Information & Communications Technology Law最新文献

筛选
英文 中文
12. Copyright infringement in the digital environment 12. 数字环境下的版权侵权
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0012
A. Murray
{"title":"12. Copyright infringement in the digital environment","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0012","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0012","url":null,"abstract":"This chapter analyses cases of copyright infringement in the online environment. It begins by analysing some early cases regarding file-sharing technologies, including A&M Records, Inc. v Napster, Inc., MGM Studios, Inc. v Grokster, Ltd, and Sweden v Neij et al. (the Pirate Bay case). It assesses new techniques for fighting illegal file-sharing, such as blocking access to websites offering file-sharing technology or indexes with a focus on the operation of s. 97A website blocking orders. It examines the recent Supreme Court decision in Cartier International v British Sky Broadcasting which will have substantial implications for costs in these orders. Finally, it describes the slightly controversial process known as speculative invoicing.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"1 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88845977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
9. Software 9. 软件
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/he/9780198804727.003.0009
A. Murray
{"title":"9. Software","authors":"A. Murray","doi":"10.1093/he/9780198804727.003.0009","DOIUrl":"https://doi.org/10.1093/he/9780198804727.003.0009","url":null,"abstract":"This chapter examines whether software should be protected by patent law or by the law of copyright, or through a sui generis form of protection. It first provides a historical background on software and copyright protection, before discussing the scope of software copyright protection and copyright infringement. The chapter then looks at several forms of copyright infringement such as offline, online, and employee piracy, and also explains the look and feel infringement by citing three cases: Navitaire v easyJet, Nova Productions v Mazooma Games, and SAS Institute v World Programming Ltd. In addition, it considers permissible acts under the UK’s Copyright, Designs and Patents Act 1988 without infringing the rights of the copyright holder, including software licences, end-user licence agreements (EULAs),. Finally, the chapter analyses cases relating to patent protection for computer software, including software patents under the European Patent Convention and the decision in Aerotel v Telco and Macrossan.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"109 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
20. Obscenity in the information society 20.信息社会中的淫秽
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0020
A. Murray
{"title":"20. Obscenity in the information society","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0020","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0020","url":null,"abstract":"This chapter, which examines pornography and obscenity on the internet, first provides an overview of the UK common law standard known as the Hicklin principle and the Obscene Publications Acts. It then discusses the UK standard and US statutory interventions on pornography, the impact of the case ACLU v Reno on the regulation of sexually explicit content on the internet, pseudo-images, and images depicting child abuse as the most extreme form of pornographic image, and the policing of pseudo-images in the UK and internationally. The chapter also considers the law on non-photographic pornographic images of children, along with private regulation of pornographic imagery and the new Age-verification code for adult websites.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"83 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81071876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
8. Intellectual property rights and the information society 8. 知识产权与信息社会
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0008
A. Murray
{"title":"8. Intellectual property rights and the information society","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0008","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0008","url":null,"abstract":"This chapter examines intellectual property rights (IPRs) in relation to the information society. The discussion begins with an overview of IPRs involving copyright, patents, trademarks, and the database right, and then considers IPRs and the process of digitization within the framework of cyberlaw. It mentions the criticism received for overprotecting content or systems in the information society and discusses the idea of an over-reliance on models developed for a previous age and for different challenges in dealing with the information economy and society. It concludes by highlighting the tension between the information society and the intellectual property industry in terms of what each wants and expects: liberty, free use of content, and unfettered free expression for the former; and protection, control over use, and abuse and reward for the latter.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"10 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81332439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1. The world of bits 1. 比特的世界
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/he/9780198804727.003.0001
A. Murray
{"title":"1. The world of bits","authors":"A. Murray","doi":"10.1093/he/9780198804727.003.0001","DOIUrl":"https://doi.org/10.1093/he/9780198804727.003.0001","url":null,"abstract":"The question ‘what can we control?’ underpins both the information society and the knowledge economy, and represents the maturity of information technology. Most importantly, it signals a transition from a world that saw economic value in terms of atoms to a world which values information in bits. This chapter examines this transition and the role of bits in the information society. It first provides an overview of bits and their place in the digitization process. The chapter then looks at the advent of digital music and other digital goods such as digital video and electronic books. It also considers the shift from rivalrous goods to nonrivalrous goods before concluding with a discussion of the legal challenge of the information society.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"72 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87048027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
23. Data protection: rights and obligations 23. 数据保护:权利和义务
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0023
A. Murray
{"title":"23. Data protection: rights and obligations","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0023","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0023","url":null,"abstract":"This chapter examines the rights of data subjects under GDPR and the role of the state in supervising data controllers. It examines data subject rights, including the subject access right and the right to correct and manage personal data. It deals with the development of the so-called Right to be Forgotten and the Mario Costeja González case. It examines the current supervisory regime, including the role of the Information Commissioner’s Office and the enforcement rights of data subjects. Key cases, including Durant v The Financial Services Authority, Edem v IC & Financial Services Authority, Dawson-Damer v Taylor Wessing, and Ittihadieh v 5–11 Cheyne Gardens are discussed, and the chapter concludes by examining the enhanced enforcement rights awarded to the Information Commissioner’s Office by the General Data Protection Regulation in 2018.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"117 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72628865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
16. Electronic contracts 16. 电子合同
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0016
A. Murray
{"title":"16. Electronic contracts","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0016","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0016","url":null,"abstract":"This chapter examines contracts in electronic commerce and their implications for the traditional contract law and the law relating to payment and payment methods. It first looks at the rules for the formation of informal electronic contracts and the regulation of offer and acceptance, focusing on Articles 9–11 of the European Union’s Electronic Commerce Directive. The chapter then considers the question of when acceptance is effectively communicated to the offeror, the terms of the contract, and their enforcement as well as evaluating formal contracts and discussing their formation and terms. A focus for this chapter is the evolving laws on electronic signatures, the role of qualified trust service providers and how electronic signatures are formalized. The chapter concludes with a discussion of the evolving area of smart contracts: their design, formation, and what the role of the law is in relation to these self-enforcing agreements.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"14 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88815259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
22. Data protection: the legal framework 22. 数据保护:法律框架
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0022
A. Murray
{"title":"22. Data protection: the legal framework","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0022","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0022","url":null,"abstract":"This chapter examines data protection, digitization of data, its implications for personal privacy, and the regulation of data industries. It begins by discussing the current law found in the General Data Protection Regulation and the Data Protection Act 2018. It examines the key concepts of data controllers, data processors, and data subjects, and discusses the conditions for the processing of personal data. This includes an examination of key cases such as Nowak v Data Protection Commissioner and Bodil Lindqvist. It looks at the geographical scope of the GDPR and the extraterritorial effect of the Regulation, and examines the domestic purposes exemption after Ryneš.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"107 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77007100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5. Cyber-speech 5. Cyber-speech
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0005
A. Murray
{"title":"5. Cyber-speech","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0005","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0005","url":null,"abstract":"This chapter examines cyber-speech and its implications for free expression. It first provides an overview of the technologies involved, from simple systems such as web pages and internet forums to social media platforms (SMPs) such as blogs, social media platforms, and media-sharing sites. The chapter then highlights the social implications of the shift in power from centralized media organizations to decentralized ‘citizen journalism’. It also considers the responsibilities that citizens owe to each other in this environment and how regulators may balance freedom of expression with social responsibility. To determine whose values predominate when regulating a global media tool which does not recognize traditional borders, the chapter presents three particular case studies: political speech, hate speech, and commercial speech.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"5 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80999381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3. Net neutrality 3.网络中立
IF 1.5
Information & Communications Technology Law Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0003
A. Murray
{"title":"3. Net neutrality","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0003","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0003","url":null,"abstract":"This chapter examines the nature of network neutrality or net neutrality. This is a highly prized design feature of the network that all data packets shall be treated equally. It was the nature of the early network that this design feature was protected and established by visionaries such as Vint Cerf and Bob Kahn. Tim Berners-Lee the creator of the World Wide Web has written at length as to how net neutrality allowed him to create the web without asking permission from anyone. However, modern network design challenges this ‘first amendment of the internet’ and recent developments, in particular in the United States, have led to debate on whether net neutrality should be legally enshrined.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"24 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81880148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信