Information technology law

'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation.

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Lloyd, Ian J. 1955- (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Oxford [u.a.] Oxford Univ. Press 2011
Ausgabe:6. ed.
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 c 4500
001 BV039644431
003 DE-604
005 20160831
007 t
008 111018s2011 |||| 00||| eng d
015 |a GBA847476  |2 dnb 
020 |a 9780199588749  |9 978-0-19-958874-9 
035 |a (OCoLC)214305980 
035 |a (DE-599)BVBBV039644431 
040 |a DE-604  |b ger  |e rakwb 
041 0 |a eng 
049 |a DE-M382  |a DE-739 
050 0 |a KD667.C65 
082 0 |a 343.410999  |2 22 
084 |a PZ 3200  |0 (DE-625)141165:  |2 rvk 
100 1 |a Lloyd, Ian J.  |d 1955-  |e Verfasser  |0 (DE-588)12918893X  |4 aut 
245 1 0 |a Information technology law  |c Ian J. Lloyd 
250 |a 6. ed. 
264 1 |a Oxford [u.a.]  |b Oxford Univ. Press  |c 2011 
300 |a XL, 597 S. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
520 3 |a 'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation. 
650 4 |a Computers / Law and legislation / Great Britain 
650 4 |a Electronic data interchange / Law and legislation / Great Britain 
650 4 |a Computers / Law and legislation 
650 4 |a Information technology / Law and legislation 
650 4 |a Recht 
650 4 |a Computer crimes  |z Great Britain 
650 4 |a Computers  |x Law and legislation  |z Great Britain 
650 4 |a Data protection  |x Law and legislation  |z Great Britain 
650 4 |a Data transmission systems  |x Law and legislation  |z Great Britain 
650 0 7 |a Recht  |0 (DE-588)4048737-4  |2 gnd  |9 rswk-swf 
650 0 7 |a Informationstechnik  |0 (DE-588)4026926-7  |2 gnd  |9 rswk-swf 
650 0 7 |a Datenverarbeitung  |0 (DE-588)4011152-0  |2 gnd  |9 rswk-swf 
651 4 |a Großbritannien 
651 7 |a Großbritannien  |0 (DE-588)4022153-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Großbritannien  |0 (DE-588)4022153-2  |D g 
689 0 1 |a Informationstechnik  |0 (DE-588)4026926-7  |D s 
689 0 2 |a Recht  |0 (DE-588)4048737-4  |D s 
689 0 |5 DE-604 
689 1 0 |a Großbritannien  |0 (DE-588)4022153-2  |D g 
689 1 1 |a Datenverarbeitung  |0 (DE-588)4011152-0  |D s 
689 1 2 |a Recht  |0 (DE-588)4048737-4  |D s 
689 1 |5 DE-604 
856 4 2 |m SWB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
999 |a oai:aleph.bib-bvb.de:BVB01-024494271 

Datensatz im Suchindex

_version_ 1804148500949106688
adam_text IMAGE 1 DETAILED CONTENTS LIST OF TABLES XXI TABLE OF CASES XXIII TABLE OF STATUTES XXVII TABLE OF STATUTORY INSTRUMENTS XXXI I I TABLE OF EUROPEAN LEGISLATION XXXV TABLE OF CONVENTIONS AND OTHER ENACTMENTS XXXJX PART I PRIVACY, ANONYMITY, A ND DATA PROTECTION 1 PRIVACY, TECHNOLOGY, AND SURVEILLANCE 3 INTRODUCTION 3 FORMS OF SURVEILLANCE 4 INTO THE SURVEILLANCE SOCIETY 6 SURVEILLANCE AND THE LAW 8 PRIVACY AND THE LAW 11 THE POST-SECOND WORLD WAR EXPANSION OF RIGHTS TO PRIVACY 11 PRIVACY AND SURVEILLANCE 15 INFORMATIONAL PRIVACY AFTER SEPTEMBER 11,2001 17 CONCLUSIONS 19 2 THE EMERGENCE OF DATA PROTECTION 21 INTRODUCTION 21 THE EMERGENCE OF DATA PROTECTION LEGISLATION 22 INTERNATIONAL DATA PROTECTION INITIATIVES 23 THE COUNCIL OF EUROPE 24 THE ORGANISATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD) 26 THE ASIA-PACIFIC PRIVACY CHARTER INITIATIVE 28 THE UN 28 THE DEVELOPMENT OF DATA PROTECTION IN THE UNITED KINGDOM 29 THE COMMITTEE ON DATA PROTECTION 30 THE DATA PROTECTION ACT 1984 32 THE EUROPEAN DATA PROTECTION DIRECTIVE AND THE DATA PROTECTION ACT 1998 33 THE DATA PROTECTION ACT 1998 35 CONCLUSIONS 36 IMAGE 2 XII DETAILED CONTENTS CODES OF PRACTICE CODES UNDER THE DATA PROTECTION DIRECTIVE CONCLUSIONS 6 INDIVIDUAL RIGHTS AND REMEDIES INTRODUCTION SUBJECT ACCESS AND INFORMATION RIGHTS ACCESS TIMETABLE EXCEPTIONS TO THE SUBJECT ACCESS PROVISIONS THIRD-PARTY DATA NATIONAL SECURITY DATA HELD FOR POLICING AND REVENUE-GATHERING PURPOSES HEALTH DATA EDUCATION AND SOCIAL WORK DATA REGULATORY ACTIVITY RESEARCH, HISTORY, AND STATISTICS INFORMATION REQUIRED TO BE MADE AVAILABLE TO THE PUBLIC MISCELLANEOUS EXCEPTIONS CONFIDENTIAL REFERENCES ARMED FORCES JUDICIAL APPOINTMENTS AND HONOURS CROWN EMPLOYMENT AND CROWN AND MINISTERIAL APPOINTMENTS MANAGEMENT FORECASTS CORPORATE FINANCE NEGOTIATIONS EXAMINATION MARKS AND EXAMINATION SCRIPTS INFORMATION ABOUT HUMAN EMBRYOS LEGAL PROFESSIONAL PRIVILEGE SELF-INCRIMINATION MATTERS ARISING SUBSEQUENT TO AN ACCESS REQUEST DENIAL OF ACCESS RECTIFICATION OF INACCURATE DATA COMPENSATION OTHER SUBJECT RIGHTS RIGHT TO REQUEST AN ASSESSMENT OF PROCESSING RIGHT TO RESIST ENFORCED SUBJECT ACCESS RIGHTS TO OBJECT TO DATA PROCESSING DIRECT MARKETING OTHER FORMS OF PROCESSING AUTOMATED DECISION-MAKING CONCLUSIONS 7 SECTORAL ASPECTS OF DATA PROTECTION INTRODUCTION DATA PROTECTION AND THE MEDIA 120 121 122 123 123 123 126 126 128 131 135 136 138 138 139 139 139 140 140 140 140 140 140 141 141 142 142 142 142 142 143 144 145 145 145 147 147 149 150 151 152 152 152 IMAGE 3 DETAILED CONTENTS XIII SCOPE OF THE PROVISIONS 154 ACTIVITIES COVERED 154 SCOPE OF THE EXEMPTION 155 PROCEDURAL ASPECTS 155 SPECIAL INFORMATION NOTICES 159 ENFORCEMENT NOTICES 160 INDIVIDUAL RIGHTS AND REMEDIES 160 GRANTING OF ASSISTANCE BY THE COMMISSIONER 160 DATA PROTECTION IN THE ELECTRONIC COMMUNICATIONS SECTOR 1 61 AIM AND SCOPE OF THE PRIVACY AND ELECTRONIC COMMUNICATIONS DIRECTIVE 165 SECURITY AND CONFIDENTIALITY 166 BREACH NOTIFICATION 168 TRAFFIC DATA 169 ITEMISED BILLING 173 DIRECTORY INFORMATION 175 CALLING AND CONNECTED LINE IDENTIFICATION 176 UNSOLICITED COMMUNICATIONS 178 CONCLUSIONS 181 8 TRANSBORDER DATA FLOWS 182 INTRODUCTION 182 REGULATING TRANSBORDER DATA FLOWS 184 PROCEDURES FOR DETERMINING ADEQUACY 185 . DEFINING ADEQUACY 185 ACTIVITY IN DETERMINING ADEQUACY 187 THE SAFE HARBOR 1 AGREEMENT 188 CONSEQUENCES OF A FINDING OF ADEQUACY 192 THE SWIFT CASE 193 AIR PASSENGER DATA 195 TRANSFERS WHEN AN ADEQUATE LEVEL OF PROTECTION IS NOT PROVIDED 197 THE ROLE OF CONTRACT 198 BINDING CORPORATE RULES 202 CONCLUSIONS 203 PART II COMPUTER-RELATED CRIME 9 THE PHENOMENON OF COMPUTER-RELATED CRIME 209 INTRODUCTION 209 FORMS OF COMPUTER-RELATED CRIME 212 COMPUTER FRAUD 212 HACKING 215 VIRUSES (AND OTHER NASTIES) 215 DENIAL OF SERVICE ATTACKS 216 NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 217 IMAGE 4 XIV DETAILED CONTENTS THE COUNCIL OF EUROPE CYBERCRIME CONVENTION 218 OECD GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS 219 EU INITIATIVES 220 CONCLUSIONS 221 10 LEGISLATING FOR COMPUTER CRIME 223 INTRODUCTION 223 OFFENCES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS 223 ILLEGAL ACCESS 224 OBTAINING OR ENABLING ACCESS 225 UNAUTHORISED ACCESS 227 UNAUTHORISED USE BY AUTHORISED USERS 228 ILLEGAL INTERCEPTION 231 DAMAGE TO DATA 232 MISUSE OF DEVICES 238 CONCLUSIONS 239 11 COMPUTER FORGERY AND FRAUD 241 INTRODUCTION 241 COMPUTER-RELATED FORGERY 241 COMPUTER-RELATED FRAUD 242 DECEPTION OF A MACHINE 244 THE DISHONEST OBTAINING OF SERVICES 247 CONCLUSIONS 248 12 THE INTERNET AND COMPUTER PORNOGRAPHY 250 INTRODUCTION 250 THE INTERNET AND CHILD PORNOGRAPHY 252 PHOTOGRAPHS AND PSEUDO-PHOTOGRAPHS 254 MULTIMEDIA PRODUCTS 257 JURISDICTIONAL ISSUES 258 CONCLUSIONS 261 13 DETECTING AND PROSECUTING COMPUTER CRIME 262 INTRODUCTION 262 OBTAINING EVIDENCE OF CRIMINALITY 263 INTERCEPTION OF COMMUNICATIONS 263 SEARCH WARRANTS 267 JURISDICTIONAL ISSUES 268 EXTRADITION 270 THE COMPUTER IN COURT 271 HEARSAY EVIDENCE 272 IMAGE 5 DETAILED CONTENTS XV THE CRIMINAL EVIDENCE ACT 1965 272 THE POLICE AND CRIMINAL EVIDENCE ACT 1984 274 CONCLUSIONS 277 PART III INTELLECTUAL PROPERTY ISSUES 14 INTELLECTUAL PROPERTY LAW 281 INTRODUCTION 281 FORMS OF INTELLECTUAL PROPERTY RIGHTS 282 DEVELOPMENT OF INTELLECTUAL PROPERTY LAW 283 CONCLUSIONS 285 15 KEY ELEMENTS OF THE PATENT SYSTEM 287 INTRODUCTION 287 PATENTS IN THE INTERNATIONAL ARENA 289 THE PATENT CO-OPERATION TREATY 289 THE EUROPEAN PATENT CONVENTION 290 THE PROPOSED COMMUNITY PATENT 291 INTELLECTUAL PROPERTY IN THE GATS AND WTO 292 REQUIREMENTS FOR PATENTABILITY 292 NOVELTY 293 INVENTIVE STEP 294 CAPACITY FOR INDUSTRIAL APPLICATION 295 MATTERS EXCLUDED FROM PATENT PROTECTION 296 PATENTING SOFTWARE 297 THE PROCESS OF OBTAINING AND ENFORCING A PATENT 298 THE APPLICATION 298 SPECIFICATION AND STATEMENT OF CLAIM 298 PRELIMINARY EXAMINATION 299 PUBLICATION OF THE APPLICATION 300 SUBSTANTIVE EXAMINATION 300 THIRD-PARTY INVOLVEMENT 301 AWARD OF A PATENT 301 INFRINGEMENT OF PATENTS 301 REMEDIES FOR INFRINGEMENT OF A PATENT 302 REVOCATION OF A PATENT 303 CONCLUSIONS 303 16 PATENTS AND SOFTWARE 306 INTRODUCTION 306 THE PATENTS ACT 1977 AND THE EUROPEAN PATENT CONVENTION 309 THE QUEST FOR A TECHNICAL CONTRIBUTION 310 THE DEVELOPMENT OF SOFTWARE PATENT JURISPRUDENCE 317 IMAGE 6 XVI DETAILED CONTENTS NEW MILLENNIUM, NEW PATENT LAW? IBM S APPLICATION PENSIONS BENEFITS HITACHI MICROSOFT LET A THOUSAND FLOWERS BLOOM? CONCLUSIONS 17 COPYRIGHT PROTECTION INTRODUCTION COPYRIGHT BASICS FORMS OF PROTECTED WORK THE REQUIREMENT OF ORIGINALITY OWNERSHIP OF COPYRIGHT EMPLOYEE-CREATED WORKS COMPUTER-GENERATED WORKS INFRINGEMENT OF COPYRIGHT THE NATURE OF COPYING FAIR AND UNFAIR USE OF AN EARLIER WORK TO ISSUE COPIES OF THE WORK TO THE PUBLIC TO PERFORM, SHOW, OR PLAY THE WORK IN PUBLIC TO BROADCAST THE WORK OR INCLUDE IT IN A CABLE PROGRAMME SERVICE TO MAKE AN ADAPTATION OF THE WORK THE DEVELOPMENT OF SOFTWARE COPYRIGHT APPLYING COPYRIGHT PRINCIPLES TO SOFTWARE SOFTWARE PIRACY USER RIGHTS IN RESPECT OF SOFTWARE FAIR DEALING A USE RIGHT FOR SOFTWARE? ERROR CORRECTION BACK-UP COPIES REVERSE ENGINEERING AND DECOMPILATION REVERSE ENGINEERING AND COMPUTER PROGRAMS LITERAL AND NON-LITERAL COPYING THE RISE AND FALL OF LOOK AND FEEL PROTECTION THE COMPUTERISED PHARMACIST AGRICULTURAL SOFTWARE FINANCIAL MARKETS ARM S LENGTH REPRODUCTION COMPUTER PROGRAMS AS VISUAL WORKS CONCLUSIONS 18 COPYRIGHT IN THE INFORMATION ECONOMY INTRODUCTION THE DIRECTIVE ON COPYRIGHT IN THE INFORMATION SOCIETY CACHING COPY PROTECTION AND DIGITAL RIGHTS MANAGEMENT (DRM) 320 320 322 323 324 325 330 334 334 336 336 337 338 338 339 341 341 342 344 345 345 346 346 348 348 349 350 351 353 353 354 358 360 362 362 365 366 369 372 374 375 375 376 378 378 IMAGE 7 DETAILED CONTENTS XVII PRIVATE COPYING IN THE DIGITAL AGE 380 THE DIGITAL ECONOMY ACT 383 THIRD-PARTY LIABILITY FOR COPYRIGHT INFRINGEMENT 385 CONCLUSIONS 387 19 PROTECTION OF DATABASES 390 INTRODUCTION 390 WHAT IS A DATABASE? 390 EXAMPLES OF DATABASES 391 DATABASES AND NEW TECHNOLOGY 391 TRADITIONAL FORMS OF PROTECTION FOR DATABASES 392 THE SWEAT OF THE BROW DOCTRINE 393 THE DATABASE REGIME 397 COPYRIGHT AND DATABASES 397 LICENSING AND DATABASES 398 OTHER COPYRIGHT CHANGES 399 THE DATABASE RIGHT 400 DURATION OF THE RIGHT 401 THE DATABASE RIGHT IN THE COURTS 402 FOOTBALL FIXTURE LISTS . 405 CONCLUSIONS 407 20 TRADE MARK AND DOMAIN NAME ISSUES 409 INTRODUCTION 409 EFFECT OF TRADE MARKS 411 PASSING OFF 411 TRADE MARKS AND INFORMATION TECHNOLOGY 412 INTERNET-RELATED TRADE MARK DISPUTES 413 DOMAIN-NAME HIJACKING * 413 HONEST CONCURRENT USE 418 REVERSE DOMAIN-NAME HIJACKING 421 THE UNIFORM DISPUTE RESOLUTION RULES 423 TRADE MARKS AND INTERNET SEARCH ENGINES 426 L OREAL AND OTHERS V EBAY AND OTHERS .. 427 CONCLUSIONS 429 21 COMPETITION AND INTELLECTUAL PROPERTY ISSUES 430 INTRODUCTION 430 INITIAL DEVELOPMENTS 430 TELEVISION LISTINGS 431 THE MICROSOFT LITIGATION 435 FROM ONE BATTLE TO ANOTHER 438 CONCLUSIONS 439 IMAGE 8 XVIII DETAILED CONTENTS PART IV E-COMMERCE 22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 443 INTRODUCTION 4 43 INTERNATIONAL INITIATIVES 444 KEY LEGAL INSTRUMENTS 445 THE DISTANCE SELLING DIRECTIVE 445 THE ELECTRONIC COMMERCE DIRECTIVE AND REGULATIONS 447 DEFENCES PROVIDED TO INFORMATION SERVICE PROVIDERS 449 SUBSTANTIVE PROVISIONS IN THE DIRECTIVE 453 WHEN AND WHERE IS A CONTRACT MADE? 453 CHOICE OF LAW ISSUES 456 ALTERNATIVE DISPUTE RESOLUTION 458 CONCLUSIONS 459 23 CRYPTOGRAPHY, ELECTRONIC SIGNATURES, AND THE ELECTRONIC COMMUNICATIONS ACT 2000 460 INTRODUCTION 460 THE NATURE OF ENCRYPTION 461 ENTER TRUSTED THIRD PARTIES 464 LEGAL APPROACHES * 466 BACKGROUND TO THE ELECTRONIC COMMUNICATIONS ACT 2000 467 THE BASIS OF REQUIREMENTS FOR WRITING 468 ELECTRONIC SIGNATURES 472 ELECTRONIC SIGNATURES AND THE ELECTRONIC COMMUNICATIONS ACT 2000 475 ELECTRONIC SIGNATURES 475 CRYPTOGRAPHY SERVICE PROVIDERS 476 CONCLUSIONS 478 PART V LEGAL ISSUES OF THE INTERNET 24 CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE 483 INTRODUCTION 483 FORMS OF LIABILITY 484 THE NATURE OF SOFTWARE DEFECTS 485 FORMS OF SOFTWARE 487 THE LEGAL STATUS OF SOFTWARE AND SOFTWARE CONTRACTS 487 IMPLIED TERMS IN SOFTWARE CONTRACTS 491 TITLE IN SOFTWARE 491 DESCRIPTION 492 QUALITY 492 REMEDIES FOR BREACH OF THE IMPLIED TERMS 495 IMAGE 9 DETAILED CONTENTS XIX SOFTWARE QUALITY AND THE COURTS 497 QUESTIONS OF TIME 498 PROBLEMS WITH THE COMMUNITY CHARGE 500 WATER PRIVATISATION 502 THE MONDAY SOFTWARE PACKAGE 504 THE DOG WITH AN MBA 507 EXCLUSION OR LIMITATION OF LIABILITY 510 ENFORCEABILITY OF SHRINK-WRAP LICENCES 511 CONSUMER CONTRACTS 512 NON-CONSUMER CONTRACTS 513 THE REQUIREMENT OF REASONABLENESS 516 CONCLUSIONS 520 25 NON-CONTRACTUAL LIABILITY 522 INTRODUCTION 522 TORTIOUS LIABILITY 522 DUTY OF CARE 522 BREACH OF DUTY 523 APPLICATION OF THE CONCEPT OF NEGLIGENCE TO SOFTWARE 524 LIABILITY FOR THE USE OF INFORMATION TECHNOLOGY 525 LIABILITY FOR THE FAILURE TO USE INFORMATION TECHNOLOGY 527 CAUSATION 528 REMOTENESS OF DAMAGE 529 NOVUS ACTUS INTERVENIENS 530 COMPENSATABLE LOSS 530 DEFENCES 532 CONTRIBUTORY NEGLIGENCE 532 VOLENTI NON FIT INJURIA 533 MEASURE OF DAMAGES 533 EXCLUSION OF TORTIOUS LIABILITY 534 PRODUCT LIABILITY AND SOFTWARE 534 SCOPE OF THE LEGISLATION 535 PARTIES LIABLE 535 PRODUCTS 536 DAMAGE 537 DEFECTIVENESS 537 DEFENCES 539 COMPLIANCE WITH LEGAL REQUIREMENTS 539 CONFORMITY WITH SPECIFICATION 539 DEVELOPMENT RISKS 540 CONCLUSIONS 544 26 DEFAMATION AND THE INTERNET 545 INTRODUCTION 545 IMAGE 10 XX DETAILED CONTENTS THE NATURE OF DEFAMATION 3 * COMMUNICATION 5 C WHO IS LIABLE FOR DEFAMATORY COMMENTS? 3I?S LIABILITY OF THE POSTER ^ EMPLOYER S LIABILITY ^- LIABILITY OF ISPS 5 5I ISPS AND THE ELECTRONIC COMMERCE DIRECTIVE K* SINGLE OR MULTIPLE PUBLICATIONS? -^C CONCLUSIONS 5^3 PART VI REGULATION OF THE INTERNET 27 INTERNET REGULATION AND THE RISE, FALL, ANDRISEOF.COM 567 INTRODUCTION 56? THE EMERGENCE OF INTERNET REGULATION 558 THE DOMAIN NAME STRUCTURE 57 ; NATIONAL DOMAIN NAMES 572 REFORM OF INTERNET REGULATION 572 THE FUTURE OF ICANN AND INTERNET REGULATION 576 CONCLUSIONS 577 PART VII LIVING IN AN INTERNET WORLD EPILOGUE IT LAW-PAST, PRESENT, AND LOOKING INTO THE FUTURE 581 INDEX 589
any_adam_object 1
author Lloyd, Ian J. 1955-
author_GND (DE-588)12918893X
author_facet Lloyd, Ian J. 1955-
author_role aut
author_sort Lloyd, Ian J. 1955-
author_variant i j l ij ijl
building Verbundindex
bvnumber BV039644431
callnumber-first K - Law
callnumber-label KD667
callnumber-raw KD667.C65
callnumber-search KD667.C65
callnumber-sort KD 3667 C65
callnumber-subject KD - United Kingdom and Ireland
classification_rvk PZ 3200
ctrlnum (OCoLC)214305980
(DE-599)BVBBV039644431
dewey-full 343.410999
dewey-hundreds 300 - Social sciences
dewey-ones 343 - Military, tax, trade & industrial law
dewey-raw 343.410999
dewey-search 343.410999
dewey-sort 3343.410999
dewey-tens 340 - Law
discipline Rechtswissenschaft
edition 6. ed.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02559nam a2200601 c 4500</leader><controlfield tag="001">BV039644431</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160831 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111018s2011 |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA847476</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199588749</subfield><subfield code="9">978-0-19-958874-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)214305980</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039644431</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KD667.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.410999</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3200</subfield><subfield code="0">(DE-625)141165:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lloyd, Ian J.</subfield><subfield code="d">1955-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)12918893X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology law</subfield><subfield code="c">Ian J. Lloyd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">6. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XL, 597 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data interchange / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Großbritannien</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024494271&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024494271</subfield></datafield></record></collection>
geographic Großbritannien
Großbritannien (DE-588)4022153-2 gnd
geographic_facet Großbritannien
id DE-604.BV039644431
illustrated Not Illustrated
indexdate 2024-07-10T00:08:08Z
institution BVB
isbn 9780199588749
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024494271
oclc_num 214305980
open_access_boolean
owner DE-M382
DE-739
owner_facet DE-M382
DE-739
physical XL, 597 S.
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Oxford Univ. Press
record_format marc
spelling Lloyd, Ian J. 1955- Verfasser (DE-588)12918893X aut
Information technology law Ian J. Lloyd
6. ed.
Oxford [u.a.] Oxford Univ. Press 2011
XL, 597 S.
txt rdacontent
n rdamedia
nc rdacarrier
'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation.
Computers / Law and legislation / Great Britain
Electronic data interchange / Law and legislation / Great Britain
Computers / Law and legislation
Information technology / Law and legislation
Recht
Computer crimes Great Britain
Computers Law and legislation Great Britain
Data protection Law and legislation Great Britain
Data transmission systems Law and legislation Great Britain
Recht (DE-588)4048737-4 gnd rswk-swf
Informationstechnik (DE-588)4026926-7 gnd rswk-swf
Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf
Großbritannien
Großbritannien (DE-588)4022153-2 gnd rswk-swf
Großbritannien (DE-588)4022153-2 g
Informationstechnik (DE-588)4026926-7 s
Recht (DE-588)4048737-4 s
DE-604
Datenverarbeitung (DE-588)4011152-0 s
SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis
spellingShingle Lloyd, Ian J. 1955-
Information technology law
Computers / Law and legislation / Great Britain
Electronic data interchange / Law and legislation / Great Britain
Computers / Law and legislation
Information technology / Law and legislation
Recht
Computer crimes Great Britain
Computers Law and legislation Great Britain
Data protection Law and legislation Great Britain
Data transmission systems Law and legislation Great Britain
Recht (DE-588)4048737-4 gnd
Informationstechnik (DE-588)4026926-7 gnd
Datenverarbeitung (DE-588)4011152-0 gnd
subject_GND (DE-588)4048737-4
(DE-588)4026926-7
(DE-588)4011152-0
(DE-588)4022153-2
title Information technology law
title_auth Information technology law
title_exact_search Information technology law
title_full Information technology law Ian J. Lloyd
title_fullStr Information technology law Ian J. Lloyd
title_full_unstemmed Information technology law Ian J. Lloyd
title_short Information technology law
title_sort information technology law
topic Computers / Law and legislation / Great Britain
Electronic data interchange / Law and legislation / Great Britain
Computers / Law and legislation
Information technology / Law and legislation
Recht
Computer crimes Great Britain
Computers Law and legislation Great Britain
Data protection Law and legislation Great Britain
Data transmission systems Law and legislation Great Britain
Recht (DE-588)4048737-4 gnd
Informationstechnik (DE-588)4026926-7 gnd
Datenverarbeitung (DE-588)4011152-0 gnd
topic_facet Computers / Law and legislation / Great Britain
Electronic data interchange / Law and legislation / Great Britain
Computers / Law and legislation
Information technology / Law and legislation
Recht
Computer crimes Great Britain
Computers Law and legislation Great Britain
Data protection Law and legislation Great Britain
Data transmission systems Law and legislation Great Britain
Informationstechnik
Datenverarbeitung
Großbritannien
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT lloydianj informationtechnologylaw