![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Invaluable guidance on the most important legal issues facing nonprofits today Internet communication is the lifeblood of countless nonprofit organizations, yet there exists no specific law to provide for its regulation. Without solid legal guidance, nonprofits risk not only missing out on the unlimited opportunities that the Internet has to offer, but also jeopardizing their tax-exempt status. The Nonprofits' Guide to Internet Communications Law analyzes and explains the laws applicable to Internet communications by nonprofit organizations. Nonprofit law expert Bruce Hopkins writes that with Congress and government agencies reluctant to create new law, it will ultimately be up to the courts to determine the future of Internet law affecting nonprofit organizations. Extrapolating from the underlying principles of existing law, Hopkins addresses the legal ramifications of Internet business activities, charitable-giving administration, fundraising programs, lobbying, political campaign activities, and more. The Nonprofits' Guide to Internet Communications Law proves an unparalleled resource for this emerging field.
A thoroughly updated, comprehensive, and accessible guide to U.S. telecommunications law and policy, covering recent developments including mobile broadband issues, spectrum policy, and net neutrality. In Digital Crossroads, two experts on telecommunications policy offer a comprehensive and accessible analysis of the regulation of competition in the U.S. telecommunications industry. The first edition of Digital Crossroads (MIT Press, 2005) became an essential and uniquely readable guide for policymakers, lawyers, scholars, and students in a fast-moving and complex policy field. In this second edition, the authors have revised every section of every chapter to reflect the evolution in industry structure, technology, and regulatory strategy since 2005. The book features entirely new discussions of such topics as the explosive development of the mobile broadband ecosystem; incentive auctions and other recent spectrum policy initiatives; the FCC's net neutrality rules; the National Broadband Plan; the declining relevance of the traditional public switched telephone network; and the policy response to online video services and their potential to transform the way Americans watch television. Like its predecessor, this new edition of Digital Crossroads not only helps nonspecialists climb this field's formidable learning curve, but also makes substantive contributions to ongoing policy debates.
This book examines legal and cybersecurity challenges resulting from malicious activities on global cyberspace and proposes feasible regulatory, and policy based solutions to address these challenges. Global cyberspace has become an enormous challenge from the security perspective partly due to complications in enforcing security and regulatory efforts of national jurisdictions. This book presents more practical solutions to counteract these and other security threats posed by private and state-sponsored actors. Illicit events on cyberspace become increasingly complex as cyber technology advances thereby undermining the ability of existing regulatory instruments aimed at cybersecurity and deterring cybercrime. As existing laws cannot cope with newly emerging cyber security incidents, these incidents pose security threats for digital assets including those associated with Foreign Direct Investment (FDI). Increasingly interdependent global market place calls for more collaborative efforts to make cyberspace safer and more suitable for business transactions. This means there is the need to work towards not only regulatory solutions at national levels but more internationally enforceable legal norms must be worked out, which is part of the discussions in this book.
Technological developments related to the Internet benefit consumers who want convenient ways to view and hear information and entertainment content on a variety of electronic devices. The global nature of the Internet offers expanded commercial opportunities for intellectual property (IP) rights holders but also increases the potential for copyright and trademark infringement. Piracy of the content created by movie, music, and software companies and sales of counterfeit pharmaceutical drugs and consumer products negatively impact the American economy and can pose risks to the health and safety of U.S. citizens. This book discusses legislative approaches to online piracy and copyright infringement.
MS. DANIE VICTOR, ESQUIRE HAS BEEN PRACTICING LAW AND LECTURING WORLDWIDE ON A VARIETY OF TOPICS SINCE 1991. ALL REQUESTS MUST BE SUBMITTED VIA FACSIMILE ONLY: 772-283-2331.
Social media is one of the hottest topics in business today. The power of reaching hundreds of thousands of people is enticing. Correct use of social media for marketing a law practice or legal nurse consulting business is an art as well as a science. You may use the material in this book to deepen your understanding of social media, and to define a realistic plan for your own efforts.
Featuring the most current exploration of cyberlaw, CYBERLAW helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlaw-from cases to legislation to regulations.
This exceptional book is ideal for industry professionals, regulators and scholars in the domain of European regulatory governance. Amongst its many resources and informative features is a Regulatory Compliance Matrix with more than 1000 entries - a simplified but comprehensive guide to the laws, regulations, standards, and recommendations applicable to compliance programmes. What practitioners find inside will empower them to save thousands of euros, man-hours, and consultancy interventions. It also usefully guides regulators and scholars in understanding the complexities of European regulation and the important role industry plays. Inside, the reader will find the following key resources: INDUSTRY GOVERNANCE THEORY: a new take on regulatory governance that gives insight into industry's pro-active role and predominating influence in shaping European public policy. REGULATORY COMPLIANCE MATRIX: a synopsis of the principal domains of regulation, setting forth legal norms, ancillary standards and guidelines. REGULATORY COMPLIANCE MATURITY MODEL: part of a novel toolkit for organisations to design and manage their compliance programmes more effectively.P OLICY INFLUENCE-TIMING MODEL: a dynamic model of the public policy cycle empowering organisations to influence the outcomes of upcoming regulatory initiatives. STAKEHOLDER ACTION MATRIX: a map of stakeholders' engagement at all levels of governance, exhibiting their types and the channels through which they make the deepest impact on regulatory decisions. STAKEHOLDER DIRECTORY: a definitive compendium of potential allies and rivals who exercise the most influence over regulatory processes. EMPIRICAL RESEARCH METHODS: a background in survey techniques, participant observation, model evaluation, case studies, inferential logic, triangulation, and more. OTHER RESOURCES: including a comprehensive review of policy papers on European governance and ICT regulation put out by the European Commission, and a multidimensional Roadmap to the pan-European eComunications Framework Review.
The Internet has been romanticized as a zone of freedom. The alluring combination of sophisticated technology with low barriers to entry and instantaneous outreach to millions of users has mesmerized libertarians and communitarians alike. Lawmakers have joined the celebration, passing the Communications Decency Act, which enables Internet Service Providers to allow unregulated discourse without danger of liability, all in the name of enhancing freedom of speech. But an unregulated Internet is a breeding ground for offensive conduct. At last we have a book that begins to focus on abuses made possible by anonymity, freedom from liability, and lack of oversight. The distinguished scholars assembled in this volume, drawn from law and philosophy, connect the absence of legal oversight with harassment and discrimination. Questioning the simplistic notion that abusive speech and mobocracy are the inevitable outcomes of new technology, they argue that current misuse is the outgrowth of social, technological, and legal choices. Seeing this clearly will help us to be better informed about our options. In a field still dominated by a frontier perspective, this book has the potential to be a real game changer. Armed with example after example of harassment in Internet chat rooms and forums, the authors detail some of the vile and hateful speech that the current combination of law and technology has bred. The facts are then treated to analysis and policy prescriptions. Read this book and you will never again see the Internet through rose-colored glasses.
The Software Licensing Handbook leads you through the twists and turns of the language found in almost all software, maintenance and professional services contracts. Plain English explanations of standard contract wording enables anyone to understand what you are reading, regardless of whether you are buying OR selling software. Additionally, sections on negotiation and contract management enable you to fully understand, appreciate and if necessary, implement a complete contracting process.
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
What happens in the virtual world doesn't always stay in the virtual world Tens of millions of people today are living part of their life in a virtual world. In places like World of Warcraft, Second Life, and Free Realms, people are making friends, building communities, creating art, and making real money. Business is booming on the virtual frontier, as billions of dollars are paid in exchange for pixels on screens. But sometimes things go wrong. Virtual criminals defraud online communities in pursuit of real-world profits. People feel cheated when their avatars lose virtual property to wrongdoers. Increasingly, they turn to legal systems for solutions. But when your avatar has been robbed, what law is there to assist you? In Virtual Justice, Greg Lastowka illustrates the real legal dilemmas posed by virtual worlds. Presenting the most recent lawsuits and controversies, he explains how governments are responding to the chaos on the cyberspace frontier. After an engaging overview of the history and business models of today's virtual worlds, he explores how laws of property, jurisdiction, crime, and copyright are being adapted to pave the path of virtual law. Virtual worlds are becoming more important to society with each passing year. This pioneering study will be an invaluable guide to scholars of online communities for years to come.
Recent developments in Information and Communication Technologies (ICT) have brought about changes that have revolutionalised traditional ways of conducting business. While these developments in cyberspace bear legal implications, legal regimes in some African countries such as Tanzania have not kept pace with the changes in order to properly regulate related activities happening under cyberspace. This volume attempts to bridge the gap between the Law and ICT developments in East Africa. It attempts to respond to questions such as: What is Cyber Law? How are Parties Identified under a Relationship in a Cyberspace Environment? How are Banking and other Cyber Payments Done? What about Combating Cyber Crime and Managing E-Commerce? What is the Impact of ICT on Intellectual Property Rights? And, how are Internet Domain Names Regulated? The volume is a useful handbook for those who want to understand the changing legal guidelines in relation to developments in ICT.
The US Stock Market collapsed on Thursday, 6 May 2010 when the Dow Jones Index spiked down over 1000 points in a matter of a few minutes. Such a world market sell caused by a true Cyber attack could destroy the wealth of billions of people around the globe. This book will examine what Cyber Attacks could do to the civilized world, which grows more dependent on the Internet functioning properly to perform all of the complex tasks that need to be done every day.
Transmission of copyrighted work over the Internet has resulted in the introduction of a new exclusive right: the right of communication to the public, which was established by the WIPO Copyright Treaties. However, in implementing the Treaties, different jurisdictions have their own understandings and legislative solutions. This book examines these laws and the nature of the new right of communication to the public. In addition, copyright exceptions are an important way to balance the relationship of interest between copyright owners and the public by way of free uses, statutory licences and compulsory licences. In the environment of the Internet, this way is still effective on adjusting the relationship. This book analyses the relationship between transmission over the Internet and the exclusive rights, and examines all exceptions, such as fair use, sui generis rights, library and archive exceptions and educational use exceptions.
How can attorneys reach new clients on the Internet? Veteran attorney and Internet entrepreneur Jeff Lantz provides the definitive source for law firm Internet marketing, brand and value proposition creation, effective website development, search engine optimization (SEO), search engine/pay-per-click marketing on Google, Bing, and Yahoo , blogging, and social/business networking on Facebook and Twitter. The book discusses domain name acquisition, hosting, website platform and Content Management Systems, Web 2.0 design, SEO for high rankings on Google, and creating a powerful Client-Centered Website that resonates with clients and serves as a call to action. What Internet marketing is the most effective? Learn how to measure cost-per-client and to use website statistics for better marketing allocation. Step-by-step instructions are provided for domain registration, designing PPC ad campaigns on Google, Bing, and Yahoo , and creating business pages on Facebook and Twitter.
Like many other areas of life, humanitarian practice and thinking are being transformed by information and communications technology. Despite this, the growing digitization of humanitarianism has been a relatively unnoticed dimension of global order. Based on more than seven years of data collection and interdisciplinary research, #Help presents a ground-breaking study of digital humanitarianism and its ramifications for international law and politics. Global problems and policies are being reconfigured, regulated, and addressed through digital interfaces developed for humanitarian ends. #Help analyses how populations, maps, and emergencies take shape on the global plane when given digital form and explores the reorientation of nation states' priorities and practices of governing around digital data collection imperatives. This book also illuminates how the growing prominence of digital interfaces in international humanitarian work is sustained and shaped by law and policy. #Help reveals new vectors of global inequality and new forms of global relation taking effect in the here and now. To understand how major digital platforms are seeking to extend their serviceable lives, and to see how global order might take shape in the future, it is essential to grasp the perils and possibilities of digital humanitarianism. #Help will transform thinking about what is at stake in the use of digital interfaces in the humanitarian field and about how, where, and for whom we are making the global order of tomorrow.
Is the existing law in England and Wales is adequate to protect the privacy of the individual against the intrusion by the press? This book considers the nature and extent of existing legal protection and what alternatives there may be through the Press Complaints Commission and its Code of Practice. Future legal developments are also addressed. Contents: .Complaints and the Press .Confidentiality .Copyright .Nuisance .Others Sources of Protection .Technology .Data Protection and the Press .The Human Rights Act Essential reading for the press, lawyers advising the press and those that need protection from the press, Privacy and the Press remains as accessible and easy to use as the first edition.
PEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file sharing is or should be legal. John Logie analyzes the public arguments growing out of more than five years of debate sparked by the advent of Napster, the first widely adopted peer-to-peer technology. The debate continues with the second wave of peer-to-peer file transfer utilities like Limewire, KaZaA, and BitTorrent. With PEERS, PIRATES, AND PERSUASION, Logie joins the likes of Lawrence Lessig, Siva Vaidhyanathan, Jessica Litman, and James Boyle in the ongoing effort to challenge and change current copyright law so that it fulfills its purpose of fostering creativity and innovation while protecting the rights of artists in an attention economy. Logie examines metaphoric frames-warfare, theft, piracy, sharing, and hacking, for example-that dominate the peer-to-peer debates and demonstrably shape public policy on the use and exchange of digital media. PEERS, PIRATES, AND PERSUASION identifies the Napster case as a failed opportunity for a productive national discussion on intellectual property rights and responsibilities in digital environments. Logie closes by examining the U.S. Supreme Court's ruling in the "Grokster" case, in which leading peer-to-peer companies were found to be actively inducing copyright infringement. The Grokster case, Logie contends, has already produced the chilling effects that will stifle the innovative spirit at the heart of the Internet and networked communities. ABOUT THE AUTHOR John Logie is Associate Professor of Rhetoric at the University of Minnesota.
This book explores, through a children's rights-based perspective, the emergence of a safeguarding dystopia in child online protection that has emerged from a tension between an over-reliance in technical solutions and a lack of understanding around code and algorithm capabilities. The text argues that a safeguarding dystopia results in docile children, rather than safe ones, and that we should stop seeing technology as the sole solution to online safeguarding. The reader will, through reading this book, gain a deeper understanding of the current policy arena in online safeguarding, what causes children to beocme upset online, and the doomed nature of safeguarding solutions. The book also features a detailed analysis of issues surrounding content filtering, access monitoring, surveillance, image recognition, and tracking. This book is aimed at legal practitioners, law students, and those interested in child safeguarding and technology. |
You may like...
Letters of Donald Hankey - a Student in…
Donald William Alers Hankey
Paperback
R570
Discovery Miles 5 700
Best Practices Of South African Public…
Nicholus Mollo, Jan De Groof
Paperback
Race, Class And The Post-Apartheid…
John Reynolds, Ben Fine, …
Paperback
Teaching-Learning Dynamics
Monica Jacobs, Ntombizolile Vakalisa, …
Paperback
R618
Discovery Miles 6 180
|