Journal: Comput. Law Secur. Rev.

Volume 2, Issue 3

2 -- 3David Marshall. Introduction to the law on software licences part III: Mistake and fraud
3 -- 5Don Jerrard. Current development in computer contracts
5 -- 6Davies Greaves. A UK perspective
6 -- 9Reginald H. Weller, Shelley F. Wall. Software escrow: A practical primer
9 -- 10Colin Long. Mercury and British telecom interconnection part II: Regulation and competition
10 -- 12Robert Hay. Software piracy in the U.K. - A review
15 -- 16Nigel Savage. The data protection act - policies and experience to date: A review of the second annual report of the data protection registrar
16 -- 18Gavin Morisson. A practica man's guide to living with the act
19 -- 20John E. Appleton. Expert systems and intellectual property law - Some unlikely thoughts on some likely problems that expert systems are likely to generate
20 -- 21David Davies. The Nature of computer crime - a risk management perspective
21 -- 23Yvo Heaton. The human risks - an auditors point of view
25 -- 26Charles Christian. Lex ex machina
26 -- 32David Davies. New highlights