![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
The common fallacy regarding cyberspace is that the Internet is a new jurisdiction, in which none of the existing rules and regulations apply. However, all the actors involved in an Internet transaction live in one or more existing jurisdictions, so rather than being unregulated, the Internet is arguably highly regulated. Worse, much of this law and regulation is contradictory and difficult, or impossible, to comply with. This 2004 book takes a global view of the fundamental legal issues raised by the advent of the Internet as an international communications mechanism. Legal and other materials are integrated to support the discussion of how technological, economic and political factors are shaping the law governing the Internet. Global trends in legal issues are addressed and the effectiveness of potential mechanisms for legal change that are applicable to Internet law are also examined. Of interest to students and practitioners in computer and electronic commerce law.
Now available in a paperback edition, law and technology guru Richard Susskind, author of bestselling The Future of Law, brings together in one volume eleven significant essays on the application of IT to legal practice and the administration of justice, including key topics such as knowledge management and the impact of electronic commerce and electronic government. This edition includes a new Preface, in which Susskind puts forward his views on the burst of the dotcom bubble, offers an extension to his Grid to cover in-house lawyers, and comments on the next big things in this area: e-learning, document assembly, online dispute resolution, e-mail management, and matter-centric systems.
Highly publicized legal cases, such as those involving libel verdicts, obscenity prosecutions, the First Amendment, and other areas of media law have focused attention on only one part of the media's impact on law. This study, the first to explore the broad influence of computers and television on the future of the legal process, explains the critical role of information and argues that the influence of the new modes of communication can be seen in changes occurring in many areas of the law. These areas include the goals and purposes of law, the doctrines and rules of law, the processes law uses to settle disputes and shape behavior, the legal profession, and the values and concepts that underlie our system of law.
This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with regard to the construction, maintenance and protection of computational artefacts. This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations.
This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with regard to the construction, maintenance and protection of computational artefacts. This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations.
Like many other areas of life, humanitarian practice and thinking are being transformed by information and communications technology. Despite this, the growing digitization of humanitarianism has been a relatively unnoticed dimension of global order. Based on more than seven years of data collection and interdisciplinary research, #Help presents a ground-breaking study of digital humanitarianism and its ramifications for international law and politics. Global problems and policies are being reconfigured, regulated, and addressed through digital interfaces developed for humanitarian ends. #Help analyses how populations, maps, and emergencies take shape on the global plane when given digital form and explores the reorientation of nation states' priorities and practices of governing around digital data collection imperatives. This book also illuminates how the growing prominence of digital interfaces in international humanitarian work is sustained and shaped by law and policy. #Help reveals new vectors of global inequality and new forms of global relation taking effect in the here and now. To understand how major digital platforms are seeking to extend their serviceable lives, and to see how global order might take shape in the future, it is essential to grasp the perils and possibilities of digital humanitarianism. #Help will transform thinking about what is at stake in the use of digital interfaces in the humanitarian field and about how, where, and for whom we are making the global order of tomorrow.
This book examines the role of international law in securing privacy and data protection in the digital age. Driven mainly by the transnational nature of privacy threats involving private actors as well as States, calls are increasingly made for an international privacy framework to meet these challenges. Mapped against a flurry of global privacy initiatives, the book provides the first comprehensive analysis of the extent to which and whether international law attends to the complexities of upholding digital privacy. The book starts by exploring boundaries of international privacy law in upholding privacy and data protection in the digital ecosystem where threats to privacy are increasingly transnational, sophisticated and privatized. It then explores the potential of global privacy initiatives, namely Internet bills of rights, universalization of regional systems of data privacy protection, and the multi-level privacy discourse at the United Nations, in reimagining the normative contours of international privacy law. Having shown limitations of global privacy initiatives, the book proposes a pragmatic approach that could make international privacy law better-equipped in the digital age.
Now in its sixth edition, this invaluable handbook provides a complete guide to the practical application of data protection law in the UK. It is fully updated and expanded to include coverage of significant developments in the practice of data protection, and takes account of new legislation since the last edition. The sixth edition includes coverage of the Data Protection Act 2018, Data Protection, Privacy and Electronic Communications (Amendments etc.) (EU Exit) Regulations 2019, and the European Union (Withdrawal Agreement) Act 2020, and contains relevant analysis of the effect of Brexit on UK data protection law. Data Protection: A Practical Guide to UK Law is essential reading for all those working with data protection issues, including in compliance departments in both the public and private sectors, as well as in-house and private practice lawyers, company secretaries, HR Officers, marketing executives and IT specialists.
Smart Legal Contracts: Computable Law in Theory and Practice is a landmark investigation into one of the most important trends at the interface of law and technology: the effort to harness emerging digital technologies to change the way that parties form and perform contracts. While developments in distributed ledger technology have brought the topic of 'smart contracts' into the mainstream of legal attention, this volume takes a broader approach to ask how computers can be used in the contracting process. This book assesses how contractual promises are expressed in software and how code-based artefacts can be incorporated within more conventional legal structures. With incisive contributions from members of the judiciary, legal scholars, practitioners, and computer scientists, this book sets out to frame the borders of an emerging area of law and start a more productive dialogue between the various disciplines involved in the evolution of contracts as software. It provides the first step towards a more disciplined approach to computational contracts that avoids the techno-legal ambiguities of 'smart contracts' and reveals an emerging taxonomy of approaches to encoding contracts in whole or in part. Conceived and written during a time when major legal systems began to engage with the advent of contracts in computable form, and aimed at a fundamental level of enquiry, this collection will provide essential insight into future trends and will provide a point of orientation for future scholarship and innovation.
In recent decades, companies around the world have deployed an arsenal of tools - including IP law, hardware design, software restrictions, pricing strategies, and marketing messages - to prevent consumers from fixing the things they own. While this strategy has enriched companies almost beyond measure, it has taken billions of dollars out of the pockets of consumers and imposed massive environmental costs on the planet. In The Right to Repair, Aaron Perzanowski analyzes the history of repair to show how we've arrived at this moment, when a battle over repair is being waged - largely unnoticed - in courtrooms, legislatures, and administrative agencies. With deft, lucid prose, Perzanowski explains the opaque and complex legal landscape that surrounds the right to repair and shows readers how to fight back.
Private companies exert considerable control over the flow of information on the internet. Whether users are finding information with a search engine, communicating on a social networking site or accessing the internet through an ISP, access to participation can be blocked, channelled, edited or personalised. Such gatekeepers are powerful forces in facilitating or hindering freedom of expression online. This is problematic for a human rights system which has historically treated human rights as a government responsibility, and this is compounded by the largely light-touch regulatory approach to the internet in the West. Regulating Speech in Cyberspace explores how these gatekeepers operate at the intersection of three fields of study: regulation (more broadly, law), corporate social responsibility and human rights. It proposes an alternative corporate governance model for speech regulation, one that acts as a template for the increasingly common use of non-state-based models of governance for human rights.
Government and Information: The Law Relating to Access, Disclosure and their Regulation is the leading text offering comprehensive and practical advice on the access, disclosure and retention of government records under UK, EU and ECHR requirements. It is essential reading for all those dealing with public authority information. The fifth edition is extensively revised following numerous developments in both UK and EU law as well as the ever expanding case law on information rights under statutory, Convention and common law provisions. Legislation: Justice and Security Act 2013; Crime and Courts Act 2013 (s 34 in relation to press standards following Leveson); Re-use of Public Sector Information Regulations 2015 Investigatory Powers Bill 2016; Environmental Information Regulations 2004; General Data Protection Regulation 2016; Key cases since the last edition include: Evans v Attorney General [2015] UKSC 21 - the SC ruled that the Attorney General had acted unlawfully in issuing a veto preventing disclosure Kennedy v Charities Commission [2014] UKSC 20 - Supreme Court extended the ambit of the common law in relation to access to information and transparency Case 362/14 Schrems [2015]) - involving data transfer to the USA PJS v Newsgroup Newspapers ltd [2016] UKSC 26 - developing the law of personal privacy
Cloud computing continues to expand dramatically and the 'as a Service' model is now both mainstream and ubiquitous. Cloud now encompasses everything from the remote provision of essential computer processing and storage resources, through to delivery of complex business and government services, logistics, healthcare, education, and entertainment. The Covid-19 pandemic provided a striking demonstration of cloud computing's global scalability and resilience, as billions of workers and students switched in a matter of weeks to working and studying 'from home'. This book delivers an accessible analysis of the key legal and regulatory issues that surround cloud computing. Topics covered include contracts for cloud services, information ownership and licensing, privacy and data protection, standards and competition law, law enforcement access to data, and international tax models for cloud and other digital services. The book is organised in four parts. Part I explains what cloud computing is, why it matters, and what non-technical readers need to know about how it works. Part II includes a detailed review of standard contracts for 40 cloud services and highlights key legal and commercial issues that arise in negotiated transactions for cloud services. Ownership of, and access to, 'digital assets' are also explored. Part III focusses on the application of data protection and cybersecurity rules, including an in-depth assessment of the impact of the EU's General Data Protection Regulation (GDPR) on providers and users of cloud services. Finally, Part IV addresses governance issues relating to public sector use of cloud, access to cloud data by law enforcement authorities, competition rules and standards, and the disruption to global taxation models caused by the rapid shift to cloud services.
Open banking is a silent revolution transforming the banking industry. It is the manifestation of the revolution of consumer technology in banking and will dramatically change not only how we bank, but also the world of finance and how we interact with it. Since the United Kingdom along with the rest of the European Union adopted rules requiring banks to share customer data to improve competition in the banking sector, a wave of countries from Asia to Africa to the Americas have adopted various forms of their own open banking regimes. Among Basel Committee jurisdictions, at least fifteen jurisdictions have some form of open banking, and this number does not even include the many jurisdictions outside the Basel Committee membership with open banking activities. Although U.S. banks and market participants have been sharing customer-permissioned data for the past twenty years and there have been recent policy discussions, such as the Obama administration's failed Consumer Data Privacy Bill and the Data Aggregation Principles of the Consumer Financial Protection Bureau, open banking is still a little-known concept among consumers and policymakers in the States. This book defines the concept of 'open banking' and explores key legal, policy, and economic questions raised by open banking.
This book asks a simple question: are the tech giants monopolies? In the current environment of suspicion towards the major technology companies as a result of concerns about their power and influence, it has become commonplace to talk of Google, Facebook, Amazon, Apple, Microsoft, or Netflix as the modern day version of the 19th century trusts. In turn, the tech giants are vilified for a whole range of monopoly harms towards consumers, workers and even the democratic process. In the US and the EU, antitrust, and regulatory reform is on the way. Using economics, business and management science as well legal reasoning, this book offers a new perspective on big tech. It builds a theory of "moligopoly". The theory advances that the tech giants, or at least some of them, coexist both as monopolies and oligopoly firms that compete against each other in an environment of substantial uncertainty and economic dynamism. With this, the book assesses ongoing antitrust and regulatory policy efforts. It demonstrates that it is counterproductive to pursue policies that introduce more rivalry in moligopoly markets subject to technological discontinuities. And that non-economic harms like privacy violations, fake news, or hate speech are difficult issues that belong to the realm of regulation, not antimonopoly remediation.
The concept of a risk-based approach to data protection came to the fore during the overhaul process of the EU's General Data Protection Regulation (GDPR). At its core, it consists of endowing the regulated organizations that process personal data with increased responsibility for complying with data protection mandates. Such increased compliance duties are performed through risk management tools. This book provides a comprehensive analysis of this legal and policy development, which considers a legal, historical, and theoretical perspective. By framing the risk-based approach as a sui generis implementation of a specific regulation model 'known as meta regulation, this book provides a recollection of the policy developments that led to the adoption of the risk-based approach in light of regulation theory and debates. It also discusses a number of salient issues pertaining to the risk-based approach, such as its rationale, scope, and meaning; the role for regulators; and its potential and limits. The book also looks at they way it has been undertaken in major statutes with a focus on key provisions, such as data protection impact assessments or accountability. Finally, the book devotes considerable attention to the notion of risk. It explains key terms such as risk assessment and management. It discusses in-depth the role of harms in data protection, the meaning of a data protection risk, and the difference between risks and harms. It also critically analyses prevalent data protection risk management methodologies and explains the most important caveats for managing data protection risks.
To better understand the heterogeneity of the international online intermediary liability regime, The Oxford Handbook of Intermediary Liability Online is designed to provide a comprehensive, authoritative and 'state-of-the-art' discussion of by highlighting emerging trends. This book discusses fundamental legal issues in intermediary liability online, while also describing advancement in intermediary liability theory and identifying recent policy trends. Sections I and II provide a taxonomy of internet platforms, a general discussion of possible basis for liability and remedies, while putting into context intermediary liability regulation with fundamental rights and the ethical implications of the intermediaries' role. Section III presents a jurisdictional overview discussing intermediary liability safe harbour arrangements and highlighting issues with systemic fragmentation and miscellaneous inconsistent approaches. Mapping online intermediary liability worldwide entails the review of a wide-ranging topic, stretching into many different areas of law and domain-specific solutions. Section IV provides an overview of intermediate liability for copyright, trademark, and privacy infringement, together with Internet platforms' obligations and liabilities for defamation, hate and dangerous speech. Section V reviews intermediary liability enforcement strategies by focusing on emerging trends, including proactive monitoring obligations across the entire spectrum of intermediary liability subject matters, blocking orders against innocent third parties, and the emergence of administrative enforcement of intermediary liability online. In addition, Section VI discusses an additional core emerging trend in intermediary liability enforcement: voluntary measures and private ordering. Finally, international private law issues are addressed in Section VII with special emphasis on the international struggle over Internet jurisdiction and extra-territorial enforcement of intermediaries' obligations.
This collection investigates the sharpening conflict between the nation state and the internet through a multidisciplinary lens. It challenges the idea of an inherently global internet by examining its increasing territorial fragmentation and, conversely, the notion that for states online law and order is business as usual. Cyberborders based on national law are not just erected around China's online community. Cultural, political and economic forces, as reflected in national or regional norms, have also incentivised virtual borders in the West. The nation state is asserting itself. Yet, there are also signs of the receding role of the state in favour of corporations wielding influence through de-facto control over content and technology. This volume contributes to the online governance debate by joining ideas from law, politics and human geography to explore internet jurisdiction and its overlap with topics such as freedom of expression, free trade, democracy, identity and cartographic maps.
In this riveting, behind-the-scenes courtroom drama, a brilliant legal team battles corporate greed and government overreach for our fundamental right to control our genes. When attorney Chris Hansen learned that the U.S. government was issuing patents for human genes to biotech companies, his first thought was, How can a corporation own what makes us who we are? Then he discovered that women were being charged exorbitant fees to test for hereditary breast and ovarian cancers, tests they desperately needed--all because Myriad Genetics had patented the famous BRCA genes. So he sued them. Jorge L. Contreras, one of the nation's foremost authorities on human genetics law, has devoted years to investigating the groundbreaking civil rights case known as AMP v. Myriad. In The Genome Defense Contreras gives us the view from inside as Hansen and his team of ACLU lawyers, along with a committed group of activists, scientists, and physicians, take their one-in-a-million case all the way to the U.S. Supreme Court. Contreras interviewed more than a hundred key players involved in all aspects of the case--from judges and policy makers to ethicists and genetic counselors, as well as cancer survivors and those whose lives would be impacted by the decision--expertly weaving together their stories into a fascinating narrative of this pivotal moment in history. The Genome Defense is a powerful and compelling story about how society must balance scientific discovery with corporate profits and the rights of all people.
WHAT IF YOUR BOSS WAS AN ALGORITHM? The gig economy promises to revolutionise work as we know it, offering flexibility and independence instead of 9-to-5 drudgery. The potential benefits are enormous: consumers enjoy the convenience and affordability of on-demand work while micro-entrepreneurs turn to online platforms in search of their next gig, task, or ride. IS THIS THE FUTURE OF WORK? The gig economy promises to revolutionise work as we know it, offering flexibility and independence instead of 9-to-5 drudgery. The potential benefits are enormous: consumers enjoy the convenience and affordability of on-demand work while micro-entrepreneurs turn to online platforms in search of their next gig, task, or ride. HOW CAN WE PROTECT CONSUMERS & WORKERS WITHOUT STIFLING INNOVATION? As courts and governments around the world begin to grapple with the gig economy, Humans as a Service explores the challenges of on-demand work, and explains how we can ensure decent working conditions, protect consumers, and foster innovation. Employment law plays a central role in levelling the playing field: gigs, tasks, and rides are work - and should be regulated as such.
The Seventh Edition covers the new set of EU Directives and the Electronic Communications Code, which will considerably change the legal framework for electronic communications. Essential reading for all lawyers and non-legal executives involved in telecoms, IT and media, this book will enable the reader to: - Make valuable comparative analyses with detailed coverage of 34 EU and non-EU countries in a single, accessible source - Ensure that your company's/clients' current and future activities do not conflict with the rules outlined in the 2009 EU Regulatory Package - Successfully evaluate opportunities for expansion within the European telecoms industry and potential pitfalls The EU chapter and the country chapters are complemented by detailed chapters on EU Data Protection and Privacy, EU Competition Law in the Telecommunications Sector, The Law of the International Telecommunication Union and the World Trade Organisation, and Compliance and Risk Management. Countries included: EU: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Russia, Slovakia, Slovenia, Spain, Sweden, UK. Non EU: Croatia, Macedonia, Norway, Switzerland, Turkey, Ukraine.
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the "trusted systems" underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
Since the last edition of this book was published, numerous changes have occurred in the telecommunications sector, at a national, European, and international level. Telecommunications Law and Regulation takes these changes into account, including an examination of the*adoption of Directive 2014/61/EU on the measures to reduce to cost of deploying electronic communication networks; Directive 2014/53/EU on radio equipment; Regulation 2015/2120 on 'open internet access' and roaming; and the implications of Brexit on the UK telecommunications sector. There is also coverage of substantial regulatory developments in US law since 2012, including the FCC's order on 'Protecting and Promoting the Open Internet' (March 2015). Written by leading experts, it is essential reading for legal practitioners and academics involved in the telecommunications industry.
As technology makes it easier for people to work together, large-scale collaboration is becoming increasingly prevalent. In this context, the question of how to determine authorship - and hence ownership - of copyright in collaborative works is an important question to which current copyright law fails to provide a coherent or consistent answer. In Copyright and Collective Authorship, Daniela Simone engages with the problem of how to determine the authorship of highly collaborative works. Employing insights from the ways in which collaborators understand and regulate issues of authorship, the book argues that a recalibration of copyright law is necessary, proposing an inclusive and contextual approach to joint authorship that is true to the legal concept of authorship but is also more aligned with creative reality.
Never before have the civil rights of people with disabilities aligned so well with developments in information and communication technology. The center of the technology revolution is the Internet, which fosters unprecedented opportunities for engagement in democratic society. The Americans with Disabilities Act likewise is helping to ensure equal participation in society by people with disabilities. Globally, the Convention on the Rights of Persons with Disabilities further affirms that persons with disabilities are entitled to the full and equal enjoyment of fundamental personal freedoms. This book is about the lived struggle for disability rights, with a focus on Web equality for people with cognitive disabilities, such as intellectual disabilities, autism, and print-related disabilities. The principles derived from the right to the Web - freedom of speech and individual dignity - are bound to lead toward full and meaningful involvement in society for persons with cognitive and other disabilities. |
You may like...
Manufacturing Engineering - Select…
Vishal S Sharma, Uday S. Dixit, …
Hardcover
R4,142
Discovery Miles 41 420
Advanced Interferometers and the Search…
Massimo Bassan
Hardcover
Sex and Gender Differences in…
Elena Moro, Gennarina Arabia, …
Hardcover
R4,498
Discovery Miles 44 980
Sustainable Human Development Across the…
Shameem Oomur, Susan E Luczak, …
Hardcover
R2,836
Discovery Miles 28 360
Cerebral Lateralization and Cognition…
Gillian Forrester, Kristelle Hudry, …
Hardcover
R6,207
Discovery Miles 62 070
|