The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The standard text on computer and information technology law for both students and practitioners, this work is now fully updated to reflect the Digital Economy Act 2010, changes to consumer protection law at EU level including the Unfair Commercial Practices Directive as well as a series of trade mark actions against eBay and copyrights suits against Google and numerous recent cases.The implications for IT contracts of BSkyB Ltd v HP Enterprise Services UK Ltd arealso considered.
Chris Reed is Professor of Electronic Commerce Law at Queen Mary, University of London. He teaches on a number of Queen Mary's LLM courses in the field, which include Computer Law, Electronic Commerce Law, Information Law, Communications Law and Media Law. From 1997-2000, Chris was Joint Chairman of the Society for Computers and Law, and in 1997-8 he acted as Specialist Adviser to the House of Lords Select Committee on Science and Technology. Chris participated as an Expert at the European Commission/Danish Government Copenhagen Hearing on Digital Signatures, represented the UK Government at the Hague Conference on Private International Law and has been an invited speaker at OECD and G8 international conferences.
Table of Contents
PART I: Commercial Exploitation of Information Technology Products and Services 1. System Supply Contracts 2. Mass Market Online and Technology Contracting 3. Information Technology Outsourcing and Services Arrangements PART II: Online Commerce 4. Electronic Commerce 5. Online Intermediaries PART III: Intellectual Property and Related Rights in Information Technology 6. Patent Protection for Computer-related Inventions 7. Copyright in Information Technology and Data 8. Database Protection 9. Online Use of Trade Marks and Domain Names PART IV: Electronic Privacy and Access to Information 10. Privacy and Data Protection 11. Access to Electronic Information PART V: Electronic Information Misuse 12. Computer Crime and Information Misuse