Normal view MARC view ISBD view

Information technology law / Diane Rowland, Elizabeth Macdonald.

By: Rowland, Diane.
Contributor(s): Macdonald, Elizabeth, LL. B [(j.a.)].
Publisher: London : Cavendish Pub., 2000Edition: 2nd ed.Description: xlv, 554 p. : 24 cm.ISBN: 1859415644 (pbk.).Subject(s): Computer crimes -- Great Britain | Computers -- Law and legislation -- Great Britain | Data protection -- Law and legislation -- Great Britain | Data transmission systems -- Law and legislation -- Great BritainDDC classification: 343.42099
Contents:
Preface. - Acknowledgments. - Table of cases. - Table of legislation. - Table of Statutory Instruments. - Table of EC Legislation. - Table of Abbreviations. - 1. Introduction. - Pt. 1. The Challenge of Computer Software. - 2. Protecting and Exploiting Rights in Software - Intellectual Property Rights. - 3. Protecting and Exploiting Rights in Software - Contract. - 4. Defective Software - Contract. - 5. Defective Software - Product Liability and Tort. - Pt. II. The Challenges of Computer Networks. - 6. E-Commerce. - 7. Protecting the Private Individual. - 8. Policing 'Cyberspace'. - 9. Aspects of the Protection of Intellectual Property Rights on the Internet. - Index.
Item type Current location Shelf location Call number Copy number Status Notes Date due Barcode Remark
Main Collection TU External Storage-LCS
343.42099 ROW (Browse shelf) 1 Available TBSxx,34004,03,GR 1000500960 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1
Main Collection TU External Storage-LCS
343.42099 ROW (Browse shelf) 1 Available TBSxx,34001,03,GR 1000500959 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1
Main Collection TU External Storage-LCS
343.42099 ROW (Browse shelf) 1 Available TBSxx,34007,03,GR 1000500958 Please fill up online form at https://taylorslibrary.taylors.edu.my/services/external_storage1
Main Collection Taylor's Library-TU

Floor 3, Shelf 8 , Side 1, TierNo 4, BayNo 3

343.42099 ROW (Browse shelf) 1 Available TBSxx,18002,03,GR 5000015952

The law is stated as at 1July 2000.

Preface. - Acknowledgments. - Table of cases. - Table of legislation. - Table of Statutory Instruments. - Table of EC Legislation. - Table of Abbreviations. - 1. Introduction. - Pt. 1. The Challenge of Computer Software. - 2. Protecting and Exploiting Rights in Software - Intellectual Property Rights. - 3. Protecting and Exploiting Rights in Software - Contract. - 4. Defective Software - Contract. - 5. Defective Software - Product Liability and Tort. - Pt. II. The Challenges of Computer Networks. - 6. E-Commerce. - 7. Protecting the Private Individual. - 8. Policing 'Cyberspace'. - 9. Aspects of the Protection of Intellectual Property Rights on the Internet. - Index.