case and the Eu-Us debate" | (2004) 20 Computer Law & Security Review 98 | María Verónica Pérez Asinari, Yves Poullet | Netherlands | circa 2004 |
|
||
"Developments in electronic contract laws: A Malaysian perspective" | (2004) 20 Computer Law & Security Review 117 | Md Abdul Jalil, Leo D Pointon | Netherlands | circa 2004 |
|
||
"Going for the throat: Carnivore in an Echelon world - Part Ii" | (2004) 20 Computer Law & Security Review 84 | Talitha Nabbali, Mark Perry | Netherlands | circa 2004 |
|
||
"Implementation of the e-Privacy Directive in the Uk – understanding the new rules" | (2004) 20 Computer Law & Security Review 127 | Colleen Donovan | Netherlands | circa 2004 |
|
||
"Durant v Fsa – Court of Appeal's radical judgment on the Data Protection Act" | (2004) 20 Computer Law & Security Review 133 | Marcus Turle | Netherlands | circa 2004 |
|
||
"Cybersecurity – the Ctose project" | (2004) 20 Computer Law & Security Review 125 | Paul Mann | Netherlands | circa 2004 |
|
||
"Baker & McKenzie's annual review of developments in Eu law relating to Ip, It & telecommunications" | (2004) 20 Computer Law & Security Review 139 | Miriam Andrews, David Halliday, Steve Holmes | Netherlands | circa 2004 |
|
||
"News and comment on recent developments from around the world" | (2004) 20 Computer Law & Security Review 146 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Zeta-Jones – so what's the damage?" | (2004) 20 Computer Law & Security Review 137 | Cameron Craig | Netherlands | circa 2004 |
|
||
"Validating identity for the electronic environment[]" | (2004) 20 Computer Law & Security Review 164 | Stephen Mason | Netherlands | circa 2004 |
|
||
"Internet break-ins: new legal liability" | (2004) 20 Computer Law & Security Review 171 | Benjamin Wright | Netherlands | circa 2004 |
|
||
"Eu gets tough on intellectual property piracy" | (2004) 20 Computer Law & Security Review 163 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"International data transfers between the United States and the European Union: are the procedural provisions of the Safe Harbor solution adequate?" | (2004) 20 Computer Law & Security Review 182 | Alexander Zinser | Netherlands | circa 2004 |
|
||
"The DaimlerChrysler codes of conduct: the ideal way for global companies to export personal data from Germany to countries outside the Eu/Eea?" | (2004) 20 Computer Law & Security Review 185 | Hans-Werner Moritz | Netherlands | circa 2004 |
|
||
"The Court of Appeal's interpretation of “personal data” in Durant v Fsa – a welcome clarification, or a cat amongst the data protection pigeons?" | (2004) 20 Computer Law & Security Review 175 | Simon Chalton | Netherlands | circa 2004 |
|
||
"Japan's new privacy legislation: are you ready?" | (2004) 20 Computer Law & Security Review 200 | Joanne Harland | Netherlands | circa 2004 |
|
||
"“The voice of reason” … finding middle ground in It contracts" | (2004) 20 Computer Law & Security Review 204 | Kit Burden | Netherlands | circa 2004 |
|
||
"Access to communications data by public authorities" | (2004) 20 Computer Law & Security Review 194 | Abu Bakar Munir, Siti Hajar Mohd Yasin | Netherlands | circa 2004 |
|
||
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" | (2004) 20 Computer Law & Security Review 213 | David Halliday, Miriam Andrews, Jonathan Sharp, Lily Williams, Harry Small, Don Jerrard | Netherlands | circa 2004 |
|
||
"News and comment on recent developments from around the world" | (2004) 20 Computer Law & Security Review 219 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"The problem of spam law: a comment on the Malaysian communications and multimedia commission's discussion paper on regulating unsolicited commercial messages" | (2004) 20 Computer Law & Security Review 206 | Dennis W K Khong | Netherlands | circa 2004 |
|
||
"Internet Service Providers (Isps) and their responsibility for content under the new French legal regime" | (2004) 20 Computer Law & Security Review 268 | David Taylor | Netherlands | circa 2004 |
|
||
"Software licensing under the competition law spotlight – the new technology transfer block exemption" | (2004) 20 Computer Law & Security Review 273 | Mark Turner, Dominic Callaghan | Netherlands | circa 2004 |
|
||
"Planning for digital television services gathers pace" | (2004) 20 Computer Law & Security Review 267 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"The protection of databases under Us and Eu law – Sui generis right as an appropriate concept? – Part I – Us law" | (2004) 20 Computer Law & Security Review 288 | Jörg Hladjk | Netherlands | circa 2004 |
|
||
"PayPal: the legal status of C2C payment systems" | (2004) 20 Computer Law & Security Review 293 | Andrés Guadamuz González | Netherlands | circa 2004 |
|
||
"Towards digital rights and exemptions management systems" | (2004) 20 Computer Law & Security Review 281 | Thierry Maillard, Teddy Furon | Netherlands | circa 2004 |
|
||
"Data protection and business sales – risks and solutions?" | (2004) 20 Computer Law & Security Review 306 | Nick Graham | Netherlands | circa 2004 |
|
||
"Lessons learned from the Italian law on privacy – Part I" | (2004) 20 Computer Law & Security Review 310 | Pierluigi Perri, Stefano Zanero | Netherlands | circa 2004 |
|
||
"It is impossible to control information by law, but the law can control the way people use information" | (2004) 20 Computer Law & Security Review 300 | Simon Chalton | Netherlands | circa 2004 |
|
||
"Personal data and ancillary information" | (2004) 20 Computer Law & Security Review 317 | Colleen Donovan | Netherlands | circa 2004 |
|
||
"Windows v Lindows – have Microsoft won the battle only to lose the war?" | (2004) 20 Computer Law & Security Review 321 | Abida Chaudri, Ville Patja | Netherlands | circa 2004 |
|
||
"Press reigned in by House of Lords decision" | (2004) 20 Computer Law & Security Review 314 | Marcus Turle | Netherlands | circa 2004 |
|
||
"News and comment on recent developments from around the world" | (2004) 20 Computer Law & Security Review 332 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Data protection law under scrutiny" | (2004) 20 Computer Law & Security Review 355 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" | (2004) 20 Computer Law & Security Review 324 | David Halliday, Miriam Andrews, Robert Coffey, Jonathan Sharp, Lily Williams | Netherlands | circa 2004 |
|
||
"Using technology to protect copyright works" | (2004) 20 Computer Law & Security Review 364 | David Bainbridge | Netherlands | circa 2004 |
|
||
"Airline passengers' data: adoption of an adequacy decision by the European Commission How will the story end?" | (2004) 20 Computer Law & Security Review 370 | María Verónica Pérez Asinari, Yves Poullet | Netherlands | circa 2004 |
|
||
"Is further legislation really necessary to level the playing field? A Uk perspective" | (2004) 20 Computer Law & Security Review 356 | Will James, Joel Smith, Herbert Smith | Netherlands | circa 2004 |
|
||
"Lessons learned from the Italian law on privacy – Part Ii" | (2004) 20 Computer Law & Security Review 384 | Pierluigi Perri, Stefano Zanero | Netherlands | circa 2004 |
|
||
"The world's current legislative efforts against cyber crime" | (2004) 20 Computer Law & Security Review 390 | Nick Nykodym, Robert Taylor | Netherlands | circa 2004 |
|
||
"The protection of databases under Eu and Us law – the sui generis right as an appropriate concept? Part Ii" | (2004) 20 Computer Law & Security Review 377 | Jörg Hladjk | Netherlands | circa 2004 |
|
||
"When it is and isn't mobile" | (2004) 20 Computer Law & Security Review 400 | Alice Hardy, Heather Rowe | Netherlands | circa 2004 |
|
||
"Metatags and banner advertisements – do they infringe trade mark rights?" | (2004) 20 Computer Law & Security Review 402 | Abida Chaudri | Netherlands | circa 2004 |
|
||
"Who bears the risk of mistake?" | (2004) 20 Computer Law & Security Review 396 | Ter Kah Leng | Netherlands | circa 2004 |
|
||
"Sports body scores victory – Morris Communications Corp. v. Pga Tour (11thCir. Ca)" | (2004) 20 Computer Law & Security Review 408 | Satish Khandke | Netherlands | circa 2004 |
|
||
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" | (2004) 20 Computer Law & Security Review 411 | David Halliday, Miriam Andrews, Emily Keim, Amit Khanna, Harry Small | Netherlands | circa 2004 |
|
||
"Database rights: The Advocate General issues her opinion in British Horseracing Board v William Hill" | (2004) 20 Computer Law & Security Review 405 | Charlie Everitt | Netherlands | circa 2004 |
|
||
"Exploiting holes in software security: The Shellcoder's Handbook – Discovery and exploiting security holes" | (2004) 20 Computer Law & Security Review 430 | Koziol, Litchfield, Aitel, Anley, Eren, Mehta, Hassell | Netherlands | circa 2004 |
|
||
"Security in data communications: Security in Fixed and Wireless Networks – An introduction to securing data communications" | (2004) 20 Computer Law & Security Review 431 | Gunter Schafer | Netherlands | circa 2004 |
|
||
"News and comment on recent developments from around the world" | (2004) 20 Computer Law & Security Review 415 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Authorship and authenticity in cyberspace" | (2004) 20 Computer Law & Security Review 436 | Patricia Akester | Netherlands | circa 2004 |
|
||
"Business implications of anti-circumvention legislation and recommendations" | (2004) 20 Computer Law & Security Review 445 | YiJun Tian (George) | Netherlands | circa 2004 |
|
||
"Eu sets out plans for Europe's information economy" | (2004) 20 Computer Law & Security Review 435 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Allocating risk in It contracts: A review of the case law on the enforceability of limitations and exclusions under the Unfair Contract Terms Act 1977" | (2004) 20 Computer Law & Security Review 466 | Paul O'Hare | Netherlands | circa 2004 |
|
||
"Recent international attempts to can spam" | (2004) 20 Computer Law & Security Review 472 | Tania SL Cheng | Netherlands | circa 2004 |
|
||
"Searching for trouble – keyword advertising and trade mark infringement" | (2004) 20 Computer Law & Security Review 453 | Nicholas Tyacke, Rohan Higgins | Netherlands | circa 2004 |
|
||
"Compulsory licences of Ip rights: easier to get after the Ims health decision?" | (2004) 20 Computer Law & Security Review 482 | Pat Treacy, Thomas Heide | Netherlands | circa 2004 |
|
||
"Data Protection and the retention of personal data – how long is too long?" | (2004) 20 Computer Law & Security Review 486 | Colleen Donovan | Netherlands | circa 2004 |
|
||
"3G Licensing in China: a waiting game" | (2004) 20 Computer Law & Security Review 480 | Andrew McGinty, Donald Da Bona | Netherlands | circa 2004 |
|
||
"News and comment on recent developments from around the world" | (2004) 20 Computer Law & Security Review 493 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Copyright law: world copyright law" | (2004) 20 Computer Law & Security Review 511 | JAL Sterling | Netherlands | circa 2004 |
|
||
"UK Implementation of the Copyright in the Information Society Directive" | (2004) 20 Computer Law & Security Report 17 | T Cook | Australia | circa 2004 |
|
||
"It's an e-Xmas and a spam new year" | (2004) 20 Computer Law & Security Review 3 | Stephen Saxby | Netherlands | circa 2004 |
|
||
"Baker & McKenzie's column tracking recent developments in Eu law relating to Ip, It & telecommunications" | (2004) 20 Computer Law & Security Review 488 | Harry Small, David Halliday, Miriam Andrews, Emily Keim, Robert Coffey | Netherlands | circa 2004 |
|