|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
This open access book explores the legal aspects of cybersecurity
in Poland. The authors are not limited to the framework created by
the NCSA (National Cybersecurity System Act - this act was the
first attempt to create a legal regulation of cybersecurity and, in
addition, has implemented the provisions of the NIS Directive) but
may discuss a number of other issues. The book presents
international and EU regulations in the field of cybersecurity and
issues pertinent to combating cybercrime and cyberterrorism.
Moreover, regulations concerning cybercrime in a few select
European countries are presented in addition to the problem of
collision of state actions in ensuring cybersecurity and human
rights. The advantages of the book include a comprehensive and
synthetic approach to the issues related to the cybersecurity
system of the Republic of Poland, a research perspective that takes
as the basic level of analysis issues related to the security of
the state and citizens, and the analysis of additional issues
related to cybersecurity, such as cybercrime, cyberterrorism, and
the problem of collision between states ensuring security
cybernetics and human rights. The book targets a wide range of
readers, especially scientists and researchers, members of
legislative bodies, practitioners (especially judges, prosecutors,
lawyers, law enforcement officials), experts in the field of IT
security, and officials of public authorities. Most authors are
scholars and researchers at the War Studies University in Warsaw.
Some of them work at the Academic Centre for Cybersecurity Policy -
a thinktank created by the Ministry of National Defence of the
Republic of Poland.
This book addresses current issues regarding the ethical use of
information technology in a holistic vision, by combining the
perspectives of education specialists and those in the field of
computer science at the level of higher education. It provides a
current ethical perspective on the problems and solutions involved
in the use of information technology in higher education. It
appeals to readers interested in exploring the problems and
appropriate solutions related to the ethical use of new
technologies in higher education.
Many pressing environmental and security threats now facing the
international community may be traced to the frontiers. From
climate change and cyber-attacks to the associated challenges of
space weaponization and orbital debris mitigation, solutions to all
of these issues have at their root some form of regulation over the
'global commons'. Yet governance over these spaces is now
transitioning away from multilateral treaties to regional and
bilateral accords. This book makes an original contribution by
comparing and contrasting some of the principal issues facing the
frontiers. It analyzes how and why existing governance structures
are often failing to adequately meet global collective action
problems, with special coverage on cybersecurity and Internet
governance. It proposes a new way forward incorporating lessons
from successful regimes as well as the interdisciplinary
scholarship on polycentric governance, arguing that
multi-stakeholder collaboration is imperative in order to avoid
tragedies of the global commons.
In Digital Data Collection and Information Privacy Law, Mark Burdon
argues for the reformulation of information privacy law to regulate
new power consequences of ubiquitous data collection. Examining
developing business models, based on collections of sensor data -
with a focus on the 'smart home' - Burdon demonstrates the
challenges that are arising for information privacy's control-model
and its application of principled protections of personal
information exchange. By reformulating information privacy's
primary role of individual control as an interrupter of modulated
power, Burdon provides a foundation for future law reform and calls
for stronger information privacy law protections. This book should
be read by anyone interested in the role of privacy in a world of
ubiquitous and pervasive data collection.
By adopting a multi-disciplinary approach, this book provides a
comprehensive analysis of the legality of the use of autonomous
weapons systems under international law. It examines different
arguments presented by States, roboticists and scholars to
demonstrate the challenges such systems will create for the laws of
war. This study examines how technology of warfare seeks to
increase the dissociation of risk and communication between weapons
and their human operators. Furthermore, it explains how algorithms
might give rise to 'errors' on the battlefield that cannot be
directly attributed to human operators. Against this backdrop, Dr
Seixas-Nunes examines three distinct legal frameworks: the
distinction between the legality of weapons and the laws of
targeting; different mechanisms of individual accountability and
the importance of recovering the category of 'dolus eventualis' for
programmers and technicians and, finally, State responsibility for
violations of the laws of war caused by weapons' software errors.
Patents are important tools for innovation policy. They incentivize
the creation and dissemination of new technical solutions and help
to disclose their working to the public in exchange for limited
exclusivity. Injunctions are important tools of their enforcement.
Much has been written about different aspects of the patent system,
but the issue of injunctions is largely neglected in the
comparative legal literature. This book explains how the drafting,
tailoring and enforcement of injunctions in patent law works in
several leading jurisdictions: Europe, the United States, Canada,
and Israel. The chapters provide in-depth explanation of how and
why national judges provide for or reject flexibility and tailoring
of injunctive relief. With its transatlantic and intra- European
comparisons, as well as a policy and theoretical synthesis, this is
the most comprehensive overview available for practicing attorneys
and scholars in patent law. This book is also available as Open
Access on Cambridge Core.
Regulators have been more permissive for medical devices compared
to their drug and biologic counterparts. While innovative products
can thereby reach consumers more quickly, this approach raises
serious public health and safety concerns. Additionally, the nature
of medical devices is rapidly changing, as software has become as
important as hardware. Regulation must keep pace with the current
developments and controversies of this technology. This volume
provides a multidisciplinary evaluation of the ethical, legal, and
regulatory concerns surrounding medical devices in the US and EU.
For medical providers, policymakers, and other stakeholders, the
book offers a framework for the opportunities and challenges on the
horizon for medical device regulation. Readers will gain a nuanced
overview of the latest developments in patient privacy and safety,
innovation, and new regulatory laws. This book is also available as
Open Access on Cambridge Core.
Regulators have been more permissive for medical devices compared
to their drug and biologic counterparts. While innovative products
can thereby reach consumers more quickly, this approach raises
serious public health and safety concerns. Additionally, the nature
of medical devices is rapidly changing, as software has become as
important as hardware. Regulation must keep pace with the current
developments and controversies of this technology. This volume
provides a multidisciplinary evaluation of the ethical, legal, and
regulatory concerns surrounding medical devices in the US and EU.
For medical providers, policymakers, and other stakeholders, the
book offers a framework for the opportunities and challenges on the
horizon for medical device regulation. Readers will gain a nuanced
overview of the latest developments in patient privacy and safety,
innovation, and new regulatory laws. This book is also available as
Open Access on Cambridge Core.
Funksysteme bilden zunehmend die Grundlage von Kommunikation,
privat ebenso wie in Industrie und Wirtschaft. Von WLAN bis zur
Satellitenkommunikation mussen die Kommunikations-, Navigations-
und Rundfunksatelliten und ihre Bodenanlagen national und
international regulatorisch koordiniert werden. Das Buch beschreibt
anschaulich das Prozedere einer Funkanmeldung, eroertert Beispiele
von Satellitenprojekten und zeigt Wege auf, wie das endliche
Spektrum effektiv genutzt werden kann, damit auch in Zukunft
weitere Systeme zugelassen werden koennen.
The book examines the extent to which Chinese cyber and network
security laws and policies act as a constraint on the emergence of
Chinese entrepreneurialism and innovation. Specifically, how the
contradictions and tensions between data localisation laws (as part
of Network Sovereignty policies) affect innovation in artificial
intelligence (AI). The book surveys the globalised R&D
networks, and how the increasing use of open-source platforms by
leading Chinese AI firms during 2017-2020, exacerbated the apparent
contradiction between Network Sovereignty and Chinese innovation.
The drafting of the Cyber Security Law did not anticipate the
changing nature of globalised AI innovation. It is argued that the
deliberate deployment of what the book refers to as 'fuzzy logic'
in drafting the Cyber Security Law allowed regulators to
subsequently interpret key terms regarding data in that Law in a
fluid and flexible fashion to benefit Chinese innovation.
The Radio Act of August 13, 1912, provided for the licensing of
radio operators and transmitting stations for nearly 15 years until
Congress passed the Radio Act of 1927. From 1921 to 1927, there
were continual revisions and developments and these still serve as
the basis for current broadcast regulation. This book chronicles
that crucial six-year period using primary documents. The
administrative structure of the Department of Commerce and the
personnel involved in the regulation of broadcasting are detailed.
The book is arranged chronologically in three sections: Broadcast
Regulation and Policy from 1921 to 1925; Congestion and the
Beginning of Regulatory Breakdown in 1924 and 1925; and Regulatory
Breakdown and the Passage of the Act of 1927. There is also
discussion of the Department of Commerce divisions and their
involvement until they were absorbed by the Federal Communication
Commission. A bibliography and an index conclude the work.
Surveillance of citizens is a clear manifestation of government
power. The act of surveillance is generally deemed acceptable in a
democratic society where it is necessary to protect the interests
of the nation and where the power is exercised non-arbitrarily and
in accordance with the law. Surveillance and the Law analyses the
core features of surveillance that create stark challenges for
transparency and accountability by examining the relationship
between language, power, and surveillance. It identifies a number
of features of surveillance law, surveillance language, and the
distribution of power that perpetuate the existing surveillance
paradigm. Using case studies from the US, the UK, and Ireland, it
assesses the techniques used to maintain the status quo of
continued surveillance expansion. These jurisdictions are selected
for their similarities, but also for their key constitutional
distinctions, which influence how power is distributed and
restrained in the different systems. Though the book maintains that
the classic principles of transparency and accountability remain
the best means available to limit the arbitrary exercise of
government power, it evaluates how these principles could be better
realised in order to restore power to the people and to maintain an
appropriate balance between government intrusion and the right to
privacy. By identifying the common tactics used in the expansion of
surveillance around the globe, this book will appeal to students
and scholars interested in privacy law, human rights, information
technology law, and surveillance studies.
Greift die Bundesnetzagentur regulierend in das Marktgeschehen nach
dem TKG ein, betrifft dies regelmassig nicht nur den
Regulierungsadressaten, sondern auch andere zugangsberechtigte
Netzbetreiber und Diensteanbieter. Dementsprechend ist der
Drittschutz im Rahmen der Marktregulierung ein Feld, das seit
einigen Jahren vermehrt Gegenstand gerichtlicher AEusserungen
gewesen ist. Zusatzlich aufgeladen wird diese Thematik durch die
richtlinienrechtliche Vorsteuerung. Im Fokus dieser Untersuchung
steht die Ermittlung des drittschutzenden Gehalts der
Marktregulierungsnormen sowie eine systematisierende Einteilung der
drittschutzenden Regelungen. Behandelt werden neben uberkommenen
Kriterien zur Bestimmung drittschutzender Normen auch Ansatze zur
Bewaltigung multipolarer Konfliktlagen und Richtlinienvorgaben.
The most fascinating and profitable subject of predictive
algorithms is the human actor. Analysing big data through learning
algorithms to predict and pre-empt individual decisions gives a
powerful tool to corporations, political parties and the state.
Algorithmic analysis of digital footprints, as an omnipresent form
of surveillance, has already been used in diverse contexts:
behavioural advertising, personalised pricing, political
micro-targeting, precision medicine, and predictive policing and
prison sentencing. This volume brings together experts to offer
philosophical, sociological, and legal perspectives on these
personalised data practices. It explores common themes such as
choice, personal autonomy, equality, privacy, and corporate and
governmental efficiency against the normative frameworks of the
market, democracy and the rule of law. By offering these insights,
this collection on data-driven personalisation seeks to stimulate
an interdisciplinary debate on one of the most pervasive,
transformative, and insidious socio-technical developments of our
time.
This book builds an empirical basis towards creating broader
prevention and intervention programs in curbing digital piracy. It
addresses the psychosocial, cultural and criminological factors
associated with digital piracy to construct more efficient
problem-solving mechanisms. Digital piracy including online piracy
involves illegal copying of copyrighted materials. This practice
costs the software industry, entertainment industry, and
governments billions of dollars every year. Reports of the World
Intellectual Property Organization (WIPO) and Business Software
Alliance (BSA) view piracy largely in the light of economic
factors; the assumption being that only those who cannot afford
legitimate copies of software, music, and movies indulge in it.
Drawing on research and theories from various disciplines like
psychology, sociology, criminology, and law, the authors have
designed an empirical study to understand the contribution of
psychological, cultural and criminological factors to digital
piracy. The chapters include data from India and China, which
continue to be on the Special 301 report priority watch list of the
WIPO, and Serbia, which has been on the watch list 4 times. They
examine the role of self-control, self-efficacy, perceived
punishment severity, awareness about digital piracy, peer
influence, neutralization techniques, novelty seeking, pro-industry
factors and other socio-demographic factors in predicting digital
piracy. This book addresses a large readership, comprising
academics and researchers in psychology, criminology and criminal
justice, law and intellectual property rights, social sciences, and
IT, as well as policymakers, to better understand and deal with the
phenomenon of digital piracy.
Fur neue und kunftige Geschaftsfelder von E-Commerce und
E-Government stellen der Datenschutz und der Identitatsschutz
wichtige Herausforderungen dar. Renommierte Autoren aus
Wissenschaft und Praxis widmen sich in dem Band aktuellen Problemen
des Daten- und Identitatsschutzes aus rechtlicher und technischer
Perspektive. Sie analysieren aktuelle Problemfalle aus der Praxis
und bieten Handlungsempfehlungen an. Das Werk richtet sich an
Juristen und technisch Verantwortliche in Behorden und Unternehmen
sowie an Rechtsanwalte und Wissenschaftler."
Should we regulate artificial intelligence? Can we? From
self-driving cars and high-speed trading to algorithmic
decision-making, the way we live, work, and play is increasingly
dependent on AI systems that operate with diminishing human
intervention. These fast, autonomous, and opaque machines offer
great benefits - and pose significant risks. This book examines how
our laws are dealing with AI, as well as what additional rules and
institutions are needed - including the role that AI might play in
regulating itself. Drawing on diverse technologies and examples
from around the world, the book offers lessons on how to manage
risk, draw red lines, and preserve the legitimacy of public
authority. Though the prospect of AI pushing beyond the limits of
the law may seem remote, these measures are useful now - and will
be essential if it ever does.
Artificial Intelligence (AI) has become omnipresent in today's
business environment: from chatbots to healthcare services to
various ways of creating useful information. While AI has been
increasingly used to optimize various creative and innovative
processes, the integration of AI into products, services, and other
operational procedures raises significant concerns across virtually
all areas of intellectual property (IP) law. While AI has drawn
extensive attention from IP experts globally, this is the first
book providing a broad and comprehensive picture from the
perspectives of the very nature of AI technology, its commercial
implications, its interaction with different kinds of IP, IP
administration, software and data, its social and economic impact
on the innovation policy, and ultimately AI's eligibility as a
legal entity.
This innovative book sets itself at the crossroads of several
rapidly developing areas of research in legal and global studies
related to social computing, specifically in the context of how
public emergency responders appropriate content on social media
platforms for emergency and disaster management. The book - a
collaboration between computer scientists, ethicists, legal
scholars and practitioners - should be read by anyone concerned
with the ongoing debate over the corporatization and
commodification of user-generated content on social media and the
extent to which this content can be legally and ethically harnessed
for emergency and disaster management. The collaboration was made
possible by EU's FP 7 Project Slandail (# 607691, 2014-17).
Two of the most important developments of this new century are the
emergence of cloud computing and big data. However, the
uncertainties surrounding the failure of cloud service providers to
clearly assert ownership rights over data and databases during
cloud computing transactions and big data services have been
perceived as imposing legal risks and transaction costs. This lack
of clear ownership rights is also seen as slowing down the capacity
of the Internet market to thrive. Click-through agreements drafted
on a take-it-or-leave-it basis govern the current state of the art,
and they do not allow much room for negotiation. The novel
contribution of this book proffers a new contractual model
advocating the extension of the negotiation capabilities of cloud
customers, thus enabling an automated and machine-readable
framework, orchestrated by a cloud broker. Cloud computing and big
data are constantly evolving and transforming into new paradigms
where cloud brokers are predicted to play a vital role as
innovation intermediaries adding extra value to the entire life
cycle. This evolution will alleviate the legal uncertainties in
society by means of embedding legal requirements in the user
interface and related computer systems or its code. This book
situates the theories of law and economics and behavioral law and
economics in the context of cloud computing and takes database
rights and ownership rights of data as prime examples to represent
the problem of collecting, outsourcing, and sharing data and
databases on a global scale. It does this by highlighting the legal
constraints concerning ownership rights of data and databases and
proposes finding a solution outside the boundaries and limitations
of the law. By allowing cloud brokers to establish themselves in
the market as entities coordinating and actively engaging in the
negotiation of service-level agreements (SLAs), individual
customers as well as small and medium-sized enterprises could
efficiently and effortlessly choose a cloud provider that best
suits their needs. This approach, which the author calls "plan-like
architectures," endeavors to create a more trustworthy cloud
computing environment and to yield radical new results for the
development of the cloud computing and big data markets.
Digital Evidence and Computer Crime, Third Edition, provides the
knowledge necessary to uncover and use digital evidence effectively
in any kind of investigation. It offers a thorough explanation of
how computer networks function, how they can be involved in crimes,
and how they can be used as a source of evidence. In particular, it
addresses the abuse of computer networks as well as privacy and
security issues on computer networks. This updated edition is
organized into five parts. Part 1 is about digital forensics and
covers topics ranging from the use of digital evidence in the
courtroom to cybercrime law. Part 2 explores topics such as how
digital investigations are conducted, handling a digital crime
scene, and investigative reconstruction with digital evidence. Part
3 deals with apprehending offenders, whereas Part 4 focuses on the
use of computers in digital investigation. The book concludes with
Part 5, which includes the application of forensic science to
networks. New to this edition are updated information on dedicated
to networked Windows, Unix, and Macintosh computers, as well as
Personal Digital Assistants; coverage of developments in related
technology and tools; updated language for search warrant and
coverage of legal developments in the US impacting computer
forensics; and discussion of legislation from other countries to
provide international scope. There are detailed case examples that
demonstrate key concepts and give students a practical/applied
understanding of the topics, along with ancillary materials that
include an Instructor's Manual and PowerPoint slides. This book
will prove valuable to computer forensic students and
professionals, lawyers, law enforcement, and government agencies
(IRS, FBI, CIA, CCIPS, etc.).
This book provides a comparison and practical guide for academics,
students, and the business community of the current data protection
laws in selected Asia Pacific countries (Australia, India,
Indonesia, Japan Malaysia, Singapore, Thailand) and the European
Union. The book shows how over the past three decades the range of
economic, political, and social activities that have moved to the
internet has increased significantly. This technological
transformation has resulted in the collection of personal data, its
use and storage across international boundaries at a rate that
governments have been unable to keep pace. The book highlights
challenges and potential solutions related to data protection
issues arising from cross-border problems in which personal data is
being considered as intellectual property, within transnational
contracts and in anti-trust law. The book also discusses the
emerging challenges in protecting personal data and promoting cyber
security. The book provides a deeper understanding of the legal
risks and frameworks associated with data protection law for local,
regional and global academics, students, businesses, industries,
legal profession and individuals.
|
You may like...
Orange
Derrick S Slack
Hardcover
R610
Discovery Miles 6 100
|