This volume introduces the reader to the principles of law which govern dealings in, and the use of, computer technology, and proposes solutions to commonly encountered problems. The coverage is of use to lawyers, as well as to businesses and scientists for whom computing technology is an integral part of their daily activities.
This edition has been substantially revised to cover new developments in this consantly changing field of law, examining international developments and recent cases in addition to legislative changes.
Chris Reed is Managing Editor of the "International Journal of Law and Computing".
Introduction, Chris Reed: what is computer law? common themes software technology electronic transactions. Part 1 Hardware contracts, Chris Reed: the user requirements specification negotiation sales and leases delivery and payment transfer of ownership and risk the seller's obligations the buyer's remedies the seller's remedies exclusion clauses maintenance agreements system supply contracts. Part 2 Software contracts, Graham Smith: the software licence principal commercial terms warranties exclusion and limitation of liability source-code escrow shrink-wrap licensing pespoke software software maintenance. Part 3 Liability, Chris Reed: contractual liability exclusion clauses strict liability - the Consumer Protection Act 1987 negligence. Part 4 Copyright, Christopher Millard: in what can copyright subsist? ownership and duration of copyright infringement of copyright scope of protection for computer programs and data moral rights civil remedies, criminal sanctions and procedural matters. Part 5 Patent protection for computer-related inventions, Tim Press: overview of the patent system patents for computer-related inventions in detail other aspects of patent law why exclude anything from patentability the future. Part 6 Design right and semiconductor-chip protection, Robert J. Hart and Chris Reed: design right semiconductor-chip protection the WIPO Treaty. Part 7 Protecting confidential information, Allison Coleman: the civil action for breach of confidence jurisdiction the special problem ofconfidential information acquired by improper means the criminal law. Part 8 Computer crime, Ian J. Lloyd and Moira J. Simpson: crime in cyberspace classifications of computer crime computer fraud damage to data or programs theft of information the reports of the Law Commission international developments the Computer Misuse Act 1990. Part 9 Evidence, Michael Silverleaf. Part 10 Electronic data interchange, Chris Reed. Part 11 Data protection, Ian Walden. Part 12 EC computer law, Tim Cowen. (Part contents)