Wireless Security – What is the issue?
Sandra Potter, Phil Farrelly and Adam Todhunter highlight the dangers of the easy access that is the inevitable companion of wireless technology….
Sandra Potter, Phil Farrelly and Adam Todhunter highlight the dangers of the easy access that is the inevitable companion of wireless technology….
Jim Davies tells us why USB is not an unmixed blessing and looks at solutions to the security problems USB devices can pose….
Intellectual Property lawyer Graeme Fearon of Thring Townsend reviews the APIG report and suggested amendments to the Computer Misuse Act 1990….
Read More… from ALL PARTY INTERNET GROUP APIG REPORT ON THE COMPUTER MISUSE ACT
The summer viewing of Big Brother enthralled and appalled. Hazel Randall looks at the show going on on your PC with the updates in Adware and Spyware, and other techniques for tracking what private and commercial PC users are doing….
Read More… from Big Brother Isn’t Watching You (Everybody Else Is)
Jim Davies of GPM Security Consultants explains why vulnerability will survive any anti-virus solution and suggests a different approach….
Matthew Murphy gives a resumé of the current legal issues in the world’s most exciting economy….
Read More… from Current Issues in IT and Communications Law in China
Barristers Michael Douglas QC and Alex Charlton and Ashhurst partner Jeremy Drew join forces to discuss the granting or refusal of mandatory injunctions….
Hazel Raw of v-lex ltd looks at the menu of spam solutions and asks what lawyers can do to help legitimate marketing companies getting caught in the spam stew….
The battle between file-sharers and the film and music industries throws up some interesting issues. Gary Fotios looks at some of them….
Read More… from Unwarranted Strangleholds or Legitimate Protection?
New e-mail guidelines for solicitors acknowledge the importance of this major communication tool. SCL’s Nigel Miller welcomes the guidelines and Laurence Eastham suggests areas for improvement….