Information technology law
'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford [u.a.]
Oxford Univ. Press
2011
|
Ausgabe: | 6. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039644431 | ||
003 | DE-604 | ||
005 | 20160831 | ||
007 | t | ||
008 | 111018s2011 |||| 00||| eng d | ||
015 | |a GBA847476 |2 dnb | ||
020 | |a 9780199588749 |9 978-0-19-958874-9 | ||
035 | |a (OCoLC)214305980 | ||
035 | |a (DE-599)BVBBV039644431 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-M382 |a DE-739 | ||
050 | 0 | |a KD667.C65 | |
082 | 0 | |a 343.410999 |2 22 | |
084 | |a PZ 3200 |0 (DE-625)141165: |2 rvk | ||
100 | 1 | |a Lloyd, Ian J. |d 1955- |e Verfasser |0 (DE-588)12918893X |4 aut | |
245 | 1 | 0 | |a Information technology law |c Ian J. Lloyd |
250 | |a 6. ed. | ||
264 | 1 | |a Oxford [u.a.] |b Oxford Univ. Press |c 2011 | |
300 | |a XL, 597 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a 'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation. | |
650 | 4 | |a Computers / Law and legislation / Great Britain | |
650 | 4 | |a Electronic data interchange / Law and legislation / Great Britain | |
650 | 4 | |a Computers / Law and legislation | |
650 | 4 | |a Information technology / Law and legislation | |
650 | 4 | |a Recht | |
650 | 4 | |a Computer crimes |z Great Britain | |
650 | 4 | |a Computers |x Law and legislation |z Great Britain | |
650 | 4 | |a Data protection |x Law and legislation |z Great Britain | |
650 | 4 | |a Data transmission systems |x Law and legislation |z Great Britain | |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstechnik |0 (DE-588)4026926-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
651 | 4 | |a Großbritannien | |
651 | 7 | |a Großbritannien |0 (DE-588)4022153-2 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 0 | 1 | |a Informationstechnik |0 (DE-588)4026926-7 |D s |
689 | 0 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 1 | 1 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 1 | 2 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024494271 |
Datensatz im Suchindex
_version_ | 1804148500949106688 |
---|---|
adam_text | IMAGE 1
DETAILED CONTENTS
LIST OF TABLES XXI
TABLE OF CASES XXIII
TABLE OF STATUTES XXVII
TABLE OF STATUTORY INSTRUMENTS XXXI I I
TABLE OF EUROPEAN LEGISLATION XXXV
TABLE OF CONVENTIONS AND OTHER ENACTMENTS XXXJX
PART I PRIVACY, ANONYMITY, A ND DATA PROTECTION
1 PRIVACY, TECHNOLOGY, AND SURVEILLANCE 3
INTRODUCTION 3
FORMS OF SURVEILLANCE 4
INTO THE SURVEILLANCE SOCIETY 6
SURVEILLANCE AND THE LAW 8
PRIVACY AND THE LAW 11
THE POST-SECOND WORLD WAR EXPANSION OF RIGHTS TO PRIVACY 11
PRIVACY AND SURVEILLANCE 15
INFORMATIONAL PRIVACY AFTER SEPTEMBER 11,2001 17
CONCLUSIONS 19
2 THE EMERGENCE OF DATA PROTECTION 21
INTRODUCTION 21
THE EMERGENCE OF DATA PROTECTION LEGISLATION 22
INTERNATIONAL DATA PROTECTION INITIATIVES 23
THE COUNCIL OF EUROPE 24
THE ORGANISATION FOR ECONOMIC COOPERATION AND DEVELOPMENT (OECD) 26 THE
ASIA-PACIFIC PRIVACY CHARTER INITIATIVE 28
THE UN 28
THE DEVELOPMENT OF DATA PROTECTION IN THE UNITED KINGDOM 29
THE COMMITTEE ON DATA PROTECTION 30
THE DATA PROTECTION ACT 1984 32
THE EUROPEAN DATA PROTECTION DIRECTIVE AND THE DATA PROTECTION ACT 1998
33
THE DATA PROTECTION ACT 1998 35
CONCLUSIONS 36
IMAGE 2
XII DETAILED CONTENTS
CODES OF PRACTICE CODES UNDER THE DATA PROTECTION DIRECTIVE
CONCLUSIONS
6 INDIVIDUAL RIGHTS AND REMEDIES
INTRODUCTION
SUBJECT ACCESS AND INFORMATION RIGHTS
ACCESS TIMETABLE
EXCEPTIONS TO THE SUBJECT ACCESS PROVISIONS THIRD-PARTY DATA NATIONAL
SECURITY DATA HELD FOR POLICING AND REVENUE-GATHERING PURPOSES
HEALTH DATA EDUCATION AND SOCIAL WORK DATA REGULATORY ACTIVITY RESEARCH,
HISTORY, AND STATISTICS
INFORMATION REQUIRED TO BE MADE AVAILABLE TO THE PUBLIC MISCELLANEOUS
EXCEPTIONS CONFIDENTIAL REFERENCES ARMED FORCES
JUDICIAL APPOINTMENTS AND HONOURS CROWN EMPLOYMENT AND CROWN AND
MINISTERIAL APPOINTMENTS MANAGEMENT FORECASTS CORPORATE FINANCE
NEGOTIATIONS EXAMINATION MARKS AND EXAMINATION SCRIPTS INFORMATION ABOUT
HUMAN EMBRYOS LEGAL PROFESSIONAL PRIVILEGE SELF-INCRIMINATION
MATTERS ARISING SUBSEQUENT TO AN ACCESS REQUEST DENIAL OF ACCESS
RECTIFICATION OF INACCURATE DATA COMPENSATION
OTHER SUBJECT RIGHTS RIGHT TO REQUEST AN ASSESSMENT OF PROCESSING RIGHT
TO RESIST ENFORCED SUBJECT ACCESS RIGHTS TO OBJECT TO DATA PROCESSING
DIRECT MARKETING OTHER FORMS OF PROCESSING AUTOMATED DECISION-MAKING
CONCLUSIONS
7 SECTORAL ASPECTS OF DATA PROTECTION
INTRODUCTION
DATA PROTECTION AND THE MEDIA
120 121
122
123
123
123 126
126 128 131 135
136 138 138 139
139 139 140 140
140 140 140 140
141 141 142 142
142
142 142 143 144
145 145 145 147
147 149 150
151
152
152
152
IMAGE 3
DETAILED CONTENTS XIII
SCOPE OF THE PROVISIONS 154
ACTIVITIES COVERED 154
SCOPE OF THE EXEMPTION 155
PROCEDURAL ASPECTS 155
SPECIAL INFORMATION NOTICES 159
ENFORCEMENT NOTICES 160
INDIVIDUAL RIGHTS AND REMEDIES 160
GRANTING OF ASSISTANCE BY THE COMMISSIONER 160
DATA PROTECTION IN THE ELECTRONIC COMMUNICATIONS SECTOR 1 61
AIM AND SCOPE OF THE PRIVACY AND ELECTRONIC COMMUNICATIONS DIRECTIVE 165
SECURITY AND CONFIDENTIALITY 166
BREACH NOTIFICATION 168
TRAFFIC DATA 169
ITEMISED BILLING 173
DIRECTORY INFORMATION 175
CALLING AND CONNECTED LINE IDENTIFICATION 176
UNSOLICITED COMMUNICATIONS 178
CONCLUSIONS 181
8 TRANSBORDER DATA FLOWS 182
INTRODUCTION 182
REGULATING TRANSBORDER DATA FLOWS 184
PROCEDURES FOR DETERMINING ADEQUACY 185 .
DEFINING ADEQUACY 185
ACTIVITY IN DETERMINING ADEQUACY 187
THE SAFE HARBOR 1 AGREEMENT 188
CONSEQUENCES OF A FINDING OF ADEQUACY 192
THE SWIFT CASE 193
AIR PASSENGER DATA 195
TRANSFERS WHEN AN ADEQUATE LEVEL OF PROTECTION IS NOT PROVIDED 197 THE
ROLE OF CONTRACT 198
BINDING CORPORATE RULES 202
CONCLUSIONS 203
PART II COMPUTER-RELATED CRIME
9 THE PHENOMENON OF COMPUTER-RELATED CRIME 209
INTRODUCTION 209
FORMS OF COMPUTER-RELATED CRIME 212
COMPUTER FRAUD 212
HACKING 215
VIRUSES (AND OTHER NASTIES) 215
DENIAL OF SERVICE ATTACKS 216
NATIONAL AND INTERNATIONAL RESPONSES TO COMPUTER-RELATED CRIME 217
IMAGE 4
XIV DETAILED CONTENTS
THE COUNCIL OF EUROPE CYBERCRIME CONVENTION 218
OECD GUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS 219
EU INITIATIVES 220
CONCLUSIONS 221
10 LEGISLATING FOR COMPUTER CRIME 223
INTRODUCTION 223
OFFENCES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF
COMPUTER DATA AND SYSTEMS 223
ILLEGAL ACCESS 224
OBTAINING OR ENABLING ACCESS 225
UNAUTHORISED ACCESS 227
UNAUTHORISED USE BY AUTHORISED USERS 228
ILLEGAL INTERCEPTION 231
DAMAGE TO DATA 232
MISUSE OF DEVICES 238
CONCLUSIONS 239
11 COMPUTER FORGERY AND FRAUD 241
INTRODUCTION 241
COMPUTER-RELATED FORGERY 241
COMPUTER-RELATED FRAUD 242
DECEPTION OF A MACHINE 244
THE DISHONEST OBTAINING OF SERVICES 247
CONCLUSIONS 248
12 THE INTERNET AND COMPUTER PORNOGRAPHY 250
INTRODUCTION 250
THE INTERNET AND CHILD PORNOGRAPHY 252
PHOTOGRAPHS AND PSEUDO-PHOTOGRAPHS 254
MULTIMEDIA PRODUCTS 257
JURISDICTIONAL ISSUES 258
CONCLUSIONS 261
13 DETECTING AND PROSECUTING COMPUTER CRIME 262
INTRODUCTION 262
OBTAINING EVIDENCE OF CRIMINALITY 263
INTERCEPTION OF COMMUNICATIONS 263
SEARCH WARRANTS 267
JURISDICTIONAL ISSUES 268
EXTRADITION 270
THE COMPUTER IN COURT 271
HEARSAY EVIDENCE 272
IMAGE 5
DETAILED CONTENTS XV
THE CRIMINAL EVIDENCE ACT 1965 272
THE POLICE AND CRIMINAL EVIDENCE ACT 1984 274
CONCLUSIONS 277
PART III INTELLECTUAL PROPERTY ISSUES
14 INTELLECTUAL PROPERTY LAW 281
INTRODUCTION 281
FORMS OF INTELLECTUAL PROPERTY RIGHTS 282
DEVELOPMENT OF INTELLECTUAL PROPERTY LAW 283
CONCLUSIONS 285
15 KEY ELEMENTS OF THE PATENT SYSTEM 287
INTRODUCTION 287
PATENTS IN THE INTERNATIONAL ARENA 289
THE PATENT CO-OPERATION TREATY 289
THE EUROPEAN PATENT CONVENTION 290
THE PROPOSED COMMUNITY PATENT 291
INTELLECTUAL PROPERTY IN THE GATS AND WTO 292
REQUIREMENTS FOR PATENTABILITY 292
NOVELTY 293
INVENTIVE STEP 294
CAPACITY FOR INDUSTRIAL APPLICATION 295
MATTERS EXCLUDED FROM PATENT PROTECTION 296
PATENTING SOFTWARE 297
THE PROCESS OF OBTAINING AND ENFORCING A PATENT 298
THE APPLICATION 298
SPECIFICATION AND STATEMENT OF CLAIM 298
PRELIMINARY EXAMINATION 299
PUBLICATION OF THE APPLICATION 300
SUBSTANTIVE EXAMINATION 300
THIRD-PARTY INVOLVEMENT 301
AWARD OF A PATENT 301
INFRINGEMENT OF PATENTS 301
REMEDIES FOR INFRINGEMENT OF A PATENT 302
REVOCATION OF A PATENT 303
CONCLUSIONS 303
16 PATENTS AND SOFTWARE 306
INTRODUCTION 306
THE PATENTS ACT 1977 AND THE EUROPEAN PATENT CONVENTION 309
THE QUEST FOR A TECHNICAL CONTRIBUTION 310
THE DEVELOPMENT OF SOFTWARE PATENT JURISPRUDENCE 317
IMAGE 6
XVI DETAILED CONTENTS
NEW MILLENNIUM, NEW PATENT LAW?
IBM S APPLICATION
PENSIONS BENEFITS HITACHI MICROSOFT LET A THOUSAND FLOWERS BLOOM?
CONCLUSIONS
17 COPYRIGHT PROTECTION
INTRODUCTION
COPYRIGHT BASICS
FORMS OF PROTECTED WORK
THE REQUIREMENT OF ORIGINALITY
OWNERSHIP OF COPYRIGHT
EMPLOYEE-CREATED WORKS
COMPUTER-GENERATED WORKS
INFRINGEMENT OF COPYRIGHT
THE NATURE OF COPYING
FAIR AND UNFAIR USE OF AN EARLIER WORK
TO ISSUE COPIES OF THE WORK TO THE PUBLIC
TO PERFORM, SHOW, OR PLAY THE WORK IN PUBLIC
TO BROADCAST THE WORK OR INCLUDE IT IN A CABLE PROGRAMME SERVICE
TO MAKE AN ADAPTATION OF THE WORK
THE DEVELOPMENT OF SOFTWARE COPYRIGHT
APPLYING COPYRIGHT PRINCIPLES TO SOFTWARE
SOFTWARE PIRACY
USER RIGHTS IN RESPECT OF SOFTWARE
FAIR DEALING
A USE RIGHT FOR SOFTWARE?
ERROR CORRECTION
BACK-UP COPIES
REVERSE ENGINEERING AND DECOMPILATION
REVERSE ENGINEERING AND COMPUTER PROGRAMS
LITERAL AND NON-LITERAL COPYING
THE RISE AND FALL OF LOOK AND FEEL PROTECTION
THE COMPUTERISED PHARMACIST
AGRICULTURAL SOFTWARE
FINANCIAL MARKETS
ARM S LENGTH REPRODUCTION
COMPUTER PROGRAMS AS VISUAL WORKS
CONCLUSIONS
18 COPYRIGHT IN THE INFORMATION ECONOMY
INTRODUCTION
THE DIRECTIVE ON COPYRIGHT IN THE INFORMATION SOCIETY CACHING COPY
PROTECTION AND DIGITAL RIGHTS MANAGEMENT (DRM)
320 320
322 323 324
325
330
334
334
336
336 337 338 338
339 341 341 342
344 345 345 346
346
348 348 349 350
351 353 353 354
358 360 362 362
365 366 369 372
374
375
375
376 378 378
IMAGE 7
DETAILED CONTENTS XVII
PRIVATE COPYING IN THE DIGITAL AGE 380
THE DIGITAL ECONOMY ACT 383
THIRD-PARTY LIABILITY FOR COPYRIGHT INFRINGEMENT 385
CONCLUSIONS 387
19 PROTECTION OF DATABASES 390
INTRODUCTION 390
WHAT IS A DATABASE? 390
EXAMPLES OF DATABASES 391
DATABASES AND NEW TECHNOLOGY 391
TRADITIONAL FORMS OF PROTECTION FOR DATABASES 392
THE SWEAT OF THE BROW DOCTRINE 393
THE DATABASE REGIME 397
COPYRIGHT AND DATABASES 397
LICENSING AND DATABASES 398
OTHER COPYRIGHT CHANGES 399
THE DATABASE RIGHT 400
DURATION OF THE RIGHT 401
THE DATABASE RIGHT IN THE COURTS 402
FOOTBALL FIXTURE LISTS . 405
CONCLUSIONS 407
20 TRADE MARK AND DOMAIN NAME ISSUES 409
INTRODUCTION 409
EFFECT OF TRADE MARKS 411
PASSING OFF 411
TRADE MARKS AND INFORMATION TECHNOLOGY 412
INTERNET-RELATED TRADE MARK DISPUTES 413
DOMAIN-NAME HIJACKING * 413
HONEST CONCURRENT USE 418
REVERSE DOMAIN-NAME HIJACKING 421
THE UNIFORM DISPUTE RESOLUTION RULES 423
TRADE MARKS AND INTERNET SEARCH ENGINES 426
L OREAL AND OTHERS V EBAY AND OTHERS .. 427
CONCLUSIONS 429
21 COMPETITION AND INTELLECTUAL PROPERTY ISSUES 430
INTRODUCTION 430
INITIAL DEVELOPMENTS 430
TELEVISION LISTINGS 431
THE MICROSOFT LITIGATION 435
FROM ONE BATTLE TO ANOTHER 438
CONCLUSIONS 439
IMAGE 8
XVIII DETAILED CONTENTS
PART IV E-COMMERCE
22 INTERNATIONAL AND EUROPEAN INITIATIVES IN E-COMMERCE 443
INTRODUCTION 4 43
INTERNATIONAL INITIATIVES 444
KEY LEGAL INSTRUMENTS 445
THE DISTANCE SELLING DIRECTIVE 445
THE ELECTRONIC COMMERCE DIRECTIVE AND REGULATIONS 447
DEFENCES PROVIDED TO INFORMATION SERVICE PROVIDERS 449
SUBSTANTIVE PROVISIONS IN THE DIRECTIVE 453
WHEN AND WHERE IS A CONTRACT MADE? 453
CHOICE OF LAW ISSUES 456
ALTERNATIVE DISPUTE RESOLUTION 458
CONCLUSIONS 459
23 CRYPTOGRAPHY, ELECTRONIC SIGNATURES, AND
THE ELECTRONIC COMMUNICATIONS ACT 2000 460
INTRODUCTION 460
THE NATURE OF ENCRYPTION 461
ENTER TRUSTED THIRD PARTIES 464
LEGAL APPROACHES * 466
BACKGROUND TO THE ELECTRONIC COMMUNICATIONS ACT 2000 467
THE BASIS OF REQUIREMENTS FOR WRITING 468
ELECTRONIC SIGNATURES 472
ELECTRONIC SIGNATURES AND THE ELECTRONIC COMMUNICATIONS ACT 2000 475
ELECTRONIC SIGNATURES 475
CRYPTOGRAPHY SERVICE PROVIDERS 476
CONCLUSIONS 478
PART V LEGAL ISSUES OF THE INTERNET
24 CONTRACTUAL LIABILITY FOR DEFECTIVE SOFTWARE 483
INTRODUCTION 483
FORMS OF LIABILITY 484
THE NATURE OF SOFTWARE DEFECTS 485
FORMS OF SOFTWARE 487
THE LEGAL STATUS OF SOFTWARE AND SOFTWARE CONTRACTS 487
IMPLIED TERMS IN SOFTWARE CONTRACTS 491
TITLE IN SOFTWARE 491
DESCRIPTION 492
QUALITY 492
REMEDIES FOR BREACH OF THE IMPLIED TERMS 495
IMAGE 9
DETAILED CONTENTS XIX
SOFTWARE QUALITY AND THE COURTS 497
QUESTIONS OF TIME 498
PROBLEMS WITH THE COMMUNITY CHARGE 500
WATER PRIVATISATION 502
THE MONDAY SOFTWARE PACKAGE 504
THE DOG WITH AN MBA 507
EXCLUSION OR LIMITATION OF LIABILITY 510
ENFORCEABILITY OF SHRINK-WRAP LICENCES 511
CONSUMER CONTRACTS 512
NON-CONSUMER CONTRACTS 513
THE REQUIREMENT OF REASONABLENESS 516
CONCLUSIONS 520
25 NON-CONTRACTUAL LIABILITY 522
INTRODUCTION 522
TORTIOUS LIABILITY 522
DUTY OF CARE 522
BREACH OF DUTY 523
APPLICATION OF THE CONCEPT OF NEGLIGENCE TO SOFTWARE 524
LIABILITY FOR THE USE OF INFORMATION TECHNOLOGY 525
LIABILITY FOR THE FAILURE TO USE INFORMATION TECHNOLOGY 527
CAUSATION 528
REMOTENESS OF DAMAGE 529
NOVUS ACTUS INTERVENIENS 530
COMPENSATABLE LOSS 530
DEFENCES 532
CONTRIBUTORY NEGLIGENCE 532
VOLENTI NON FIT INJURIA 533
MEASURE OF DAMAGES 533
EXCLUSION OF TORTIOUS LIABILITY 534
PRODUCT LIABILITY AND SOFTWARE 534
SCOPE OF THE LEGISLATION 535
PARTIES LIABLE 535
PRODUCTS 536
DAMAGE 537
DEFECTIVENESS 537
DEFENCES 539
COMPLIANCE WITH LEGAL REQUIREMENTS 539
CONFORMITY WITH SPECIFICATION 539
DEVELOPMENT RISKS 540
CONCLUSIONS 544
26 DEFAMATION AND THE INTERNET 545
INTRODUCTION 545
IMAGE 10
XX DETAILED CONTENTS
THE NATURE OF DEFAMATION 3 *
COMMUNICATION 5 C
WHO IS LIABLE FOR DEFAMATORY COMMENTS? 3I?S
LIABILITY OF THE POSTER ^
EMPLOYER S LIABILITY ^-
LIABILITY OF ISPS 5 5I
ISPS AND THE ELECTRONIC COMMERCE DIRECTIVE K*
SINGLE OR MULTIPLE PUBLICATIONS? -^C
CONCLUSIONS 5^3
PART VI REGULATION OF THE INTERNET
27 INTERNET REGULATION AND THE RISE, FALL, ANDRISEOF.COM 567
INTRODUCTION 56?
THE EMERGENCE OF INTERNET REGULATION 558
THE DOMAIN NAME STRUCTURE 57 ;
NATIONAL DOMAIN NAMES 572
REFORM OF INTERNET REGULATION 572
THE FUTURE OF ICANN AND INTERNET REGULATION 576
CONCLUSIONS 577
PART VII LIVING IN AN INTERNET WORLD
EPILOGUE IT LAW-PAST, PRESENT, AND LOOKING INTO THE FUTURE 581
INDEX 589
|
any_adam_object | 1 |
author | Lloyd, Ian J. 1955- |
author_GND | (DE-588)12918893X |
author_facet | Lloyd, Ian J. 1955- |
author_role | aut |
author_sort | Lloyd, Ian J. 1955- |
author_variant | i j l ij ijl |
building | Verbundindex |
bvnumber | BV039644431 |
callnumber-first | K - Law |
callnumber-label | KD667 |
callnumber-raw | KD667.C65 |
callnumber-search | KD667.C65 |
callnumber-sort | KD 3667 C65 |
callnumber-subject | KD - United Kingdom and Ireland |
classification_rvk | PZ 3200 |
ctrlnum | (OCoLC)214305980 (DE-599)BVBBV039644431 |
dewey-full | 343.410999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.410999 |
dewey-search | 343.410999 |
dewey-sort | 3343.410999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
edition | 6. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02559nam a2200601 c 4500</leader><controlfield tag="001">BV039644431</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160831 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">111018s2011 |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA847476</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199588749</subfield><subfield code="9">978-0-19-958874-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)214305980</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039644431</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KD667.C65</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.410999</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3200</subfield><subfield code="0">(DE-625)141165:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lloyd, Ian J.</subfield><subfield code="d">1955-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)12918893X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information technology law</subfield><subfield code="c">Ian J. Lloyd</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">6. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XL, 597 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data interchange / Law and legislation / Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Großbritannien</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Informationstechnik</subfield><subfield code="0">(DE-588)4026926-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024494271</subfield></datafield></record></collection> |
geographic | Großbritannien Großbritannien (DE-588)4022153-2 gnd |
geographic_facet | Großbritannien |
id | DE-604.BV039644431 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:08:08Z |
institution | BVB |
isbn | 9780199588749 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024494271 |
oclc_num | 214305980 |
open_access_boolean | |
owner | DE-M382 DE-739 |
owner_facet | DE-M382 DE-739 |
physical | XL, 597 S. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | Lloyd, Ian J. 1955- Verfasser (DE-588)12918893X aut Information technology law Ian J. Lloyd 6. ed. Oxford [u.a.] Oxford Univ. Press 2011 XL, 597 S. txt rdacontent n rdamedia nc rdacarrier 'Information Technology Law' examines the national and international basis for action on such topics as data protection and computer crime. The text goes on to analyse the effectiveness of current intellectual property legislation. Computers / Law and legislation / Great Britain Electronic data interchange / Law and legislation / Great Britain Computers / Law and legislation Information technology / Law and legislation Recht Computer crimes Great Britain Computers Law and legislation Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Recht (DE-588)4048737-4 gnd rswk-swf Informationstechnik (DE-588)4026926-7 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Großbritannien Großbritannien (DE-588)4022153-2 gnd rswk-swf Großbritannien (DE-588)4022153-2 g Informationstechnik (DE-588)4026926-7 s Recht (DE-588)4048737-4 s DE-604 Datenverarbeitung (DE-588)4011152-0 s SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lloyd, Ian J. 1955- Information technology law Computers / Law and legislation / Great Britain Electronic data interchange / Law and legislation / Great Britain Computers / Law and legislation Information technology / Law and legislation Recht Computer crimes Great Britain Computers Law and legislation Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Recht (DE-588)4048737-4 gnd Informationstechnik (DE-588)4026926-7 gnd Datenverarbeitung (DE-588)4011152-0 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4026926-7 (DE-588)4011152-0 (DE-588)4022153-2 |
title | Information technology law |
title_auth | Information technology law |
title_exact_search | Information technology law |
title_full | Information technology law Ian J. Lloyd |
title_fullStr | Information technology law Ian J. Lloyd |
title_full_unstemmed | Information technology law Ian J. Lloyd |
title_short | Information technology law |
title_sort | information technology law |
topic | Computers / Law and legislation / Great Britain Electronic data interchange / Law and legislation / Great Britain Computers / Law and legislation Information technology / Law and legislation Recht Computer crimes Great Britain Computers Law and legislation Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Recht (DE-588)4048737-4 gnd Informationstechnik (DE-588)4026926-7 gnd Datenverarbeitung (DE-588)4011152-0 gnd |
topic_facet | Computers / Law and legislation / Great Britain Electronic data interchange / Law and legislation / Great Britain Computers / Law and legislation Information technology / Law and legislation Recht Computer crimes Great Britain Computers Law and legislation Great Britain Data protection Law and legislation Great Britain Data transmission systems Law and legislation Great Britain Informationstechnik Datenverarbeitung Großbritannien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024494271&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lloydianj informationtechnologylaw |