{"title":"The Personal Data Protection Bill, 2018: India's regulatory journey towards a comprehensive data protection law","authors":"M. DevaPrasad, C. SuchithraMenon","doi":"10.1093/ijlit/eaaa006","DOIUrl":"https://doi.org/10.1093/ijlit/eaaa006","url":null,"abstract":"","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"27 1","pages":"20-38"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/ijlit/eaaa006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60803546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Child Pornography: Law and Policy, by Alisdair A Gillespie,","authors":"B. Chatterjee","doi":"10.1093/ijlit/eas011","DOIUrl":"https://doi.org/10.1093/ijlit/eas011","url":null,"abstract":"","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"20 1","pages":"245-248"},"PeriodicalIF":1.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/ijlit/eas011","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60804264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The ongoing design duty in Universal Music Australia Pty Ltd v Sharman License Holdings Ltd – Casting the scope of copyright infringement even wider","authors":"Jeffrey C. J. Lee","doi":"10.1093/IJLIT/EAL020","DOIUrl":"https://doi.org/10.1093/IJLIT/EAL020","url":null,"abstract":"","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"15 1","pages":"275-298"},"PeriodicalIF":1.0,"publicationDate":"2006-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/IJLIT/EAL020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60804193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copyright Infringement in a Borderless World - Does Territoriality Matter? Society of Composers, Authors and Music Publishers of Canada v. Canadian Association of Internet Providers [2004] 2 SCR 427","authors":"Susanna H. S. Leong, Cheng Lim Saw","doi":"10.1093/IJLIT/EAI030","DOIUrl":"https://doi.org/10.1093/IJLIT/EAI030","url":null,"abstract":"The recent decision of the Supreme Court of Canada in Society of Composers, Authors and Music Publishers of Canada v Canadian Association of Internet Providers [2004] 2 SCR 427 is significant for two reasons: (a) the Canadian Supreme Court held that Internet Service Providers should be exempted from copyright liability as long as they provide only a conduit service in transmitting copyright materials between Internet users (a point which is consistent with many national copyright laws); (b) the majority of the Canadian Supreme Court arrived at the conclusion that the appropriate test to determine whether an infringement for the unauthorized transmission of online copyright material has occurred within the Canadian jurisdiction is the 'real and substantial connection' test (LeBel J, however, dissented and was of the view that the correct test to apply is the 'host server' test). This paper studies these two tests as propounded by the Canadian Supreme Court and assesses their strengths and weaknesses, especially in light of the territoriality principle in copyright law.","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"15 1","pages":"38-53"},"PeriodicalIF":1.0,"publicationDate":"2006-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/IJLIT/EAI030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60804645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Black hats and white hats: authorisation of copyright infringement in Australia and the United States","authors":"M. Jackson, M. Shelly","doi":"10.1093/IJLIT/EAI022","DOIUrl":"https://doi.org/10.1093/IJLIT/EAI022","url":null,"abstract":"This article explores the concept of authorisation in relation to the possible liability of manufacturers and suppliers of technology if, and when, their technology is used by purchasers or other users to infringe copyright. Cases over the last 30 years brought by copyright owners or holders against the manufacturers and suppliers of technology which has the potential to infringe copyright are examined, as well as the differing copyright laws in Australia and the United States relating to the authorisation of copyright infringement. The article concludes with a discussion on the current legal approaches to authorisation and on possible future approaches.","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"14 1","pages":"28-46"},"PeriodicalIF":1.0,"publicationDate":"2005-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/IJLIT/EAI022","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60804629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Feudalism: Who owns the Knowledge Economy?","authors":"A. Guadamuz","doi":"10.1093/ijlit/12.2.238","DOIUrl":"https://doi.org/10.1093/ijlit/12.2.238","url":null,"abstract":"Some people may be laughing when looking at you reading in your spare time. Some may be admired of you. And some may want be like you who have reading hobby. What about your own feel? Have you felt right? Reading is a need and a hobby at once. This condition is the on that will make you feel that you must read. If you know are looking for the book enPDFd information feudalism who owns the knowledge economy as the choice of reading, you can find here.","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"12 1","pages":"238-240"},"PeriodicalIF":1.0,"publicationDate":"2004-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/ijlit/12.2.238","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60803143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zaw Z. Han, Tint Khine, I. Ahmad, Sunil Shrestha, L. Leff
{"title":"Interoperability from electronic commerce to litigation using XML rules","authors":"Zaw Z. Han, Tint Khine, I. Ahmad, Sunil Shrestha, L. Leff","doi":"10.1093/ijlit/eal013","DOIUrl":"https://doi.org/10.1093/ijlit/eal013","url":null,"abstract":"We used the XML Rule system earlier described in [6] to simulate litigation arising from electronic commerce in a purchase order situation. This work is distinguished by using XML documents that comply with standards issued by standards-issuing organizations.","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"6 1","pages":"93-94"},"PeriodicalIF":1.0,"publicationDate":"2003-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73459182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Agents and the Legal Protection of Non-creative Databases","authors":"Henning Grosse Ruse-Khan","doi":"10.1093/IJLIT/9.3.295","DOIUrl":"https://doi.org/10.1093/IJLIT/9.3.295","url":null,"abstract":"","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"9 1","pages":"295-326"},"PeriodicalIF":1.0,"publicationDate":"2001-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/IJLIT/9.3.295","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60803271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book Review. Forms and agreements on intellectual property and international licensing. David de all, Peter McL Colley","authors":"C. Waelde","doi":"10.1093/IJLIT/5.3.328","DOIUrl":"https://doi.org/10.1093/IJLIT/5.3.328","url":null,"abstract":"","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"11 suppl_1 1","pages":"328-330"},"PeriodicalIF":1.0,"publicationDate":"1997-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1093/IJLIT/5.3.328","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60803057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reviews. European community law. Andrew Charlesworth, Holly Cullen#EC information technology law. Robbie Downing","authors":"C. Scott","doi":"10.1093/IJLIT/4.2.176","DOIUrl":"https://doi.org/10.1093/IJLIT/4.2.176","url":null,"abstract":"","PeriodicalId":44278,"journal":{"name":"International Journal of Law and Information Technology","volume":"4 1","pages":"176-181"},"PeriodicalIF":1.0,"publicationDate":"1996-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60802770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}