![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This book examines the fundamental question of how legislators and other rule-makers should handle remembering and forgetting information (especially personally identifiable information) in the digital age. It encompasses such topics as privacy, data protection, individual and collective memory, and the right to be forgotten when considering data storage, processing and deletion. The authors argue in support of maintaining the new digital default, that (personally identifiable) information should be remembered rather than forgotten. The book offers guidelines for legislators as well as private and public organizations on how to make decisions on remembering and forgetting personally identifiable information in the digital age. It draws on three main perspectives: law, based on a comprehensive analysis of Swiss law that serves as an example; technology, specifically search engines, internet archives, social media and the mobile internet; and an interdisciplinary perspective with contributions from various disciplines such as philosophy, anthropology, sociology, psychology, and economics, amongst others.. Thanks to this multifaceted approach, readers will benefit from a holistic view of the informational phenomenon of "remembering and forgetting". This book will appeal to lawyers, philosophers, sociologists, historians, economists, anthropologists, and psychologists among many others. Such wide appeal is due to its rich and interdisciplinary approach to the challenges for individuals and society at large with regard to remembering and forgetting in the digital age.
The new edition of this acclaimed book gives a fully updated overview of European data protection law affecting companies, incorporating the important legal developments which have taken place since the last edition was published. These include the first three cases of the European Court of Justice interpreting the EU Data Protection Directive (95/46), the Commission's first report on the implementation of the Directive, the Data Retention Directive, new developments in international data transfers, conflicts between security requirements and data protection, and the implementation of the Electronic Communications and Privacy Directive 2002/58 in the Member States. It also covers the recent European Court of Justice decision on the controversial export of airline passenger data to the US, and expands its European overview to include the new and acceding Member States. The book contains comprehensive coverage of data protection law, while at the same time providing pragmatic guidance on the typical compliance issues that companies face. As globalization of the world economy continues, an increasing number of business issues with data protection implications have come to the foreground, for example, outsourcing, whistleblower hotlines and records management, all of which are covered in the book. The appendices have been expanded to include most sources which a company will need, such as the texts of relevant directives, the safe harbor principles and FAQs, and charts of implementation in the Member States of specific provisions of interest to business. Thus, the book is a single reference source for companies faced with data protection issues. A Chinese edition of the book was published in 2008, making it the first in-depth treatise on European data protection law published in Chinese.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
Rights, Regulation and the Technological Revolution confronts a
central question facing modern government - how can regulators
respond to both the challenges and opportunities presented by a
technologically-driven society without sacrificing legitimacy for
effectiveness, or weakening the essential conditions of a stable,
aspirant moral community?
Our society has a technology problem. Many want to disconnect from screens but can't help themselves. These days we spend more time online than ever. Some turn to self-help-measures to limit their usage, yet repeatedly fail, while parents feel particularly powerless to help their children. Unwired: Gaining Control over Addictive Technologies shows us a way out. Rather than blaming users, the book shatters the illusion that we autonomously choose how to spend our time online. It shifts the moral responsibility and accountability for solutions to corporations. Drawing lessons from the tobacco and food industries, the book demonstrates why government regulation is necessary to curb technology addiction. It describes a grassroots movement already in action across courts and legislative halls. Groundbreaking and urgent, Unwired provides a blueprint to develop this movement for change, to one that will allow us to finally gain control.
It has been said that the only asset that a lawyer has is time. But the reality is that a lawyer's greatest asset is information. The practice and the business of law is all about information exchange. The flow of information travels in a number of different directions during the life of a case. A client communicates certain facts to a lawyer. The lawyer assimilates those facts and seeks out specialised legal information which may be applicable to those facts. In the course of a generation there has been a technological revolution which represents a paradigm shift in the flow of information and communication. Collisions in the Digital Paradigm is about how the law deals with digital information technologies and some of the problems that arise when the law has to deal with issues arising in a new paradigm.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
States increasingly delegate regulatory and police functions to Internet intermediaries. The delegation is achieved by providing an incentive in the form of conditional liability exemptions. In the EU, the exemptions enshrined in the E-Commerce Directive effectively require intermediaries to police online content if they wish to maintain immunity regarding third party content. Such an approach results in delegated private enforcement that may lead to interference with the right to freedom of expression. Involving intermediaries in content regulation may be inevitable. The legal framework, on which it is based, however, should come equipped with safeguards that ensure effective protection of the right to freedom of expression.This book analyses the positive obligation of the European Union to introduce safeguards for freedom of expression when delegating the realisation of public policy objectives to Internet intermediaries.It also identifies and describes the safeguards that should be implemented in order to better protect freedom of expression.In a time when these issues are of particular relevance, Intermediary liability and freedom of expression in the EU provides the reader with a broader perspective on the problem of delegated regulation of expression on theInternet. It also provides the reader with up-to-date information on the discussions in the EU.
The General Data Protection Regulation in Plain Language is a guide for anyone interested in the much-discussed rules of the GDPR. In this legislation, which came into force in 2018, the European Union meticulously describes what you can and cannot do with data about other people. Violating these rules can lead to a fine of up to 20 million euros. This book sets out the most important obligations of individuals and organisations that process data about others. These include taking technical security measures, carrying out an impact assessment and registering all data-processing procedures within an organisation. It also discusses the rights of citizens whose data are processed, such as the right to be forgotten, the right to information and the right to data portability.
A powerful argument for new laws and policies regarding cyber-security, from the former US Secretary of Homeland Security. The most dangerous threat we-individually and as a society-face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack. In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data-more widespread by business than by government, and impossible to stop-should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analysed or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not only the simple loss of privacy, which is almost impossible to protect, but also that of individual autonomy-the ability to make personal choices free of manipulation or coercion. Offering colourful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today and charts a forceful new strategy that balances the needs of government, business and individuals alike.
This book discusses the implementation of privacy by design in Europe, a principle that has been codified within the European Data Protection Regulation (GDPR). While privacy by design inspires hope for future privacy-sensitive designs, it also introduces the need for a common understanding of the legal and technical concepts of privacy and data protection. By pursuing an interdisciplinary approach and comparing the problem definitions and objectives of both disciplines, this book bridges the gap between the legal and technical fields in order to enhance the regulatory and academic discourse. The research presented reveals the scope of legal principles and technical tools for privacy protection, and shows that the concept of privacy by design goes beyond the principle of the GDPR. The book presents an analysis of how current regulations delegate the implementation of technical privacy and data protection measures to developers and describes how policy design must evolve in order to implement privacy by design and default principles.
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
This book critically confronts perceptions that social media has become a 'wasteland' for young people. Law has become preoccupied with privacy, intellectual property, defamation and criminal behaviour in and through social media. In the case of children and youth, this book argues, these preoccupations - whilst important - have disguised and distracted public debate away from a much broader, and more positive, consideration of the nature of social media. In particular, the legal tendency to consider social media as 'dangerous' for young people - to focus exclusively on the need to protect and control their online presence and privacy, whilst tending to suspect, or to criminalise, their use of it - has obscured the potential of social media to help young people to participate more fully as citizens in society. Drawing on sociological work on the construction of childhood, and engaging a wide range of national and international legal material, this book argues that social media may yet offer the possibility of an entirely different - and more progressive -conceptualisation of children and youth.
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
Mass digitization of texts, images, and other creative works promises to unprecedentedly enhance access to culture and knowledge. With the electronic 'library of Alexandria' having started to materialize, a number of legal and policy issues have emerged. The book develops an extended conceptual account of the ways in which mass digital projects challenge the established copyright norms through the wholesale copying of works, their storage in cloud environments, and their automated processing for purposes of data analytics and text mining. As individual licensing is not compatible with the mass scale of these activities, alternative approaches have gained momentum as effect of judicial interpretation, legislative initiative and private-ordering solutions. This book queries the normative and policy implications of this newly emerging framework in copyright law. Adopting a cross-jurisdictional perspective, it concludes that lack of clarity as to the scope of authorial consent does not only bear the risk of legal uncertainty, but can also lead to the creation of new and not readily transparent monopolies on information and knowledge. In this respect, a new regulatory framework is outlined drawing from the insights developed in areas of law where the concept of consent in the use of data has been thoroughly elaborated. Illustrating how mass digitization unveils a number of unsettled theoretical issues within copyright, the book builds a sophisticated case that digital repositories in the mass digital age should be and remain fully-fledged public goods to the benefit of future generations.
The fifth edition of Information Technology Law continues to be dedicated to a detailed analysis of and commentary on the latest developments within this burgeoning field of law. It provides an essential read for all those interested in the interface between law and technology and the effect of new technological developments on the law. The contents have been restructured and the reordering of the chapters provides a coherent flow to the subject matter. Criminal law issues are now dealt with in two separate chapters to enable a more focused approach to content crime. The new edition contains both a significant amount of incremental change as well as substantial new material and, where possible, case studies have been used to illustrate significant issues. In particular, new additions include: * Social media and the criminal law; * The impact of the decision in Google Spain and the 'right to be forgotten'; * The Schrems case and the demise of the Safe Harbour agreement; * The judicial reassessment of the proportionality of ICT surveillance powers within the UK and EU post the Madrid bombings; * The expansion of the ICANN gTLDs and the redesigned domain name registration and dispute resolution processes.
Tom Crone's classic text has been thoroughly revised by an impressive team of legal experts. It provides an essential source of reference for the key legal issues encountered by those who work in the media such as journalists, editors and producers, as well as media lawyers. Topics covered include: Protection of Reputation Copyright and Rights Clearance New Media Breach of Confidence and Privacy The Data Protection Act 1998 Reporting Restrictions, Contempt of Court and Protection of Journalistic Sources The Freedom of Information Act 2000 and Official Secrets Professional Regulatory Bodies and Advertising The Human Rights Act 1998 The Law in Scotland and the United States of America Comprehensive supplementary reference material is also provided, including a glossary of legal terms, addresses, telephone numbers and web sites of professional bodies, and specimen agreements including interview agreements and moral rights waivers. With contributions from: Terence Bergin, Marietta Cauchi, Jane Colston, Mark Cranwell, Charles de Fleurieu, Simon Dowson-Collins, David Green, Peter Grundberg, Rebecca Handler, Joanna Ludlam, Rosalind McInnes, Hugh Tomlinson and John Wadham.
In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society's interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a 'right to be forgotten', Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.
The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is a full-time job. This updated, everything-you-need-to-know reference removes the uncertainty. Internet and the Law: Technology, Society, and Compromises, Second Edition is the go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about how to protect intellectual creations, but about what should be protected. Entries also discuss how the Web has brought First Amendment rights and free expression into question as society grapples with attempts to control "leaks" and to restrict content such as pornography, spam, defamation, and criminal speech. Explains complex legal and technical concepts clearly and understandably through entries that range from 500 to 5,000 words Covers a wide range of topics, including censorship, copyright, domain name disputes, file-sharing, hacking, patents, spam, malware, international law, tax issues, trademarks, and viruses Features an introductory guide to the U.S. legal system, including how to find, read, and understand sources of law Includes cases, statutes, and international treaties relevant to the law of information technology and the Internet
Media Law for Producers is a comprehensive handbook that explains, in lay terms, the myriad legal issues that the producer will face on a regular basis - contracts, permits, defamation, patents, releases and insurance, libel, royalties and residuals, as well as protecting the finished production. This revised and expanded edition includes such Internet-related topics as Internet music law, online registration, and online privacy. Other new topics covered include: * Implied and express contracts in the project/idea submission process * Assignment/transfer of copyright * Music clip licensing * Use of other people's trademarks in media production * Parody as a defense to copyright infringement Clear explanations examine the how and why of different types of production contracts, and checklists provide a quick means for producers to determine when their productions might be at greatest risk to legal challenges. Media Law for Producers also examines the substantial changes in copyright term resulting from recent copyright legislation. Legal problems can be very costly to media producers. Lawyers and court fees, coupled with the loss of work time, can lead to bankruptcy. Media Law for Producers cuts through the legalese and illustrates legal issues to help producers recognize the legal questions that can arise during production.
Maps the landscape of contemporary informational interests. Of considerable interest to those working at the intersection of law and technology, as well as others concerned with the legal, political, and social aspects of our information society.
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.
Billions of minutes a month are spent globally on social media. This raises not only serious legal issues, but also has a clear impact on everyday commercial activity. This book considers the significant legal developments that have arisen due to social media. It provides an expert explanation of the issues that practitioners and businesses need to consider, as well as the special measures that are required in order to minimise their exposure to risk. The content is highly practical, and not only explores the law related to social media, but also includes useful aids for the reader, such as flow charts, checklists and case studies. Various categories and channels of social media are covered in this book, alongside the legal classification of different social networks. Social media is also considered in the context of human rights law by evaluating the implications this has had upon the development of civil and criminal law when pursuing a civil remedy or criminal prosecution in relation to online speech. As part of these discussions the book deals specifically with the Defamation Act 2013, the Communications Act 2003, the Computer Misuse Act 1990 and the Contempt of Court Act 1988 among other key issues such as seeking Injunctions and the resulting privacy implications. Finally, the author also pays careful consideration to the commercial aspects raised by social media. The reader will find reference to key cases and regulatory guidance notes and statutes including, the Data Protection Act 1998 (including the draft Data Protection Regulation), user privacy, human rights, trading and advertising standards, special rules for FCA regulated bodies and social media insurance. This book is an invaluable guide for private practice and in-house practitioners, business professionals, academics and post-graduate students involved in the law surrounding social media. |
You may like...
Oscillation Theory for Difference and…
R.P. Agarwal, Said R. Grace, …
Hardcover
R2,841
Discovery Miles 28 410
Hindu Tribes and Castes ...; v.1
Matthew Atmore 1826-1880 Sherring
Hardcover
R1,013
Discovery Miles 10 130
Redemption - 2017 Tales from the Writers…
Bernie Dowling, Vera M Murray, …
Hardcover
R788
Discovery Miles 7 880
Writing Home - Lewis Nkosi on South…
Lindy Stibel, Michael Chapman
Paperback
The Portuguese In India Being A History…
Fredrich Charles Danvers
Hardcover
R831
Discovery Miles 8 310
Critical Infrastructure Protection III…
Charles Palmer, Sujeet Shenoi
Hardcover
R2,676
Discovery Miles 26 760
|