Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This exceptional new text offers an up-to-date and integrated approach to communication law. Written by two practicing attorneys with extensive experience teaching the communication law course, Law for Advertising, Broadcasting, Journalism, and Public Relations covers the areas of communication law essential and most relevant for readers throughout the communication curriculum. Its integrated approach will serve students and practitioners in advertising and public relations as well as those in journalism and electronic media. Providing background to help readers understand legal concepts, this comprehensive communication law text includes an introduction to the legal system; covers legal procedures, structures, and jurisdictions; discusses the First Amendment and electronic media regulations; and considers issues of access. Additional material includes: *intellectual property law; *employment and agency law, with explanations of how these laws create obligations for mass communication professionals and their employees; *commercial communication laws; and *special laws and regulations that impact reporters, public relations practitioners, and advertisers who deal with stock sales. Special features of this text include: *Magic Words and Phrases--defining legal terms; *Cases--illustrating key points in each chapter; *Practice Notes--highlighting points of particular interest to professional media practices; *Instructions on finding and briefing cases, with a sample brief; and *Examples of legal documents and jury instructions. This text is intended as an introduction to communication law for students and practitioners in mass communication, journalism, advertising, broadcasting, telecommunications, and public relations.
Cyberspace, the electronic super-highway or the Internet, as it is most commonly known, is a globally-networked, computer-sustained, computer-accessed and computer-generated multidimensional virtual reality, the use of which is increasing at a tremendous rate. Although much has been written on the legal issues relating to this virtual reality, this book provides coverage of the private international aspects. The work aims to address two basic questions, namely, which court has jurisdiction and which law is to be applied when litigation arises from activity on the Internet? The book comprises seven key papers, presented at an international symposium organised by Utrecht University's Molengraaff Institute of Private Law and the Hague Conference on Private International Law, which was held in Utrecht in June 1997. The main topics covered include: the role of law in cyberspace; experiences in the field of intellectual property; can private international law provide order to the chaos?; problems concerning jurisdiction and applicable law; and conclusions and recommendations.
For the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct. The book addresses the international regulation of cryptography and digital signatures both in terms of confidentiality (cryptography used to keep secrets) and authentication (cryptography used to verify information). Coverage includes: a description of over 45 countries' policies and laws on cryptography import, export, and domestic controls and digital signature initiatives worldwide; a concise history of the cryptography debate in the United States from its beginnings after World War II to the recent debates over the Clipper Chip and key recovery encryption; and a presentation of the efforts of the United States government (and others) to build a new national consensus on regulation of encryption.
The metaverse seems to be on everybody's lips - and yet, very few people can actually explain what it means or why it is important. This book aims to fill the gap from an interdisciplinary perspective informed by law and media and communications studies. Going beyond the optimism emanating from technology companies and venture capitalists, the authors critically evaluate the antecedents and the building blocks of the metaverse, the design and regulatory challenges that need to be solved, and commercial opportunities that are yet to be fully realised. While the metaverse is poised to open new possibilities and perspectives, it will also be a dangerous place - one ripe with threats ranging from disinformation to intellectual property theft to sexual harassment. Hence, the book also offers a useful guide to the legal and political governance issues ahead while also contextualising them within the broader domain of governance and regulation of digital technologies.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.
This collection critically explores the use of financial technology (FinTech) and artificial intelligence (AI) in the financial sector and discusses effective regulation and the prevention of crime. Focusing on crypto-assets, InsureTech and the digitisation of financial dispute resolution, the book examines the strategic and ethical aspects of incorporating AI into the financial sector. The volume adopts a comparative legal approach to: critically evaluate the strategic and ethical benefits and challenges of AI in the financial sector; critically analyse the role, values and challenges of FinTech in society; make recommendations on protecting vulnerable customers without restricting financial innovation; and to make recommendations on effective regulation and prevention of crime in these areas. The book will be of interest to teachers and students of banking and financial regulation related modules, researchers in computer science, corporate governance, and business and economics. It will also be a valuable resource for policy makers including government departments, law enforcement agencies, financial regulatory agencies, people employed within the financial services sector, and professional services such as law, and technology.
This book demands that we question what we are told about security, using tools we have had for thousands of years. The work considers the history of security rhetoric in a number of distinct but related contexts, including the United States' security strategy, the "war" on Big Tech, and current concerns such as cybersecurity. Focusing on the language of security discourse, it draws common threads from the ancient world to the present day and the near future. The book grounds recent comparisons of Donald Trump to the Emperor Nero in a linguistic evidence base. It examines the potential impact on society of policy-makers' emphasis on the novelty of cybercrime, their likening of the internet to the Wild West, and their claims that criminals have "gone dark". It questions governments' descriptions of technology companies in words normally reserved for terrorists, and asks who might benefit. Interdisciplinary in approach, the book builds on existing literature in the Humanities and Social Sciences, most notably studies on rhetoric in Greco-Roman texts, and on the articulation of security concerns in law, international relations, and public policy contexts. It adds value to this body of research by offering new points of comparison, and a fresh but tried and tested way of looking at problems that are often presented as unprecedented. It will be essential to legal and policy practitioners, students of Law, Politics, Media, and Classics, and all those interested in employing critical thinking.
Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media.
This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
The classification of services in the digital economy proves
critical for doing business, but it appears to be a particularly
complex regulatory matter that is based upon a manifold set of
issues. In the context of the General Agreement on Trade in
Services (GATS), when the services classification scheme was
drafted in the early 1990s, convergence processes had not unfolded
yet and the internet was still in its infancy and not a reality in
daily life. Therefore, policy makers are now struggling with the
problem of regulating trade in electronic services and are in
search of a future-oriented solution for classifying them in
multilateral and preferential trade agreements. In late fall 2011,
the authors of this study were mandated by the European Union,
Delegation to Vietnam, in the context of the Multilateral Trade
Assistance Project 3 (MUTRAP 3), to work out a report clarifying
the classification of services in the information/digital economy
and to assess the impact of any decision regarding the
classifications on the domestic and external relations policy of
Vietnam, as well as to discuss the relevant issues with local
experts during three on-site visits.
Is it possible to achieve cybersecurity while safeguarding the fundamental rights to privacy and data protection? Addressing this question is crucial for contemporary societies, where network and information technologies have taken centre stage in all areas of communal life. This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law. The book explores the values, interconnections and tensions inherent to cybersecurity, privacy and data protection within the EU constitutional architecture and its digital agendas. The work's novel analysis looks at the interplay between digital policies, instruments including the GDPR, NIS Directive, cybercrime legislation, e-evidence and cyber-diplomacy measures, and technology as a regulatory object and implementing tool. This original approach, which factors in the connections between engineering principles and the layered configuration of fundamental rights, outlines all possible combinations of the relationship between cybersecurity, privacy and data protection in EU law, from clash to complete reconciliation. An essential read for scholars, legal practitioners and policymakers alike, the book demonstrates that reconciliation between cybersecurity, privacy and data protection relies on explicit and brave political choices that require an active engagement with technology, so as to preserve human flourishing, autonomy and democracy.
The Telecommunications Act of 1996 envisioned a competitive free-for-all in the U.S. telecommunications industry with removal of barriers to entry in local telecommunications markets and the lifting of the artificial restrictions that kept the Regional Bell Operating Companies (RBOCs) out of the interLATA long-distance market. After close to 5 years, only one RBOC has been granted permission (controversially) to enter the interLATA market, and local competition has yet to provide most consumers with meaningful choices. In addition, the wave of mergers across the industry has raised the specter of putting the former Bell System back together again. Policymakers now openly question whether the Act can deliver what it promised. Three principal themes are developed in this book. First, there has been a coordination failure between Congress and the FCC in translating the principles embodied in the Act into practice. The authors provide evidence for this by analyzing stock market reactions to legislative and regulatory actions. This coordination failure was largely predictable, given the ambiguity in the Act, as well as conflicting jurisdictions between the FCC and the states. Second, the Act calls for wholesale prices to be based on cost.' Regulators adopted a costing standard (TELRIC) that provides a means to subsidize competitive entry in local telephone service markets. The ready adoption of the TELRIC standard by regulators is shown to be tied to the third theme: price cap regulation provides regulators with insurance' against the adverse effects of competition in local telephone markets. Statistical analysis reveals that regulators in price cap states set uniformly lower unbundled network element prices (lower barriers to entry) in comparison with regulators in rate-of-return and earnings sharing states. The result is a triumph of regulatory processes over market processes - the antithesis of the purpose of the Act.
This book offers a comparative analysis of the domain name registration systems utililsed in Australia and the United Kingdom. Taking an international perspective, the author analyses the global trends and dynamics of the domain name registration systems and explores the advantages and disadvantages of restrictive and less restrictive systems by addressing issues of consumer protection. The book examines the regulatory frameworks in the restrictive and unrestrictive registration systems and considers recent developments in this area. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as applying rigorous legal analysis. In doing so, this work proposes ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions. The Domain Name Registration System will be of particular interest to academics and students of IT law and e-commerce.
Spam, unsolicited, unwanted commercial communication, especially in bulk form is increasingly included in the areas of concern and regulation of governments worldwide. Unfortunately, this recognized and exponentially growing menace has not yet met its regulatory match. Piecemeal controls, lack of international cooperation, and the absence of an overall policy on combating patently intrusive and unwanted messages in all channels of communication hamper the struggle. The present volume contains eleven national reports, together with a general report, on this major problem that is presently burdening and distorting communications through the Internet.Most of the reports were presented at the XVIIth Congress of the International Academy of Comparative Law held at Utrecht, the Netherlands on July 19, 2006. The authors have had the opportunity to revise and update their texts before they were submitted here for publication. The national reports are from Denmark, France, Germany, Greece, Italy, Poland, Spain, South Africa, Switzerland, the United Kingdom, and the United States. Starting from some common assumptions; including respect for freedom of expression; emphasis on unsolicited, bulk, automated; messages to strangers; and non-interference with the normal use of the Internet; the contributors set out to tackle spammer elusiveness and the difficulties of cross-border coordination that plague this field.Among the broadly conceived legal responses they consider are the following: making spam illegal; empowering the user to avoid and repel spam; laws governing confidentiality of personal data; application of unfair competition; laws; and conscripting the service providers to block spam in its tracks through a variety of controls. The reports provide documentation and analysis of the various ways in which these approaches have been used, or can be used, in legislation and case law in a variety of national and international fora. Workers in all fields of communications, from technologists to legal practitioners and academics to administrative policymakers, will benefit enormously from these syntheses and insights.
Crossroads in New Media, Identity and Law is a compilation of essays on the nexus of new information and communication technologies, cultural identity, law and politics. The essays provoke timely discussions on how these different spheres affect each other and co-evolve in our increasingly hyper-connected and globalized world.
While other studies have examined the history of cable television regulation, none has fully explained why the FCC struggled to develop regulations during its formative years. In this study, Michael Zarkin helps fill this gap by providing such an explanation through an application of organizational learning theory. Zarkin argues that in order for the FCC to formulate regulations for a brand-new communications medium, it first needed develop and effectively utilize the capacity to gather and analyze policy-relevant knowledge. By the 1970s, conditions were ripe for this to happen, and the FCC was able to more effectively revise its cable television policies. This book elaborates and applies an organizational learning framework that contributes to our understanding of how regulatory agencies operate. By employing a broad range of published and unpublished primary sources, the book also succeeds in providing a more detailed and penetrating study of cable television than previous endeavors. Rather than simply summarizing and critiquing policy decisions, the book paints a picture of the people, ideas, and politics that shaped cable television regulation during these formative years. The FCC and the Politics of Cable TV Regulation, 1952-1980 will be of interest to scholars who study regulatory agencies, the policy process, and communications law and policy.
In today's society, the power of someone's reputation, or influence, has been turned into a job: that of being a social media influencer. This role comes with promises, such as aspirational work, but is rife with challenges, given the controversy that often surrounds influencers. This is the first book on the regulation of social media influencers, that brings together legal, economic and ethical angles to further unveil the implications of influencer marketing. Thus far, influencers have been under scrutiny for not disclosing paid advertising, yet their activity has many more questionable implications. This edited volume combines insights from law, economics, ethics and communication science to reveal these implications and propose new ways in which public bodies, social media companies and citizens ought to relate to influencer marketing. Academics and students of Law, Economics, Ethics and Communication Science will find policy making insights in this collection. In addition, The Regulation of Social Media Influencers will be essential reading for regulators. Contributors include: E. Apa, M. de Cock Bunning, S. de Jans, M. de Veirman, R. Ducato, I. Ebert, C. Fieseler, C. Goanta, L. Hudders, M. Leiser, M. Leszczynska, D. Mangan, G. Newlands, F. Pflucke, O. Pollicino, S. Ranchordas, D. Sindermann, E. van den Abeele, S. van der Hof, G. van Dijck, V. Verdoodt, I. Wildhaber
This book offers a comparative analysis of the domain name registration systems utililsed in Australia and the United Kingdom. Taking an international perspective, the author analyses the global trends and dynamics of the domain name registration systems and explores the advantages and disadvantages of restrictive and less restrictive systems by addressing issues of consumer protection. The book examines the regulatory frameworks in the restrictive and unrestrictive registration systems and considers recent developments in this area. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as applying rigorous legal analysis. In doing so, this work proposes ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions. The Domain Name Registration System will be of particular interest to academics and students of IT law and e-commerce.
Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.
A New Framework for Intermediary Liability presents a step-by-step framework for determining when internet intermediaries ought to have a duty to act to prevent copyright infringement on their platforms and services. This timely book argues that intermediary liability for copyright infringement should be focused on an intermediary's actual responsibility for primary infringement and not simply its capacity to assist copyright owners in challenging infringement. Drawing on long-standing principles in the law of negligence, Kylie Pappalardo argues for a brand-new way to understand intermediary copyright liability and offers a means to distinguish innocent and responsible intermediaries at an early stage. Pappalardo reasons that a duty to act should only arise where the intermediary has causally contributed to the risk of infringement or where they have real and actual control over the actions of primary infringers. With astute consideration of the links between tort law and copyright, this book will be a compelling read for copyright scholars and researchers interested in intellectual property and technology law. Judges, lawyers and policymakers looking for guidance on how to define intermediary liability for copyright infringement will also find helpful direction in this book.
Like the Internet before it, robotics is a socially and economically transformative technology. Robot Law explores how the increasing sophistication of robots and their widespread deployment into hospitals, public spaces, and battlefields requires rethinking of a wide variety of philosophical and public policy issues, including how this technology interacts with existing legal regimes, and thus may inspire changes in policy and in law. This volume collects the efforts of a diverse group of scholars who each, in their own way, has worked to overcome barriers in order to facilitate necessary and timely discussions of a technology in its infancy. Identifying controversial legal, ethical, and philosophical problems, the authors reveal how issues surrounding robotics and regulation are more complicated than engineers could have anticipated, and just how much definitional and applied work remains to be done. This groundbreaking examination of a brand-new reality will be of interest and of use to a variety of groups as the authors include engineers, ethicists, lawyers, roboticists, philosophers, and serving military. Contributors include: P. Asaro, C. Bassani, E. Calisgan, R. Calo, G. Conti, D.M. Cooper, G. Conti, E.A. Croft, K. Darling, F. Ferreira, A.M. Froomkin, S. Gutiu, W. Hartzog, F.P. Hubbard, C.E.A. Karnow, I. Kerr, D. Larkin, J. Millar, A. Moon, J. Nelson, F. Operto, N.M. Richards, L.A. Shay, W.D. Smart, B.W. Smith, K. Szilagyi, K. Thomasen, H.F.M. Van der Loos, G. Veruggio |
You may like...
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
Reforming Intellectual Property
Gustavo Ghidini, Valeria Falce
Hardcover
R3,473
Discovery Miles 34 730
Research Handbook on International Law…
Nicholas Tsagourias, Russell Buchan
Hardcover
R7,667
Discovery Miles 76 670
Data Governance in AI, FinTech and…
Joseph Lee, Aline Darbellay
Hardcover
R3,302
Discovery Miles 33 020
Research Handbook on Contract Design
Marcelo Corrales Compagnucci, Helena Haapio, …
Hardcover
R5,961
Discovery Miles 59 610
|