Normal view MARC view ISBD view

Information technology law / Ian J. Lloyd.

By: Lloyd, Ian J.
Publisher: London : Butterworths, 2000Edition: 3rd ed.Description: xlvii, 634 p. ; 24 cm.ISBN: 0406914893.Subject(s): Computer crimes -- Great Britain | Computers -- Law and legislation -- Great Britain | Data protection -- Law and legislation -- Great Britain | Data transmission systems -- Law and legislation -- Great BritainDDC classification: 343.420999
Contents:
Preface. - Table of statutes. - Table of statutory instruments. - Table of conventions and other enactments. - List of cases. - How to use this book. - Introduction. - Ch. One. The emerging information society. - Ch. Two. Internet regulation and the rise of .com. - Ch. Three. Technology, privacy and surveillance. - Ch. Four. The emergence of data protection. - Ch. Five. The scope of data protection. - Ch. Six. Supervision of data users. - Ch. Seven. The data protection principles. - Ch. Eight. Individual rights and remedies. - Ch. Nine. Sectoral aspects of data protection. - Ch. Ten. Transborder data flows. - Ch. Eleven. Emerging legal responses to computer misuse. - Ch. Twelve. Computer fraud and the move to legislation. - Ch. Thirteen. The Computer Misuse Act 1990. - Ch. Fourteen. Theft of information. - Ch. Fifteen. Computer pornography. - Ch. Sixteen. Detecting and prosecuting computer crime. - Ch. Seventeen. Intellectual property law. - Ch. Eighteen. Key elements of the patent system. - Ch. Nineteen. Patents and software. - Ch. Twenty. Copyright protection. - Ch. Twenty-one. Copyright in the information society. - Ch. Twenty-two. Protection of databases. - Ch. Twenty-three. Trademark issues. - Ch. Twenty-four. Protection of semiconductor chip designs. - Ch. Twenty-five. Competition, standards and intellectual property. - Ch. Twenty-six. Contractual liability for defective software. - Ch. Twenty-seven. Non-contractual liability. - Ch. Twenty-eight. International and European initiatives in e-commerce. - Ch. Twenty-nine. Cryptography, electronic signatures and the Electronic Communications Act 2000. - Ch. Thirty. Tax and the Internet. - Ch. Thirty-one. Defamation.
Summary: This third edition of Lloyd: Information Technology Law has been fully updated to include all relevant legislation passed since the last edition, including the Data Protection Act 1998. The book examines the national and international basis for action on such topic as data protection and computer crime, and analyses the effectiveness of current intellectual propery legislation in protecting electronic rights and products. There is detailed analysis of the massive increase in Internet usage throughout society, and the challenges faced by companies and individuals in the wake of the boom in e-commerce. - Back cover.
Item type Current location Shelf location Call number Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU

Floor 3, Shelf 8 , Side 1, TierNo 6, BayNo 3

343.420999 LLO (Browse shelf) 1 Available LAWxx,17002,03,CL 5000140183

Preface. - Table of statutes. - Table of statutory instruments. - Table of conventions and other enactments. - List of cases. - How to use this book. - Introduction. - Ch. One. The emerging information society. - Ch. Two. Internet regulation and the rise of .com. - Ch. Three. Technology, privacy and surveillance. - Ch. Four. The emergence of data protection. - Ch. Five. The scope of data protection. - Ch. Six. Supervision of data users. - Ch. Seven. The data protection principles. - Ch. Eight. Individual rights and remedies. - Ch. Nine. Sectoral aspects of data protection. - Ch. Ten. Transborder data flows. - Ch. Eleven. Emerging legal responses to computer misuse. - Ch. Twelve. Computer fraud and the move to legislation. - Ch. Thirteen. The Computer Misuse Act 1990. - Ch. Fourteen. Theft of information. - Ch. Fifteen. Computer pornography. - Ch. Sixteen. Detecting and prosecuting computer crime. - Ch. Seventeen. Intellectual property law. - Ch. Eighteen. Key elements of the patent system. - Ch. Nineteen. Patents and software. - Ch. Twenty. Copyright protection. - Ch. Twenty-one. Copyright in the information society. - Ch. Twenty-two. Protection of databases. - Ch. Twenty-three. Trademark issues. - Ch. Twenty-four. Protection of semiconductor chip designs. - Ch. Twenty-five. Competition, standards and intellectual property. - Ch. Twenty-six. Contractual liability for defective software. - Ch. Twenty-seven. Non-contractual liability. - Ch. Twenty-eight. International and European initiatives in e-commerce. - Ch. Twenty-nine. Cryptography, electronic signatures and the Electronic Communications Act 2000. - Ch. Thirty. Tax and the Internet. - Ch. Thirty-one. Defamation.

This third edition of Lloyd: Information Technology Law has been fully updated to include all relevant legislation passed since the last edition, including the Data Protection Act 1998. The book examines the national and international basis for action on such topic as data protection and computer crime, and analyses the effectiveness of current intellectual propery legislation in protecting electronic rights and products. There is detailed analysis of the massive increase in Internet usage throughout society, and the challenges faced by companies and individuals in the wake of the boom in e-commerce. - Back cover.