


default search action
Computer Law & Security Review, Volume 10
Volume 10, Number 1, January 1994
- Michael Kirby:

Biotechnology and the law. 2-9 - Michael A. Heather:

Challenges for the law from cyberspace and virtual worlds. 17-21 - Katherine C. Spelman, John Moss:

The intellectual property inventory: Why do it? 22-24 - Wendy London:

Information security I. 29-30 - Neil A. McEvoy:

Information security II. 31-32 - Ian J. Lloyd:

European information market. 33-34 - David Marsh:

EDI 1993; The UK National EDI Conference; Birmingham October 4th - 7th. 35 - Simon Davies:

The Fifteenth Annual Conference of Privacy and Data Protection Commissioners. 36-37 - Heather Rowe:

Data protection. 47
Volume 10, Number 2, March 1994
- Gillian Bull:

Licensing and distribution of market data. 50-55 - Wendy R. London:

Harmonization of IT laws. 64-75 - Moira Sympson:

999 !: My computer's stopped breathing ! 76-81 - Gary Lea:

Passing off and the protection of program look & feel. 82-83 - Graham J. H. Smith:

When is a computer not a computer? 84-85 - Colin Tapper:

The law commission's report on the reform of the hearsay rule: Its impact upon the reception of computer output. 86-88 - Jean-Bernard Condat:

Toll fraud on french PBX systems. 89-91 - Alastair Ross:

The essentials of EDI law - A Straightforward legal framework to protect your business: Peter Jones and David Marsh 1993 Softcover 141p. 91 - Jørgen Klaveness:

Practical use of spreadsheets in the analysis of bankruptcies. 92-93 - Guy Lougher:

Commercial agency contracts: implementation of the EC directive. 94-95 - Bernard P. Zajac Jr.:

Clinton administration proposes national telecommunications policy. 96 - David Davies:

Managing crisis - a live simulation. 108
Volume 10, Number 3, May 1994
- Jeremy R. C. Brown:

Technology licensing. 110-120 - Robert Strivens:

EC competition law. 121-122 - John Worthy:

Software law. 123-126 - Rory Graham:

Database law. 127-130 - Robert McCallough:

Evidential issues in cases of infringement of copyright in software. 134-135
Volume 10, Number 4, July 1994
- Gyorgy Palos:

The impact of the Hungarian - USA agreement on the Hungarian intellectual property law. 185-188 - Georgi Sarakinov:

New law on copyright and neighbouring rights in Bulgaria. 189-190 - August Bequai:

Update on US congressional efforts to regulate electronic monitoring. 203-205
Volume 10, Number 5, September 1994
- Jeremy R. C. Brown:

Reconsideration of licence agreements in Europe: Implications of the '1991' programme, the single market, EC enlargement and the EEA treaty for technology transfer - part II Jeremy Brown's analysis of EC licensing policy. 222-225 - Wendy London:

EC information security legislation: Where now? 226-233 - Thomas Mandeville, Donald McLean Lamberton, Stuart MacDonald:

Marketing public sector information: Some issues. 234-237 - Irini E. Vassilaki:

Interception of telecommunications for criminal investigation - a comparative analysis. 238-242 - Harvey Freeman:

Satellite services - the future of the signatory affairs office. 243-244 - C. Ian Kyer:

Software piracy & corporate compliance. 245-246 - Peter Brownlow, John Reynolds:

Copyright protection for printed circuit board designs - diagrams as literary works. 258-259 - David Bainbridge:

Innovations (mail order) LTD v data protection registrar - data protection tribunal, 29 September 1993 (case DA/92 31/49/1). 260-261 - Richard McD. Bridge, Shelley Lane:

Format rights. 277 - Heather Rowe:

Draft UK data protection bill. 280
Volume 10, Number 6, November 1994
- Jeremy R. C. Brown:

Technology licensing. 282-284 - Conor Ward:

Cheating at cards, plastic fraud: Sharp Practices and naive systems: Naive Systems by Bryan Clough, 1994, Soft Cover, 154pp., ISBN 090 792 3283. 284 - Robert Hart:

Software patentability. 296-303 - Gary Lea:

Intellectual property. 304-306 - Stephen Castell:

Digital broadcasting. 307-310 - Benjamin Wright:

Electronic commerce. 311-312 - David Davies:

Computer insurance. 313-316 - Bernard P. Zajac Jr.:

US focus. 322-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














