![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
This clearly written and well-focused volume combines concise decisions of the primary areas of communication law with the foundational case decisions in those domains. Thus, in one volume, students of communication law, constitutional law, political science, and related fields find both the key rulings that define each area of law and a detailed summary of the legal concepts, doctrines, and policies so vital to understanding the rulings within their legal context. The text forgoes the tendency to provide encyclopedic treatment of all the relevant cases and focuses instead on the two or three cases most vital to an accurate and informed understanding of the current state of each field of communication law. The chapters provide readers with the most salient concepts and the necessary depth to understand the law while permitting most reading time to be directed to the law itself. Full-text rulings allow readers to immerse themselves in the law itself--to develop a feel for its complexity, its flexibility, and its language. Useful as a quick reference to the landmark rulings and the jurisprudence of communication law, this book also serves well as the primary text in related undergraduate courses or as a supplemental text in graduate classes in the field.
Cybercrime and cybersecurity are of increasingly high profile not only within law enforcement but among policy makers, legal professionals and the general public. The establishment of the European Cybercrime Centre at Europol and the recent publication of guidelines on the prosecution of social media cases by the Director of Public Prosecutions serve as illustrations of the reach and impact of cybercrime related issues. As more of our day to day lives are conducted via digital mediums, cybercrime has ceased to be a purely specialist area and as technologies rapidly evolve and advance so do the challenges and threats raised, making it more important than ever for practitioners working in this area to stay up to date. Building on the detailed legal analysis in the first edition, this updated text remains the only comprehensive work to cover the complete lifecycle of cybercrimes, from their commission to their investigation and prosecution. With its clear and accesible structure, Computer Crimes and Digital Investigations provides essential guidance on the substantive and procedural aspects of cybercrimes for both experienced practitioners and for those new to the field. Substantial developments have occurred since the publication of the first edition of this work, in terms of the threats faced, the legislation and case law, and the response of law enforcement. The second edition will include new material on topics such as cyberwarfare; orders made against convicted criminals; and issues of surveillance and interception as well as expanded discussions of cyber security policy and laws, intermediary liability, developments in policing activities and prosecution policies, and developments in cross-border search and seizure and mutual legal assistance and extradition. An expanded comparative discussion of law and policy within the EU and under the Budapest Convention, as well as other international organisations such as the United Nations, places cybercrime in its international context.
The information society is a key issue in everyday life and a phenomenon enc- passing social, cultural, economic, and legal facettes. Currently, an information society's legal framework is gradually crystallizing under the newly introduced term of "Internet governance." During the last few years, intensive discussions about the contents of Internet governance have addressed manifold aspects of a possible regulatory regime. In light of the general comprehension that an international treaty structure is mi- ing and that self-regulation as a normative model does not sufce in all respects, new architectural and constitutional theories have been developed; furthermore, the international body of the Internet Governance Forum (IGF) came to life. N- withstanding the available literature on IGF, however, a thorough and systematic study sheding light on the main topics of Internet governance (such as legitimacy, transparency, accountability, and participation) and on the key regulatory issues (for example critical Internet resources, access, protection of civil liberties/- man rights, realization of security, safety and privacy standards, as well as the overcoming of the digital divide) from a legal perspective is not yet at hand. The present publication aims at discussing these legal challenges. This book has benefted from many inputs and encouragements from colleagues that I am deeply grateful for. In particular, I am indebted to the very meaningful discussions and valuable support in the preparation of the publication by my - search assistants lic. iur Mirin . a Grosz and lic. iurR . omana Weber, to lic. iur.
The Internet has created a formidable challenge for human rights law and practice worldwide. International scholarly and policy-oriented communities have so far established a consensus regarding only one main aspect - human rights in the internet are the same as offline. There are emerging and ongoing debates regarding not only the standards and methods to be used for achieving the "sameness" of rights online, but also whether "classical" human rights as we know them are contested by the online environment. The internet itself, in view of its cross-border nature and its ability to affect various areas of law, requires adopting an internationally oriented approach and a perspective strongly focused on social sciences. In particular, the rise of the internet, enhanced also by the influence of new technologies such as algorithms and intelligent artificial systems, has influenced individuals' civil, political and social rights not only in the digital world, but also in the atomic realm. As the coming of the internet calls into question well-established legal categories, a broader perspective than the domestic one is necessary to investigate this phenomenon. This book explores the main fundamental issues and practical dimensions related to the safeguarding of human rights in the internet, which are at the focus of current academic debates. It provides a comprehensive analysis with a forward-looking perspective of bringing order into the somewhat chaotic online dimension of human rights. It addresses the matter of private digital censorship, the apparent inefficiency of existing judicial systems to react to human rights violations online, the uncertainty of liability for online human rights violations, whether the concern with personal data protection overshadows multiple other human rights issues online and will be of value to those interested in human rights law and legal regulation of the internet.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
In 1952, legal scholar and historian Frederick S. Siebert published
his monumental study of three centuries of press freedom in
England, in which he enunciated and supported two propositions that
were remarkable for their simplicity. The second of the
propositions has become a guiding principle in the study of free
expression. This special issue provides a remarkable body of work
focusing on this key proposition in the context of one of today's
great tragedies--September 11, 2001. It begins with an essay
examining cycles of stability/stress and the reactions to those
cycles, followed by the application of a concept to courtroom
access issues following September 11. The last two articles provide
an account of how times of stress--the period following the events
of September 11, in particular--inhibit academic freedom and an
overview of Siebert's life and work.
Tinker. R.A.V. Ollman. Hustler-Falwell. Reno-ACLU. Nebraska Press
Association. These names are synonymous with contemporary First
Amendment litigation. To explore these landmark cases more deeply,
author Joseph Russomanno interviewed the people at the core of
these and other influential First Amendment cases, and he presents
their stories here in a personal, in-depth oral history of First
Amendment law. Previously unavailable in other literature, these
stories go beyond the "what" of the cases and answer the "why" and
"how" of ten major cases from the latter part of the 20th century.
Through their own words and photographs, plaintiffs, defendants,
and their attorneys describe what it was like to be involved in the
development of these historic First Amendment cases.
Economic regulation in the telecommunications sector can be performed through economy-wide instruments, such as antitrust law and antitrust authorities, or through sector-specific instruments, such as telecommunications regulation and regulatory authorities. Relying on a comparative analysis of five countries, the present book seeks to shed some light on the respective roles of both types of instruments in liberalized telecommunications markets.
Private companies exert considerable control over the flow of information on the internet. Whether users are finding information with a search engine, communicating on a social networking site or accessing the internet through an ISP, access to participation can be blocked, channelled, edited or personalised. Such gatekeepers are powerful forces in facilitating or hindering freedom of expression online. This is problematic for a human rights system which has historically treated human rights as a government responsibility, and this is compounded by the largely light-touch regulatory approach to the internet in the West. Regulating Speech in Cyberspace explores how these gatekeepers operate at the intersection of three fields of study: regulation (more broadly, law), corporate social responsibility and human rights. It proposes an alternative corporate governance model for speech regulation, one that acts as a template for the increasingly common use of non-state-based models of governance for human rights.
In this exceptional volume, Matthew D. Bunker explores the work of
contemporary free speech critics and argues that, while at times
these critics provide important lessons, many of their conclusions
must be rejected. Moreover, Bunker suggests that we be wary of
interdisciplinary approaches to free speech theory that--by their
very assumptions and techniques--are a poor "fit" with existing
free speech theory and doctrine. In his investigation of diverse
critiques of free speech theory and his sophisticated rebuttal, he
provides an innovative and important examination of First Amendment
theory. In doing so, he establishes a new agenda for First
Amendment theory scholarship that incorporates some of the critics'
insights without abandoning the best aspects of the free speech
tradition.
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
This book provides an analysis of the legal and policy dimensions of open access to research, education and public sector information with a focus on Nigeria. Kunle shows how open access has evolved across the world and how such initiatives could be implemented in Nigeria and other countries in the developing world. The author argues for a platform where Nigerians are able to freely connect to the 'global library', through the open access dual platforms of self-archiving and open access publishing, thereby providing access to knowledge. The importance of connecting local works to the 'global library' to increase visibility and impact of such works is also underscored. This book furthers our understanding of open educational resources as alternative avenues to accessing education and seeks to foster citizenry participation, good governance, accountability, democratic values and spur creativity and innovation through open governance and access to public sector information. Providing a framework for open access in developing countries, Open Access to Knowledge in Nigeria is an important read for scholars interested in knowledge production in Africa, development of the knowledge economy and the open access and Access to Knowledge movements.
Using numerous practical examples,this book examines the evolution of EC telecommunications law following the achievement of liberalisation, the main policy goal of the 1990s. After reviewing the development of regulation in the run-up to liberalisation, the author identifies the methods used to direct the liberalisation process and tests their validity in the post-liberalisation context. A critical analysis is made of the claim that competition law will offer sufficient means to regulate the sector in the future. Particular emphasis is given to the way in which EC Competition Law changed in the 1990s using the essential facilities doctrine, an expansive non-discrimination principle and the policing of cross-subsidisation to tackle what were then thought of as regulatory matters. Also examined within the work is the procedural and institutional interplay between competition law and telecommunications regulation. In conclusion, Larouche explores the limits of competition law and puts forward a long-term case for sector-specific regulation, with a precise mandate to ensure that the telecommunications sector as a whole fulfils its role as a foundation for economic and social activity.
Journalists have often lost constitutional rights for coverage and commentary during America's wars. Based on analysis of two hundred years of law and history, this study argues that press freedom cannot and should not be suspended during armed conflict. The military and the media must work together because neither has authority over the other.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies. Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids. It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementation This publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services. Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
Google's has proved to be one of the most successful business models in today's knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial economy? Do the various lawsuits involving Google show an evolution of the existing legal framework that might favour the flourishing of other knowledge-economy businesses? Or do they simply reflect that Google has gone too far? What lessons can other knowledge-based businesses learn from all the disputes in which Google has been or is involved? This book is valuable reading for legal practitioners and academics in the field of information technologies and intellectual property law, economists interested in knowledge-economy business models and sociologists interested in internet and social networks. Dr. Aurelio Lopez-Tarruella is Senior Lecturer in Private International Law at the University of Alicante, Spain.
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups. Presenting a synthesis of information about legal data that will furnish readers with a thorough understanding of the topic, the book also explains why it is becoming crucial that data analysis be integrated into decision-making in the legal space. Legal organizations are looking at how to develop data-driven insights for a variety of purposes and it is, as Sutherland shows, vital that they have the necessary skills to facilitate this work. This book will assist in this endeavour by providing an international perspective on the issues affecting access to legal data and clearly describing methods of obtaining and evaluating it. Sutherland also incorporates advice about how to critically approach data analysis. Legal Data and Information in Practice will be essential reading for those in the law library community who are based in English-speaking countries with a common law tradition. The book will also be useful to those with a general interest in legal data, including students, academics engaged in the study of information science and law.
Now in its second edition, Cybercrime: Key Issues and Debates provides a valuable overview of this fast-paced and growing area of law. As technology develops and internet-enabled devices become ever more prevalent, new opportunities exist for that technology to be exploited by criminals. One result of this is that cybercrime is increasingly recognised as a distinct branch of criminal law. The book offers readers a thematic and critical overview of cybercrime, introducing the key principles and clearly showing the connections between topics as well as highlighting areas subject to debate. Written with an emphasis on the law in the UK but considering in detail the Council of Europe's important Convention on Cybercrime, this text also covers the jurisdictional aspects of cybercrime in international law. Themes discussed include crimes against computers, property, offensive content, and offences against the person, and, new to this edition, cybercrime investigation. Clear, concise and critical, this book is designed for students studying cybercrime for the first time, enabling them to get to grips with an area of rapid change.
Biobanks are critical infrastructure for medical research but they are also the subject of considerable ethical and legal uncertainty. Given that biobanks process large quantities of genomic data, questions have emerged as to how genetic privacy should be protected. What types of genetic privacy rights and rights holders should be protected and to what extent? Since 25th May 2018 the General Data Protection Regulation (GDPR) has applied and now occupies a key position in the European legal framework for the regulation of biobanking. This book takes an in-depth look at the function, problems, and opportunities presented by European data protection law under the GDPR as a framework for the protection of genetic privacy in biobanking in Europe. Hallinan argues that the substantive framework presented by the GDPR already offers an admirable base-line level of protection for the range of genetic privacy rights engaged by biobanking. The book further argues that, whilst numerous problems with this standard of protection are indeed identifiable, the GDPR offers the flexibility to accommodate solutions to these problems, as well as the procedural mechanisms to realise these solutions.
The book addresses representation of the public interest in Internet standard developing organisations (SDOs). Much of the existing literature on Internet governance focuses on international organisations such as the United Nations (UN), the Internet Governance Forum (IGF) and the Internet Corporation for Assigned Names and Numbers (ICANN). The literature covering standard developing organisations has to date focused on organisational aspects. This book breaks new ground with investigation of standard development within SDO fora. Case studies centre on standards relating to privacy and security, mobile communications, Intellectual Property Rights (IPR) and copyright. The book lifts the lid on internet standard setting with detailed insight into a world which, although highly technical, very much affects the way in which citizens live and work on a daily basis. In doing this it adds significantly to the trajectory of research on Internet standards and SDOs that explore the relationship between politics and protocols. The analysis contributes to academic debates on democracy and the internet, global self-regulation and civil society, and international decision-making processes in unstructured environments. The book advances work on the Multiple Streams Framework (MS) by applying it to decision-making in non-state environments, namely SDOs which have long been dominated by private actors. The book is aimed at academic audiences in political science, computer science, communications, and science and technology studies as well as representatives from civil society, the civil service, government, engineers and experts working within SDO fora. It will also be accessible to students at the postgraduate and undergraduate levels.
Social media has many advantages for professional communication - but it also carries considerable risks, including legal pitfalls. This book equips students and communication professionals with the knowledge and skills to help minimise the risks that can arise when they post or host on social media. It offers them strategies for taking advantage of the opportunities of social media while also navigating the ethical, legal, and organisational risks that can lead to audience outrage, brand damage, expensive litigation and communication crises. The book uses stakeholder theory and risk analysis tools to anticipate, identify, address and balance these opportunities and risks. It takes a global approach to risk and social media law, drawing on fascinating case studies from key international jurisdictions to explain and illustrate the basic principles. Whether you are a corporate communicator, social media manager, journalist, marketer, blogger or student you will find this book an essential addition to your professional library as the first reference point when social media and legal risks arise.
All of the short essays in this volume look past the rhetoric of technological determinism and reliance on the natural logic of the market to consider the power of law and policy to steer new media in one direction or another. Many of the essays look backwards through history or outwards across national borders. They all look forward to how today's policies will shape the future of the internet and society. A particular focus of interest for some of the contributors is the revelations that followed Edward Snowden's mass disclosure of classified documents in 2013, which revealed the U.S. National Security Agency's systematic and longstanding program of monitoring global communications. Some chapters consider different countries' varying approaches to regulating the proliferation of online communication, while others assess the current state of digital technology. They all call for policy interventions to solve market failures. This book was originally published as a special issue of Critical Studies in Media Communication.
Featuring specially commissioned chapters from experts in the field of media and communications law, this book provides an authoritative survey of media law from a comparative perspective. The handbook does not simply offer a synopsis of the state of affairs in media law jurisprudence, rather it provides a better understanding of the forces that generate media rules, norms, and standards against the background of major transformations in the way information is mediated as a result of democratization, economic development, cultural change, globalization and technological innovation. The book addresses a range of issues including: Media Law and Evolving Concepts of Democracy Network neutrality and traffic management Public Service Broadcasting in Europe Interception of Communication and Surveillance in Russia State secrets, leaks and the media A variety of rule-making institutions are considered, including administrative, and judicial entities within and outside government, but also entities such as associations and corporations that generate binding rules. The book assesses the emerging role of supranational economic and political groupings as well as non-Western models, such as China and India, where cultural attitudes toward media freedoms are often very different. Monroe E. Price is Director of the Center for Global Communication Studies at the Annenberg School for the University of Pennsylvania and Joseph and Sadie Danciger Professor of Law and Director of the Howard M. Squadron Program in Law, Media and Society at the Cardozo School of Law. Stefaan Verhulst is Chief of Research at the Markle Foundation. Previously he was the co-founder and co-director, with Professor Monroe Price, of the Programme in Comparative Media Law and Policy (PCMLP) at Oxford University, as well as senior research fellow at the Centre for Socio Legal Studies. Libby Morgan is the Associate Director of the Center for Global Communication Studies at the Annenberg School for the University of Pennsylvania. |
![]() ![]() You may like...
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
Blockchain Technologies and Applications…
Pradeep Nijalingappa, Mangesh Manikrao Ghonge
Hardcover
R6,834
Discovery Miles 68 340
EU General Data Protection Regulation…
It Governance Privacy Team
Paperback
R771
Discovery Miles 7 710
Digital Justice - Technology and the…
Ethan Katsh, Orna Rabinovich-Einy
Hardcover
R3,094
Discovery Miles 30 940
Research Handbook on Information Law and…
Sharon K. Sandeen, Christoph Rademacher, …
Hardcover
R5,767
Discovery Miles 57 670
|