default search action
Computer Law & Security Review, Volume 3
Volume 3, Number 1, May 1987
- Yvo Henniker-Heaton:
Security awareness. 2-3 - Stephen Saxby:
Semi-conductor chips. 3-6 - Stephen Saxby:
Computer evidence. 6-9 - John Sims:
New approaches to dispute resolution. 9-10 - Steven Larner, Sandy Douglas:
Settling disputes in the computer industry. 10-12 - C. C. Dilloway:
A case study in a computer arbitration. 12-13 - David W. Greaves:
Computer disputes: Have the courts become too user-friendly? 13-14 - William Farquhar:
Risk management. 14-17 - David V. Marshall:
Electronic share dealing - The legal issues. 21-23 - Bernard P. Zajac Jr.:
US focus. 23-24 - Fred Greguras:
National security decision directive 145. 25 - Stephen Saxby:
Current awareness. 26-32 - Stephen Saxby:
Recent decisions in the US courts. 34-36
Volume 3, Number 2, July 1987
- Marc Regberg:
Trends in communication technology: Impacts on the right to control publication and performance. 2-6 - R. E. Butler:
ISDN - Major obstacles stand in the way. 6 - Telecommunications and employment: An interview with Mr. R.E. Butler, Secretary-General of the international telecommunication union. 6-10
- Roy N. Freed:
Is software copyright becoming unfair competition law? 10-12 - J. A. L. Sterling:
Copyright in computer programs. 13-17 - David V. Marshall:
Electronic share dealing - the legal issues. 18-19 - Rowan Middleton:
Computer security. 23-24 - Bernard P. Zajac Jr.:
US focus. 24-27 - David W. Greaves:
Law reports update - recent legislative and judicial developments in the US. 25-27 - Noel Byrne:
Commercial agreements and competition law: Practice and procedure in the UK and EEC: Dr Nicholas Green published by Graham & Trotman, 1986. ISBN 0860107884. Price £89. 31-32 - Yvo Henniker-Heaton:
Electronic risks in banking and commerce, the gloucester hotel, London. A two day course organised by IBC technical services, March 1987. 32-34 - David W. Greaves:
The 1987 computer law symposium 28 and 29 April 1987, London. A two day course organised by legal studies and services ltd. 34-35 - David W. Greaves:
Legal liability for expert systems - 14 May 87 London. A one day conference organised by learned information ltd. 35-36 - Pamela Hughes:
Computer security - 3 day seminar 20-22/5/87. EMAP. 36
Volume 3, Number 3, September 1987
- Communication technology. 2-4
- Eric E. Bergsten:
International trade procedures. 4-7 - Roger Brown:
Privacy. 8-11 - Alistair Kelman:
Read all about yourself. 11-12 - Yvo Henniker-Heaton:
Computer security. 12-13 - David Davies:
Anatomy of a disaster. 13-14 - Bernard P. Zajac Jr.:
Computer crime - what to do before it happens. 14-18 - J. A. L. Sterling:
Copyright in computer programs. 21-28 - Bernard P. Zajac Jr.:
US focus. 28-29 - David Davies:
Security focus. 35-36 - David Davies:
It can't happen to us: A selection of recent computing losses. 36-37 - John E. Appleton:
Law reports update. 37-39
Volume 3, Number 4, November 1987
- Ruel T. Hernandez:
Information law. 2-8 - Christopher Millard:
Software licensing. 8-11 - Clive D. Thorne:
Copyright legislation. 12 - Yvo Henniker-Heaton:
Risk management. 13-15 - Pamela Hughes:
Radio frequency interference - myths, realities and a practical approach. 15-17 - Jill Dann:
Defence review. 17-18 - David V. Marshall:
Electronic share dealing - The legal issues. 18-20 - Michael D. Pendleton:
Hong Kong Focus. 20-22 - Martin Wasik:
Computer crime. 23-24 - Bernard P. Zajac Jr.:
US focus. 24-26 - David Davies:
Protection against director's failure. 37 - David Davies:
The consumer protection act British computer society, 24 September 1987. 38-40
Volume 3, Number 5, January 1988
- J. A. L. Sterling:
Copyright legislation. 2-9 - Richard Dedman:
Legal protection of software in the United Kingdom. 10-14 - Grant Hammond:
The development of trade secrets law in Canada. 14-16 - Ranald Robertson:
Strict liability under the consumer protection act 1987 - Some implications for producers of computer based products. 16-20 - Yvo Henniker-Heaton:
A look behind the news 1988 - New year's resolutions: A data processing manager reveals all. 28-29 - Pamela Hughes:
The 'need to know' principle of computer security. 29-30 - Buck BloomBecker:
US computer security legislation H.R. 145: A step toward greater computer security? 130-31 - Bernard P. Zajac Jr.:
The latest news from the US. 31-32 - Stephen Saxby:
Law report - Canada. 32-34 - David W. Greaves:
US case law and legislative developments. 34-35 - Chris Hennessy:
Contingency planning and disaster recovery for computer systems. 38-39 - David W. Greaves:
Computer disputes - A new perspective. 39 - Stephen Saxby:
Information technology and the courts. 40-41 - R. W. Wright:
R.W. Wright: Address to ITAC conference a litigation solicitor's view. 41-42 - Derek Dann, Jill Dann:
MILCOMP 87 Military computers, graphics and software a review. 42-43 - Pamela Hughes:
Fourth National Computer Security Conference, Windsor, U.K. 43-44
Volume 3, Number 6, March 1988
- Sharon Harvey, Julian Newman:
Contracts by electronic mail. 2-6 - Graham Greenleaf:
Privacy. 6-8 - Alan S. Wernick:
Intellectual property bankruptcy protection. 8-11 - John Morris:
Source code maintenance and Escrow. 11-16 - Eric Bergsten:
International trade procedures. 23-29 - Arthur Dunkel:
General agreement on tariffs and trade. 30-32 - Cliff Dilloway:
Arbitration - IBM v FUJITSU Ltd. 32-34 - David Davies:
Risk management. 35-36 - Bernard P. Zajac Jr.:
US focus. 36 - David W. Greaves:
Case law update. 37 - David W. Greaves:
US case low developments. 37-38 - Ian Walden:
Conference review. 38-40
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.