![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
Rights, Regulation and the Technological Revolution confronts a
central question facing modern government - how can regulators
respond to both the challenges and opportunities presented by a
technologically-driven society without sacrificing legitimacy for
effectiveness, or weakening the essential conditions of a stable,
aspirant moral community?
States increasingly delegate regulatory and police functions to Internet intermediaries. The delegation is achieved by providing an incentive in the form of conditional liability exemptions. In the EU, the exemptions enshrined in the E-Commerce Directive effectively require intermediaries to police online content if they wish to maintain immunity regarding third party content. Such an approach results in delegated private enforcement that may lead to interference with the right to freedom of expression. Involving intermediaries in content regulation may be inevitable. The legal framework, on which it is based, however, should come equipped with safeguards that ensure effective protection of the right to freedom of expression.This book analyses the positive obligation of the European Union to introduce safeguards for freedom of expression when delegating the realisation of public policy objectives to Internet intermediaries.It also identifies and describes the safeguards that should be implemented in order to better protect freedom of expression.In a time when these issues are of particular relevance, Intermediary liability and freedom of expression in the EU provides the reader with a broader perspective on the problem of delegated regulation of expression on theInternet. It also provides the reader with up-to-date information on the discussions in the EU.
Cyber and its related technologies such as the Internet was introduced to the world only in late 1980s, and today it is unimaginable to think of a life without it. Despite being ubiquitous, cyber technology is still seen as an enigma by many, mainly due to its rapid development and the high level of science involved. In addition to the existing complexities of the technology, the level of threat matrix surrounding the cyber domain further leads to various misconceptions and exaggerations. Cyber technology is the future, thus forcing us to understand this complex domain to survive and evolve as technological beings. To understand the enigma, the book analyzes and disentangles the issues related to cyber technology. The author unravels the threats that terrorize the cyber world and aims to decrypt its domain. It also presents the existing reality of cyber environment in India and charts out a few recommendations for enhancing the country's cyber security architecture. Further, the book delves into detailed analysis of various issues like hacking, dark web, cyber enabled terrorism and covert cyber capabilities of countries like the US and China. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka
It has been said that the only asset that a lawyer has is time. But the reality is that a lawyer's greatest asset is information. The practice and the business of law is all about information exchange. The flow of information travels in a number of different directions during the life of a case. A client communicates certain facts to a lawyer. The lawyer assimilates those facts and seeks out specialised legal information which may be applicable to those facts. In the course of a generation there has been a technological revolution which represents a paradigm shift in the flow of information and communication. Collisions in the Digital Paradigm is about how the law deals with digital information technologies and some of the problems that arise when the law has to deal with issues arising in a new paradigm.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
The General Data Protection Regulation in Plain Language is a guide for anyone interested in the much-discussed rules of the GDPR. In this legislation, which came into force in 2018, the European Union meticulously describes what you can and cannot do with data about other people. Violating these rules can lead to a fine of up to 20 million euros. This book sets out the most important obligations of individuals and organisations that process data about others. These include taking technical security measures, carrying out an impact assessment and registering all data-processing procedures within an organisation. It also discusses the rights of citizens whose data are processed, such as the right to be forgotten, the right to information and the right to data portability.
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
This book critically confronts perceptions that social media has become a 'wasteland' for young people. Law has become preoccupied with privacy, intellectual property, defamation and criminal behaviour in and through social media. In the case of children and youth, this book argues, these preoccupations - whilst important - have disguised and distracted public debate away from a much broader, and more positive, consideration of the nature of social media. In particular, the legal tendency to consider social media as 'dangerous' for young people - to focus exclusively on the need to protect and control their online presence and privacy, whilst tending to suspect, or to criminalise, their use of it - has obscured the potential of social media to help young people to participate more fully as citizens in society. Drawing on sociological work on the construction of childhood, and engaging a wide range of national and international legal material, this book argues that social media may yet offer the possibility of an entirely different - and more progressive -conceptualisation of children and youth.
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
Mass digitization of texts, images, and other creative works promises to unprecedentedly enhance access to culture and knowledge. With the electronic 'library of Alexandria' having started to materialize, a number of legal and policy issues have emerged. The book develops an extended conceptual account of the ways in which mass digital projects challenge the established copyright norms through the wholesale copying of works, their storage in cloud environments, and their automated processing for purposes of data analytics and text mining. As individual licensing is not compatible with the mass scale of these activities, alternative approaches have gained momentum as effect of judicial interpretation, legislative initiative and private-ordering solutions. This book queries the normative and policy implications of this newly emerging framework in copyright law. Adopting a cross-jurisdictional perspective, it concludes that lack of clarity as to the scope of authorial consent does not only bear the risk of legal uncertainty, but can also lead to the creation of new and not readily transparent monopolies on information and knowledge. In this respect, a new regulatory framework is outlined drawing from the insights developed in areas of law where the concept of consent in the use of data has been thoroughly elaborated. Illustrating how mass digitization unveils a number of unsettled theoretical issues within copyright, the book builds a sophisticated case that digital repositories in the mass digital age should be and remain fully-fledged public goods to the benefit of future generations.
The fifth edition of Information Technology Law continues to be dedicated to a detailed analysis of and commentary on the latest developments within this burgeoning field of law. It provides an essential read for all those interested in the interface between law and technology and the effect of new technological developments on the law. The contents have been restructured and the reordering of the chapters provides a coherent flow to the subject matter. Criminal law issues are now dealt with in two separate chapters to enable a more focused approach to content crime. The new edition contains both a significant amount of incremental change as well as substantial new material and, where possible, case studies have been used to illustrate significant issues. In particular, new additions include: * Social media and the criminal law; * The impact of the decision in Google Spain and the 'right to be forgotten'; * The Schrems case and the demise of the Safe Harbour agreement; * The judicial reassessment of the proportionality of ICT surveillance powers within the UK and EU post the Madrid bombings; * The expansion of the ICANN gTLDs and the redesigned domain name registration and dispute resolution processes.
Tom Crone's classic text has been thoroughly revised by an impressive team of legal experts. It provides an essential source of reference for the key legal issues encountered by those who work in the media such as journalists, editors and producers, as well as media lawyers. Topics covered include: Protection of Reputation Copyright and Rights Clearance New Media Breach of Confidence and Privacy The Data Protection Act 1998 Reporting Restrictions, Contempt of Court and Protection of Journalistic Sources The Freedom of Information Act 2000 and Official Secrets Professional Regulatory Bodies and Advertising The Human Rights Act 1998 The Law in Scotland and the United States of America Comprehensive supplementary reference material is also provided, including a glossary of legal terms, addresses, telephone numbers and web sites of professional bodies, and specimen agreements including interview agreements and moral rights waivers. With contributions from: Terence Bergin, Marietta Cauchi, Jane Colston, Mark Cranwell, Charles de Fleurieu, Simon Dowson-Collins, David Green, Peter Grundberg, Rebecca Handler, Joanna Ludlam, Rosalind McInnes, Hugh Tomlinson and John Wadham.
In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society's interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a 'right to be forgotten', Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.
This study examines a key aspect of regulatory policy in the field of data protection, namely the frameworks governing the sharing of data for law enforcement purposes, both within the EU and between the EU and the US and other third party countries. The work features a thorough analysis of the main data-sharing instruments that have been used by law enforcement agencies and the intelligence services in the EU and in the US between 2001 to 2015. The study also explores the challenges to data protection which the current frameworks create, and explores the possible responses to those challenges at both EU and global levels. In offering a full overview of the current EU data-sharing instruments and their data protection rules, this book will be of significant benefit to scholars and policymakers working in areas related to privacy, data protection, national security and EU external relations.
Media Law for Producers is a comprehensive handbook that explains, in lay terms, the myriad legal issues that the producer will face on a regular basis - contracts, permits, defamation, patents, releases and insurance, libel, royalties and residuals, as well as protecting the finished production. This revised and expanded edition includes such Internet-related topics as Internet music law, online registration, and online privacy. Other new topics covered include: * Implied and express contracts in the project/idea submission process * Assignment/transfer of copyright * Music clip licensing * Use of other people's trademarks in media production * Parody as a defense to copyright infringement Clear explanations examine the how and why of different types of production contracts, and checklists provide a quick means for producers to determine when their productions might be at greatest risk to legal challenges. Media Law for Producers also examines the substantial changes in copyright term resulting from recent copyright legislation. Legal problems can be very costly to media producers. Lawyers and court fees, coupled with the loss of work time, can lead to bankruptcy. Media Law for Producers cuts through the legalese and illustrates legal issues to help producers recognize the legal questions that can arise during production.
Maps the landscape of contemporary informational interests. Of considerable interest to those working at the intersection of law and technology, as well as others concerned with the legal, political, and social aspects of our information society.
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is a full-time job. This updated, everything-you-need-to-know reference removes the uncertainty. Internet and the Law: Technology, Society, and Compromises, Second Edition is the go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about how to protect intellectual creations, but about what should be protected. Entries also discuss how the Web has brought First Amendment rights and free expression into question as society grapples with attempts to control "leaks" and to restrict content such as pornography, spam, defamation, and criminal speech. Explains complex legal and technical concepts clearly and understandably through entries that range from 500 to 5,000 words Covers a wide range of topics, including censorship, copyright, domain name disputes, file-sharing, hacking, patents, spam, malware, international law, tax issues, trademarks, and viruses Features an introductory guide to the U.S. legal system, including how to find, read, and understand sources of law Includes cases, statutes, and international treaties relevant to the law of information technology and the Internet
Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.
Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media.
This book offers an original analysis of private copying and determines its actual scope as an area of end-user freedom. The basis of this examination is Article 5(2)(b) of the Copyright Directive. Despite the fact that copying for private and non-commercial use is permitted by virtue of this article and the national laws that implemented it, there is no mandate that this privilege should not be technologically or contractually restricted. Because the legal nature of private copying is not settled, users may consider that they have a 'right' to private copying, whereas rightholders are in position to prohibit the exercise of this 'right'. With digital technology and the internet, this tension has become prominent: the conceptual contours of permissible private copying, namely the private and non-commercial character of the use, do not translate well, and tend to be less clear in the digital context. With the permissible limits of private copying being contested and without clarity as to the legal nature of the private coping limitation, the scope of user freedom is being challenged. Private use, however, has always remained free in copyright law. Not only is it synonymous with user autonomy via the exhaustion doctrine, but it also finds protection under privacy considerations which come into play at the stage of copyright enforcement. The author of this book argues that the rationale for a private copying limitation remains unaltered in the digital world and maintains there is nothing to prevent national judges from interpreting the legal nature of private copying as a 'sacred' privilege that can be enforced against possible restrictions. Private Copying will be of particular interest to academics, students and practitioners of intellectual property law.
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law. |
You may like...
The Accidental Mayor - Herman Mashaba…
Michael Beaumont
Paperback
(5)
Multiple Access Communications - 5th…
Boris Bellalta, Alexey Vinel, …
Paperback
R1,793
Discovery Miles 17 930
Blockchain 3.0 for Sustainable…
Deepak Khazanchi, Ajay Kumar Vyas, …
Hardcover
R3,934
Discovery Miles 39 340
Theoretical Computer Science - 6th IFIP…
Christian S. Calude, Vladimiro Sassone
Hardcover
R1,464
Discovery Miles 14 640
This Is Jesus Christ - An Interactive…
Edward Kenneth Watson
Hardcover
|