![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book offers guidance for US-based IT businesses on both sides of the Atlantic when dealing with big data and government data, since transatlantic data flows are key to the success of these enterprises. It offers practical insights into many of the data-protection challenges US companies in various industries face when seeking to comply with US and EU data-protection laws, and analyses the potential conflicts in the light of their risks and the way in which US-based cloud providers react to the uncertainties of the applicable data-protection rules. The book particularly focuses on the insights derived from a qualitative study conducted in 2016 with various cloud-based IT businesses in the Silicon Valley area, which shows the diversity of views on data protection and the many approaches companies take to this topic. Further, it discusses key data-protection issues in the field of big data and government data.
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.
Managing scarcity to serve the public interest is a classic government task. An important way to execute this task is by allocating individual rights that are only available in limited quantities, such as CO2 emission allowances, gambling licences, subsidies, radio frequencies, public contracts and parking permits. Whereas economic and political theory has paid much attention to the allocation of scarce goods and rights, until now a consistent and general legal theory of 'the allocating government' has been missing. This is striking given the fact that limited rights have to be allocated within many sectors and are often of great social significance and financial importance. Decisions on allocation often lead to disputes. This book provides a unique exploration of building blocks for a consistent and general legal theory on the allocation of limited rights by administrative authorities. This book is useful to legislators, administrative authorities, applicants, interested third parties and the courts. The EU-law perspective is an important element in this book, but comparative law and doctrinal approaches are also taken into account. The contributions in this book have been enriched by information from national reports on the allocation of gambling licences, radio frequencies and CO2 emission permits in seven EU Member States: France, Germany, Greece, Italy, the Netherlands, Romania and Spain. (See P. Adriaanse, F. van Ommeren, W. den Ouden and J. Wolswinkel (eds.), Scarcity and the State II. Member State Reports on Gambling Licences, Radio Frequencies and CO2 Emission Permits, Intersentia, Antwerp 2016).
Emerging technologies present a challenging but fascinating set of ethical, legal and regulatory issues. The articles selected for this volume provide a broad overview of the most influential historical and current thinking in this area and show that existing frameworks are often inadequate to address new technologies - such as biotechnology, nanotechnology, synthetic biology and robotics - and innovative new models are needed. This collection brings together invaluable, innovative and often complementary approaches for overcoming the unique challenges of emerging technology ethics and governance.
This book crosses the conventional border between the analysis of on-screen and off-screen intersections of law and cinema. It not only addresses the representation of law on screen (for example, through discussions of how lawyers, police, and prisons are depicted, or how courtroom sequences function as narratives), but also focuses on how the state shapes and regulates cinema. The volume addresses the distinct contexts of China, India, Japan, Korea, the Philippines, and Vietnam, along with an integrative introduction that puts the essays and themes into context for scholars and students alike.
Cyberspace, the electronic super-highway or the Internet, as it is most commonly known, is a globally-networked, computer-sustained, computer-accessed and computer-generated multidimensional virtual reality, the use of which is increasing at a tremendous rate. Although much has been written on the legal issues relating to this virtual reality, this book provides coverage of the private international aspects. The work aims to address two basic questions, namely, which court has jurisdiction and which law is to be applied when litigation arises from activity on the Internet? The book comprises seven key papers, presented at an international symposium organised by Utrecht University's Molengraaff Institute of Private Law and the Hague Conference on Private International Law, which was held in Utrecht in June 1997. The main topics covered include: the role of law in cyberspace; experiences in the field of intellectual property; can private international law provide order to the chaos?; problems concerning jurisdiction and applicable law; and conclusions and recommendations.
This exceptional new text offers an up-to-date and integrated approach to communication law. Written by two practicing attorneys with extensive experience teaching the communication law course, Law for Advertising, Broadcasting, Journalism, and Public Relations covers the areas of communication law essential and most relevant for readers throughout the communication curriculum. Its integrated approach will serve students and practitioners in advertising and public relations as well as those in journalism and electronic media. Providing background to help readers understand legal concepts, this comprehensive communication law text includes an introduction to the legal system; covers legal procedures, structures, and jurisdictions; discusses the First Amendment and electronic media regulations; and considers issues of access. Additional material includes: *intellectual property law; *employment and agency law, with explanations of how these laws create obligations for mass communication professionals and their employees; *commercial communication laws; and *special laws and regulations that impact reporters, public relations practitioners, and advertisers who deal with stock sales. Special features of this text include: *Magic Words and Phrases--defining legal terms; *Cases--illustrating key points in each chapter; *Practice Notes--highlighting points of particular interest to professional media practices; *Instructions on finding and briefing cases, with a sample brief; and *Examples of legal documents and jury instructions. This text is intended as an introduction to communication law for students and practitioners in mass communication, journalism, advertising, broadcasting, telecommunications, and public relations.
For the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct. The book addresses the international regulation of cryptography and digital signatures both in terms of confidentiality (cryptography used to keep secrets) and authentication (cryptography used to verify information). Coverage includes: a description of over 45 countries' policies and laws on cryptography import, export, and domestic controls and digital signature initiatives worldwide; a concise history of the cryptography debate in the United States from its beginnings after World War II to the recent debates over the Clipper Chip and key recovery encryption; and a presentation of the efforts of the United States government (and others) to build a new national consensus on regulation of encryption.
Providing comparative analysis that examines both Western and non-Western legal systems, this wide-ranging Handbook expands and enriches the existing privacy and defamation law literature and addresses the fundamental issues facing today's scholars and practitioners. Comparative Privacy and Defamation provides insightful commentary on issues of theory and doctrine, including the challenges of General Data Protection Regulations (GDPR) and the impact of new technologies on the law. Chapters explore the origins and development of the right to privacy, privacy rights of photographic subjects and defamation by photo-manipulation, and the right to be forgotten. Containing contributions from expert international scholars, this comprehensive Handbook investigates the liability of internet intermediaries in cases of defamation and the emerging problem of global injunctions before concluding with eight country focussed studies. Engaging and accessible, this Handbook will be a key resource for students and scholars researching in the fields of privacy and defamation law, internet and technological law and information and media law. Contributors include: T.D.C. Bennett, S. Bretthauer, J. Campbell, P. Coe, M. Cornils, S.C. Ekaratne, A. Gajda, G. Gil, A. Koltay, R. Krotoszynski, J. Kulesza, D. Mangan, D. Milo, R. Moosavian, J. Oster, K.S. Park, M. Pearson, J. Reichel, D. Rolph, J. Shimizu, D.N. Staiger, R.L. Weaver, R.H. Weber, P. Wragg, M.N. Yan, V. Zeno-Zencovich
Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media.
This book provides a wide and deep perspective on the ethical issues raised by pervasive information and communication technology (PICT) - small, powerful, and often inexpensive Internet-connected computing devices and systems. It describes complex and unfamiliar technologies and their implications, including the transformative potential of augmented reality, the power of location-linked information, and the uses of "big data," and explains potential threats, including privacy invaded, security violated, and independence compromised, often through widespread and lucrative manipulation. PICT is changing how we live, providing entertainment, useful tools, and life-saving systems. But the very smartphones that connect us to each other and to unlimited knowledge also provide a stream of data to systems that can be used for targeted advertising or police surveillance. Paradoxically, PICT expands our personal horizons while weaving a web that may ensnare whole communities. Chapters describe particular cases of PICT gone wrong, but also highlight its general utility. Every chapter includes ethical analysis and guidance, both specific and general. Topics are as focused as the Stuxnet worm and as broad as the innumerable ways new technologies are transforming medical care. Written for a broad audience and suitable for classes in emerging technologies, the book is an example of anticipatory ethics - "ethical analysis aimed at influencing the development of new technologies" (Deborah Johnson 2010). The growth of PICT is outpacing the development of regulations and laws to protect individuals, organizations, and nations from unintended harm and malicious havoc. This book alerts users to some of the hazards of PICT; encourages designers, developers, and merchants of PICT to take seriously their ethical responsibilities - if only to "do no harm" - before their products go public; and introduces citizens and policy makers to challenges and opportunities that must not be ignored.
The classification of services in the digital economy proves
critical for doing business, but it appears to be a particularly
complex regulatory matter that is based upon a manifold set of
issues. In the context of the General Agreement on Trade in
Services (GATS), when the services classification scheme was
drafted in the early 1990s, convergence processes had not unfolded
yet and the internet was still in its infancy and not a reality in
daily life. Therefore, policy makers are now struggling with the
problem of regulating trade in electronic services and are in
search of a future-oriented solution for classifying them in
multilateral and preferential trade agreements. In late fall 2011,
the authors of this study were mandated by the European Union,
Delegation to Vietnam, in the context of the Multilateral Trade
Assistance Project 3 (MUTRAP 3), to work out a report clarifying
the classification of services in the information/digital economy
and to assess the impact of any decision regarding the
classifications on the domestic and external relations policy of
Vietnam, as well as to discuss the relevant issues with local
experts during three on-site visits.
The Telecommunications Act of 1996 envisioned a competitive free-for-all in the U.S. telecommunications industry with removal of barriers to entry in local telecommunications markets and the lifting of the artificial restrictions that kept the Regional Bell Operating Companies (RBOCs) out of the interLATA long-distance market. After close to 5 years, only one RBOC has been granted permission (controversially) to enter the interLATA market, and local competition has yet to provide most consumers with meaningful choices. In addition, the wave of mergers across the industry has raised the specter of putting the former Bell System back together again. Policymakers now openly question whether the Act can deliver what it promised. Three principal themes are developed in this book. First, there has been a coordination failure between Congress and the FCC in translating the principles embodied in the Act into practice. The authors provide evidence for this by analyzing stock market reactions to legislative and regulatory actions. This coordination failure was largely predictable, given the ambiguity in the Act, as well as conflicting jurisdictions between the FCC and the states. Second, the Act calls for wholesale prices to be based on cost.' Regulators adopted a costing standard (TELRIC) that provides a means to subsidize competitive entry in local telephone service markets. The ready adoption of the TELRIC standard by regulators is shown to be tied to the third theme: price cap regulation provides regulators with insurance' against the adverse effects of competition in local telephone markets. Statistical analysis reveals that regulators in price cap states set uniformly lower unbundled network element prices (lower barriers to entry) in comparison with regulators in rate-of-return and earnings sharing states. The result is a triumph of regulatory processes over market processes - the antithesis of the purpose of the Act.
This book offers a comparative analysis of the domain name registration systems utililsed in Australia and the United Kingdom. Taking an international perspective, the author analyses the global trends and dynamics of the domain name registration systems and explores the advantages and disadvantages of restrictive and less restrictive systems by addressing issues of consumer protection. The book examines the regulatory frameworks in the restrictive and unrestrictive registration systems and considers recent developments in this area. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as applying rigorous legal analysis. In doing so, this work proposes ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions. The Domain Name Registration System will be of particular interest to academics and students of IT law and e-commerce.
Spam, unsolicited, unwanted commercial communication, especially in bulk form is increasingly included in the areas of concern and regulation of governments worldwide. Unfortunately, this recognized and exponentially growing menace has not yet met its regulatory match. Piecemeal controls, lack of international cooperation, and the absence of an overall policy on combating patently intrusive and unwanted messages in all channels of communication hamper the struggle. The present volume contains eleven national reports, together with a general report, on this major problem that is presently burdening and distorting communications through the Internet.Most of the reports were presented at the XVIIth Congress of the International Academy of Comparative Law held at Utrecht, the Netherlands on July 19, 2006. The authors have had the opportunity to revise and update their texts before they were submitted here for publication. The national reports are from Denmark, France, Germany, Greece, Italy, Poland, Spain, South Africa, Switzerland, the United Kingdom, and the United States. Starting from some common assumptions; including respect for freedom of expression; emphasis on unsolicited, bulk, automated; messages to strangers; and non-interference with the normal use of the Internet; the contributors set out to tackle spammer elusiveness and the difficulties of cross-border coordination that plague this field.Among the broadly conceived legal responses they consider are the following: making spam illegal; empowering the user to avoid and repel spam; laws governing confidentiality of personal data; application of unfair competition; laws; and conscripting the service providers to block spam in its tracks through a variety of controls. The reports provide documentation and analysis of the various ways in which these approaches have been used, or can be used, in legislation and case law in a variety of national and international fora. Workers in all fields of communications, from technologists to legal practitioners and academics to administrative policymakers, will benefit enormously from these syntheses and insights.
The CCPA (California Consumer Privacy Act) is a data privacy law that took effect on January 1, 2020. It applied to businesses that collect California residents' personal information, and its privacy requirements are similar to those of the GDPR (General Data Protection Regulation). On May 4, 2020, Californians for Consumer Privacy (an advocacy group, founded by Alistair MacTaggart) announced that it had collected more than 900,000 signatures to qualify the CPRA (California Privacy Rights Act) for the November 2020 ballot. Also known as 'CCPA 2.0', the CPRA enhances privacy protections established by the CCPA and builds on consumer rights. CPRA effectively replaces the CCPA and bolsters privacy protections for California consumers. While many elements of the two laws are similar, there are some striking differences that could impact CPRA implementation plans, including: Limiting deletion rights that apply to unstructured data A new right to data minimization with retention requirements related to personal data New definitions and obligations related to cross-context behavioral advertising Amending breach liability to include an email address in combination with a password or security question Establishing a new regulatory enforcement body: the California Privacy Protection Agency Organizations that fail to comply with the CPRA's requirements are subject to civil penalties of up to $7,500 and a civil suit that gives every affected consumer the right to seek between $100 and $750 in damages per incident, or actual damages if higher. The law is complex and requires careful reading to understand the actual requirements for organizations - The California Privacy Rights Act - An implementation and compliance guide is here to help you. Ensure your business is CPRA compliant with essential guidanceThis book is your ideal resource for understanding the CPRA and how you can implement a strategy to ensure your organization complies with the legislation. It will give you a comprehensive understanding of the legislation by providing definitions of key terms, explanations of the security requirements, details of the breach notification procedure, and covering the penalties for noncompliance. The California Privacy Rights Act - An implementation and compliance guide is essential reading for anyone with business interests in the state of California. Not only does it serve as an introduction to the legislation, it also discusses the challenges a business may face when trying to achieve CPRA compliance. It gives you the confidence to begin your CPRA compliance journey, while highlighting the potential ongoing developments of the CPRA. Buy this book and start implementing your CPRA compliance strategy today!
Crossroads in New Media, Identity and Law is a compilation of essays on the nexus of new information and communication technologies, cultural identity, law and politics. The essays provoke timely discussions on how these different spheres affect each other and co-evolve in our increasingly hyper-connected and globalized world.
This book offers a comparative analysis of the domain name registration systems utililsed in Australia and the United Kingdom. Taking an international perspective, the author analyses the global trends and dynamics of the domain name registration systems and explores the advantages and disadvantages of restrictive and less restrictive systems by addressing issues of consumer protection. The book examines the regulatory frameworks in the restrictive and unrestrictive registration systems and considers recent developments in this area. Jenny Ng also examines the legal and economic implications of these regulatory frameworks, drawing upon economic theory, regulatory and systems theory as well as applying rigorous legal analysis. In doing so, this work proposes ways in which such systems could be better designed to reflect the needs of the specific circumstances in individual jurisdictions. The Domain Name Registration System will be of particular interest to academics and students of IT law and e-commerce.
In today's society, the power of someone's reputation, or influence, has been turned into a job: that of being a social media influencer. This role comes with promises, such as aspirational work, but is rife with challenges, given the controversy that often surrounds influencers. This is the first book on the regulation of social media influencers, that brings together legal, economic and ethical angles to further unveil the implications of influencer marketing. Thus far, influencers have been under scrutiny for not disclosing paid advertising, yet their activity has many more questionable implications. This edited volume combines insights from law, economics, ethics and communication science to reveal these implications and propose new ways in which public bodies, social media companies and citizens ought to relate to influencer marketing. Academics and students of Law, Economics, Ethics and Communication Science will find policy making insights in this collection. In addition, The Regulation of Social Media Influencers will be essential reading for regulators. Contributors include: E. Apa, M. de Cock Bunning, S. de Jans, M. de Veirman, R. Ducato, I. Ebert, C. Fieseler, C. Goanta, L. Hudders, M. Leiser, M. Leszczynska, D. Mangan, G. Newlands, F. Pflucke, O. Pollicino, S. Ranchordas, D. Sindermann, E. van den Abeele, S. van der Hof, G. van Dijck, V. Verdoodt, I. Wildhaber
The metaverse seems to be on everybody's lips - and yet, very few people can actually explain what it means or why it is important. This book aims to fill the gap from an interdisciplinary perspective informed by law and media and communications studies. Going beyond the optimism emanating from technology companies and venture capitalists, the authors critically evaluate the antecedents and the building blocks of the metaverse, the design and regulatory challenges that need to be solved, and commercial opportunities that are yet to be fully realised. While the metaverse is poised to open new possibilities and perspectives, it will also be a dangerous place - one ripe with threats ranging from disinformation to intellectual property theft to sexual harassment. Hence, the book also offers a useful guide to the legal and political governance issues ahead while also contextualising them within the broader domain of governance and regulation of digital technologies.
This book demands that we question what we are told about security, using tools we have had for thousands of years. The work considers the history of security rhetoric in a number of distinct but related contexts, including the United States' security strategy, the "war" on Big Tech, and current concerns such as cybersecurity. Focusing on the language of security discourse, it draws common threads from the ancient world to the present day and the near future. The book grounds recent comparisons of Donald Trump to the Emperor Nero in a linguistic evidence base. It examines the potential impact on society of policy-makers' emphasis on the novelty of cybercrime, their likening of the internet to the Wild West, and their claims that criminals have "gone dark". It questions governments' descriptions of technology companies in words normally reserved for terrorists, and asks who might benefit. Interdisciplinary in approach, the book builds on existing literature in the Humanities and Social Sciences, most notably studies on rhetoric in Greco-Roman texts, and on the articulation of security concerns in law, international relations, and public policy contexts. It adds value to this body of research by offering new points of comparison, and a fresh but tried and tested way of looking at problems that are often presented as unprecedented. It will be essential to legal and policy practitioners, students of Law, Politics, Media, and Classics, and all those interested in employing critical thinking. |
![]() ![]() You may like...
Cambridge Primary Science Workbook 6…
Andrea Mapplebeck, Deborah Herridge, …
Paperback
R410
Discovery Miles 4 100
Controlled Polymerization and Polymeric…
Akihiro Abe, Kwang-Sup Lee, …
Hardcover
R6,489
Discovery Miles 64 890
Beyond 2000 in Computational Geotechnics
Ronald B.J. Brinkgreve
Hardcover
R9,147
Discovery Miles 91 470
|