![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Law > Laws of other jurisdictions & general law > Financial, taxation, commercial, industrial law > Communications law
An established authority in the field, this work provides
comprehensive analysis of the law and practice relating to internet
domain names at an international level, combined with a detailed
survey of the 35 most important domain name jurisdictions
worldwide, including the US, UK, Germany, France, Italy,
Netherlands, Japan, China, Singapore, Russia, Canada, and
Australia, and new chapters on Israel, Mexico, South Korea, Brazil,
Colombia, Egypt, Portugal, and South Africa. The survey includes
extensive country-by-country analysis of how domain names relate to
existing trade mark law, and upon the developing case law in the
field, as well as the alternative dispute resolution procedures.
What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability - and more alarmingly, too little security. On the other hand, where there is too little privacy, individuals may not have the space to grow, experiment, and engage in practices not generally accepted by the majority. Moreover, allowing overly limited control over access to and uses of private places and information may itself be a threat to security. By clarifying the moral, legal, and social foundations of privacy, security, and accountability, this book helps determine the appropriate balance between these contested values. Twelve specially commissioned essays provide the ideal resource for students and academics in information and applied ethics.
Communication Law in America is a comprehensive, easy-to-follow overview of the complicated ways in which U.S. law determines who may say what to (and about) whom. It covers the usual content- libel, invasion of privacy, copyright and trademark, access to government information, advertising, electronic media- all the while giving readers a sense of how and why this country has come to weigh freedom of speech above competing freedoms far more often than in other Western democracies. This fourth edition of the well-received text boasts over 300 new citations, including discussion of a dozen U. S. Supreme Court decisions handed down since the previous edition. The nearly 200 still photos and over 80 videos on the author-maintained website - generally not images of litigants but of the actual artifacts (TV and movie scenes, advertisements, news reports) that led to the law suits- have always represented dramatic added value to students and professors alike. The new edition includes 35 new visual elements, including 20 videos. The text also offers a new section on how the First Amendment applies to special populations, including students, government employees in general, and the military in particular.
New Media, Old Regimes: Case Studies in Comparative Communication Law and Policy, by Lyombe S. Eko, is a collection of novel theoretical perspectives and case studies which illustrate how different communication law regimes conceptualize and apply universal ideals of human rights and freedom of expression to media controversies in real space and cyberspace. Eko's investigation includes such controversial communication policy topics as North African regimes' failed use of telecommunications to suppress the social change of the Arab Spring, the Mohammad cartoon controversy in Denmark and France, French and American policy of development and diffusion of the Minitel and the Internet, American and Russian regulation of internet surveillance, the problem of managing pedopornography in cyberspace and real space, and other current communication policy cases. This study will aid readers not only to understand different national and cultural perspectives of thorny communication issues, but also show that though freedom of expression is a pluralistic concept, the actions of all political regimes at the national, transnational, and international levels must be held up to the universal standards of freedom of expression set forth in the Universal Declaration of Human Rights. New Media, Old Regimes provides essential scholarship on comparative communication law and policy in a world of new media.
A PDF version of this book is available for free in open access via www.tandfebooks.com as well as the OAPEN Library platform, www.oapen.org. It has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 3.0 license and is part of the OAPEN-UK research project. E-commerce offers immense challenges to traditional dispute resolution methods, as it entails parties often located in different parts of the world making contracts with each other at the click of a mouse. The use of traditional litigation for disputes arising in this forum is often inconvenient, impractical, time-consuming and expensive due to the low value of the transactions and the physical distance between the parties. Thus modern legal systems face a crucial choice: either to adopt traditional dispute resolution methods that have served the legal systems well for hundreds of years or to find new methods which are better suited to a world not anchored in territorial borders. Online Dispute Resolution (ODR), originally an off-shoot of Alternative Dispute Resolution (ADR), takes advantage of the speed and convenience of the Internet, becoming the best, and often the only option for enhancing consumer redress and strengthening their trust in e-commerce. This book provides an in-depth account of the potential of ODR for European consumers, offering a comprehensive and up to date analysis of the development of ODR. It considers the current expansion of ODR and evaluates the challenges posed in its growth. The book proposes the creation of legal standards to close the gap between the potential of ODR services and their actual use, arguing that ODR, if it is to realise its full potential in the resolution of e-commerce disputes and in the enforcement of consumer rights, must be grounded firmly on a European regulatory model.
A data security breach occurs when there is a loss or theft of, or other unauthorized access to, sensitive personally identifiable information that could result in the potential compromise of the confidentiality or integrity of data. This book provides an overview of state security breach notification laws applicable to entities that collect, maintain, own, possess, or license personal information. This book describes information security and security breach notification requirements in the Office of Management and Budget's "Breach Notification Policy," the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and the Gramm-Leach-Bliley Act (GLBA).
Uno puede preguntarse como un juez o una camara legislativa de algun gobierno determina que cosas pueden ser vistas u oidas en los diversos medios de telecomunicaciones. Algunos indagan sobre la censura a contenidos indecentes u obscenos; otros ponen mas enfasis en la restriccion a contenidos violentos. Muchos debaten cuales deben ser los parametros para supervisar la concentracion de los medios....
Expert hands-on advice on getting the most out of Web 2.0 and cloud computing. Applications like YouTube, Facebook, Flickr and Slideshare all raise legal problems for the information professional. Whether you're working with, managing or using Web 2.0 or cloud computing applications you will need to be able to assess and manage risk effectively. This no-nonsense practical working tool will make the relevant legal principles simple to understand for those with little or no experience and make common problems quick to solve when you're struggling with daily deadlines. Each chapter starts with an accessible introduction to the key areas of relevant law and the implications for Web 2.0 and cloud computing. Cross-sectoral case studies illustrate real world problems and exercises with easy-to-follow, pragmatic solutions allow you to quickly develop good practice. The relevant practice is discussed in relation to these key topics: the major legal issues raised by Web 2.0 an overview of copyright other intellectual property rights and related rights data protection including UK and EU law freedom of information defamation and global differences in defamation law cloud computing issues liability issues. Readership: This is an essential toolkit for all information professionals working in public, academic or special libraries, archives or museums, who are working with, using or managing Web 2.0 or cloud computing applications. It also provides a practical introduction to the law on these topics for LIS students and academics.
There is no comprehensive federal privacy statute that protects personal information. Instead, a patchwork of federal laws and regulations govern the collection and disclosure of personal information and has been addressed by Congress on a sector-by-sector basis. Some contend that this patchwork of laws and regulations is insufficient to meet the demands of today's technology. Congress, the Obama Administration, businesses, public interest groups and citizens are all involved in the discussion of privacy solutions. This book examines some of these efforts with respect to the protection of personal information and provides a brief overview of selected recent developments in the area of federal privacy law.
Concerned that the fast-evolving technology used to empower students also puts the school at risk? The legal issues that affect today's classrooms require a heightened awareness and understanding of Internet safety and cyber law. This timely reference is an essential overview for teachers, media specialists, and administrators covering legal issues related to Internet and technology use. Lawyer and educational policy expert Aimee M. Bissonette provides up-to-date research, jargon-free summaries of legal cases illustrating potentially risky classroom situations, and proactive strategies on: Privacy, security, copyright, liability, and safety Internet tools, social networking sites, cyberbullying, and appropriate online behavior The use of non-school electronics such as cell phones, handheld computers, and cameras With sample policies, procedures, permission forms, and contract language, Cyber Law turns complicated legal concepts into concrete ideas that will help schools act responsibly and anticipate new developments.
In 1996, Congress enacted comprehensive reform of the nation's statutory and regulatory framework for telecommunications by passing the Telecommunications Act, which substantially amended the 1934 Communications Act. The general objective of the 1996 Act was to open up markets to competition by removing unnecessary regulatory barriers to entry. At that time, the industry was characterised by service-specific networks that did not compete with one another: circuit-switched networks provided telephone service and coaxial cable networks provided cable service. The act created distinct regulatory regimes for these service-specific telephone networks and cable networks that included provisions intended to foster competition from new entrants that used network architectures and technologies similar to those of the incumbents. This 'intramodal' competition has proved very limited. But the deployment of digital technologies in these previously distinct networks has led to market convergence and 'intermodal' competition, as telephone, cable, and even wireless networks increasingly are able to offer voice, data, and video services over a single broadband platform. There is consensus that the current statutory framework is not effective in the current market environment, but not on how to modify it. The debate focuses on how to foster investment, innovation, and competition in both the physical broadband network and in the applications that ride over that network while also meeting the many non-economic objectives of U.S. telecommunications policy: universal service, homeland security, public safety, diversity of voices, localism, consumer protection, etc. This book explores these issues and includes the act in its entirety.
Do courts adequately balance the rights of a free press? Under what conditions may the government refuse to release information to the news media? How can society protect itself from deceptive advertising? First Amendment questions like these are the focus of Communication Law. This introductory textbook addresses First Amendment issues that affect the general public, academics, business people, journalists, government officials, and broadcasters. This newly revised edition contains descriptions and analyses of recent and precedent-setting judicial decisions and is a valuable text for communication law courses in journalism, communication, and political science departments.
Advance praise for The GigaLaw Guide to Internet Law
Electronic banking is a rapidly expanding and complex area. The aim of this new edition is to assist understanding of the legal issues in this area for both legislators and draftsmen. Electronic Banking has developed at a breathtaking pace and it is very important that the law keeps up with changes in the area. Specific events have made it even more essential for an updated text on this subject; the development of payment clearing since the deregulation of cross-border flows of funds, the development of capital adequacy ratios and the Euro. Electronic banking practices affect even the simplest daily transactions, a thorough understanding of the subject is therefore vital. The second edition of Cross Border Electronic Banking 2nd Edition sees substantial developments. It explains the increasingly complex emerging payment system for the information economy. The chapters on Bolero and Swift are key for the banking industry, these are very - yen]hot-- topics that are yet to be covered by other books. The text looks at both business to business transactions and banker-customer relationships. It also discusses the latest developments including the new EC Directive on regulating the issui
Part of a series of short books which deal with topical issues in public policy in an accessible way, this volume examines the legal impact of the information technology revolution. The massive data banks operated by public and private sector organizations have implications for both individuals and society as a whole. In the area of criminal law, the computer hacker has attained a place in popular demonology, whilst the fear of computer viruses and the problems of software piracy have attracted widespread publicity. The increasing use of and reliance upon computers in safety-critical applications also prompts consideration of the legal consequences which may follow any failure. In addition to examining the efficacy of present and proposed legal responses, this book considers the social, technical and cultural fators which influence various forms of computer-related behaviour.
Life now without access to electronic telecommunications would be regarded as highly unsatisfactory by most of the UK population. Such ready access would not have been achieved without methodical and ultimately enforceable means of access to the land on which to install the infrastructure necessary to support the development of an electronic communications network. Successive governments have made such access a priority, regarding it as a principle that no person should unreasonably be denied access to an electronic communications network or electronic communications services. The enactment of the Telecommunications Act 1984 and its revision by the Communications Act in 2003 have played their role in the provision of an extensive electronic infrastructure in the UK, while their reshaping by means of the Digital Economy Act 2017 will continue that process. Throughout that process, a little publicised series of struggles has taken place between telecommunications operators and landowners, as they seek to interpret the Electronic Communications Code by which their rights and obligations have been regulated. This book describes the problems that accompanied the Old Code (which will continue to regulate existing installations and agreements); and the intended solutions under the New Code. The eminent team of authors explain the background, provisions and operation of the old code and the new one, providing practical and jargon-free guidance throughout. It is sure to become the reference on this topic and is intended as a guide for telecommunications operators, land owners, and of course for their advisers in the legal and surveying professions. All members of Falcon Chambers, comprising nine Queen's Counsel and 30 junior barristers, specialise in property law and allied topics, including the various incarnations of the Electronic Communications Code. Members of Falcon Chambers, including all the authors of this new work, have for many years lectured and written widely on the code, and have appeared (acting for both operators and landowners) in many of the few reported cases on the subject of the interface between property law and the code, including for example: Geo Networks Ltd v The Bridgewater Canal Co. Ltd (2010); Geo Networks Ltd v The Bridgewater Canal Co. Ltd (2011); Crest Nicholson (Operations) Ltd v Arqiva Services Ltd (2015); Brophy v Vodafone Ltd (2017).
Providing a comprehensive explanation of blockchain, cryptocurrency and the international regulation and challenges that apply, this book introduces the reader to the core topics, including: global regulation of blockchain and cryptoassets; the Internet of Things; the Right to be Forgotten and the right to erasure; environmental, social and governance metrics; smart contracts; initial coin offerings; data protection regulation; Decentralised Autonomous Organisations ('DAOs') and the Metaverse. Written by leading UK experts in cyber law, the Second Edition includes: - fungible and non-fungible cryptoassets ('NFTs') - remedy and tracing strategies - financial hygiene requirements that flow from anti-money laundering - counter-terrorist financing regulations. Explaining the fundamentals of blockchain and cryptocurrency in an accessible and understandable way, and sparking new thinking about how old problems can be solved in new ways, this book is essential reading for anyone wishing to have a wider understanding of this complex and evolving area of law.
This book brings together papers that offer conceptual analyses, highlight issues, propose solutions, and discuss practices regarding privacy, data protection and Artificial Intelligence. It is one of the results of the thirteenth annual International Conference on Computers, Privacy and Data Protection (CPDP) held in Brussels in January 2020. The development and deployment of Artificial Intelligence promises significant break-throughs in how humans use data and information to understand and interact with the world. The technology, however, also raises significant concerns. In particular, concerns are raised as to how Artificial Intelligence will impact fundamental rights. This interdisciplinary book has been written at a time when the scale and impact of data processing on society - on individuals as well as on social systems - is becoming ever starker. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection.
This fifth volume from the Munster Colloquia on EU Law and the Digital Economy focuses on one of the most important challenges faced by private law in this era of digitalisation: the effects of 'data as counter-performance' on contract law; a phenomenon acknowledged by the EU legislator in the new Digital Content Directive 2019/770. In the book, legal experts from across Europe examine various issues, in particular contract performance and restitution and the relationship between contract law and data protection.
In Broadcasters' Rights in the Digital Era, Sakthivel provides a cogent understanding into a hitherto unchartered territory on the applicability of copyright law on the live streaming of 'entertainment content'- an emerging medium of communication. The book examines in exhaustive breadth the scope of broadcasters' neighbouring rights under the copyright regime in the light of technological advancements vis-a-vis authors' right and explores the experiences of EU & USA and then suggests suitable changes to the Indian Copyright regime. Sakthivel employs technological analysis and existence of differential market for different mediums to substantiate the relationship of live streaming and the copyright regime.
Although the law on infringement is relatively straightforward in relation to the copying of literal and textual elements of software, it is the copying of non-literal and functional elements that poses complex and topical questions in the context of intellectual property (IP) protection. In many cases, it is these non-literal and functional elements that contain the real value of a software product. This book concerns the copying of non-literal and functional elements of software in both the United States and European Union, using a holistic approach to address the most topical questions facing experts concerned with legal protection of software products across a range of technological platforms. The book focuses on six distinct but interrelated areas: contract, copyright, patents, trade-dress, designs and trade secrets, discussing these areas separately and in relation to one another. The book discusses software as a multilayered functional product, setting the scene for other legal discussions by highlighting software's unique characteristics. It examines models for the provision of software, addressing licensing patterns and overall enforceability, as well as the statutory and judicial tools for regulating the use of such licences. It assesses the protection of non-literal and functional software elements under EU and US laws, focusing on internal architecture, interfaces, behavioural elements and GUIs.
Protecting the privacy of student data when bringing technology into the classroom is one of the toughest organizational challenges facing schools and districts today. Parent and legislator concerns about how school systems protect the privacy of student data are at an all-time high. School systems must navigate complex federal and state regulations, understand how technology providers collect and protect student data, explain those complexities to parents, and provide the reassurance the community needs that the student information will remain safe. Student Data Privacy: Building a School Compliance Program provides solutions for all of these challenges and more. It is a step-by-step journey through the process of building the policies and practices to protect student data, and shifting the organizational culture to prioritize privacy while still taking advantage of the tremendous benefits that technology has to offer in the modern classroom.
Even though the First Amendment of the U.S. Constitution grants freedom of speech and freedom of the press, laws and regulations governing media frequently evolve as the media themselves do. As a result, it is often a challenge to keep pace with new laws and regulations. Electronic Media Law is a comprehensive, up-to-date textbook on the constantly changing and often complex world of electronic media law. Author Roger L. Sadler examines the laws, regulations, and court rulings affecting broadcasting, cable, satellite, and cyberspace. The book also looks at cases from the print media and general First Amendment law, because they often contain important concepts that are relevant to the electronic media. Electronic Media Law is written for mass media students, not for future lawyers, so the text is straightforward and explains "legalese." The author covers First Amendment law, political broadcasting rules, broadcast content regulations, FCC rules for station operations, cable regulation, media ownership rules, media liability lawsuits, intrusive newsgathering methods, media restrictions during wartime, libel, privacy, copyright, advertising law, freedom of information, cameras in the court, and privilege. Key Features Provides an easy-to-use format of chapter categories and sections that facilitate research on individual topics Frequently Asked Questions highlight important points from cases Explains complex, legal concepts in basic terms that give students the foundation for further studies in electronic media law Electronic Media Law provides an understanding of the First Amendment and the American legal system with an emphasis on the electronic media. It is an excellent textbook for undergraduate and graduate students studying broadcast law and media law. |
You may like...
Philosophy in education and research…
Maximus Monaheng Sefotho
Paperback
(1)
|