![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
The relationship between hacking and the law has always been complex and conflict-ridden. This book examines the relations and interactions between hacking and the law with a view to understanding how hackers influence and are influenced by technology laws and policies. In our increasingly digital and connected world where hackers play a significant role in determining the structures, configurations and operations of the networked information society, this book delivers an interdisciplinary study of the practices, norms and values of hackers and how they conflict and correspond with the aims and aspirations of hacking-related laws. Describing and analyzing the legal and normative impact of hacking, as well as proposing new approaches to its regulation and governance, this book makes an essential contribution to understanding the socio-technical changes, and consequent legal challenges, faced by our contemporary connected society.
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
This book seeks to answer one central question: do the U.S. cable and satellite retransmission statutory licenses comply with the TRIPs minimum standard? As with all legal problems, the resolution of ambiguity provides the challenge--and the interest. In this regard, by far the greatest ambiguity is created by the use of the term "equitable renumeration" in the TRIPs retransmission norm. Resort will be had to not only the drafting history of the TRIPs incorporated Berne Convention article, but also to the discipline of economics and to the field of restitutionary monetary awards in common law countries, to seek to provide a meaning for that term. This book is unique in so far as it purports to undertake to provide an analysis whereby a TRIPs compliance issue is considered fully at a theoretical level in an attempt to provide an answer. In so doing, it is hoped that the analysis will provide a methodology for the consideration of the compliance of national laws with intellectual property treaty obligations, which is of use to anyone who may wish to consider such compliance issues in the future.
Lipton considers the balance between trademark policy, free speech and other pressing interests in domain names, such as privacy and personality rights and cultural and political interests.
Mass digitization of texts, images, and other creative works promises to unprecedentedly enhance access to culture and knowledge. With the electronic 'library of Alexandria' having started to materialize, a number of legal and policy issues have emerged. The book develops an extended conceptual account of the ways in which mass digital projects challenge the established copyright norms through the wholesale copying of works, their storage in cloud environments, and their automated processing for purposes of data analytics and text mining. As individual licensing is not compatible with the mass scale of these activities, alternative approaches have gained momentum as effect of judicial interpretation, legislative initiative and private-ordering solutions. This book queries the normative and policy implications of this newly emerging framework in copyright law. Adopting a cross-jurisdictional perspective, it concludes that lack of clarity as to the scope of authorial consent does not only bear the risk of legal uncertainty, but can also lead to the creation of new and not readily transparent monopolies on information and knowledge. In this respect, a new regulatory framework is outlined drawing from the insights developed in areas of law where the concept of consent in the use of data has been thoroughly elaborated. Illustrating how mass digitization unveils a number of unsettled theoretical issues within copyright, the book builds a sophisticated case that digital repositories in the mass digital age should be and remain fully-fledged public goods to the benefit of future generations.
The fifth edition of Information Technology Law continues to be dedicated to a detailed analysis of and commentary on the latest developments within this burgeoning field of law. It provides an essential read for all those interested in the interface between law and technology and the effect of new technological developments on the law. The contents have been restructured and the reordering of the chapters provides a coherent flow to the subject matter. Criminal law issues are now dealt with in two separate chapters to enable a more focused approach to content crime. The new edition contains both a significant amount of incremental change as well as substantial new material and, where possible, case studies have been used to illustrate significant issues. In particular, new additions include: * Social media and the criminal law; * The impact of the decision in Google Spain and the 'right to be forgotten'; * The Schrems case and the demise of the Safe Harbour agreement; * The judicial reassessment of the proportionality of ICT surveillance powers within the UK and EU post the Madrid bombings; * The expansion of the ICANN gTLDs and the redesigned domain name registration and dispute resolution processes.
In an age of smartphones, Facebook and YouTube, privacy may seem to be a norm of the past. This book addresses ethical and legal questions that arise when media technologies are used to give individuals unwanted attention. Drawing from a broad range of cases within the US, UK, Australia, Europe, and elsewhere, Mark Tunick asks whether privacy interests can ever be weightier than society's interest in free speech and access to information. Taking a comparative and interdisciplinary approach, and drawing on the work of political theorist Jeremy Waldron concerning toleration, the book argues that we can still have a legitimate interest in controlling the extent to which information about us is disseminated. The book begins by exploring why privacy and free speech are valuable, before developing a framework for weighing these conflicting values. By taking up key cases in the US and Europe, and the debate about a 'right to be forgotten', Tunick discusses the potential costs of limiting free speech, and points to legal remedies and other ways to develop new social attitudes to privacy in an age of instant information sharing. This book will be of great interest to students of privacy law, legal ethics, internet governance and media law in general.
Tom Crone's classic text has been thoroughly revised by an impressive team of legal experts. It provides an essential source of reference for the key legal issues encountered by those who work in the media such as journalists, editors and producers, as well as media lawyers. Topics covered include: Protection of Reputation Copyright and Rights Clearance New Media Breach of Confidence and Privacy The Data Protection Act 1998 Reporting Restrictions, Contempt of Court and Protection of Journalistic Sources The Freedom of Information Act 2000 and Official Secrets Professional Regulatory Bodies and Advertising The Human Rights Act 1998 The Law in Scotland and the United States of America Comprehensive supplementary reference material is also provided, including a glossary of legal terms, addresses, telephone numbers and web sites of professional bodies, and specimen agreements including interview agreements and moral rights waivers. With contributions from: Terence Bergin, Marietta Cauchi, Jane Colston, Mark Cranwell, Charles de Fleurieu, Simon Dowson-Collins, David Green, Peter Grundberg, Rebecca Handler, Joanna Ludlam, Rosalind McInnes, Hugh Tomlinson and John Wadham.
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.
Media Law for Producers is a comprehensive handbook that explains, in lay terms, the myriad legal issues that the producer will face on a regular basis - contracts, permits, defamation, patents, releases and insurance, libel, royalties and residuals, as well as protecting the finished production. This revised and expanded edition includes such Internet-related topics as Internet music law, online registration, and online privacy. Other new topics covered include: * Implied and express contracts in the project/idea submission process * Assignment/transfer of copyright * Music clip licensing * Use of other people's trademarks in media production * Parody as a defense to copyright infringement Clear explanations examine the how and why of different types of production contracts, and checklists provide a quick means for producers to determine when their productions might be at greatest risk to legal challenges. Media Law for Producers also examines the substantial changes in copyright term resulting from recent copyright legislation. Legal problems can be very costly to media producers. Lawyers and court fees, coupled with the loss of work time, can lead to bankruptcy. Media Law for Producers cuts through the legalese and illustrates legal issues to help producers recognize the legal questions that can arise during production.
The world of Internet law is constantly changing and is difficult to follow, even for those for whom doing so is a full-time job. This updated, everything-you-need-to-know reference removes the uncertainty. Internet and the Law: Technology, Society, and Compromises, Second Edition is the go-to source for anyone who needs clear explanations of complex legal concepts related to online practices and content. This wide-ranging, alphabetical reference explores diverse areas of law, including territorial jurisdiction and taxation, that are relevant to or affected by advances in information technology and the rise of the Internet. Particular emphasis is placed on intellectual property law and laws regarding freedom of expression. The Internet, as this book shows, raises questions not only about how to protect intellectual creations, but about what should be protected. Entries also discuss how the Web has brought First Amendment rights and free expression into question as society grapples with attempts to control "leaks" and to restrict content such as pornography, spam, defamation, and criminal speech. Explains complex legal and technical concepts clearly and understandably through entries that range from 500 to 5,000 words Covers a wide range of topics, including censorship, copyright, domain name disputes, file-sharing, hacking, patents, spam, malware, international law, tax issues, trademarks, and viruses Features an introductory guide to the U.S. legal system, including how to find, read, and understand sources of law Includes cases, statutes, and international treaties relevant to the law of information technology and the Internet
E-voting is the use of electronic means in the casting of the vote at political elections or referendums. This book provides an overview of e-voting related case-law worldwide and explains how judicial decisions impact e-voting development. With contributions by renowned experts on thirteen countries, the authors discuss e-voting both from controlled environments, such as voting machines in polling stations, and uncontrolled ones, including internet voting. Each chapter examines a group of country-specific leading judicial decisions on e-voting and their likely impact on its future development. Reference is made to emerging standards on e-voting such as the Recommendation Rec(2004)11 of the Council of Europe, the only international instrument on e-voting regulation, and to other countries' case-law. The work provides a broader, informative and easily accessible perspective on the historical, political and legal aspects of an otherwise very technical subject, and contributes to a better understanding of the significance of case law and its impact in shaping e-voting's future development. The book will be significantly useful to anyone with an interest in e-voting, in particular decision makers and officials, researchers and academia, as well as NGOs and providers of e-voting solutions.
Stefan Larsson's Conceptions in the Code makes a significant contribution to sociolegal analysis, representing a valuable contribution to conceptual metaphor theory. By utilising the case of copyright in a digital context it explains the role that metaphor plays when the law is dealing with technological change, displaying both conceptual path-dependence as well as what is called non-legislative developments in the law. The overall analysis draws from conceptual studies of "property" in intellectual property. By using Karl Renner's account of property, Larsson demonstrates how the property regime of copyright is the projection of an older regime of control onto a new set of digital social relations. Further, through an analysis of the concept of "copy" in copyright as well as the metaphorical battle of defining the BitTorrent site "The Pirate Bay" in the Swedish court case with its founders, Larsson shows the historical and embodied dependence of digital phenomena in law, and thereby how normative aspects of the source concept also stains the target domain. The book also draws from empirical studies on file sharing and historical expressions of the conceptualisation of law, revealing both the cultural bias of both file sharing and law. Also law is thereby shown to be largely depending on metaphors and embodiment to be reified and understood. The contribution is relevant for the conceptual and regulatory struggles of a multitude of contemporary socio-digital phenomena in addition to copyright and file sharing, including big data and the oft-praised "openness" of digital innovation.
Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.
This book offers an original analysis of private copying and determines its actual scope as an area of end-user freedom. The basis of this examination is Article 5(2)(b) of the Copyright Directive. Despite the fact that copying for private and non-commercial use is permitted by virtue of this article and the national laws that implemented it, there is no mandate that this privilege should not be technologically or contractually restricted. Because the legal nature of private copying is not settled, users may consider that they have a 'right' to private copying, whereas rightholders are in position to prohibit the exercise of this 'right'. With digital technology and the internet, this tension has become prominent: the conceptual contours of permissible private copying, namely the private and non-commercial character of the use, do not translate well, and tend to be less clear in the digital context. With the permissible limits of private copying being contested and without clarity as to the legal nature of the private coping limitation, the scope of user freedom is being challenged. Private use, however, has always remained free in copyright law. Not only is it synonymous with user autonomy via the exhaustion doctrine, but it also finds protection under privacy considerations which come into play at the stage of copyright enforcement. The author of this book argues that the rationale for a private copying limitation remains unaltered in the digital world and maintains there is nothing to prevent national judges from interpreting the legal nature of private copying as a 'sacred' privilege that can be enforced against possible restrictions. Private Copying will be of particular interest to academics, students and practitioners of intellectual property law.
Invaluable guidance on the most important legal issues facing nonprofits today Internet communication is the lifeblood of countless nonprofit organizations, yet there exists no specific law to provide for its regulation. Without solid legal guidance, nonprofits risk not only missing out on the unlimited opportunities that the Internet has to offer, but also jeopardizing their tax-exempt status. The Nonprofits' Guide to Internet Communications Law analyzes and explains the laws applicable to Internet communications by nonprofit organizations. Nonprofit law expert Bruce Hopkins writes that with Congress and government agencies reluctant to create new law, it will ultimately be up to the courts to determine the future of Internet law affecting nonprofit organizations. Extrapolating from the underlying principles of existing law, Hopkins addresses the legal ramifications of Internet business activities, charitable-giving administration, fundraising programs, lobbying, political campaign activities, and more. The Nonprofits' Guide to Internet Communications Law proves an unparalleled resource for this emerging field.
Breaking Away sounds a warning call alerting readers that their privacy and autonomy concerns are indeed warranted, and the remedies deserve far greater attention than they have received from our leading policymakers and experts to date. Through the various prisms of economic theory, market data, policy, and law, the book offers a clear and accessible insight into how a few powerful firms - Google, Apple, Facebook (Meta), and Amazon - have used the same anticompetitive playbook and manipulated the current legal regime for their gain at our collective expense. While much has been written about these four companies' power, far less has been said about addressing their risks. In looking at the proposals to date, however, policymakers and scholars have not fully addressed three fundamental issues: First, will more competition necessarily promote our privacy and well-being? Second, who owns the personal data, and is that even the right question? Third, what are the policy implications if personal data is non-rivalrous? Breaking Away not only articulates the limitations of the current enforcement and regulatory approach but offers concrete proposals to promote competition, without having to sacrifice our privacy. This book explores how these platforms accumulated their power, why the risks they pose are far greater than previously believed, and why the tools need to be far more robust than what is being proposed. Policymakers, scholars, and business owners, managers, and entrepreneurs seeking to compete and innovate in the digital platform economy will find the book an invaluable source of information.
In this book, Benjamin Farrand employs an interdisciplinary approach that combines legal analysis with political theory to explore the development of copyright law in the EU. Farrand utilises Foucault's concept of Networks of Power and Culpepper's Quiet Politics to assess the adoption and enforcement of copyright law in the EU, including the role of industry representative, cross-border licensing, and judicial approaches to territorial restrictions. Focusing in particular on legislative initiatives concerning copyright, digital music and the internet, Networks of Power in Digital Copyright Law and Policy: Political Salience, Expertise and the Legislative Process demonstrates the connection between copyright law and complex network relationships. This book presents an original socio-political theoretical framework for assessing developments in copyright law that will interest researchers and post-graduate students of law and politics, as well as those more particularly concerned with political theory, EU and copyright law.
During this era of construction of the information superhighway, this volume presents a prudent analysis of the pros and cons of continuing state regulation of telecommunications. While interested parties either attack or defend state regulation, careful scholarly analysis is required to strike the appropriate balance of regulatory federalism. Focusing on regulation in the 1990s, it uses a positive political economy perspective to analyze enduring state-federal conflicts and to weigh the justifications and explanations for continuing state telecommunications regulation, or for changing its structure. It also considers normative concerns and makes recommendations about how to improve telecommunications policy. Seriously concerned with assessing the problems surrounding cost burdens for different categories of consumers, market entry for different firms, economic growth and the information infrastructure, global competitiveness, and control over information, this volume attempts to provide answers to the following specific questions: * How are states regulating telecommunications in the brave new world of global markets, fiber optics, and digital technology? * Do states vary significantly in their regulatory models? * How are the politics of state and federal regulation different? * Would a different federal-state relationship better serve national telecommunications goals in the future? To tackle these critical questions, the scholarly perspectives of economists, lawyers, political scientists, and telecommunications consultants and practitioners are employed.
"Cohen v. Cowles Media Company" changed the course of First Amendment media law. After a quarter century of decisions interpreting the First Amendment to give media organizations preferential treatment, the Supreme Court ruled in 1991 that the Constitution did not give the press immunity from the laws ordinary citizens must obey. The American Bar Association quarterly "Communications Lawyer" (Spring 1998) calls "Cohen" a media law hall of fame case. The author, who was the plaintiff's sole attorney in all phases of the case, provides detailed analysis of the complexities of constitutional litigation and the strategic and tactical considerations involved in formulating constitutional arguments in the Supreme Court and other courts. This is a classic David v. Goliath story of a lone lawyer who worked out of his basement taking on media and legal giants and winning. Scores of attorneys from major law firms around the country represented the Minneapolis and St. Paul newspaper defendants and their allies in court in a case where experts were confident that the press could never lose. The "Cohen" decision has revolutionized the law regarding accountability for wrongdoing by media organizations, and many federal and state courts have relied upon the "Cohen" case in holding media organizations liable for their actions. This lively account will interest not only legal and media scholars, but all readers interested in correcting injustice.
In this book Konstantinos Komaitis identifies a tripartite problem - intellectual, institutional and ethical - inherent in the domain name regulation culture. Using the theory of property, Komaitis discusses domain names as sui generis 'e-property' rights and analyses the experience of the past ten years, through the Uniform Domain Name Dispute Resolution Policy (UDRP) and the Anticybersquatting Consumer Protection Act (ACPA). The institutional deficit he identifies, generates a further discussion on the ethical dimensions in the regulation of domain names and prompts Komaitis to suggest the creation of an environment based on justice. The relationship between trademarks and domain names has always been contentious and the existing institutions of the UDRP and ACPA have not assisted in alleviating the tension between the two identifiers. Over the past ten years, the trademark community has been systematic in encouraging and promoting a culture that indiscriminately considers domain names as secondclass citizens, suggesting that trademark rights should have priority over the registration in the domain name space. Komaitis disputes this assertion and brings to light the injustices and the trademark-oriented nature of the UDRP and ACPA. He queries what the appropriate legal source to protect registrants when not seeking to promote trademark interests is. He also delineates a legal hypothesis on their nature as well as the steps of their institutionalisation process that we need to reverse, seeking to create a just framework for the regulation of domain names. Finally he explores how the current policies contribute to the philosophy of domain names as second-class citizens. With these questions in mind, Komaitis suggests some recommendations concerning the reconfiguration of the regulation of domain names.
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings. Among the overarching topics treated in the Chinese context are the following: intellectual property protection in cyberspace; privacy of communication and data privacy; electronic contract forming and electronic signature; personal, domestic and international jurisdiction; and free expression in cyberspace. This book is particularly valuable to legal, business, and communication professionals, academics, and students concerned with the regulation of the Internet and related activities in China. It is the first book to focus solely on Chinese Internet law.
This volume presents analyses of data protection systems and of 26 jurisdictions with data protection legislation in Africa, as well as additional selected countries without comprehensive data protection laws. In addition, it covers all sub-regional and regional data privacy policies in Africa. Apart from analysing data protection law, the book focuses on the socio-economic contexts, political settings and legal culture in which such laws developed and operate. It bases its analyses on the African legal culture and comparative international data privacy law. In Africa protection of personal data, the central preoccupation of data privacy laws, is on the policy agenda. The recently adopted African Union Cyber Security and Data Protection Convention 2014, which is the first and currently the only single treaty across the globe to address data protection outside Europe, serves as an illustration of such interest. In addition, there are data protection frameworks at sub-regional levels for West Africa, East Africa and Southern Africa. Similarly, laws on protection of personal data are increasingly being adopted at national plane. Yet despite these data privacy law reforms there is very little literature about data privacy law in Africa and its recent developments. This book fills that gap.
A PDF version of this book is available for free in open access via www.tandfebooks.com as well as the OAPEN Library platform, www.oapen.org. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 3.0 license and is part of the OAPEN-UK research project. E-commerce offers immense challenges to traditional dispute resolution methods, as it entails parties often located in different parts of the world making contracts with each other at the click of a mouse. The use of traditional litigation for disputes arising in this forum is often inconvenient, impractical, time-consuming and expensive due to the low value of the transactions and the physical distance between the parties. Thus modern legal systems face a crucial choice: either to adopt traditional dispute resolution methods that have served the legal systems well for hundreds of years or to find new methods which are better suited to a world not anchored in territorial borders. Online Dispute Resolution (ODR), originally an off-shoot of Alternative Dispute Resolution (ADR), takes advantage of the speed and convenience of the Internet, becoming the best, and often the only option for enhancing consumer redress and strengthening their trust in e-commerce. This book provides an in-depth account of the potential of ODR for European consumers, offering a comprehensive and up to date analysis of the development of ODR. It considers the current expansion of ODR and evaluates the challenges posed in its growth. The book proposes the creation of legal standards to close the gap between the potential of ODR services and their actual use, arguing that ODR, if it is to realise its full potential in the resolution of e-commerce disputes and in the enforcement of consumer rights, must be grounded firmly on a European regulatory model.
Customary Law of the Internet is the first book that deals comprehensively with the emergence of a new kind of law on the Internet that could be utilized by governments and private arbitrators to settle disputes and make better laws. This new kind of law is what once used to be the only source of legal rights and obligations: customary law. The author first addresses issues posed by the emergence of the Internet and analyses relevant international treaties, in particular the Convention on the Use of Electronic Communications in International Contracting. He then comes to the emerging customary norms developed by the Internet community, the importance of custom from an historical perspective and the nature of international custom. The concept of Internet custom is introduced, followed by a detailed methodology for evidencing customary norms in judicial proceedings. The last part of the book is devoted to the novel concept of autonomous Internet law, based on customary norms of the Internet community, arbitral and judicial awards, general principles of law, conventions, model laws, commonly used contract terms and technical standards. Several Internet customs are discussed in the area of intellectual property, electronic contracting, online advertising and transaction security. This book is addressed both to national and international governments, judges and arbitrators as well as to online traders, researchers and the Internet community as a whole. It is an important tool for academics and practitioners interested and active in cyberspace regulation and the Information Technology community. Dr Paul Przemyslaw Polanski (BBus, magister prawa) is presently a senior researcher at the Department of European Law, Faculty of Law, University of Warsaw, and Department of Information Systems, Leon Kozminski Academy of Entrepreneurship and Management (LKAEM), Warsaw. Previously, he worked as a computer programmer in the Australian IT industry and as a researcher at the University of Melbourne and Monash University. He also worked for legal offices in Poland, specializing in information technology law, contracts, property and EU law. Currently, he administers the e-learning platform www.elaw.pl. This is Volume 13 in the Information Technology and Law (IT&Law) Series |
![]() ![]() You may like...
STEM Research for Students Volume 1…
Julia H Cothron, Ronald N Giese, …
Hardcover
R2,880
Discovery Miles 28 800
Online Learning and Assessment in Higher…
Robyn Benson, Charlotte Brack
Paperback
R1,648
Discovery Miles 16 480
|