![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Private companies exert considerable control over the flow of information on the internet. Whether users are finding information with a search engine, communicating on a social networking site or accessing the internet through an ISP, access to participation can be blocked, channelled, edited or personalised. Such gatekeepers are powerful forces in facilitating or hindering freedom of expression online. This is problematic for a human rights system which has historically treated human rights as a government responsibility, and this is compounded by the largely light-touch regulatory approach to the internet in the West. Regulating Speech in Cyberspace explores how these gatekeepers operate at the intersection of three fields of study: regulation (more broadly, law), corporate social responsibility and human rights. It proposes an alternative corporate governance model for speech regulation, one that acts as a template for the increasingly common use of non-state-based models of governance for human rights.
The Technology and Construction Court is one of the specialist jurisdictions of the High Court. It deals with a specialised workload involving construction industry and engineering disputes and, increasingly, information technology disputes. Its work often involves heavy factual cases, but also action in support of other dispute resolution methods such as arbitration, mediation, or adjudication under the Housing Grants, Construction, and Regeneration Act 1996. Technology and Construction Court :Practice and Procedure provides a unique and authoritative guide to this jurisdiction. It examines the day-to-day workings of the Court in detail, including: the relevant Civil Procedure Rules, the Pre-Action Protocol procedure, case management, alternative dispute resolution, the Court's support for arbitration, the stages in proceedings leading up to trial, the enforcement of adjudicators' decisions and costs. The book is fully up-to-date to take account of the second edition of the TCC Guide, which took effect on October 2005. The text offers step-by-step guide to the practice and procedures involved in the initiating and defending of proceedings, together with expert analysis and guidance on matters unique to the Court - such as Scott schedules, handling of expert witnesses, and enforcement of adjudication decisions. The authors are specialist practitioners with extensive experience of the Court from both sides of the legal profession. They have combined an authoritative analysis of the powers and constitution of the Court with detailed attention to the practical matters facing litigants, including timescales, costs, and the interaction of the Court's powers with alternative dispute resolution methods. There are useful appendices with extensive materials including a list of the current Judges, a list of District Registries, relevant legislation, rules of procedure, Practice Directions, and statutory instruments and various standard forms. This detailed and authoritative guide to the practice and procedure of this Court will be an essential reference work for all practitioners and in-house counsel involved with construction, engineering and IT disputes.
Defences to copyright infringement have gained increased significance over the past twenty years. The fourth industrial revolution emerged with the development of innovative copy-reliant services and business models, which have transformed the way in which copyright works can be used and re-used, spanning from digital learning methods, to mass digitization initiatives, media monitoring services, image transformation tools or content-mining technologies. The lawfulness and legitimacy of such innovative services and business methods, that arguably have the potential to enhance public welfare, is dubious and challenges copyright law. EU copyright contains diverse, yet specifically enumerated, narrowly drafted, and strictly interpreted defensive rules, often taking the form of the so-called exceptions and limitations to copyright. In addition, defendants may also deny liability by attacking one or more of the elements of infringement, by bringing forward for instance claims negating copyright subsistence or the scope of copyright protection. Because the fourth industrial revolution comes with the promise of innovation and business growth, which are stated objectives of EU copyright, it invites an examination of defensive rules as an organic whole. This book adopts such a holistic approach in its exploration of the limits of permissibility under EU copyright, including not only legislatively mentioned exceptions and limitations but also doctrinal principles and external to copyright rules with a view to unveil possible gaps and overlaps, offering a novel classification of defensive rules, and evaluating the adaptability of the law towards technological change. Discussing recent legislative developments, such as the provisions of the Digital Single Market Directive, and case law from the Court of Justice, and bringing insights from an extensive set of national laws and cases, this book tells the story of copyright from the perspective of copyright defences, offering both positivist and normative insights into law and doctrine and arguing towards a principle-based understanding of the scope of defences that could inform future law and policy making.
Never before have the civil rights of people with disabilities aligned so well with developments in information and communication technology. The center of the technology revolution is the Internet, which fosters unprecedented opportunities for engagement in democratic society. The Americans with Disabilities Act likewise is helping to ensure equal participation in society by people with disabilities. Globally, the Convention on the Rights of Persons with Disabilities further affirms that persons with disabilities are entitled to the full and equal enjoyment of fundamental personal freedoms. This book is about the lived struggle for disability rights, with a focus on Web equality for people with cognitive disabilities, such as intellectual disabilities, autism, and print-related disabilities. The principles derived from the right to the Web - freedom of speech and individual dignity - are bound to lead toward full and meaningful involvement in society for persons with cognitive and other disabilities.
Internet Privacy Rights analyses the current threats to our online autonomy and privacy and proposes a new model for the gathering, retention and use of personal data. Key to the model is the development of specific privacy rights: a right to roam the internet with privacy, a right to monitor the monitors, a right to delete personal data and a right to create, assert and protect an online identity. These rights could help in the formulation of more effective and appropriate legislation, and shape more privacy-friendly business models. The conclusion examines how the internet might look with these rights in place and whether such an internet could be sustainable from both a governmental and a business perspective.
The liberalisation of the EU telecommunications markets, completed on 1 January 1998, created a strong European communications sector by promoting vigorous competition and innovation. The resulting revolutionary developments in technology and markets, necessitated a comprehensive review of regulatory policy to cater for dynamic and largely unpredictable markets. The EU adopted a new common regulatory framework for electronic communications and services in 2002, which simplifies and consolidates previous legislation. The 'Framework Directive' contains common provisions that underlie separate measures dealing with access and interconnection, authorisation, universal service and user's rights, data protection, local loop unbundling, harmonisation of use of the radio spectrum and competition issues. EU Electronic Communications Law provides comprehensive and expert analysis of the new regulatory framework, which covers all communications infrastructure and associated services: satellite networks, fixed and mobile terrestrial networks, cable TV networks, other networks used for radio and television broadcasting, and services which control access to these services. It derives from a section in the looseleaf Law of the EU (Vaughan & Robertson, eds), and is made available here for the benefit of those who don't subscribe to the looseleaf.
Lloyd and Mellor: Telecommunications Law is an important new text
which covers all areas of telecommunications law in the UK. But
since no examination of telecommunications can, in this new
economy, look within a single country's borders, this key work
offers a detailed account of the EU's telecommunications policy
which increasingly shapes national laws and policies.
Blockchain Technology and the Law: Opportunities and Risks is one of the first texts to offer a critical analysis of Blockchain and the legal and economic challenges faced by this new technology. This book will offer those who are unfamiliar with Blockchain an introduction as to how the technology works and will demonstrate how a legal framework that governs it can be used to ensure that it can be successfully deployed. Discussions included in this book: - an introduction to smart contracts, and their potential, from a commercial and consumer law perspective, to change the nature of transactions between parties; - the impact that Blockchain has already had on financial services, and the possible consumer risks and macro-economic issues that may arise in the future; - the challenges that are facing global securities regulators with the development of Initial Coin Offerings and the ongoing risks that they pose to the investing public; - the risk of significant privacy breaches due to the online public nature of Blockchain; and - the future of Blockchain technology. Of interest to academics, policy-makers, technology developers and legal practitioners, this book will provide a thorough examination of Blockchain technology in relation to the law from a comparative perspective with a focus on the United Kingdom, Canada and the United States.
How will law, regulation and ethics govern a future of fast-changing technologies? 'From current controversies over Internet content, privacy and radicalisation, to science fiction and Black Mirror visions of the future, pervasive fears exist that technology inevitably outpaces law and social control' 'Future Law' responds to these fears by exploring how law and ethics can foresee and control new technologies that challenge our societal norms and expectations. Bringing together cutting-edge authors from academia, legal practice and the technology industry, this book explores and leverages the power of human imagination in understanding, critiquing and improving the legal responses to technological change.
This work provides detailed coverage of the current state of international treaty law in respect of copyright issues relating to the Internet and E-commerce. The centre-piece of the book is an article-by-article analysis of the two key World Intellectual Property Organisation (WIPO) treaties tackling the subject: the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty, both negotiated primarily as a response to technological developments such as the Internet. It also includes detailed comparative material showing how the WIPO treaties are being implemented elsewhere in the world, and in particular how the EU, Japan and the US are responding to these key issues. This includes analysis of the key EU Directive on Copyright and Related Rights in the Information Society, which is intended to roll out protection across Europe for copyright holders operating in the digital arena.
This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with regard to the construction, maintenance and protection of computational artefacts. This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations.
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
This open access book offers a new account on the legal conflict between privacy and trade in the digital sphere. It develops a fundamental rights theory with a new right to continuous protection of personal data and explores the room for the application of this new right in trade law. Replicable legal analysis and practical solutions show the way to deal with cross-border data flows without violating fundamental rights and trade law principles. The interplay of privacy and trade became a topic of worldwide attention in the wake of Edward Snowden's revelations concerning US mass surveillance. Based on claims brought forward by the activist Maximilian Schrems, the ECJ passed down two high-profile rulings restricting EU-US data flows. Personal data is relevant for a wide range of services that are supplied across borders and restrictions on data flows therefore have an impact on the trade with such services. After the two rulings by the ECJ, it is less clear then ever how privacy protection and trade can be brought together on an international scale. Although it was widely understood that the legal dispute over EU-US data flows concerns the broad application of EU data protection law, it has never been fully explored just how far the EU's requirements for the protection of digital rights go and what this means beyond EU-US data flows. This book shows how the international effects of EU data protection law are rooted in the EU Charter of Fundamental Rights and that the architecture of EU law demands that the Charter as primary EU law takes precedence over international law. The book sets out to solve the problem of how the EU legal data transfer regime must be designed to implement the EU's extraterritorial fundamental rights requirements without violating the principles of the WTO's law on services. It also addresses current developments in international trade law - the conclusion of comprehensive trade agreements - and offers suggestion for the design of data flow clauses that accommodate privacy and trade.
Cybersecurity is a leading national problem for which the market may fail to produce a solution. The ultimate source of the problem is that computer owners lack adequate incentives to invest in security because they bear fully the costs of their security precautions but share the benefits with their network partners. In a world of positive transaction costs, individuals often select less than optimal security levels. The problem is compounded because the insecure networks extend far beyond the regulatory jurisdiction of any one nation or even coalition of nations. Originally published in 2006, this book brings together the views of leading law and economics scholars on the nature of the cybersecurity problem and possible solutions to it. Many of these solutions are market based, but they need some help, either from government or industry groups, or both. Indeed, the cybersecurity problem prefigures a host of twenty-first-century problems created by information technology and the globalization of markets.
The Radio Act of August 13, 1912, provided for the licensing of radio operators and transmitting stations for nearly 15 years until Congress passed the Radio Act of 1927. From 1921 to 1927, there were continual revisions and developments and these still serve as the basis for current broadcast regulation. This book chronicles that crucial six-year period using primary documents. The administrative structure of the Department of Commerce and the personnel involved in the regulation of broadcasting are detailed. The book is arranged chronologically in three sections: Broadcast Regulation and Policy from 1921 to 1925; Congestion and the Beginning of Regulatory Breakdown in 1924 and 1925; and Regulatory Breakdown and the Passage of the Act of 1927. There is also discussion of the Department of Commerce divisions and their involvement until they were absorbed by the Federal Communication Commission. A bibliography and an index conclude the work.
This handbook provides a comprehensive treatise of the concepts and nature of technology-facilitated gendered violence and abuse, as well as legal, community and activist responses to these harms. It offers an inclusive and intersectional treatment of gendered violence including that experienced by gender, sexuality and racially diverse victim-survivors. It examines the types of gendered violence facilitated by technologies but also responses to these harms from the perspectives of victim advocates, legal analyses, organisational and community responses, as well as activism within civil society. It is unique in its recognition of the intersecting drivers of inequality and marginalisation including misogyny, racism, colonialism and homophobia. It draws together the expertise of a range of established and globally renowned scholars in the field, as well as survivor-advocate-scholars and emerging scholars, lending a combination of credibility, rigor, currency, and innovation throughout. This handbook further provides recommendations for policy and practice and will appeal to academics and students in Criminology, Criminal Justice, Law, Socio-Legal Studies, Politics, as well as Women's and/or Gender Studies.
Which state has and should have the right and power to regulate sites and online events? Who can apply their defamation or contract law, obscenity standards, gambling or banking regulation, pharmaceutical licensing requirements or hate speech prohibitions to any particular Internet activity? Traditionally, transnational activity has been 'shared out' between national sovereigns with the aid of location-centric rules which can be adjusted to the transnational Internet. But can these allocation rules be stretched indefinitely, and what are the costs for online actors and for states themselves of squeezing global online activity into nation-state law? Does the future of online regulation lie in global legal harmonisation or is it a cyberspace that increasingly mirrors the national borders of the offline world? This 2007 book offers some uncomfortable insights into one of the most important debates on Internet governance.
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
The adoption of electronic commercial transactions has facilitated cross-border trade and business, but the complexity of determining the place of business and other connecting factors in cyberspace has challenged existing private international law. This comparison of the rules of internet jurisdiction and choice of law as well as online dispute resolution (ODR) covers both B2B and B2C contracts in the EU, USA and China. It highlights the achievement of the Rome I Regulation in the EU, evaluates the merits of the Hague Convention on Choice of Court Agreement at the international level and gives an insight into the current developments in CIDIP. The in-depth research allows for solutions to be proposed relating to the problems of the legal uncertainty of internet conflict of law and the validity and enforceability of ODR agreements and decisions.
This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam. The book builds on the first book Data Protection Law. A Comparative Analysis of Asia-Pacific and European Approaches, Robert Walters, Leon Trakman, Bruno Zeller. As the world comes to terms with Artificial Intelligence (AI), which now pervades the daily lives of everyone. For instance, our smart or Iphone, and smart home technology (robots, televisions, fridges and toys) access our personal data at an unprecedented level. Therefore, the security of that data is increasingly more vulnerable and can be compromised. This book examines the interface of cyber security, AI and data protection. It highlights and recommends that regulators and governments need to undertake wider research and law reform to ensure the most vulnerable in the community have their personal data protected adequately, while balancing the future benefits of the digital economy.
Investigating Computer Crime presents practical methods for gathering electronic evidence and dealing with crimes involving computers. Based on material gathered from hundreds of investigators all over the world, it contains an incredible amount of practical, directly applicable information. It follows a step-by-step approach to the investigation, seizure, and evaluation of computer evidence. The material in the book has been used at the Federal Law Enforcement Training Center and the Canadian Police College for teaching computer classes in white collar crime and sex crime investigations and by U.S. Army Intelligence in cooperation with NATO in Europe. It has also been used to teach a one-week course in computer crime investigation to agents from the IRS, Secret Service, and state and local agencies.
This book addresses current issues regarding the ethical use of information technology in a holistic vision, by combining the perspectives of education specialists and those in the field of computer science at the level of higher education. It provides a current ethical perspective on the problems and solutions involved in the use of information technology in higher education. It appeals to readers interested in exploring the problems and appropriate solutions related to the ethical use of new technologies in higher education.
Funksysteme bilden zunehmend die Grundlage von Kommunikation, privat ebenso wie in Industrie und Wirtschaft. Von WLAN bis zur Satellitenkommunikation mussen die Kommunikations-, Navigations- und Rundfunksatelliten und ihre Bodenanlagen national und international regulatorisch koordiniert werden. Das Buch beschreibt anschaulich das Prozedere einer Funkanmeldung, eroertert Beispiele von Satellitenprojekten und zeigt Wege auf, wie das endliche Spektrum effektiv genutzt werden kann, damit auch in Zukunft weitere Systeme zugelassen werden koennen.
This book presents the latest and most relevant studies, surveys, and succinct reviews in the field of financial crimes and cybercrime, conducted and gathered by a group of top professionals, scholars, and researchers from China, India, Spain, Italy, Poland, Germany, and Russia. Focusing on the threats posed by and corresponding approaches to controlling financial crime and cybercrime, the book informs readers about emerging trends in the evolution of international crime involving cyber-technologies and the latest financial tools, as well as future challenges that could feasibly be overcome with a more sound criminal legislation framework and adequate criminal management. In turn, the book highlights innovative methods for combating financial crime and cybercrime, e.g., establishing an effective supervision system over P2P; encouraging financial innovation and coordination with international anti-terrorism organizations and multiple countries; improving mechanisms for extraditing and punishing criminals who defect to another country; designing a protection system in accordance with internationally accepted standards; and reforming economic criminal offenses and other methods that will produce positive results in practice. Given its scope, the book will prove useful to legal professionals and researchers alike. It gathers selected proceedings of the 10th International Forum on Crime and Criminal Law in the Global Era (IFCCLGE), held on Nov 20-Dec 1, 2019, in Beijing, China.
This book is about the human factor in cybercrime: its offenders, victims and parties involved in tackling cybercrime. It takes a diverse international perspective of the response to and prevention of cybercrime by seeking to understand not just the technological, but the human decision-making involved. This edited volume represents the state of the art of research on the human factor in cybercrime, addressing its victims, offenders, and policing. It originated at the Second annual Conference on the Human Factor in Cybercrime, held in The Netherlands in October 2019, bringing together empirical research from a variety of disciplines, and theoretical and methodological approaches. This volume will be of particular interest to researchers and students in cybercrime and the psychology of cybercrime, as well as policy makers and law enforcement interested in prevention and detection. |
You may like...
Dance Music Spaces - Clubs, Clubbers…
Danielle Antoinette Hidalgo
Hardcover
R2,697
Discovery Miles 26 970
|