Summary, etc |
Summary<br/>"Information Technology Law is the ideal companion for a course of study on IT law and the ways in which it is evolving in response to rapid technological and social change. This ground-breaking new work is the first textbook to systematically examine how the law and legal process of the UK interacts with the modern 'information society' and the fast-moving process of digitization. It examines the challenges that this fast pace of change brings to the established legal order, which was developed to meet the needs of a traditional physical society. To address these issues, this book begins by defining the information society and discussing how it may be regulated. From there it moves to questions of internet governance and rights and responsibilities in the digital environment. Particular attention is paid to key regulatory 'pressure points', including: DT copyright for digital products DT identity fraud DT electronic commerce DT privacy and surveillance Possible future challenges and opportunities are outlined and discussed, including e-government, virtual environments and property, and the development of web 3.0. Information Technology Law: The law and society covers all aspects of a course of study on IT law, and is therefore an ideal text for students. The author's highly original and thought-provoking approach to the subject also makes it essential reading for researchers, IT professionals and policymakers. <strong>Online Resource Centre </strong> This book is accompanied by an Online Resource Centre containing the following resources for students: DT Regular podcast updates from the author DT A selection of useful web links DT A glossary of key terms DT A link to the author's IT law blog"--<br/>Contents<br/>Machine generated contents note: pt. I INFORMATION AND SOCIETY<br/>1.The world of bits<br/>1.1.An introduction to bits<br/>1.1.1.The process of digitization<br/>1.2.Moving from atoms to bits<br/>1.2.1.Music goes digital<br/>1.2.2.Digital goods and society<br/>1.3.Rivalrous and nonrivalrous goods<br/>1.4.The legal challenge of the information society<br/>2.The network of networks<br/>2.1.Introducing the internet (history)<br/>2.1.1.Building the ARPANET<br/>2.1.2.Building the internet<br/>2.2.How the modern internet functions<br/>2.2.1.Net neutrality<br/>2.3.Higher-level protocols<br/>3.Digitization and society<br/>3.1.The digitization of information<br/>3.1.1.Information collection, aggregation, and exploitation<br/>3.1.2.Information disintermediation<br/>3.1.3.Information management<br/>3.2.Digital convergence<br/>3.3.The cross-border challenge of information law<br/>3.4.Digitization and law<br/>pt. II GOVERNANCE IN THE INFORMATION SOCIETY<br/>4.Regulating the digital environment<br/>Contents note continued: 4.1.Can we regulate the digital environment?<br/>4.1.1.Cyberlibertarianism<br/>4.1.2.Cyberpaternalism<br/>4.2.Lawrence Lessig's modalities of regulation<br/>4.3.Network communitarianism<br/>4.4.Regulators in cyberspace: private regulators<br/>4.5.Regulators in cyberspace: states and supranational regulation<br/>4.5.1.WSIS, the IGF, and the ITU<br/>4.6.Conclusions<br/>5.Digital ownership<br/>5.1.Digital property<br/>5.1.1.Information as property<br/>5.1.2.Statutory intellectual property rights<br/>5.1.3.Confidential information<br/>5.2.Digital trespass<br/>5.2.1.Trespass to servers<br/>5.2.2.Copyright and trespass: indexing and scraping<br/>5.2.3.Intel v Hamidi<br/>5.2.4.Associated Press v Meltwater US Holdings, Inc.<br/>5.3.Virtual property<br/>5.3.1.Virtual theft<br/>5.3.2.Misappropriation of virtual goods<br/>5.4.Conclusions<br/>6.Cyber-speech<br/>6.1.Introduction<br/>6.2.From web 1.0 to web 2.0<br/>6.2.1.Web 1.0: internet forums<br/>6.2.2.Web 1.0: personal websites<br/>Contents note continued: 6.2.3.Web 1.0: law and society<br/>6.2.4.Web 2.0: social media platforms<br/>6.3.Freedom of expression and social responsibility<br/>6.3.1.Freedom of expression: the `First Amendment' approach<br/>6.3.2.Freedom of expression: the European approach<br/>6.3.3.Freedom of expression: the approaches compared<br/>6.3.4.LICRA et UEJF v Yahoo! Inc. and Yahoo! France<br/>6.3.5.Cross-border speech<br/>6.3.6.Yahoo! Inc. v LICRA<br/>6.3.7.Free expression online<br/>6.4.Political speech<br/>6.4.1.Political speech: economics and media<br/>6.4.2.Online political speech<br/>6.5.Hate speech<br/>6.5.1.Hate speech and society<br/>6.5.2.Inter-state speech<br/>6.6.Commercial speech<br/>6.6.1.Commercial speech and the First Amendment<br/>6.6.2.Commercial speech and the information society<br/>6.6.3.Regulating spam in Europe<br/>6.6.4.Mansfield v John Lewis<br/>6.7.Conclusions: cyber-speech and free expression<br/>7.Social networking and antisocial conduct<br/>7.1.Introduction<br/>Contents note continued: 7.2.Social networking, gossip, and privacy<br/>7.2.1.The spring of 2011 and the Ryan Giggs affair<br/>7.2.2.The Neuberger report, the joint committee on privacy and injunctions and the Right to be Forgotten<br/>7.3.Making criminal threats and organizing criminal activity<br/>7.3.1.The Paul Chambers case<br/>7.3.2.The Facebook riot cases<br/>7.4.Cyberbullying, trolling, and harassment<br/>7.5.YouTube and `Innocence of Muslims'<br/>7.6.Conclusions<br/>8.Defamation<br/>8.1.The tort of defamation<br/>8.1.1.Statements and publication<br/>8.1.2.Taking jurisdiction in claims against non-EU respondents<br/>8.1.3.Defences<br/>8.2.Digital defamation: publication and republication<br/>8.2.1.Dow Jones v Gutnick<br/>8.2.2.Loutchansky v Times Newspapers: republication and limitation<br/>8.2.3.King v Lewis<br/>8.2.4.Jameel v Dow Jones<br/>8.2.5.Online defamation post Jameel<br/>8.2.6.Sloutsker v Romanova<br/>8.3.Intermediary liability<br/>8.3.1.Godfrey v Demon Internet<br/>Contents note continued: 8.3.2.Intermediary defences: the E-Commerce Directive and Regulations<br/>8.3.3.The operators of websites' defence<br/>8.4.Digital defamation and UGC<br/>8.4.1.Facebook and Twitter libel<br/>8.5.Conclusions<br/>pt. III DIGITAL CONTENT AND INTELLECTUAL PROPERTY RIGHTS<br/>9.Intellectual property rights and the information society<br/>9.1.An introduction to IPRs<br/>9.1.1.Copyright<br/>9.1.2.Patents<br/>9.1.3.Trademarks<br/>9.1.4.The database right<br/>9.2.IPRs and digitization<br/>10.Software<br/>10.1.Protecting software: history<br/>10.2.Copyright in computer software<br/>10.2.1.Obtaining copyright protection<br/>10.2.2.The scope of copyright protection<br/>10.3.Copyright infringement and software: literal copying<br/>10.3.1.Offline piracy<br/>10.3.2.Online piracy<br/>10.3.3.Employee piracy<br/>10.4.Copyright infringement and software: non-literal copying<br/>10.4.1.Look and feel infringement<br/>10.4.2.Look and feel: Navitaire v easyJet<br/>Contents note continued: 10.4.3.Look and feel: Nova Productions v Mazooma Games<br/>10.4.4.Look and feel: SAS Institute v World Programming Ltd<br/>10.5.Copyright infringement and software: permitted acts<br/>10.6.Software licences<br/>10.6.1.End-user licence agreements (EULAs)<br/>10.6.2.F(L)OSS<br/>10.7.Patent protection for computer software<br/>10.7.1.VICOM/Computer-related invention<br/>10.7.2.The effect of State Street Bank<br/>10.7.3.De facto software patents under the European Patent Convention<br/>10.7.4.Aerotel Ltd v Telco and Macrossan's Application<br/>10.8.Conclusions<br/>11.Copyright in the digital environment<br/>11.1.Linking, caching, and aggregating<br/>11.1.1.Web-linking<br/>11.1.2.Google Inc. v Copiepresse SCRL<br/>11.1.3.Public Relations Consultants Association v The Newspaper Licensing Agency<br/>11.1.4.Linking and the right to communicate: Svennson, BestWater, and C More Entertainment<br/>11.2.Peer-to-peer networks<br/>11.2.1.Early cases<br/>Contents note continued: 11.2.2.A&M records, Inc. v Napster, Inc.<br/>11.2.3.Post-Napster. MGM Studios, Inc. v Grokster, Ltd<br/>11.2.4.Sweden v Neij et al. (the Pirate Bay case)<br/>11.2.5.Site blocking<br/>11.2.6.Speculative invoicing<br/>11.3.Information and the public domain: the Creative Commons<br/>11.4.Conclusions<br/>12.Databases<br/>12.1.Copyright and the database right<br/>12.1.1.The listings cases<br/>12.1.2.The Database Directive<br/>12.2.The database right<br/>12.2.1.The Fixtures Marketing cases<br/>12.2.2.British Horseracing Board Ltd v William Hill<br/>12.2.3.After BHB<br/>12.2.4.The Football Dataco decisions<br/>12.3.Databases and the information society<br/>12.4.Conclusions<br/>pt. IV CRIMINAL ACTIVITY IN THE INFORMATION SOCIETY<br/>13.Computer misuse<br/>13.1.Hacking<br/>13.1.1.Employee hackers<br/>13.1.2.External hackers<br/>13.1.3.Extradition and the McKinnon case<br/>13.2.Viruses, criminal damage, and mail-bombing<br/>13.2.1.Early cases: the Mad Hacker and the Black Baron<br/>Contents note continued: 13.2.2.Later cases: web defacement and mail-bombing<br/>13.3.Denial of service and supply of devices<br/>13.3.1.Section 3ZA<br/>13.3.2.Section 3A<br/>13.4.Conclusions<br/>14.Pornography and obscenity in the information society<br/>14.1.Obscenity<br/>14.1.1.The Hicklin principle<br/>14.1.2.The Obscene Publications Acts<br/>14.2.Pornography<br/>14.2.1.The UK standard<br/>14.2.2.A global standard?<br/>14.2.3.US statutory interventions<br/>14.2.4.The decision heard `round the world'<br/>14.3.Child-abuse images and pseudo-images<br/>14.3.1.Policing pseudo-images in the UK<br/>14.3.2.Non-photographic pornographic images of children<br/>14.3.3.Policing pseudo-images internationally<br/>14.4.Extreme pornography<br/>14.5.Revenge porn<br/>14.6.Private regulation of pornographic imagery<br/>14.7.Conclusions<br/>15.Crime and law enforcement in the information society<br/>15.1.Fraud and identity theft<br/>15.1.1.Fraud<br/>15.1.2.Identity theft and identity fraud<br/>Contents note continued: 15.2.Grooming, harassment, and cyberstalking<br/>15.2.1.Grooming<br/>15.2.2.Sexual communication with a child<br/>15.2.3.Harassment and stalking<br/>15.3.Cyberterrorism<br/>15.4.The convention on cybercrime<br/>15.5.Conclusions<br/>pt. V E-COMMERCE<br/>16.Branding, trademarks, and domain names<br/>16.1.Trademarks and branding<br/>16.2.Trademarks in the global business environment<br/>16.2.1.Registered and unregistered trademarks<br/>16.2.2.Trademark characteristics<br/>16.3.Domain names as badges of identity<br/>16.4.Early trademark/domain name disputes<br/>16.4.1.Cybersquatting before the UK courts<br/>16.5.The ICANN UDRP<br/>16.6.The new gTLD process and dispute resolution<br/>16.7.The Nominet DRS<br/>16.7.1.Reviewing the Nominet DRS<br/>16.8.Conclusions<br/>17.Brand identities, search engines, and secondary markets<br/>17.1.Jurisdiction and online trademark disputes<br/>17.2.Search engines<br/>17.3.Secondary markets<br/>17.4.Conclusions<br/>18.Electronic contracts<br/>Contents note continued: 18.1.Contracting informally<br/>18.1.1.Contract formation<br/>18.2.Regulating offer and acceptance<br/>18.2.1.Articles 9<br/>11 of the Electronic Commerce Directive<br/>18.2.2.Communicating acceptance<br/>18.3.Contractual terms<br/>18.3.1.Express terms<br/>18.3.2.Terms incorporated by reference<br/>18.3.3.Implied terms<br/>18.4.Enforcing terms: consumer protection provisions<br/>18.4.1.The Consumer Rights Act 2015<br/>18.4.2.The Consumer Contracts (Information, Cancellation and Additional Charges) Regulations 2013<br/>18.5.Formal contracts<br/>18.6.Electronic signatures<br/>18.6.1.Identity and electronic signatures<br/>18.6.2.Qualified electronic signatures<br/>18.7.Conclusions<br/>19.Electronic payments<br/>19.1.Payments<br/>19.1.1.Token payments<br/>19.1.2.Alternative payment systems<br/>19.1.3.Early e-money<br/>19.2.The Electronic Money Directive 2000 (now repealed)<br/>19.3.Review of the Electronic Money Directive and the 2009 Electronic Money Directive<br/>Contents note continued: 19.4.Bitcoin and cryptocurrencies<br/>19.5.Conclusions<br/>pt. VI PRIVACY IN THE INFORMATION SOCIETY AND FUTURE DEVELOPMENTS<br/>20.Data protection<br/>20.1.Digitization, data, and the regulation of data industries<br/>20.1.1.The changing face of data protection laws in Europe<br/>20.2.The Data Protection Act 1998: data and data processing<br/>20.2.1.Processing data<br/>20.3.Conditions for the processing of personal data<br/>20.3.1.Consent<br/>20.3.2.Processing sensitive personal data<br/>20.3.3.Exporting personal data<br/>20.4.Supervision of data controllers: data subject rights<br/>20.4.1.Subject access: Durant v the Financial Services Authority<br/>20.4.2.Revising subject access: Edem v IC & Financial Services Authority<br/>20.4.3.Correcting and managing data<br/>20.4.4.The right to be forgotten<br/>20.5.State supervision of data controllers<br/>20.5.1.The Information Commissioner as regulator<br/>20.6.The General Data Protection Regulation<br/>20.7.Conclusions<br/>Contents note continued: 21.State surveillance and data retention<br/>21.1.State surveillance<br/>21.1.1.The current UK legal framework for interception<br/>21.1.2.State surveillance programmes: Five Eyes, Upstream, and Tempora<br/>21.1.3.Liberty & Privacy International v GCHQ<br/>21.1.4.The Anderson/RUSI reviews<br/>21.1.5.The draft Investigatory Powers Bill (Interception)<br/>21.2.Data retention<br/>21.2.1.Digital Rights Ireland and Seitlinger & Ors<br/>21.2.2.The Data Retention and Investigatory Powers Act 2014 (DRIPA)<br/>21.2.3.The Draft Investigatory Powers Bill (Data Retention)<br/>21.3.Conclusions<br/>pt. VII FUTURE CHALLENGES FOR INFORMATION LAW<br/>22.The future for IT law<br/>22.1.Future developments<br/>22.1.1.Greater connectivity, greater control<br/>22.1.2.Greater connectivity, greater freedom<br/>22.1.3.Developing technologies and legal responses<br/>22.2.The Internet of Things and intelligent processing<br/>22.3.Law 2.0. |