


default search action
Computer Law & Security Review, Volume 3
Volume 3, Number 1, May 1987
- Yvo Henniker-Heaton:

Security awareness. 2-3 - Stephen Saxby:

Semi-conductor chips. 3-6 - Stephen Saxby:

Computer evidence. 6-9 - John Sims:

New approaches to dispute resolution. 9-10 - Steven Larner, Sandy Douglas:

Settling disputes in the computer industry. 10-12 - C. C. Dilloway:

A case study in a computer arbitration. 12-13 - David W. Greaves:

Computer disputes: Have the courts become too user-friendly? 13-14 - William Farquhar:

Risk management. 14-17 - David V. Marshall:

Electronic share dealing - The legal issues. 21-23 - Bernard P. Zajac Jr.:

US focus. 23-24 - Fred Greguras:

National security decision directive 145. 25 - Stephen Saxby:

Current awareness. 26-32 - Stephen Saxby:

Recent decisions in the US courts. 34-36
Volume 3, Number 2, July 1987
- Marc Regberg:

Trends in communication technology: Impacts on the right to control publication and performance. 2-6 - R. E. Butler:

ISDN - Major obstacles stand in the way. 6 - Telecommunications and employment: An interview with Mr. R.E. Butler, Secretary-General of the international telecommunication union. 6-10

- Roy N. Freed:

Is software copyright becoming unfair competition law? 10-12 - J. A. L. Sterling:

Copyright in computer programs. 13-17 - David V. Marshall:

Electronic share dealing - the legal issues. 18-19 - Rowan Middleton:

Computer security. 23-24 - Bernard P. Zajac Jr.:

US focus. 24-27 - David W. Greaves:

Law reports update - recent legislative and judicial developments in the US. 25-27 - Noel Byrne:

Commercial agreements and competition law: Practice and procedure in the UK and EEC: Dr Nicholas Green published by Graham & Trotman, 1986. ISBN 0860107884. Price £89. 31-32 - Yvo Henniker-Heaton:

Electronic risks in banking and commerce, the gloucester hotel, London. A two day course organised by IBC technical services, March 1987. 32-34 - David W. Greaves:

The 1987 computer law symposium 28 and 29 April 1987, London. A two day course organised by legal studies and services ltd. 34-35 - David W. Greaves:

Legal liability for expert systems - 14 May 87 London. A one day conference organised by learned information ltd. 35-36 - Pamela Hughes:

Computer security - 3 day seminar 20-22/5/87. EMAP. 36
Volume 3, Number 3, September 1987
- Communication technology. 2-4

- Eric E. Bergsten:

International trade procedures. 4-7 - Roger Brown:

Privacy. 8-11 - Alistair Kelman:

Read all about yourself. 11-12 - Yvo Henniker-Heaton:

Computer security. 12-13 - David Davies:

Anatomy of a disaster. 13-14 - Bernard P. Zajac Jr.:

Computer crime - what to do before it happens. 14-18 - J. A. L. Sterling:

Copyright in computer programs. 21-28 - Bernard P. Zajac Jr.:

US focus. 28-29 - David Davies:

Security focus. 35-36 - David Davies:

It can't happen to us: A selection of recent computing losses. 36-37 - John E. Appleton:

Law reports update. 37-39
Volume 3, Number 4, November 1987
- Ruel T. Hernandez:

Information law. 2-8 - Christopher Millard:

Software licensing. 8-11 - Clive D. Thorne:

Copyright legislation. 12 - Yvo Henniker-Heaton:

Risk management. 13-15 - Pamela Hughes:

Radio frequency interference - myths, realities and a practical approach. 15-17 - Jill Dann:

Defence review. 17-18 - David V. Marshall:

Electronic share dealing - The legal issues. 18-20 - Michael D. Pendleton:

Hong Kong Focus. 20-22 - Martin Wasik:

Computer crime. 23-24 - Bernard P. Zajac Jr.:

US focus. 24-26 - David Davies:

Protection against director's failure. 37 - David Davies:

The consumer protection act British computer society, 24 September 1987. 38-40
Volume 3, Number 5, January 1988
- J. A. L. Sterling:

Copyright legislation. 2-9 - Richard Dedman:

Legal protection of software in the United Kingdom. 10-14 - Grant Hammond:

The development of trade secrets law in Canada. 14-16 - Ranald Robertson:

Strict liability under the consumer protection act 1987 - Some implications for producers of computer based products. 16-20 - Yvo Henniker-Heaton:

A look behind the news 1988 - New year's resolutions: A data processing manager reveals all. 28-29 - Pamela Hughes:

The 'need to know' principle of computer security. 29-30 - Buck BloomBecker:

US computer security legislation H.R. 145: A step toward greater computer security? 130-31 - Bernard P. Zajac Jr.:

The latest news from the US. 31-32 - Stephen Saxby:

Law report - Canada. 32-34 - David W. Greaves:

US case law and legislative developments. 34-35 - Chris Hennessy:

Contingency planning and disaster recovery for computer systems. 38-39 - David W. Greaves:

Computer disputes - A new perspective. 39 - Stephen Saxby:

Information technology and the courts. 40-41 - R. W. Wright:

R.W. Wright: Address to ITAC conference a litigation solicitor's view. 41-42 - Derek Dann, Jill Dann:

MILCOMP 87 Military computers, graphics and software a review. 42-43 - Pamela Hughes:

Fourth National Computer Security Conference, Windsor, U.K. 43-44
Volume 3, Number 6, March 1988
- Sharon Harvey, Julian Newman

:
Contracts by electronic mail. 2-6 - Graham Greenleaf:

Privacy. 6-8 - Alan S. Wernick:

Intellectual property bankruptcy protection. 8-11 - John Morris:

Source code maintenance and Escrow. 11-16 - Eric Bergsten:

International trade procedures. 23-29 - Arthur Dunkel:

General agreement on tariffs and trade. 30-32 - Cliff Dilloway:

Arbitration - IBM v FUJITSU Ltd. 32-34 - David Davies:

Risk management. 35-36 - Bernard P. Zajac Jr.:

US focus. 36 - David W. Greaves:

Case law update. 37 - David W. Greaves:

US case low developments. 37-38 - Ian Walden:

Conference review. 38-40

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














