Electronic Signatures in Law
Eduardo Ustaran reviews Electronic Signatures in Law by Stephen Mason, published by Lexis Nexis Butterworths. £95. ISBN 0406 97006 8….
Eduardo Ustaran reviews Electronic Signatures in Law by Stephen Mason, published by Lexis Nexis Butterworths. £95. ISBN 0406 97006 8….
South African attorney Dr Gerrie Ebersöhn assesses potential liability for the e-mail that gets filtered out by spam filtering software….
This event mixed celebration with illumination. A full transcript of the lecture is now available as well as Richard Harrison’s sparkling report of the event….
Have you got a war story from an attempt to negotiate peace? Clive Freeman is looking for input from SCL members to enrich the second meeting of the IT Disputes Group….
Read More… from Mediation of IT Disputes: Avoiding the Pitfalls
This article is adapted from a talk given by Clive Davies of Olswang at the SCL Third Annual IT Law Conference….
Read More… from Data Protection, Human Rights and Freedom of Information: Latest Developments
The magazine’s Co-ordinating Editor, Laurence Eastham, met with Robin James, Senior Programme Manager for EDS Justice, in November and discussed with him the way in which EDS operates and his personal views on court technology….
The Working Group’s report deserves more publicity than it has received, although it is no doubt being taken seriously by those with the power to influence decisions. Some of its recommendations are highlighted below. Electronic Issue of Proceedings and Applications As regards this topic, the Working Group’s recommendations included the following: · “We believe practitioners…
Read More… from LSLA and Bar Report on Technology in the Civil Courts
Laurence Eastham reports on his all too brief fling with the Blackberry wireless communications solution….
The recent acquittal of Aaron Caffrey of a charge pursuant to s 3 of the Computer Misuse Act 1990 has brought to light the inadequacies of both that Act and other aspects of the criminal justice system in dealing with denial of service attacks. Shelley Hill suggests it is time to review the law….
Read More… from Driving a Trojan Horse and Cart through the Computer Misuse Act
Whether viewed as a spy in your shopping or just a security device, RFID tags have made the headlines. Alexander Brown explains the technology, the general concerns and the law….
Read More… from RFID Tags: An Unlawful, or Just Unwanted, Invasion of Privacy?