![]() |
![]() |
Your cart is empty |
||
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
Social media is one of the hottest topics in business today. The power of reaching hundreds of thousands of people is enticing. Correct use of social media for marketing a law practice or legal nurse consulting business is an art as well as a science. You may use the material in this book to deepen your understanding of social media, and to define a realistic plan for your own efforts.
Cryptoassets represent one of the most high profile financial products in the world, and fastest growing financial products in history. From Bitcoin, Etherium and Ripple's XRP-so called "utility tokens" used to access financial services-to initial coin offerings that in 2017 rivalled venture capital in money raised for startups, with an estimated $5.6 billion (USD) raised worldwide across 435 ICOs. All the while, technologists have hailed the underlying blockchain technology for these assets as potentially game changing applications for financial payments and record-keeping. At the same time, cryptoassets have produced considerable controversy. Many have turned out to be lacklustre investments for investors. Others, especially ICOs, have also attracted noticeable fraud, failing firms, and alarming lapses in information-sharing with investors. Consequently, many commentators around the world have pressed that ICO tokens be considered securities, and that concomitant registration and disclosure requirements attach to their sales to the public. This volume assembles an impressive group of scholars, businesspersons and regulators to collectively write on cryptoassets. This volume represents perspectives from across the regulatory ecosystem, and includes technologists, venture capitalists, scholars, and practitioners in securities law and central banking.
The federal computer fraud and abuse statute, 18 U.S.C. 1030, protects computers in which there is a federal interest (federal computers, bank computers, and computers used in or affecting interstate and foreign commerce). It shields them from trespassing, threats, damage, espionage and from being corruptly used as instruments of fraud. It is not a comprehensive provision; instead it fills cracks and gaps in the protection afforded by other state and federal criminal laws. This book provides an overview of the federal computer fraud and abuse statute and related federal criminal laws with a focus on the proper handling of digital evidence and forensics.
MS. DANIE VICTOR, ESQUIRE HAS BEEN PRACTICING LAW AND LECTURING WORLDWIDE ON A VARIETY OF TOPICS SINCE 1991. ALL REQUESTS MUST BE SUBMITTED VIA FACSIMILE ONLY: 772-283-2331.
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
What happens in the virtual world doesn't always stay in the virtual world Tens of millions of people today are living part of their life in a virtual world. In places like World of Warcraft, Second Life, and Free Realms, people are making friends, building communities, creating art, and making real money. Business is booming on the virtual frontier, as billions of dollars are paid in exchange for pixels on screens. But sometimes things go wrong. Virtual criminals defraud online communities in pursuit of real-world profits. People feel cheated when their avatars lose virtual property to wrongdoers. Increasingly, they turn to legal systems for solutions. But when your avatar has been robbed, what law is there to assist you? In Virtual Justice, Greg Lastowka illustrates the real legal dilemmas posed by virtual worlds. Presenting the most recent lawsuits and controversies, he explains how governments are responding to the chaos on the cyberspace frontier. After an engaging overview of the history and business models of today's virtual worlds, he explores how laws of property, jurisdiction, crime, and copyright are being adapted to pave the path of virtual law. Virtual worlds are becoming more important to society with each passing year. This pioneering study will be an invaluable guide to scholars of online communities for years to come.
Recent developments in Information and Communication Technologies (ICT) have brought about changes that have revolutionalised traditional ways of conducting business. While these developments in cyberspace bear legal implications, legal regimes in some African countries such as Tanzania have not kept pace with the changes in order to properly regulate related activities happening under cyberspace. This volume attempts to bridge the gap between the Law and ICT developments in East Africa. It attempts to respond to questions such as: What is Cyber Law? How are Parties Identified under a Relationship in a Cyberspace Environment? How are Banking and other Cyber Payments Done? What about Combating Cyber Crime and Managing E-Commerce? What is the Impact of ICT on Intellectual Property Rights? And, how are Internet Domain Names Regulated? The volume is a useful handbook for those who want to understand the changing legal guidelines in relation to developments in ICT.
The US Stock Market collapsed on Thursday, 6 May 2010 when the Dow Jones Index spiked down over 1000 points in a matter of a few minutes. Such a world market sell caused by a true Cyber attack could destroy the wealth of billions of people around the globe. This book will examine what Cyber Attacks could do to the civilized world, which grows more dependent on the Internet functioning properly to perform all of the complex tasks that need to be done every day.
The Software Licensing Handbook leads you through the twists and turns of the language found in almost all software, maintenance and professional services contracts. Plain English explanations of standard contract wording enables anyone to understand what you are reading, regardless of whether you are buying OR selling software. Additionally, sections on negotiation and contract management enable you to fully understand, appreciate and if necessary, implement a complete contracting process.
How can attorneys reach new clients on the Internet? Veteran attorney and Internet entrepreneur Jeff Lantz provides the definitive source for law firm Internet marketing, brand and value proposition creation, effective website development, search engine optimization (SEO), search engine/pay-per-click marketing on Google, Bing, and Yahoo , blogging, and social/business networking on Facebook and Twitter. The book discusses domain name acquisition, hosting, website platform and Content Management Systems, Web 2.0 design, SEO for high rankings on Google, and creating a powerful Client-Centered Website that resonates with clients and serves as a call to action. What Internet marketing is the most effective? Learn how to measure cost-per-client and to use website statistics for better marketing allocation. Step-by-step instructions are provided for domain registration, designing PPC ad campaigns on Google, Bing, and Yahoo , and creating business pages on Facebook and Twitter.
Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Who's really in control of what's happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. It's a book about the fate of one idea - that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace and globalization communities.
Transmission of copyrighted work over the Internet has resulted in the introduction of a new exclusive right: the right of communication to the public, which was established by the WIPO Copyright Treaties. However, in implementing the Treaties, different jurisdictions have their own understandings and legislative solutions. This book examines these laws and the nature of the new right of communication to the public. In addition, copyright exceptions are an important way to balance the relationship of interest between copyright owners and the public by way of free uses, statutory licences and compulsory licences. In the environment of the Internet, this way is still effective on adjusting the relationship. This book analyses the relationship between transmission over the Internet and the exclusive rights, and examines all exceptions, such as fair use, sui generis rights, library and archive exceptions and educational use exceptions.
Is the existing law in England and Wales is adequate to protect the privacy of the individual against the intrusion by the press? This book considers the nature and extent of existing legal protection and what alternatives there may be through the Press Complaints Commission and its Code of Practice. Future legal developments are also addressed. Contents: .Complaints and the Press .Confidentiality .Copyright .Nuisance .Others Sources of Protection .Technology .Data Protection and the Press .The Human Rights Act Essential reading for the press, lawyers advising the press and those that need protection from the press, Privacy and the Press remains as accessible and easy to use as the first edition.
PEERS, PIRATES, AND PERSUASION: RHETORIC IN THE PEER-TO-PEER DEBATES investigates the role of rhetoric in shaping public perceptions about a novel technology: peer-to-peer file-sharing networks. While broadband Internet services now allow speedy transfers of complex media files, Americans face real uncertainty about whether peer-to-peer file sharing is or should be legal. John Logie analyzes the public arguments growing out of more than five years of debate sparked by the advent of Napster, the first widely adopted peer-to-peer technology. The debate continues with the second wave of peer-to-peer file transfer utilities like Limewire, KaZaA, and BitTorrent. With PEERS, PIRATES, AND PERSUASION, Logie joins the likes of Lawrence Lessig, Siva Vaidhyanathan, Jessica Litman, and James Boyle in the ongoing effort to challenge and change current copyright law so that it fulfills its purpose of fostering creativity and innovation while protecting the rights of artists in an attention economy. Logie examines metaphoric frames-warfare, theft, piracy, sharing, and hacking, for example-that dominate the peer-to-peer debates and demonstrably shape public policy on the use and exchange of digital media. PEERS, PIRATES, AND PERSUASION identifies the Napster case as a failed opportunity for a productive national discussion on intellectual property rights and responsibilities in digital environments. Logie closes by examining the U.S. Supreme Court's ruling in the "Grokster" case, in which leading peer-to-peer companies were found to be actively inducing copyright infringement. The Grokster case, Logie contends, has already produced the chilling effects that will stifle the innovative spirit at the heart of the Internet and networked communities. ABOUT THE AUTHOR John Logie is Associate Professor of Rhetoric at the University of Minnesota.
Are super-capable robots and algorithms destined to devour our jobs and idle much of the adult population? Predictions of a jobless future have recurred in waves since the advent of industrialization, only to crest and retreat as new jobs-usually better ones-have replaced those lost to machines. But there's good reason to believe that this time is different. Ongoing innovations in artificial intelligence, machine learning, and robotics are already destroying more decent middle-skill jobs than they are creating, and may be leading to a future of growing job scarcity. But there are many possible versions of that future, ranging from utterly dystopian to humane and broadly appealing. It all depends on how we respond. This book confronts the hotly-debated prospect of mounting job losses due to automation, and the widely-divergent hopes and fears that prospect evokes, and proposes a strategy for both mitigating the losses and spreading the gains from shrinking demand for human labor. We should set our collective sights, it argues, on ensuring access to adequate incomes, more free time, and decent remunerative work even in a future with less of it. Getting there will require not a single "magic bullet" solution like universal basic income or a federal job guarantee but a multi-pronged program centered on conserving, creating, and spreading work. What the book proposes for a foreseeable future of less work will simultaneously help to address growing economic inequality and persistent racial stratification, and makes sense here and now but especially as we face the prospect of net job losses.
The free trade and commerce available through website in what is known as cyber space has also given birth to a mobile population where intent may basically be criminal. This encyclopaedia tries to cover as many laws as possible, promulgated by various countries.
The regulatory architecture available for cyberspace law still seems incapable of conceiving, much less resolving, the new issues of privacy raised by the use of the Internet in the workplace. This analysis of the thorny problems in this area of the law attempts to clarify the nature of the conflicts and disputes that arise and that are likely to continue to arise. It is a detailed comparative treatment of the subject, analysing the relevant law both at the international level and in six major national jurisdictions. The author first examines the international jurisdictional problems related to the Internet and new technologies. Starting from an economic analysis of the law of cyberspace, the author demonstrates that the problem of conflicting legal rules may be solved by adopting new laws, regulations and guidelines governing the Internet. The second part explores the ways in which the Internet and the introduction of new information technologies has dramatically affected the world of work and individual rights. The author analyses the origins, limits and boundaries of these rights, and makes a comparative analysis of the relevant constitutions and statutes in both common law and civil law. Finally, an examination of the legal systems of the USA, the UK, France, Germany, Italy, and Japan, and of their responses to the new Internet-related issues, enable the author to propose effective ways to achieve a better balance between the employee's right to privacy and the responsibilities of the employer in the new electronic environment.
High Marks for the Internet Legal Guide "The Internet Legal Guide is a fascinating exploration of discovery in understanding the legal frontiers of the Internet. Dennis Powers does an immense service for all of us in an Internet form of business with this comprehensive and thorough guide." —Ahnalira Koan, Laughing Place Travel (www.ourlaughingplace.com) "I feel that this book is invaluable and a must read not only for my management team and all of my employees, but also my clients. I especially appreciated the text from actual agreement examples, as well as the discussions of provisions that followed them. I encourage anyone and everyone to buy and read this book twice. The first time to show you everything you have been doing wrong, and the second time to learn how to do it right the next time." —Jim Teece, President and Chief Executive Officer, Project A, Inc. (www.ProjectA.com) "This book is rich in content and practical advice. It is filled with informative–as well as entertaining–descriptions of the latest developments in cyberlaw. Most importantly, it gives anyone interested in doing business on the Web the know-how to avoid costly legal pitfalls and problems." —Ray August, Professor of Business Law (http://august1.com/about/) "What I really like about this book is that it takes a business approach to Internet issues. This is a book for business people with an eye to the bottom line, and how businesses can capitalize on the Web and not get entangled in legal issues. The Internet Legal Guide is essential reading for small business owners, who can not afford the luxury of an in-house legal counsel. A savvy business owner will find this book a road map to turn the Web from threat to opportunity." —Kevin Talbert, Chief Information Officer, Southern Oregon University "The New Economy is arriving. Even as the stock market and businesses adjust to absorb the 'irrational exuberance' of the late 1990s, consumers and businesses continue unabated in their march to use technology and the Internet to reduce costs, to increase profits, to improve service, to increase choice, and generally to increase the efficiency and potential of all that we do. Dennis Powers has written a timely and informative book to help prepare the nonlawyer, and even to educate lawyers, to prepare for and benefit from this new online world." —Richard Keck, Partner, Telecommunications and Electronic Commerce Practice Group, Troutman Sanders LLP "A wonderful book that melds the practical into the legal, so we all can navigate our virtual twenty-first-century operations through today’s legal-infested waters. I wish I had had it two years ago!! I could have saved a lot of time and legal costs when I was organizing my Internet company. It’s so convenient and efficient to have all the material in one place. (The good news is I can still save and benefit from the many excellent ideas.)" —Charles "Hop" Fuhrmann, Chairman, HealthyPlace.com, Inc.; Chairman and CEO, Texaco Limited
The Dutch telecommunications market is probably one of the most open in the world. Three years after its full liberalization (which was completed six months ahead of the EU timetable) the Netherlands have approximately 65 operators with interconnection or special network agreements, including five providers of mobile telephony networks. Nearly all of the world's largest international players have established a presence in the Dutch telecom market. It is for their benefit and for the benefit of their advisers that this book has been published. It contains the full text of the Dutch Telecommunications Act and of the most important decrees adopted thereunder, concurrently in Dutch and English. In addition, it contains a practical introduction to the telecommunications laws of the Netherlands described by leading practitioners in the field.
This book outlines and analyses the legislative activity of the Union in an area which is currently experiencing exponential growth in terms of both commercial activity and legal significance. The scope of the book is current,pending and proposed Internet-related law on contracts, copyright, data protection, commercial communications, financial services, electronic cash and electronic signatures. John Dickie argues that the Union is in the process of displacing Member State autonomy in the regulation of the Internet. Within that frame, it is argued that there is a lack of focus on the individual in the electronic marketplace and a lack of co-ordination between relevant legislative instruments. This book will be of interest to all those engaged with Union and Internet law, including lawyers, policy-makers and academics. |
![]() ![]() You may like...
Global Perspectives on Information…
Guillermo A. Francia Iii, Jeffrey S. Zanzig
Hardcover
R6,565
Discovery Miles 65 650
Blockchain and Public Law - Global…
Oreste Pollicino, Giovanni De Gregorio
Hardcover
R3,108
Discovery Miles 31 080
Digital Justice - Technology and the…
Ethan Katsh, Orna Rabinovich-Einy
Hardcover
R3,094
Discovery Miles 30 940
Cyberlaw @ SA - The Law of the Internet…
S. Papadopoulos, S. Snail ka Mtuze
Paperback
|