Zero Tolerance on Day Zero
Jim Davies of GPM Security Consultants explains why vulnerability will survive any anti-virus solution and suggests a different approach….
Jim Davies of GPM Security Consultants explains why vulnerability will survive any anti-virus solution and suggests a different approach….
Matthew Murphy gives a resumé of the current legal issues in the world’s most exciting economy….
Read More… from Current Issues in IT and Communications Law in China
Barristers Michael Douglas QC and Alex Charlton and Ashhurst partner Jeremy Drew join forces to discuss the granting or refusal of mandatory injunctions….
Hazel Raw of v-lex ltd looks at the menu of spam solutions and asks what lawyers can do to help legitimate marketing companies getting caught in the spam stew….
The battle between file-sharers and the film and music industries throws up some interesting issues. Gary Fotios looks at some of them….
Read More… from Unwarranted Strangleholds or Legitimate Protection?
New e-mail guidelines for solicitors acknowledge the importance of this major communication tool. SCL’s Nigel Miller welcomes the guidelines and Laurence Eastham suggests areas for improvement….
Shelley Hill of Robert Muckle welcomes the All Parliamentary Internet Group’s inquiry into the Act….
Read More… from APIG proposes revisions to the Computer Misuse Act 1990
Dr. David Wall of Leeds University asks the question we would all like to see answered with a ‘YES’….
As the EU and US debate sharing of airline passenger information, Stewart Baker, Maury Shenk, Kees Kuilwijk, Winnie Chang and Daniel Mah of Steptoe & Johnson examine the special circumstances and the extent to which sophisticated anonymisation techniques can resolve some of the most difficult conflicts between privacy and security….
Read More… from Flights and Rights: Anonymisation, Data-Matching and Privacy
The recent acquittal of Aaron Caffrey of a charge pursuant to s 3 of the Computer Misuse Act 1990 has brought to light the inadequacies of both that Act and other aspects of the criminal justice system in dealing with denial of service attacks. Shelley Hill suggests it is time to review the law….
Read More… from Driving a Trojan Horse and Cart through the Computer Misuse Act