![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This is a research and reference guide to the telecommunications industry in the United States, providing an account of legislative and policy changes up until the publication of the work. Contributions by scholars in telecommunications law and policy survey the post-1996 legislative field, giving overviews of the 1996 Act itself, the impact of the legislation on national and international competition, regulation of the industry and the MCI/FCC cases in California, mergers and acquisitions, taxation and FCC reform.
Information technology is continuing to transform global communications and the world economy with innovative products and services. In this dynamic environment, events tend to be market-driven and it may be difficult for the regulators to keep up. At the same time, there is a need for public authorities to promote effective competition within a clear, coherent, and predictable framework. This reference work summarizes the major rules and policies for information technology at European level. It describes the institutional framework and general policies for the "information society", examines the detailed rules for external trade, competition and intellectual property, and discusses the Internet and electronic commerce. It provides an excellent overview of the subject as well as a good starting point for additional research on particular issues. This work should be of interest to practising lawyers, corporate counsel, business executives, consultants, academics, and government or trade association officials.
Now in its sixth edition, Introduction to Information Technology Law (formerly Introduction to Computer Law), provides a comprehensive and accessible introduction to the law as it relates to computers. Adopting a practical approach that places the law in the context of computer use, this book is highly suitable for undergraduate law students, non-specialist students and computer professionals.
Questions concerning the quality of media performance and the
effectiveness of media policymaking often revolve around the extent
to which the media system fulfills the values inherent in diversity
and localism principles. This edited volume addresses challenges
and issues relating to diversity in local media markets from a
media law and policy perspective. Editor Philip M. Napoli provides
a conceptual and empirical framework for assessing the
success/failure of media markets and media outlets in fulfilling
diversity and localism objectives.
Due to rapid developments in the communication sector, the right to privacy faces new challenges. The increasing digitization and internationalization of communication processes have raised a number of issues, and lead to conflicts wherever national legal systems and moral concepts collide. Particularly in the areas of data protection and liability of online service providers, universal approaches are required. This title presents positions of specialists in Europe, Australia, the US and Canada which contribute to the international dialogue and thereby offer a starting point for a sustainable policy for the protection of privacy rights
Email and Internet use is increasingly topical as employers and employees test the boundaries of acceptable use of new communications technology in the workplace. The potential legal liabilities make this a crucial decision-making area for all involved in human resources management. Tolley's Managing Email and Internet Use will provide you with the essential legal guidance and practical advice to establish, implement and enforce a policy for internet and Email use in your workplace. Tolley's Managing Email and Internet Use analyses and interprets (in plain language) the law on monitoring employees' Email and internet activity, the use of confidentiality notices, privacy, harassment and Email interception by employers. It also provides information on the key regulations and guidelines which affect Email and internet policy, including the Human Rights Act 1998, Data Protection Act 1998 and the Regulation of Investigatory Powers Act 2000. Tolley's Managing Email and Internet Use is the only practical guide to offer you: - strategic guidance on implementing, policing and maintaining an effective Email and internet policy - Current thinking on managing Email and internet use - Sample policies, disclaimers, rules and procedures to assist in establishing your own guidelines - A practical approach featuring questions and answers, checklists and case studies - An accessible read regardless of previous legal experience - Latest case law from recent cases involving Email and internet policy Tolley's Managing Email and Internet Use is a complete reference source for Email and internet policy in the workplace.
Combines academic rigour with case studies and activities designed to aid learning Suitable for courses both in the UK and internationally, and it uses international examples
This book provides a clear and thorough account of the process leading up to the revision of the International Telecommunication Regulations (ITRs) one of the four treaties administered by the ITU. The author's inside view of the events and his legal analysis of the new ITRs, are different from that what has been aired in most other accounts to date. His systematic approach shows how much of the criticism of the WCIT-12 process and of the ITRs themselves, is unjustified. This book provides the most accurate view to date of what theITRs really mean and of what really happened at WCIT-12, which was undoubtedly a key event in the history of telecommunication policy and which is likely to have significant long-term effects. The book covers in some detail the events leading to the non-signature of the treaty by a significant number of states, outlines possible consequences of that split between states, and offers possible ways forward. The book includes a detailed article-by-article analysis of the new ITRs, explaining their implications and concludes with recommendations for national authorities. It concludes with an analysis of events from the point of view of dispute resolution theory, offering suggestions for how to avoid divisive outcomes in the future. "This is an excellent book, and quite rich and comprehensive. The topic is important and the book will surely be of interest to regulators, diplomats, policy experts, and all those who participated in WCIT. The author is uniquely qualified to write an analysis of the new ITRs and an account of the Conference. This book will be a good reference for the next Plenipotentiary Conference to be held in 2014 which is going to discuss follow-up to WCIT-12." Naser al-Rashedi, United Arab Emirates. "This is an authoritative expert account of a moment of high significance for vital issues with respect to international networks." Professor Dan Schiller, University of Illinois. "This is an excellent and timely work." Professor Ian Walden, Queen Mary, University of London. "Interested persons, businesses and governments can draw their policies from the assessments of a telecommunications insider as presented in this book. The manifold arguments enlightening the interpretation of the provisions of the ITRs might become an invaluable guidance for those who apply the ITRs in the future." Professor Dr. Rolf H. Weber, University of Zurich."
This book provides a comprehensive guide to legal issues which have arisen as a result of the growth of the internet and the worldwide web. As well as discussing each topic in detail, Jonathan Rosenoer includes extensive coverage of the relevant cases and their implications for the future. Topics covered include: copyright and trademark issues, defamation, privacy, liability, electronic contracts, tax issues, and ethics. A potted history of the significant legal events is included which runs from the founding of the Electronic Frontier Foundation to the 1996 Telecommunications Act. About the author: Jonathan Rosenoer has been general counsel for the Haft Corporation, Executive Editor for Lexis Counsel Connect, and is best known for his CyberLaw column which has a distribution list of over four million.
This book presents the latest and most relevant studies, surveys, and succinct reviews in the field of financial crimes and cybercrime, conducted and gathered by a group of top professionals, scholars, and researchers from China, India, Spain, Italy, Poland, Germany, and Russia. Focusing on the threats posed by and corresponding approaches to controlling financial crime and cybercrime, the book informs readers about emerging trends in the evolution of international crime involving cyber-technologies and the latest financial tools, as well as future challenges that could feasibly be overcome with a more sound criminal legislation framework and adequate criminal management. In turn, the book highlights innovative methods for combating financial crime and cybercrime, e.g., establishing an effective supervision system over P2P; encouraging financial innovation and coordination with international anti-terrorism organizations and multiple countries; improving mechanisms for extraditing and punishing criminals who defect to another country; designing a protection system in accordance with internationally accepted standards; and reforming economic criminal offenses and other methods that will produce positive results in practice. Given its scope, the book will prove useful to legal professionals and researchers alike. It gathers selected proceedings of the 10th International Forum on Crime and Criminal Law in the Global Era (IFCCLGE), held on Nov 20-Dec 1, 2019, in Beijing, China.
This book examines the timely issue of artificial intelligence (AI) and law. At this moment, AI is rapidly developing and being utilized in many different sectors. Meanwhile, the rise of AI raises complex questions and poses new challenges-new products and services involving AI will require new regulations and standards to minimize potential negative side-effects and maximize the benefits of this new technology, both within domestic law and international law. Thus, this book focuses on the impact of AI on international law and seeks ways to develop international law frameworks to adequately address the challenges of the AI era. In this context, new forms of inter-state conflicts and emergence of new subjects and objects of international law are discussed along with relevant up-to-date developments in major jurisdictions. Issues arising from the advent of AI relating to state sovereignty, state responsibility, dispute settlements, and north-south divide are also considered.
Cybercrime is remarkably varied and widespread, and financial losses range from a few hundred dollars being extorted to multi-million dollar cyberfraud cases. Increasingly, cybercrime also involves the risk of terrorist attacks bringing down a major part of the Internet. Countries are discovering that it may be impossible for them to prosecute cybercriminals. Cybercrimes, unlike 'ordinary' crimes, are transnational in nature and it is often difficult to say just where they take place. This causes legal problems, since jurisdiction is usually still confined to the place where the crime was committed. A related issue is to what extent the police can investigate cybercrimes across borders, through the Internet: do they infringe the sovereignty of other countries? This book surveys how these issues in cybercrime jurisdiction are dealt with by countries around the world, including the US, Japan, Korea, India, Brazil, Chile, Australia, New Zealand, Italy, Germany, Belgium, Denmark, and the UK. A score of experts assess how well the laws of their countries and the Cybercrime Convention deal with transnational cybercrime, and how jurisdiction conflicts should be resolved. With this in-depth survey of views and practices of cybercrime jurisdiction, the authors hope to contribute to a more concerted international effort towards effectively fighting cybercrime. The book is therefore highly recommended to policy-makers, members of the judiciary, academics and practitioners. Bert-Jaap Koops is Professor of Regulation & Technology at the Tilburg Institute for Law, Technology, and Society (TILT) of Tilburg University, The Netherlands. Susan W. Brenner is NCR Distinguished Professor of Law & Technology, University of Dayton School of Law, Ohio, US.
The growth of data-collecting goods and services, such as ehealth and mhealth apps, smart watches, mobile fitness and dieting apps, electronic skin and ingestible tech, combined with recent technological developments such as increased capacity of data storage, artificial intelligence and smart algorithms, has spawned a big data revolution that has reshaped how we understand and approach health data. Recently the COVID-19 pandemic has foregrounded a variety of data privacy issues. The collection, storage, sharing and analysis of health- related data raises major legal and ethical questions relating to privacy, data protection, profiling, discrimination, surveillance, personal autonomy and dignity. This book examines health privacy questions in light of the General Data Protection Regulation (GDPR) and the general data privacy legal framework of the European Union (EU). The GDPR is a complex and evolving body of law that aims to deal with several technological and societal health data privacy problems, while safeguarding public health interests and addressing its internal gaps and uncertainties. The book answers a diverse range of questions including: What role can the GDPR play in regulating health surveillance and big (health) data analytics? Can it catch up with internet-age developments? Are the solutions to the challenges posed by big health data to be found in the law? Does the GDPR provide adequate tools and mechanisms to ensure public health objectives and the effective protection of privacy? How does the GDPR deal with data that concern children's health and academic research? By analysing a number of diverse questions concerning big health data under the GDPR from various perspectives, this book will appeal to those interested in privacy, data protection, big data, health sciences, information technology, the GDPR, EU and human rights law.
This book presents an evaluation of recent legislative initiatives against unsolicited commercial e-mail (spam) in the European Union. The authors provide an analysis of the meaning and interpretation of the relevant new regulatory regime in the EU. They address international aspects of the fight against spam (intra-European activities and supranational policies), the dilemmas of dealing with spam and the importance of effective enforcement mechanisms. Their conclusions and recommendations provide directions, both in terms of further research as well as in terms of practical policy measures. This book is therefore highly recommended for academics as well as policy-makers and practitioners in the field of IT and law. Lodewijk F. Asscher is a researcher at the Institute for Information Law, University of Amsterdam and a local authority councillor for the City of Amsterdam. He prepared the present book in co-operation with Sjo Anne Hoogcarspel, Attorney at Law with Freshfields Bruckhaus Deringer, Amsterdam, The Netherlands. This is Volume 10 in the Information Technology and Law (IT&Law) Series
The CCPA (California Consumer Privacy Act) is a data privacy law that took effect on January 1, 2020. It applied to businesses that collect California residents' personal information, and its privacy requirements are similar to those of the GDPR (General Data Protection Regulation). On May 4, 2020, Californians for Consumer Privacy (an advocacy group, founded by Alistair MacTaggart) announced that it had collected more than 900,000 signatures to qualify the CPRA (California Privacy Rights Act) for the November 2020 ballot. Also known as 'CCPA 2.0', the CPRA enhances privacy protections established by the CCPA and builds on consumer rights. CPRA effectively replaces the CCPA and bolsters privacy protections for California consumers. While many elements of the two laws are similar, there are some striking differences that could impact CPRA implementation plans, including: Limiting deletion rights that apply to unstructured data A new right to data minimization with retention requirements related to personal data New definitions and obligations related to cross-context behavioral advertising Amending breach liability to include an email address in combination with a password or security question Establishing a new regulatory enforcement body: the California Privacy Protection Agency Organizations that fail to comply with the CPRA's requirements are subject to civil penalties of up to $7,500 and a civil suit that gives every affected consumer the right to seek between $100 and $750 in damages per incident, or actual damages if higher. The law is complex and requires careful reading to understand the actual requirements for organizations - The California Privacy Rights Act - An implementation and compliance guide is here to help you. Ensure your business is CPRA compliant with essential guidanceThis book is your ideal resource for understanding the CPRA and how you can implement a strategy to ensure your organization complies with the legislation. It will give you a comprehensive understanding of the legislation by providing definitions of key terms, explanations of the security requirements, details of the breach notification procedure, and covering the penalties for noncompliance. The California Privacy Rights Act - An implementation and compliance guide is essential reading for anyone with business interests in the state of California. Not only does it serve as an introduction to the legislation, it also discusses the challenges a business may face when trying to achieve CPRA compliance. It gives you the confidence to begin your CPRA compliance journey, while highlighting the potential ongoing developments of the CPRA. Buy this book and start implementing your CPRA compliance strategy today!
Cybercrime continues to skyrocket but we are not combatting it effectively yet. We need more cybercrime investigators from all backgrounds and working in every sector to conduct effective investigations. This book is a comprehensive resource for everyone who encounters and investigates cybercrime, no matter their title, including those working on behalf of law enforcement, private organizations, regulatory agencies, or individual victims. It provides helpful background material about cybercrime's technological and legal underpinnings, plus in-depth detail about the legal and practical aspects of conducting cybercrime investigations. Key features of this book include: Understanding cybercrime, computers, forensics, and cybersecurity Law for the cybercrime investigator, including cybercrime offenses; cyber evidence-gathering; criminal, private and regulatory law, and nation-state implications Cybercrime investigation from three key perspectives: law enforcement, private sector, and regulatory Financial investigation Identification (attribution) of cyber-conduct Apprehension Litigation in the criminal and civil arenas. This far-reaching book is an essential reference for prosecutors and law enforcement officers, agents and analysts; as well as for private sector lawyers, consultants, information security professionals, digital forensic examiners, and more. It also functions as an excellent course book for educators and trainers. We need more investigators who know how to fight cybercrime, and this book was written to achieve that goal. Authored by two former cybercrime prosecutors with a diverse array of expertise in criminal justice and the private sector, this book is informative, practical, and readable, with innovative methods and fascinating anecdotes throughout.
This book identifies the principles that should be applied when processing Big Data in the context of food safety risk assessments. Food safety is a critical goal in the protection of individuals' right to health and the flourishing of the food and feed market. Big Data is fostering new applications capable of enhancing the accuracy of food safety risk assessments. An extraordinary amount of information is analysed to detect the existence or predict the likelihood of future risks, also by means of machine learning algorithms. Big Data and novel analysis techniques are topics of growing interest for food safety agencies, including the European Food Safety Authority (EFSA). This wealth of information brings with it both opportunities and risks concerning the extraction of meaningful inferences from data. However, conflicting interests and tensions among the parties involved are hindering efforts to find shared methods for steering the processing of Big Data in a sound, transparent and trustworthy way. While consumers call for more transparency, food business operators tend to be reluctant to share informational assets. This has resulted in a considerable lack of trust in the EU food safety system. A recent legislative reform, supported by new legal cases, aims to restore confidence in the risk analysis system by reshaping the meaning of data ownership in this domain. While this regulatory approach is being established, breakthrough analytics techniques are encouraging thinking about the next steps in managing food safety data in the age of machine learning. The book focuses on two core topics - data ownership and data governance - by evaluating how the regulatory framework addresses the challenges raised by Big Data and its analysis in an applied, significant, and overlooked domain. To do so, it adopts an interdisciplinary approach that considers both the technological advances and the policy tools adopted in the European Union, while also assuming an ethical perspective when exploring potential solutions. The conclusion puts forward a proposal: an ethical blueprint for identifying the principles - Security, Accountability, Fairness, Explainability, Transparency and Privacy - to be observed when processing Big Data for food safety purposes, including by means of machine learning. Possible implementations are then discussed, also in connection with two recent legislative proposals, namely the Data Governance Act and the Artificial Intelligence Act.
Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.
The Threats of Algorithms and A.I. to Civil Rights, Legal Remedies, and American Jurisprudence addresses the many threats to American jurisprudence caused by the growing use of algorithms and artificial intelligence (A.I.). Although algorithms prove valuable to society, that value may also lead to the destruction of the foundations of American jurisprudence by threatening constitutional rights of individuals, creating new liabilities for business managers and board members, disrupting commerce, interfering with long-standing legal remedies, and causing chaos in courtrooms trying to adjudge lawsuits. Alfred R. Cowger, Jr. explains these threats and provides potential solutions for both the general public and legal practitioners. Scholars of legal studies, media studies, and political science will find this book particularly useful.
This book provides an overview of the topics of data, sovereignty, and governance with respect to data and online activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data, ownerships, and privacy with respect to digital media and content, before defining the intersection of sovereignty in law with application to data and digital media content. The authors delve into the issue of digital governance, as well as theories and systems of governance on a state level, national level, and corporate/organizational level. Chapter three jumps into the complex area of jurisdictional conflict of laws and the related issues regarding digital activities in international law, both public and private. Additionally, the book discusses the many technical complexities which underlay the evolution and creation of new law and governance strategies and structures. This includes socio-political, legal, and industrial technical complexities which can apply in these areas. The fifth chapter is a comparative examination of the legal strategies currently being explored by a variety of nations. The book concludes with a discussion about emerging topics which either influence, or are influenced by, data sovereignty and digital governance, such as indigenous data sovereignty, digital human rights and self-determination, artificial intelligence, and global digital social responsibility. Cumulatively, this book provides the full spectrum of information, from foundational principles underlining the described topics, through to the larger, more complex, evolving issues which we can foresee ahead of us.
AI in combination with other innovative technologies promises to bring unprecedented opportunities to all aspects of life. These technologies, however, hold great dangers, especially for the manipulation of the human mind, which have given rise to serious ethical concerns. Apart from some sectoral regulatory efforts to address these concerns, no regulatory framework for AI has yet been adopted though in 2021 the European Commission of the EU published a draft Act on Artificial Intelligence and UNESCO followed suit with a Recommendation on the Ethics of Artificial Intelligence. The book contextualises the future regulation of AI, specifically addressing the regulatory challenges relating to the planned prohibition of the use of AI systems that deploy subliminal techniques. The convergence of AI with various related technologies, such as brain-computer interfaces, functional magnetic resonance imaging, robotics and big data, already allows for "mind reading" or "dream hacking" through brain spyware, as well as other practices that intrude on cognition and the right to freedom of thought. Future innovations will enhance the possibilities for manipulating thoughts and behaviour, and they threaten to cause serious harm to individuals as well as to society as a whole. The issue of subliminal perception and the ability to deceive and manipulate the mind below the threshold of awareness causes severe difficulties for law and democracy and raises important questions for the future of society. This book shows how cognitive, technological, and legal questions are intrinsically interwoven, and aims to stimulate an urgently needed transdisciplinary and transnational debate between students, academics, practitioners, policymakers and citizens interested not only in the law but also in disciplines including computer science, neuroscience, sociology, political science, marketing and psychology.
ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.
|
![]() ![]() You may like...
Hot Wired Guitar: The Life and Career of…
Martin Power
Hardcover
![]()
Piano Adventures Lesson Book Level 3A…
Nancy Faber, Randall Faber
Staple bound
Suzuki Guitar School Volume 1
Seth Himmelhoch, Andrew Lafreniere, …
Paperback
|