TY - GEN AU - Murray, Andrew TI - Information technology law : the law and society SN - 9780198732464 U1 - 343.09​944 PY - 2016/// CY - Oxford PB - Oxford University Press KW - Computers KW - Law and legislation KW - Great Britain KW - Internet N2 - Summary "Information Technology Law is the ideal companion for a course of study on IT law and the ways in which it is evolving in response to rapid technological and social change. This ground-breaking new work is the first textbook to systematically examine how the law and legal process of the UK interacts with the modern 'information society' and the fast-moving process of digitization. It examines the challenges that this fast pace of change brings to the established legal order, which was developed to meet the needs of a traditional physical society. To address these issues, this book begins by defining the information society and discussing how it may be regulated. From there it moves to questions of internet governance and rights and responsibilities in the digital environment. Particular attention is paid to key regulatory 'pressure points', including: DT copyright for digital products DT identity fraud DT electronic commerce DT privacy and surveillance Possible future challenges and opportunities are outlined and discussed, including e-government, virtual environments and property, and the development of web 3.0. Information Technology Law: The law and society covers all aspects of a course of study on IT law, and is therefore an ideal text for students. The author's highly original and thought-provoking approach to the subject also makes it essential reading for researchers, IT professionals and policymakers. Online Resource Centre This book is accompanied by an Online Resource Centre containing the following resources for students: DT Regular podcast updates from the author DT A selection of useful web links DT A glossary of key terms DT A link to the author's IT law blog"-- Contents Machine generated contents note: pt. I INFORMATION AND SOCIETY 1.The world of bits 1.1.An introduction to bits 1.1.1.The process of digitization 1.2.Moving from atoms to bits 1.2.1.Music goes digital 1.2.2.Digital goods and society 1.3.Rivalrous and nonrivalrous goods 1.4.The legal challenge of the information society 2.The network of networks 2.1.Introducing the internet (history) 2.1.1.Building the ARPANET 2.1.2.Building the internet 2.2.How the modern internet functions 2.2.1.Net neutrality 2.3.Higher-level protocols 3.Digitization and society 3.1.The digitization of information 3.1.1.Information collection, aggregation, and exploitation 3.1.2.Information disintermediation 3.1.3.Information management 3.2.Digital convergence 3.3.The cross-border challenge of information law 3.4.Digitization and law pt. II GOVERNANCE IN THE INFORMATION SOCIETY 4.Regulating the digital environment Contents note continued: 4.1.Can we regulate the digital environment? 4.1.1.Cyberlibertarianism 4.1.2.Cyberpaternalism 4.2.Lawrence Lessig's modalities of regulation 4.3.Network communitarianism 4.4.Regulators in cyberspace: private regulators 4.5.Regulators in cyberspace: states and supranational regulation 4.5.1.WSIS, the IGF, and the ITU 4.6.Conclusions 5.Digital ownership 5.1.Digital property 5.1.1.Information as property 5.1.2.Statutory intellectual property rights 5.1.3.Confidential information 5.2.Digital trespass 5.2.1.Trespass to servers 5.2.2.Copyright and trespass: indexing and scraping 5.2.3.Intel v Hamidi 5.2.4.Associated Press v Meltwater US Holdings, Inc. 5.3.Virtual property 5.3.1.Virtual theft 5.3.2.Misappropriation of virtual goods 5.4.Conclusions 6.Cyber-speech 6.1.Introduction 6.2.From web 1.0 to web 2.0 6.2.1.Web 1.0: internet forums 6.2.2.Web 1.0: personal websites Contents note continued: 6.2.3.Web 1.0: law and society 6.2.4.Web 2.0: social media platforms 6.3.Freedom of expression and social responsibility 6.3.1.Freedom of expression: the `First Amendment' approach 6.3.2.Freedom of expression: the European approach 6.3.3.Freedom of expression: the approaches compared 6.3.4.LICRA et UEJF v Yahoo! Inc. and Yahoo! France 6.3.5.Cross-border speech 6.3.6.Yahoo! Inc. v LICRA 6.3.7.Free expression online 6.4.Political speech 6.4.1.Political speech: economics and media 6.4.2.Online political speech 6.5.Hate speech 6.5.1.Hate speech and society 6.5.2.Inter-state speech 6.6.Commercial speech 6.6.1.Commercial speech and the First Amendment 6.6.2.Commercial speech and the information society 6.6.3.Regulating spam in Europe 6.6.4.Mansfield v John Lewis 6.7.Conclusions: cyber-speech and free expression 7.Social networking and antisocial conduct 7.1.Introduction Contents note continued: 7.2.Social networking, gossip, and privacy 7.2.1.The spring of 2011 and the Ryan Giggs affair 7.2.2.The Neuberger report, the joint committee on privacy and injunctions and the Right to be Forgotten 7.3.Making criminal threats and organizing criminal activity 7.3.1.The Paul Chambers case 7.3.2.The Facebook riot cases 7.4.Cyberbullying, trolling, and harassment 7.5.YouTube and `Innocence of Muslims' 7.6.Conclusions 8.Defamation 8.1.The tort of defamation 8.1.1.Statements and publication 8.1.2.Taking jurisdiction in claims against non-EU respondents 8.1.3.Defences 8.2.Digital defamation: publication and republication 8.2.1.Dow Jones v Gutnick 8.2.2.Loutchansky v Times Newspapers: republication and limitation 8.2.3.King v Lewis 8.2.4.Jameel v Dow Jones 8.2.5.Online defamation post Jameel 8.2.6.Sloutsker v Romanova 8.3.Intermediary liability 8.3.1.Godfrey v Demon Internet Contents note continued: 8.3.2.Intermediary defences: the E-Commerce Directive and Regulations 8.3.3.The operators of websites' defence 8.4.Digital defamation and UGC 8.4.1.Facebook and Twitter libel 8.5.Conclusions pt. III DIGITAL CONTENT AND INTELLECTUAL PROPERTY RIGHTS 9.Intellectual property rights and the information society 9.1.An introduction to IPRs 9.1.1.Copyright 9.1.2.Patents 9.1.3.Trademarks 9.1.4.The database right 9.2.IPRs and digitization 10.Software 10.1.Protecting software: history 10.2.Copyright in computer software 10.2.1.Obtaining copyright protection 10.2.2.The scope of copyright protection 10.3.Copyright infringement and software: literal copying 10.3.1.Offline piracy 10.3.2.Online piracy 10.3.3.Employee piracy 10.4.Copyright infringement and software: non-literal copying 10.4.1.Look and feel infringement 10.4.2.Look and feel: Navitaire v easyJet Contents note continued: 10.4.3.Look and feel: Nova Productions v Mazooma Games 10.4.4.Look and feel: SAS Institute v World Programming Ltd 10.5.Copyright infringement and software: permitted acts 10.6.Software licences 10.6.1.End-user licence agreements (EULAs) 10.6.2.F(L)OSS 10.7.Patent protection for computer software 10.7.1.VICOM/​Computer-related invention 10.7.2.The effect of State Street Bank 10.7.3.De facto software patents under the European Patent Convention 10.7.4.Aerotel Ltd v Telco and Macrossan's Application 10.8.Conclusions 11.Copyright in the digital environment 11.1.Linking, caching, and aggregating 11.1.1.Web-linking 11.1.2.Google Inc. v Copiepresse SCRL 11.1.3.Public Relations Consultants Association v The Newspaper Licensing Agency 11.1.4.Linking and the right to communicate: Svennson, BestWater, and C More Entertainment 11.2.Peer-to-peer networks 11.2.1.Early cases Contents note continued: 11.2.2.A&​M records, Inc. v Napster, Inc. 11.2.3.Post-Napster. MGM Studios, Inc. v Grokster, Ltd 11.2.4.Sweden v Neij et al. (the Pirate Bay case) 11.2.5.Site blocking 11.2.6.Speculative invoicing 11.3.Information and the public domain: the Creative Commons 11.4.Conclusions 12.Databases 12.1.Copyright and the database right 12.1.1.The listings cases 12.1.2.The Database Directive 12.2.The database right 12.2.1.The Fixtures Marketing cases 12.2.2.British Horseracing Board Ltd v William Hill 12.2.3.After BHB 12.2.4.The Football Dataco decisions 12.3.Databases and the information society 12.4.Conclusions pt. IV CRIMINAL ACTIVITY IN THE INFORMATION SOCIETY 13.Computer misuse 13.1.Hacking 13.1.1.Employee hackers 13.1.2.External hackers 13.1.3.Extradition and the McKinnon case 13.2.Viruses, criminal damage, and mail-bombing 13.2.1.Early cases: the Mad Hacker and the Black Baron Contents note continued: 13.2.2.Later cases: web defacement and mail-bombing 13.3.Denial of service and supply of devices 13.3.1.Section 3ZA 13.3.2.Section 3A 13.4.Conclusions 14.Pornography and obscenity in the information society 14.1.Obscenity 14.1.1.The Hicklin principle 14.1.2.The Obscene Publications Acts 14.2.Pornography 14.2.1.The UK standard 14.2.2.A global standard? 14.2.3.US statutory interventions 14.2.4.The decision heard `round the world' 14.3.Child-abuse images and pseudo-images 14.3.1.Policing pseudo-images in the UK 14.3.2.Non-photographic pornographic images of children 14.3.3.Policing pseudo-images internationally 14.4.Extreme pornography 14.5.Revenge porn 14.6.Private regulation of pornographic imagery 14.7.Conclusions 15.Crime and law enforcement in the information society 15.1.Fraud and identity theft 15.1.1.Fraud 15.1.2.Identity theft and identity fraud Contents note continued: 15.2.Grooming, harassment, and cyberstalking 15.2.1.Grooming 15.2.2.Sexual communication with a child 15.2.3.Harassment and stalking 15.3.Cyberterrorism 15.4.The convention on cybercrime 15.5.Conclusions pt. V E-COMMERCE 16.Branding, trademarks, and domain names 16.1.Trademarks and branding 16.2.Trademarks in the global business environment 16.2.1.Registered and unregistered trademarks 16.2.2.Trademark characteristics 16.3.Domain names as badges of identity 16.4.Early trademark/​domain name disputes 16.4.1.Cybersquatting before the UK courts 16.5.The ICANN UDRP 16.6.The new gTLD process and dispute resolution 16.7.The Nominet DRS 16.7.1.Reviewing the Nominet DRS 16.8.Conclusions 17.Brand identities, search engines, and secondary markets 17.1.Jurisdiction and online trademark disputes 17.2.Search engines 17.3.Secondary markets 17.4.Conclusions 18.Electronic contracts Contents note continued: 18.1.Contracting informally 18.1.1.Contract formation 18.2.Regulating offer and acceptance 18.2.1.Articles 9 11 of the Electronic Commerce Directive 18.2.2.Communicating acceptance 18.3.Contractual terms 18.3.1.Express terms 18.3.2.Terms incorporated by reference 18.3.3.Implied terms 18.4.Enforcing terms: consumer protection provisions 18.4.1.The Consumer Rights Act 2015 18.4.2.The Consumer Contracts (Information, Cancellation and Additional Charges) Regulations 2013 18.5.Formal contracts 18.6.Electronic signatures 18.6.1.Identity and electronic signatures 18.6.2.Qualified electronic signatures 18.7.Conclusions 19.Electronic payments 19.1.Payments 19.1.1.Token payments 19.1.2.Alternative payment systems 19.1.3.Early e-money 19.2.The Electronic Money Directive 2000 (now repealed) 19.3.Review of the Electronic Money Directive and the 2009 Electronic Money Directive Contents note continued: 19.4.Bitcoin and cryptocurrencies 19.5.Conclusions pt. VI PRIVACY IN THE INFORMATION SOCIETY AND FUTURE DEVELOPMENTS 20.Data protection 20.1.Digitization, data, and the regulation of data industries 20.1.1.The changing face of data protection laws in Europe 20.2.The Data Protection Act 1998: data and data processing 20.2.1.Processing data 20.3.Conditions for the processing of personal data 20.3.1.Consent 20.3.2.Processing sensitive personal data 20.3.3.Exporting personal data 20.4.Supervision of data controllers: data subject rights 20.4.1.Subject access: Durant v the Financial Services Authority 20.4.2.Revising subject access: Edem v IC &​ Financial Services Authority 20.4.3.Correcting and managing data 20.4.4.The right to be forgotten 20.5.State supervision of data controllers 20.5.1.The Information Commissioner as regulator 20.6.The General Data Protection Regulation 20.7.Conclusions Contents note continued: 21.State surveillance and data retention 21.1.State surveillance 21.1.1.The current UK legal framework for interception 21.1.2.State surveillance programmes: Five Eyes, Upstream, and Tempora 21.1.3.Liberty &​ Privacy International v GCHQ 21.1.4.The Anderson/​RUSI reviews 21.1.5.The draft Investigatory Powers Bill (Interception) 21.2.Data retention 21.2.1.Digital Rights Ireland and Seitlinger &​ Ors 21.2.2.The Data Retention and Investigatory Powers Act 2014 (DRIPA) 21.2.3.The Draft Investigatory Powers Bill (Data Retention) 21.3.Conclusions pt. VII FUTURE CHALLENGES FOR INFORMATION LAW 22.The future for IT law 22.1.Future developments 22.1.1.Greater connectivity, greater control 22.1.2.Greater connectivity, greater freedom 22.1.3.Developing technologies and legal responses 22.2.The Internet of Things and intelligent processing 22.3.Law 2.0 ER -