Summary
"Information Technology Law is the ideal companion for a course of study on IT law and the ways in which it is evolving in response to rapid technological and social change. This ground-breaking new work is the first textbook to systematically examine how the law and legal process of the UK interacts with the modern 'information society' and the fast-moving process of digitization. It examines the challenges that this fast pace of change brings to the established legal order, which was developed to meet the needs of a traditional physical society. To address these issues, this book begins by defining the information society and discussing how it may be regulated. From there it moves to questions of internet governance and rights and responsibilities in the digital environment. Particular attention is paid to key regulatory 'pressure points', including: DT copyright for digital products DT identity fraud DT electronic commerce DT privacy and surveillance Possible future challenges and opportunities are outlined and discussed, including e-government, virtual environments and property, and the development of web 3.0. Information Technology Law: The law and society covers all aspects of a course of study on IT law, and is therefore an ideal text for students. The author's highly original and thought-provoking approach to the subject also makes it essential reading for researchers, IT professionals and policymakers. <strong>Online Resource Centre </strong> This book is accompanied by an Online Resource Centre containing the following resources for students: DT Regular podcast updates from the author DT A selection of useful web links DT A glossary of key terms DT A link to the author's IT law blog"--
Contents
Machine generated contents note: pt. I INFORMATION AND SOCIETY
1.The world of bits
1.1.An introduction to bits
1.1.1.The process of digitization
1.2.Moving from atoms to bits
1.2.1.Music goes digital
1.2.2.Digital goods and society
1.3.Rivalrous and nonrivalrous goods
1.4.The legal challenge of the information society
2.The network of networks
2.1.Introducing the internet (history)
2.1.1.Building the ARPANET
2.1.2.Building the internet
2.2.How the modern internet functions
2.2.1.Net neutrality
2.3.Higher-level protocols
3.Digitization and society
3.1.The digitization of information
3.1.1.Information collection, aggregation, and exploitation
3.1.2.Information disintermediation
3.1.3.Information management
3.2.Digital convergence
3.3.The cross-border challenge of information law
3.4.Digitization and law
pt. II GOVERNANCE IN THE INFORMATION SOCIETY
4.Regulating the digital environment
Contents note continued: 4.1.Can we regulate the digital environment?
4.1.1.Cyberlibertarianism
4.1.2.Cyberpaternalism
4.2.Lawrence Lessig's modalities of regulation
4.3.Network communitarianism
4.4.Regulators in cyberspace: private regulators
4.5.Regulators in cyberspace: states and supranational regulation
4.5.1.WSIS, the IGF, and the ITU
4.6.Conclusions
5.Digital ownership
5.1.Digital property
5.1.1.Information as property
5.1.2.Statutory intellectual property rights
5.1.3.Confidential information
5.2.Digital trespass
5.2.1.Trespass to servers
5.2.2.Copyright and trespass: indexing and scraping
5.2.3.Intel v Hamidi
5.2.4.Associated Press v Meltwater US Holdings, Inc.
5.3.Virtual property
5.3.1.Virtual theft
5.3.2.Misappropriation of virtual goods
5.4.Conclusions
6.Cyber-speech
6.1.Introduction
6.2.From web 1.0 to web 2.0
6.2.1.Web 1.0: internet forums
6.2.2.Web 1.0: personal websites
Contents note continued: 6.2.3.Web 1.0: law and society
6.2.4.Web 2.0: social media platforms
6.3.Freedom of expression and social responsibility
6.3.1.Freedom of expression: the `First Amendment' approach
6.3.2.Freedom of expression: the European approach
6.3.3.Freedom of expression: the approaches compared
6.3.4.LICRA et UEJF v Yahoo! Inc. and Yahoo! France
6.3.5.Cross-border speech
6.3.6.Yahoo! Inc. v LICRA
6.3.7.Free expression online
6.4.Political speech
6.4.1.Political speech: economics and media
6.4.2.Online political speech
6.5.Hate speech
6.5.1.Hate speech and society
6.5.2.Inter-state speech
6.6.Commercial speech
6.6.1.Commercial speech and the First Amendment
6.6.2.Commercial speech and the information society
6.6.3.Regulating spam in Europe
6.6.4.Mansfield v John Lewis
6.7.Conclusions: cyber-speech and free expression
7.Social networking and antisocial conduct
7.1.Introduction
Contents note continued: 7.2.Social networking, gossip, and privacy
7.2.1.The spring of 2011 and the Ryan Giggs affair
7.2.2.The Neuberger report, the joint committee on privacy and injunctions and the Right to be Forgotten
7.3.Making criminal threats and organizing criminal activity
7.3.1.The Paul Chambers case
7.3.2.The Facebook riot cases
7.4.Cyberbullying, trolling, and harassment
7.5.YouTube and `Innocence of Muslims'
7.6.Conclusions
8.Defamation
8.1.The tort of defamation
8.1.1.Statements and publication
8.1.2.Taking jurisdiction in claims against non-EU respondents
8.1.3.Defences
8.2.Digital defamation: publication and republication
8.2.1.Dow Jones v Gutnick
8.2.2.Loutchansky v Times Newspapers: republication and limitation
8.2.3.King v Lewis
8.2.4.Jameel v Dow Jones
8.2.5.Online defamation post Jameel
8.2.6.Sloutsker v Romanova
8.3.Intermediary liability
8.3.1.Godfrey v Demon Internet
Contents note continued: 8.3.2.Intermediary defences: the E-Commerce Directive and Regulations
8.3.3.The operators of websites' defence
8.4.Digital defamation and UGC
8.4.1.Facebook and Twitter libel
8.5.Conclusions
pt. III DIGITAL CONTENT AND INTELLECTUAL PROPERTY RIGHTS
9.Intellectual property rights and the information society
9.1.An introduction to IPRs
9.1.1.Copyright
9.1.2.Patents
9.1.3.Trademarks
9.1.4.The database right
9.2.IPRs and digitization
10.Software
10.1.Protecting software: history
10.2.Copyright in computer software
10.2.1.Obtaining copyright protection
10.2.2.The scope of copyright protection
10.3.Copyright infringement and software: literal copying
10.3.1.Offline piracy
10.3.2.Online piracy
10.3.3.Employee piracy
10.4.Copyright infringement and software: non-literal copying
10.4.1.Look and feel infringement
10.4.2.Look and feel: Navitaire v easyJet
Contents note continued: 10.4.3.Look and feel: Nova Productions v Mazooma Games
10.4.4.Look and feel: SAS Institute v World Programming Ltd
10.5.Copyright infringement and software: permitted acts
10.6.Software licences
10.6.1.End-user licence agreements (EULAs)
10.6.2.F(L)OSS
10.7.Patent protection for computer software
10.7.1.VICOM/Computer-related invention
10.7.2.The effect of State Street Bank
10.7.3.De facto software patents under the European Patent Convention
10.7.4.Aerotel Ltd v Telco and Macrossan's Application
10.8.Conclusions
11.Copyright in the digital environment
11.1.Linking, caching, and aggregating
11.1.1.Web-linking
11.1.2.Google Inc. v Copiepresse SCRL
11.1.3.Public Relations Consultants Association v The Newspaper Licensing Agency
11.1.4.Linking and the right to communicate: Svennson, BestWater, and C More Entertainment
11.2.Peer-to-peer networks
11.2.1.Early cases
Contents note continued: 11.2.2.A&M records, Inc. v Napster, Inc.
11.2.3.Post-Napster. MGM Studios, Inc. v Grokster, Ltd
11.2.4.Sweden v Neij et al. (the Pirate Bay case)
11.2.5.Site blocking
11.2.6.Speculative invoicing
11.3.Information and the public domain: the Creative Commons
11.4.Conclusions
12.Databases
12.1.Copyright and the database right
12.1.1.The listings cases
12.1.2.The Database Directive
12.2.The database right
12.2.1.The Fixtures Marketing cases
12.2.2.British Horseracing Board Ltd v William Hill
12.2.3.After BHB
12.2.4.The Football Dataco decisions
12.3.Databases and the information society
12.4.Conclusions
pt. IV CRIMINAL ACTIVITY IN THE INFORMATION SOCIETY
13.Computer misuse
13.1.Hacking
13.1.1.Employee hackers
13.1.2.External hackers
13.1.3.Extradition and the McKinnon case
13.2.Viruses, criminal damage, and mail-bombing
13.2.1.Early cases: the Mad Hacker and the Black Baron
Contents note continued: 13.2.2.Later cases: web defacement and mail-bombing
13.3.Denial of service and supply of devices
13.3.1.Section 3ZA
13.3.2.Section 3A
13.4.Conclusions
14.Pornography and obscenity in the information society
14.1.Obscenity
14.1.1.The Hicklin principle
14.1.2.The Obscene Publications Acts
14.2.Pornography
14.2.1.The UK standard
14.2.2.A global standard?
14.2.3.US statutory interventions
14.2.4.The decision heard `round the world'
14.3.Child-abuse images and pseudo-images
14.3.1.Policing pseudo-images in the UK
14.3.2.Non-photographic pornographic images of children
14.3.3.Policing pseudo-images internationally
14.4.Extreme pornography
14.5.Revenge porn
14.6.Private regulation of pornographic imagery
14.7.Conclusions
15.Crime and law enforcement in the information society
15.1.Fraud and identity theft
15.1.1.Fraud
15.1.2.Identity theft and identity fraud
Contents note continued: 15.2.Grooming, harassment, and cyberstalking
15.2.1.Grooming
15.2.2.Sexual communication with a child
15.2.3.Harassment and stalking
15.3.Cyberterrorism
15.4.The convention on cybercrime
15.5.Conclusions
pt. V E-COMMERCE
16.Branding, trademarks, and domain names
16.1.Trademarks and branding
16.2.Trademarks in the global business environment
16.2.1.Registered and unregistered trademarks
16.2.2.Trademark characteristics
16.3.Domain names as badges of identity
16.4.Early trademark/domain name disputes
16.4.1.Cybersquatting before the UK courts
16.5.The ICANN UDRP
16.6.The new gTLD process and dispute resolution
16.7.The Nominet DRS
16.7.1.Reviewing the Nominet DRS
16.8.Conclusions
17.Brand identities, search engines, and secondary markets
17.1.Jurisdiction and online trademark disputes
17.2.Search engines
17.3.Secondary markets
17.4.Conclusions
18.Electronic contracts
Contents note continued: 18.1.Contracting informally
18.1.1.Contract formation
18.2.Regulating offer and acceptance
18.2.1.Articles 9
11 of the Electronic Commerce Directive
18.2.2.Communicating acceptance
18.3.Contractual terms
18.3.1.Express terms
18.3.2.Terms incorporated by reference
18.3.3.Implied terms
18.4.Enforcing terms: consumer protection provisions
18.4.1.The Consumer Rights Act 2015
18.4.2.The Consumer Contracts (Information, Cancellation and Additional Charges) Regulations 2013
18.5.Formal contracts
18.6.Electronic signatures
18.6.1.Identity and electronic signatures
18.6.2.Qualified electronic signatures
18.7.Conclusions
19.Electronic payments
19.1.Payments
19.1.1.Token payments
19.1.2.Alternative payment systems
19.1.3.Early e-money
19.2.The Electronic Money Directive 2000 (now repealed)
19.3.Review of the Electronic Money Directive and the 2009 Electronic Money Directive
Contents note continued: 19.4.Bitcoin and cryptocurrencies
19.5.Conclusions
pt. VI PRIVACY IN THE INFORMATION SOCIETY AND FUTURE DEVELOPMENTS
20.Data protection
20.1.Digitization, data, and the regulation of data industries
20.1.1.The changing face of data protection laws in Europe
20.2.The Data Protection Act 1998: data and data processing
20.2.1.Processing data
20.3.Conditions for the processing of personal data
20.3.1.Consent
20.3.2.Processing sensitive personal data
20.3.3.Exporting personal data
20.4.Supervision of data controllers: data subject rights
20.4.1.Subject access: Durant v the Financial Services Authority
20.4.2.Revising subject access: Edem v IC & Financial Services Authority
20.4.3.Correcting and managing data
20.4.4.The right to be forgotten
20.5.State supervision of data controllers
20.5.1.The Information Commissioner as regulator
20.6.The General Data Protection Regulation
20.7.Conclusions
Contents note continued: 21.State surveillance and data retention
21.1.State surveillance
21.1.1.The current UK legal framework for interception
21.1.2.State surveillance programmes: Five Eyes, Upstream, and Tempora
21.1.3.Liberty & Privacy International v GCHQ
21.1.4.The Anderson/RUSI reviews
21.1.5.The draft Investigatory Powers Bill (Interception)
21.2.Data retention
21.2.1.Digital Rights Ireland and Seitlinger & Ors
21.2.2.The Data Retention and Investigatory Powers Act 2014 (DRIPA)
21.2.3.The Draft Investigatory Powers Bill (Data Retention)
21.3.Conclusions
pt. VII FUTURE CHALLENGES FOR INFORMATION LAW
22.The future for IT law
22.1.Future developments
22.1.1.Greater connectivity, greater control
22.1.2.Greater connectivity, greater freedom
22.1.3.Developing technologies and legal responses
22.2.The Internet of Things and intelligent processing
22.3.Law 2.0.
There are no comments on this title.