Opening up the CAN-SPAM Act
Jeffrey D. Sullivan & Michael B. de Leeuw, two New York based specialists give us the perspective of US lawyers on the CAN-SPAM Act….
Jeffrey D. Sullivan & Michael B. de Leeuw, two New York based specialists give us the perspective of US lawyers on the CAN-SPAM Act….
Nigel Wildish and Viv Nissanka of the Technology Law Group at Field Fisher Waterhouse discuss the deletion of Huntley’s personal data by Humberside Constabulary and its subsequent justification….
Read More… from A Deletion Too Far: Huntley, Soham and Data Protection
As the EU and US debate sharing of airline passenger information, Stewart Baker, Maury Shenk, Kees Kuilwijk, Winnie Chang and Daniel Mah of Steptoe & Johnson examine the special circumstances and the extent to which sophisticated anonymisation techniques can resolve some of the most difficult conflicts between privacy and security….
Read More… from Flights and Rights: Anonymisation, Data-Matching and Privacy
Sandra Potter talked to Laurence Eastham about her initiative in creating and consulting on a draft Practice Direction to cover the use of IT in the litigation of civil matters….
This event mixed celebration with illumination. A full transcript of the lecture is now available as well as Richard Harrison’s sparkling report of the event….
The Society for Computers and Law has announced the launch of the IT Disputes Interest Group, a forum for lawyers, industry experts, suppliers and users involved in all forms of disputes in the IT industry….
Have you got a war story from an attempt to negotiate peace? Clive Freeman is looking for input from SCL members to enrich the second meeting of the IT Disputes Group….
Read More… from Mediation of IT Disputes: Avoiding the Pitfalls
Tom Hopkinson and Michele C.S. Lange review the US practice of using filtering technology to navigate electronic evidence, and the lessons we might learn from it….
The recent acquittal of Aaron Caffrey of a charge pursuant to s 3 of the Computer Misuse Act 1990 has brought to light the inadequacies of both that Act and other aspects of the criminal justice system in dealing with denial of service attacks. Shelley Hill suggests it is time to review the law….
Read More… from Driving a Trojan Horse and Cart through the Computer Misuse Act
Whether viewed as a spy in your shopping or just a security device, RFID tags have made the headlines. Alexander Brown explains the technology, the general concerns and the law….
Read More… from RFID Tags: An Unlawful, or Just Unwanted, Invasion of Privacy?