Stemming the Peer To Peer Outflow at Source – maybe
David Flint examines the import of the MGM v Grokster decision.
article
David Flint examines the import of the MGM v Grokster decision.
article
Eduardo Ustaran considers the required safeguards in contracts concerning transfer of data abroad.
article
A look at "harmonised flexibility" and some practical implications for UK spectrum users from Simon Muys
article
Richard Cumbley and Peter Church report and comment on the collision between traditional outsourcing settlement confidentiality and the new freedom of information regime.
article
Victoria Cooper thinks that the Cresswell Report underestimates the attractions of tape back-up.
article
Maureen Daly presents an analysis of the differing approaches in the US and various European jurisdictions to allegations of trade mark infringement and unfair competition by search engines.
article
Adam Westbrooke argues the importance of data tagging but explains that its importance does not dictate that it must be complex.
article
article
Kit Burden explains why IT security matters, or should matter.
article
Alastair Morrison responds to the call in an issue of the magazine for articles on whether generic software can do most of the IT work required by the legal profession.
article