Journal: Comput. Law Secur. Rev.

Volume 4, Issue 5

2 -- 4Martin Wasik. The law commission's working paper on computer misuse
4 -- 0Martin Wasik. CBI Conference on combating computer crime - increasing computer security: Centre Point, London, 27th October 1988
8 -- 0David Davies. Dramatic review: "The hacker and the malevolent employee"; performed at COMPSEC '88
13 -- 14Mark Tantum. Section 69 and all that
15 -- 17David Davies. Continuing the series by David Davies Part IV: Why have a strategy
18 -- 20Christopher Millard. Software escrow arrangements and the insolvency act 1986
21 -- 22. Custom software source code ownership and access
23 -- 26Simon Chalton. Product testing: liability, acceptance, contract terms
27 -- 28Michael J. Shpizner. Congress passes new legislation protecting licensees of intellectual property
28 -- 0Anthony Korn. Data protection in Ireland: The Netherlands and Switzerland: Privacy Laws and Business Seminar, Mayfair Hotel, London, Wednesday, 19 October 1988
34 -- 35Bernard P. Zajac Jr.. Virus hits major US computer network
40 -- 41David Greaves. Eurodynamics systems PLC-V-general automation ltd. (As yet unreported - September 1988)
42 -- 43Stephen Saxby. European Study Conferences Ltd: The Royal Automobile Club, London, Thursday, 13 October 1988