


default search action
Computer Law & Security Review, Volume 2
Volume 2, Number 1, May 1986
- David Marshall:

Introduction to the law on software licences part I: The basics. 2-3 - John Railton:

Banking technology. 27-28
Volume 2, Number 2, July 1986
- David Marshall:

Introduction to the law on software licences part II: The specifics. 2-3 - David W. Greaves:

Atwater 1986 conference on the world information economy: Risks and opportunities: 4-7 November, 1986. Montreal, Quebec, Canada Organisers: International Institute for Information and communications. 3-4 - Alan S. Wernick:

Whan a software licensor files for bankruptcy the license may lose rights. 4-5 - Edward Sambridge:

Model conditions for software development. 5-6 - John J. Borking:

Software copyright part II: The new German legislation. 6 - Colin Long:

Mercury and British telecom - interconnection part I: The story so far. 7-8 - David Davies:

Professional indemnity insurance: A new nightmare for the professions. 8-10 - David Davies:

Computer insurance: Part III - Consequential loss. 10-12 - William Farquhar:

Micro secure: A guide to computer security part II: Recovery and control. 12-14 - Stephen Saxby:

Data protection act 1984: Security and accuracy of data. 14 - Tony Stayton-Davis:

But is it admissible as evidence? 14-15 - John Cartwright:

Copyright and computer output. 15-17 - Bernard P. Zajac Jr.:

The latest news from the US. 17-18 - Charles P. Lickson:

Reform of intellectual property: Laws could follow US report. 18-19 - Charles Christian:

Lex ex machina. 19-20 - David Yates:

Technology and revolution in a changing city. 20-21 - John Railton:

Cheque truncation. 21-22 - David W. Greaves:

Computer services association - legal affairs group. 22-23
Volume 2, Number 3, September 1986
- David Marshall:

Introduction to the law on software licences part III: Mistake and fraud. 2-3 - Don Jerrard:

Current development in computer contracts. 3-5 - Davies Greaves:

A UK perspective. 5-6 - Reginald H. Weller, Shelley F. Wall:

Software escrow: A practical primer. 6-9 - Colin Long:

Mercury and British telecom interconnection part II: Regulation and competition. 9-10 - Robert Hay:

Software piracy in the U.K. - A review. 10-12 - Nigel Savage:

The data protection act - policies and experience to date: A review of the second annual report of the data protection registrar. 15-16 - Gavin Morisson:

A practica man's guide to living with the act. 16-18 - John E. Appleton:

Expert systems and intellectual property law - Some unlikely thoughts on some likely problems that expert systems are likely to generate. 19-20 - David Davies:

The Nature of computer crime - a risk management perspective. 20-21 - Yvo Heaton:

The human risks - an auditors point of view. 21-23 - Charles Christian:

Lex ex machina. 25-26 - David Davies:

New highlights. 26-32
Volume 2, Number 4, November 1986
- Martin Edwards:

Introduction to the law on software licenses Part IV: Performance and breach. 8-11 - Nicholas Green Barrister:

Voluntary industry standards for a hardware-based software protection system: Antitrust implications. 11-12 - L. J. Kutten:

Software and the copyright notice. 12-13 - Ian Beale:

Computer eavesdropping - Fact or fantasy. 14-15 - Richard Sizer:

Registered purposes: The implications. 15-16 - John Sutcliffe:

Preparing for subject access. 17-18 - John Railton:

EFT: The report of the secretary-general to the 19th session of the UN commission on international trade law. 18-21 - Charles Christian:

Lex ex machina. 23
Volume 2, Number 5, January 1987
- Stephen Saxby:

Software copyright - the outstanding questions. 4-7 - David W. Greaves:

Sources to structures - whelan V jaslow and its implications for software developers. 7-8 - David Marshall:

Software licences. 8-10 - Yvo Henniker-Heaton:

Risk management. 10-13 - Richard Sizer:

Data protection. 13-15 - Julian Burnside:

Electronic fund transfers. 15-19 - L. J. Kutten:

Feedback. 19-21 - Alistair Kelman:

Computer fraud. 21-22 - Fred Greguras:

US focus. 22-26 - Charles Christian:

Behind the news. 27 - Chris Hennessy:

Current awareness. 28-32
Volume 2, Number 6, March 1987
- Alan S. Wernick:

Computer contracts. 2-4 - David Davies:

Risk management. 14-16 - John Railton:

Banking technology. 16-17 - Bernard P. Zajac Jr.:

US focus. 17-18 - Charles Christian:

Behind the news. 18-19 - David W. Greaves:

Law reports update. 19-22

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














