LawCite Search | LawCite Markup Tool | Help | Feedback

Law
Cite


Cases matching this search | Law Reform Reports matching this search | Law Journal Articles matching this search

Help
Show filtered results

Matching Law Journal Articles: 81

Journal Article Title Citation(s) Author Jurisdiction Date Full Text Citation Index † 
Japan's New Privacy Legislation: Are You Ready? ’ (2004) 20 Computer Law & Security Report 200 Computer Law & Security Report Australia circa 2004 flag 1
(2004) 20 Computer Law & Security Report 175 (2004) 20 Computer Law & Security Report 175 Computer Law & Security Report Australia circa 2004 flag 1
"Regulation of electronic communications networks and services in the Uk — Part Ii" (2004) 20 Computer Law & Security Review 4 Andrew Sharpe Netherlands circa 2004 flag
"Business Implications of Anti-Circumvention Legislation & Recommendations for Copyright Users" (2004) 20 Computer Law & Security Report 445 Tian, G Australia circa 2004 flag
"Uk implementation of the Copyright in the Information Society Directive" (2004) 20 Computer Law & Security Review 17 Trevor Cook Netherlands circa 2004 flag
"Data protection: Multi-application smart cards: the use of global unique identifiers for cross-profiling purposes - Part Ii: towards a privacy enhancing smart card engineering" (2004) 20 Computer Law & Security Review 22 Jean-Marc Dinant, Ewout Keuleers Netherlands circa 2004 flag
"Draft directive on the patentability of computer-implemented inventions: The European Parliament's amendments - have the proposals been wrecked?" (2004) 20 Computer Law & Security Review 12 Alexander Batteson Netherlands circa 2004 flag
"Dual encryption and plausible deniability" (2004) 20 Computer Law & Security Review 37 Derrick Grover Netherlands circa 2004 flag
"Penetration testing — the legal implications" (2004) 20 Computer Law & Security Review 41 Marc Dautlich Netherlands circa 2004 flag
"Identity fraud as a challenge to the constitutional state[]" (2004) 20 Computer Law & Security Review 29 Jan Grijpink Netherlands circa 2004 flag
"Distance marketing of financial services — the regulatory mire" (2004) 20 Computer Law & Security Review 53 Phillip Rees Netherlands circa 2004 flag
"An introduction to charging mechanisms in It procurements" (2004) 20 Computer Law & Security Review 57 Justin Harrington Netherlands circa 2004 flag
"Towards legal programming: The incorporation of legal criteria in software agent design - Current proposals and future prospects" (2004) 20 Computer Law & Security Review 44 Malcolm Bain, Brian Subirana Netherlands circa 2004 flag
"News and comment on recent developments from around the world" (2004) 20 Computer Law & Security Review 65 Stephen Saxby Netherlands circa 2004 flag
"Distance selling comes of age" (2004) 20 Computer Law & Security Review 83 Stephen Saxby Netherlands circa 2004 flag
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" (2004) 20 Computer Law & Security Review 61 David Halliday, Miriam Andrews, Jo McGarvey, Kate Stephen Netherlands circa 2004 flag
"The airline passenger data disclosure case and the Eu-Us debate" (2004) 20 Computer Law & Security Review 98 María Verónica Pérez Asinari, Yves Poullet Netherlands circa 2004 flag
"Developments in electronic contract laws: A Malaysian perspective" (2004) 20 Computer Law & Security Review 117 Md Abdul Jalil, Leo D Pointon Netherlands circa 2004 flag
"Going for the throat: Carnivore in an Echelon world - Part Ii" (2004) 20 Computer Law & Security Review 84 Talitha Nabbali, Mark Perry Netherlands circa 2004 flag
"Implementation of the e-Privacy Directive in the Uk – understanding the new rules" (2004) 20 Computer Law & Security Review 127 Colleen Donovan Netherlands circa 2004 flag
"Durant v Fsa – Court of Appeal's radical judgment on the Data Protection Act" (2004) 20 Computer Law & Security Review 133 Marcus Turle Netherlands circa 2004 flag
"Cybersecurity – the Ctose project" (2004) 20 Computer Law & Security Review 125 Paul Mann Netherlands circa 2004 flag
"Baker & McKenzie's annual review of developments in Eu law relating to Ip, It & telecommunications" (2004) 20 Computer Law & Security Review 139 Miriam Andrews, David Halliday, Steve Holmes Netherlands circa 2004 flag
"News and comment on recent developments from around the world" (2004) 20 Computer Law & Security Review 146 Stephen Saxby Netherlands circa 2004 flag
"Zeta-Jones – so what's the damage?" (2004) 20 Computer Law & Security Review 137 Cameron Craig Netherlands circa 2004 flag
"Validating identity for the electronic environment[]" (2004) 20 Computer Law & Security Review 164 Stephen Mason Netherlands circa 2004 flag
"Internet break-ins: new legal liability" (2004) 20 Computer Law & Security Review 171 Benjamin Wright Netherlands circa 2004 flag
"Eu gets tough on intellectual property piracy" (2004) 20 Computer Law & Security Review 163 Stephen Saxby Netherlands circa 2004 flag
"International data transfers between the United States and the European Union: are the procedural provisions of the Safe Harbor solution adequate?" (2004) 20 Computer Law & Security Review 182 Alexander Zinser Netherlands circa 2004 flag
"The DaimlerChrysler codes of conduct: the ideal way for global companies to export personal data from Germany to countries outside the Eu/Eea?" (2004) 20 Computer Law & Security Review 185 Hans-Werner Moritz Netherlands circa 2004 flag
"The Court of Appeal's interpretation of “personal data” in Durant v Fsa – a welcome clarification, or a cat amongst the data protection pigeons?" (2004) 20 Computer Law & Security Review 175 Simon Chalton Netherlands circa 2004 flag
"Japan's new privacy legislation: are you ready?" (2004) 20 Computer Law & Security Review 200 Joanne Harland Netherlands circa 2004 flag
"“The voice of reason” … finding middle ground in It contracts" (2004) 20 Computer Law & Security Review 204 Kit Burden Netherlands circa 2004 flag
"Access to communications data by public authorities" (2004) 20 Computer Law & Security Review 194 Abu Bakar Munir, Siti Hajar Mohd Yasin Netherlands circa 2004 flag
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" (2004) 20 Computer Law & Security Review 213 David Halliday, Miriam Andrews, Jonathan Sharp, Lily Williams, Harry Small, Don Jerrard Netherlands circa 2004 flag
"News and comment on recent developments from around the world" (2004) 20 Computer Law & Security Review 219 Stephen Saxby Netherlands circa 2004 flag
"The problem of spam law: a comment on the Malaysian communications and multimedia commission's discussion paper on regulating unsolicited commercial messages" (2004) 20 Computer Law & Security Review 206 Dennis W K Khong Netherlands circa 2004 flag
"Internet Service Providers (Isps) and their responsibility for content under the new French legal regime" (2004) 20 Computer Law & Security Review 268 David Taylor Netherlands circa 2004 flag
"Software licensing under the competition law spotlight – the new technology transfer block exemption" (2004) 20 Computer Law & Security Review 273 Mark Turner, Dominic Callaghan Netherlands circa 2004 flag
"Planning for digital television services gathers pace" (2004) 20 Computer Law & Security Review 267 Stephen Saxby Netherlands circa 2004 flag
"The protection of databases under Us and Eu law – Sui generis right as an appropriate concept? – Part I – Us law" (2004) 20 Computer Law & Security Review 288 Jörg Hladjk Netherlands circa 2004 flag
"PayPal: the legal status of C2C payment systems" (2004) 20 Computer Law & Security Review 293 Andrés Guadamuz González Netherlands circa 2004 flag
"Towards digital rights and exemptions management systems" (2004) 20 Computer Law & Security Review 281 Thierry Maillard, Teddy Furon Netherlands circa 2004 flag
"Data protection and business sales – risks and solutions?" (2004) 20 Computer Law & Security Review 306 Nick Graham Netherlands circa 2004 flag
"Lessons learned from the Italian law on privacy – Part I" (2004) 20 Computer Law & Security Review 310 Pierluigi Perri, Stefano Zanero Netherlands circa 2004 flag
"It is impossible to control information by law, but the law can control the way people use information" (2004) 20 Computer Law & Security Review 300 Simon Chalton Netherlands circa 2004 flag
"Personal data and ancillary information" (2004) 20 Computer Law & Security Review 317 Colleen Donovan Netherlands circa 2004 flag
"Windows v Lindows – have Microsoft won the battle only to lose the war?" (2004) 20 Computer Law & Security Review 321 Abida Chaudri, Ville Patja Netherlands circa 2004 flag
"Press reigned in by House of Lords decision" (2004) 20 Computer Law & Security Review 314 Marcus Turle Netherlands circa 2004 flag
"News and comment on recent developments from around the world" (2004) 20 Computer Law & Security Review 332 Stephen Saxby Netherlands circa 2004 flag
"Data protection law under scrutiny" (2004) 20 Computer Law & Security Review 355 Stephen Saxby Netherlands circa 2004 flag
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" (2004) 20 Computer Law & Security Review 324 David Halliday, Miriam Andrews, Robert Coffey, Jonathan Sharp, Lily Williams Netherlands circa 2004 flag
"Using technology to protect copyright works" (2004) 20 Computer Law & Security Review 364 David Bainbridge Netherlands circa 2004 flag
"Airline passengers' data: adoption of an adequacy decision by the European Commission How will the story end?" (2004) 20 Computer Law & Security Review 370 María Verónica Pérez Asinari, Yves Poullet Netherlands circa 2004 flag
"Is further legislation really necessary to level the playing field? A Uk perspective" (2004) 20 Computer Law & Security Review 356 Will James, Joel Smith, Herbert Smith Netherlands circa 2004 flag
"Lessons learned from the Italian law on privacy – Part Ii" (2004) 20 Computer Law & Security Review 384 Pierluigi Perri, Stefano Zanero Netherlands circa 2004 flag
"The world's current legislative efforts against cyber crime" (2004) 20 Computer Law & Security Review 390 Nick Nykodym, Robert Taylor Netherlands circa 2004 flag
"The protection of databases under Eu and Us law – the sui generis right as an appropriate concept? Part Ii" (2004) 20 Computer Law & Security Review 377 Jörg Hladjk Netherlands circa 2004 flag
"When it is and isn't mobile" (2004) 20 Computer Law & Security Review 400 Alice Hardy, Heather Rowe Netherlands circa 2004 flag
"Metatags and banner advertisements – do they infringe trade mark rights?" (2004) 20 Computer Law & Security Review 402 Abida Chaudri Netherlands circa 2004 flag
"Who bears the risk of mistake?" (2004) 20 Computer Law & Security Review 396 Ter Kah Leng Netherlands circa 2004 flag
"Sports body scores victory – Morris Communications Corp. v. Pga Tour (11thCir. Ca)" (2004) 20 Computer Law & Security Review 408 Satish Khandke Netherlands circa 2004 flag
"Baker & McKenzie's regular article tracking developments in Eu law relating to Ip, It & telecommunications" (2004) 20 Computer Law & Security Review 411 David Halliday, Miriam Andrews, Emily Keim, Amit Khanna, Harry Small Netherlands circa 2004 flag
"Database rights: The Advocate General issues her opinion in British Horseracing Board v William Hill" (2004) 20 Computer Law & Security Review 405 Charlie Everitt Netherlands circa 2004 flag
"Exploiting holes in software security: The Shellcoder's Handbook – Discovery and exploiting security holes" (2004) 20 Computer Law & Security Review 430 Koziol, Litchfield, Aitel, Anley, Eren, Mehta, Hassell Netherlands circa 2004 flag
"Security in data communications: Security in Fixed and Wireless Networks – An introduction to securing data communications" (2004) 20 Computer Law & Security Review 431 Gunter Schafer Netherlands circa 2004 flag
"News and comment on recent developments from around the world" (2004) 20 Computer Law & Security Review 415 Stephen Saxby Netherlands circa 2004 flag
"Authorship and authenticity in cyberspace" (2004) 20 Computer Law & Security Review 436 Patricia Akester Netherlands circa 2004 flag
"Business implications of anti-circumvention legislation and recommendations" (2004) 20 Computer Law & Security Review 445 YiJun Tian (George) Netherlands circa 2004 flag
"Eu sets out plans for Europe's information economy" (2004) 20 Computer Law & Security Review 435 Stephen Saxby Netherlands circa 2004 flag
"Allocating risk in It contracts: A review of the case law on the enforceability of limitations and exclusions under the Unfair Contract Terms Act 1977" (2004) 20 Computer Law & Security Review 466 Paul O'Hare Netherlands circa 2004 flag
"Recent international attempts to can spam" (2004) 20 Computer Law & Security Review 472 Tania SL Cheng Netherlands circa 2004 flag
"Searching for trouble – keyword advertising and trade mark infringement" (2004) 20 Computer Law & Security Review 453 Nicholas Tyacke, Rohan Higgins Netherlands circa 2004 flag
"Compulsory licences of Ip rights: easier to get after the Ims health decision?" (2004) 20 Computer Law & Security Review 482 Pat Treacy, Thomas Heide Netherlands circa 2004 flag
"Data Protection and the retention of personal data – how long is too long?" (2004) 20 Computer Law & Security Review 486 Colleen Donovan Netherlands circa 2004 flag
"3G Licensing in China: a waiting game" (2004) 20 Computer Law & Security Review 480 Andrew McGinty, Donald Da Bona Netherlands circa 2004 flag
"News and comment on recent developments from around the world" (2004) 20 Computer Law & Security Review 493 Stephen Saxby Netherlands circa 2004 flag
"Copyright law: world copyright law" (2004) 20 Computer Law & Security Review 511 JAL Sterling Netherlands circa 2004 flag
"UK Implementation of the Copyright in the Information Society Directive" (2004) 20 Computer Law & Security Report 17 T Cook Australia circa 2004 flag
"It's an e-Xmas and a spam new year" (2004) 20 Computer Law & Security Review 3 Stephen Saxby Netherlands circa 2004 flag
"Baker & McKenzie's column tracking recent developments in Eu law relating to Ip, It & telecommunications" (2004) 20 Computer Law & Security Review 488 Harry Small, David Halliday, Miriam Andrews, Emily Keim, Robert Coffey Netherlands circa 2004 flag

LawCite: Privacy | Disclaimers | Conditions of Use | Acknowledgements | Feedback