The Perils of E-mail
If you thought Year 2000 was a potentially explosive issue, wait until people start banging on your doors demanding tamper-proof records of all e-mails sent and received for the past three years.
article
If you thought Year 2000 was a potentially explosive issue, wait until people start banging on your doors demanding tamper-proof records of all e-mails sent and received for the past three years.
article
This article from the NISCC Secretariat explains what the NISCC aims to do and the services it can provide by way of alerting to security dangers.
article
Tony Korn, Head of the Professional Services practice at independent management and IT consultants Cornwell Affiliates plc, reviews Professional Services Automation (PSA)
article
Two years ago, phone conferencing became a mandatory part of legal life as a result of the Woolf reforms.
article
Joe Reevy advises on how to approach and manage an IT dispute. He considers the basic legal issues and the steps to take to minimise problems when things go wrong.
article
An extract from an edition of the Posthumous Papers of the Pickwick Club originally by Charles Dickens
article
Jon Vogler reviews Forensic Computing: A Practitioner’s Guide by Tony Sammes and Brian Jenkinson, Springer, £29.50
article
Mark Owens reviews E-Mail, The Internet and the Law by T. Kevan and P. McGrath, EMIS Professional Publishing Ltd, 223pp ISBN 1-85811-268-0
article
Ian Jeffrey thinks that database right is proving to be even more important than predicted. This article looks at the scope of the right and applies it in a number of commonly occurring scenarios.
article
The rules on the rights in material published electronically are still developing. Lisa Boyd of Lochners Technology Solicitors looks at a US case which may affect developments.
article