Preface |
|
ix | |
|
|
xi | |
|
|
xxxi | |
|
Table of Statutory Instruments |
|
|
xli | |
|
Table of European Legislation |
|
|
xliii | |
|
|
lv | |
|
1 Regulating Information Technologies |
|
|
1 | (23) |
|
Information Technology Law? |
|
|
2 | (1) |
|
The Information Age, IT Law, and their Paradoxes |
|
|
3 | (4) |
|
Regulatory Theory: Lessig and Beyond |
|
|
7 | (5) |
|
|
12 | (10) |
|
Looking Forward (and Backward and Sideways) |
|
|
22 | (2) |
|
2 Regulatory Competence over the Internet |
|
|
24 | (45) |
|
|
25 | (1) |
|
Substantive Legal Harmonisation |
|
|
26 | (1) |
|
Competence under Public and Private International Law |
|
|
27 | (1) |
|
Transnational Online Crime |
|
|
28 | (24) |
|
Transnational Online Civil Disputes |
|
|
52 | (17) |
|
3 Content Regulation: Liability of Intermediaries |
|
|
69 | (31) |
|
|
70 | (1) |
|
Online Intermediaries and Legal Concerns |
|
|
71 | (3) |
|
Immunities under the E-Commerce Directive |
|
|
74 | (1) |
|
Immunities: Connectivity and Navigation |
|
|
75 | (10) |
|
Immunities: Content Hosts and Web 2.0 Providers |
|
|
85 | (7) |
|
|
92 | (1) |
|
US Intermediary Immunities |
|
|
93 | (4) |
|
Trends in Intermediary Liability |
|
|
97 | (3) |
|
|
100 | (46) |
|
|
101 | (1) |
|
The Nature of Cybercrime and Cybercriminals |
|
|
102 | (3) |
|
|
105 | (9) |
|
|
114 | (15) |
|
|
129 | (15) |
|
|
144 | (2) |
|
5 Privacy and Data Protection |
|
|
146 | (43) |
|
|
147 | (1) |
|
Data Protection: The Nature of the Problem |
|
|
147 | (3) |
|
Data Protection and Privacy |
|
|
150 | (4) |
|
Regulatory Approaches and Initiatives |
|
|
154 | (4) |
|
The Data Protection Directive 95/46/EC |
|
|
158 | (1) |
|
Provisions of Directive 95/46/EC |
|
|
159 | (7) |
|
Data Protection in the UK: The Data Protection Act 1998 |
|
|
166 | (3) |
|
The Data Protection Principles |
|
|
169 | (9) |
|
|
178 | (3) |
|
Administration and Enforcement |
|
|
181 | (2) |
|
Data Protection and Electronic Communications |
|
|
183 | (6) |
|
6 Surveillance, Data Retention, and Encryption |
|
|
189 | (43) |
|
|
190 | (1) |
|
Interception of Communications |
|
|
191 | (25) |
|
Communications Data, Traffic Data, and Data Retention |
|
|
216 | (8) |
|
|
224 | (5) |
|
|
229 | (3) |
|
|
232 | (48) |
|
|
233 | (1) |
|
|
234 | (21) |
|
Transnational Online Contracting |
|
|
255 | (15) |
|
Formalities and Signatures |
|
|
270 | (10) |
|
|
280 | (39) |
|
|
281 | (4) |
|
Trade Marks and Domain Names |
|
|
285 | (3) |
|
Domain Name Disputes in the Courts |
|
|
288 | (15) |
|
|
303 | (10) |
|
|
313 | (6) |
|
9 Copyright and the Internet |
|
|
319 | (35) |
|
|
320 | (2) |
|
|
322 | (7) |
|
|
329 | (4) |
|
|
333 | (15) |
|
Technological Protection Mechanisms and Digital Rights Management |
|
|
348 | (3) |
|
|
351 | (3) |
|
10 Intellectual Property Rights in Software |
|
|
354 | (40) |
|
|
355 | (1) |
|
Choice of Intellectual Property Protection |
|
|
355 | (16) |
|
The Software Directive and its Implementation |
|
|
371 | (4) |
|
Patents and Computer Software |
|
|
375 | (9) |
|
Sui Generis Rights Revisited |
|
|
384 | (1) |
|
Intellectual Property Rights in Databases |
|
|
385 | (1) |
|
|
386 | (7) |
|
|
393 | (1) |
|
11 Software Licences, Free and Open Source Licensing (F/OSS), and `Software as a Service' (SaaS) |
|
|
394 | (40) |
|
|
395 | (1) |
|
|
396 | (2) |
|
|
398 | (3) |
|
|
401 | (2) |
|
The EC Software Directive |
|
|
403 | (9) |
|
Free and Open Source Software Licensing [ F/OSS] |
|
|
412 | (15) |
|
Software as a Service (SaaS) |
|
|
427 | (5) |
|
|
432 | (2) |
|
|
434 | (54) |
|
|
435 | (1) |
|
Can Software Be `Perfect'? |
|
|
436 | (1) |
|
|
437 | (3) |
|
|
440 | (27) |
|
|
467 | (1) |
|
|
468 | (1) |
|
Unfair Contract Terms Act 1977 |
|
|
469 | (6) |
|
Unfair Terms in Consumer Contracts Regulations 1999 |
|
|
475 | (1) |
|
|
476 | (12) |
Bibliography |
|
488 | (34) |
Index |
|
522 | |