Journal: Comput. Law Secur. Rev.

Volume 3, Issue 6

2 -- 6Sharon Harvey, Julian Newman. Contracts by electronic mail
6 -- 8Graham Greenleaf. Privacy
8 -- 11Alan S. Wernick. Intellectual property bankruptcy protection
11 -- 16John Morris. Source code maintenance and Escrow
23 -- 29Eric Bergsten. International trade procedures
30 -- 32Arthur Dunkel. General agreement on tariffs and trade
32 -- 34Cliff Dilloway. Arbitration - IBM v FUJITSU Ltd
35 -- 36David Davies. Risk management
36 -- 0Bernard P. Zajac Jr.. US focus
37 -- 38David W. Greaves. US case low developments
37 -- 0David W. Greaves. Case law update
38 -- 40Ian Walden. Conference review

Volume 3, Issue 5

2 -- 9J. A. L. Sterling. Copyright legislation
10 -- 14Richard Dedman. Legal protection of software in the United Kingdom
14 -- 16Grant Hammond. The development of trade secrets law in Canada
16 -- 20Ranald Robertson. Strict liability under the consumer protection act 1987 - Some implications for producers of computer based products
28 -- 29Yvo Henniker-Heaton. A look behind the news 1988 - New year's resolutions: A data processing manager reveals all
29 -- 30Pamela Hughes. The 'need to know' principle of computer security
31 -- 32Bernard P. Zajac Jr.. The latest news from the US
32 -- 34Stephen Saxby. Law report - Canada
34 -- 35David W. Greaves. US case law and legislative developments
38 -- 39Chris Hennessy. Contingency planning and disaster recovery for computer systems
39 -- 0David W. Greaves. Computer disputes - A new perspective
40 -- 41Stephen Saxby. Information technology and the courts
41 -- 42R. W. Wright. R.W. Wright: Address to ITAC conference a litigation solicitor's view
42 -- 43Derek Dann, Jill Dann. MILCOMP 87 Military computers, graphics and software a review
43 -- 44Pamela Hughes. Fourth National Computer Security Conference, Windsor, U.K
130 -- 31Buck BloomBecker. US computer security legislation H.R. 145: A step toward greater computer security?

Volume 3, Issue 4

2 -- 8Ruel T. Hernandez. Information law
8 -- 11Christopher Millard. Software licensing
12 -- 0Clive D. Thorne. Copyright legislation
13 -- 15Yvo Henniker-Heaton. Risk management
15 -- 17Pamela Hughes. Radio frequency interference - myths, realities and a practical approach
17 -- 18Jill Dann. Defence review
18 -- 20David V. Marshall. Electronic share dealing - The legal issues
20 -- 22Michael D. Pendleton. Hong Kong Focus
23 -- 24Martin Wasik. Computer crime
24 -- 26Bernard P. Zajac Jr.. US focus
37 -- 0David Davies. Protection against director's failure
38 -- 40David Davies. The consumer protection act British computer society, 24 September 1987

Volume 3, Issue 3

2 -- 4. Communication technology
4 -- 7Eric E. Bergsten. International trade procedures
8 -- 11Roger Brown. Privacy
11 -- 12Alistair Kelman. Read all about yourself
12 -- 13Yvo Henniker-Heaton. Computer security
13 -- 14David Davies. Anatomy of a disaster
14 -- 18Bernard P. Zajac Jr.. Computer crime - what to do before it happens
21 -- 28J. A. L. Sterling. Copyright in computer programs
28 -- 29Bernard P. Zajac Jr.. US focus
35 -- 36David Davies. Security focus
36 -- 37David Davies. It can't happen to us: A selection of recent computing losses
37 -- 39John E. Appleton. Law reports update

Volume 3, Issue 2

2 -- 6Marc Regberg. Trends in communication technology: Impacts on the right to control publication and performance
6 -- 10. Telecommunications and employment: An interview with Mr. R.E. Butler, Secretary-General of the international telecommunication union
6 -- 0R. E. Butler. ISDN - Major obstacles stand in the way
10 -- 12Roy N. Freed. Is software copyright becoming unfair competition law?
13 -- 17J. A. L. Sterling. Copyright in computer programs
18 -- 19David V. Marshall. Electronic share dealing - the legal issues
23 -- 24Rowan Middleton. Computer security
24 -- 27Bernard P. Zajac Jr.. US focus
25 -- 27David W. Greaves. Law reports update - recent legislative and judicial developments in the US
31 -- 32Noel Byrne. Commercial agreements and competition law: Practice and procedure in the UK and EEC: Dr Nicholas Green published by Graham & Trotman, 1986. ISBN 0860107884. Price £89
32 -- 34Yvo Henniker-Heaton. Electronic risks in banking and commerce, the gloucester hotel, London. A two day course organised by IBC technical services, March 1987
34 -- 35David W. Greaves. The 1987 computer law symposium 28 and 29 April 1987, London. A two day course organised by legal studies and services ltd
35 -- 36David W. Greaves. Legal liability for expert systems - 14 May 87 London. A one day conference organised by learned information ltd
36 -- 0Pamela Hughes. Computer security - 3 day seminar 20-22/5/87. EMAP

Volume 3, Issue 1

2 -- 3Yvo Henniker-Heaton. Security awareness
3 -- 6Stephen Saxby. Semi-conductor chips
6 -- 9Stephen Saxby. Computer evidence
9 -- 10John Sims. New approaches to dispute resolution
10 -- 12Steven Larner, Sandy Douglas. Settling disputes in the computer industry
12 -- 13C. C. Dilloway. A case study in a computer arbitration
13 -- 14David W. Greaves. Computer disputes: Have the courts become too user-friendly?
14 -- 17William Farquhar. Risk management
21 -- 23David V. Marshall. Electronic share dealing - The legal issues
23 -- 24Bernard P. Zajac Jr.. US focus
25 -- 0Fred Greguras. National security decision directive 145
26 -- 32Stephen Saxby. Current awareness
34 -- 36Stephen Saxby. Recent decisions in the US courts