TY - BOOK AU - Rowland,Diane AU - Macdonald,Elizabeth TI - Information technology law SN - 1859415644 (pbk.) U1 - 343.42099 PY - 2000/// CY - London PB - Cavendish Pub. KW - Computer crimes KW - Great Britain KW - Computers KW - Law and legislation KW - Data protection KW - Data transmission systems N1 - The law is stated as at 1July 2000; Preface. - Acknowledgments. - Table of cases. - Table of legislation. - Table of Statutory Instruments. - Table of EC Legislation. - Table of Abbreviations. - 1. Introduction. - Pt. 1. The Challenge of Computer Software. - 2. Protecting and Exploiting Rights in Software - Intellectual Property Rights. - 3. Protecting and Exploiting Rights in Software - Contract. - 4. Defective Software - Contract. - 5. Defective Software - Product Liability and Tort. - Pt. II. The Challenges of Computer Networks. - 6. E-Commerce. - 7. Protecting the Private Individual. - 8. Policing 'Cyberspace'. - 9. Aspects of the Protection of Intellectual Property Rights on the Internet. - Index ER -