Journal: Comput. Law Secur. Rev.

Volume 7, Issue 4

146 -- 151Graham J. H. Smith. Comments and recommendations by the intellectual property committee, British Computer Society
152 -- 154Quentin Archer. New rental, lending and neighbouring rights directive
155 -- 160Roy N. Freed. The birth, life, and death of computer law - part II
161 -- 164David Davies. The nature of computer dependency risks
165 -- 168Richard Dedman. Developments

Volume 7, Issue 3

107 -- 111Roy N. Freed. Computer law
111 -- 112Robin Preston. Report on the 20th anniversary meeting of the US computer law association
113 -- 116Richard Stephens, Stephenson Harwood. Consultancy contracts
117 -- 122Nicholas Frome, Heather Rowe. Database law
123 -- 126Angela Kolb. Data protection - Germany
127 -- 130Peter G. Leonard, Peter Waters. Telecommunications
131 -- 0Bernard P. Zajac Jr.. US focus
141 -- 142Julian P. Thurston. Facilities management: Outsourcing your information technology needs
142 -- 143Christopher Rees. Second annual conference on the supply of computer systems and software held at Cafe Royal London 8 July 1991

Volume 7, Issue 2

50 -- 51Chris White. The EC software directive: A user's perspective
51 -- 52Robert Hart. Maintenance under the EEC directive on the legal protection of computer programs
60 -- 61Vivien Irish. Protecting business ideas - an introduction
61 -- 62Alan S. Wernick. How to perfect security interest in software
63 -- 65Drakulic der Mirjana. Information law
66 -- 67L. L. M. Nelka Fikeys Krmic. The first personal data protection act in Yugoslavia
68 -- 69Heather Rowe. The EC commission green paper on satellite communications
70 -- 71Heather Rowe. The United Kingdom Duopoly review
72 -- 74Alastair MacWillson, Ian Beale. System development auditing: A risk based approach
75 -- 76Michael Bowles. Security precautions for the disposal of confidential data
76 -- 0Bernard P. Zajac Jr.. Managing information security - A non-technical management guide: by Ken Wong and Steve Watt 1990 (Elsevier Advance Technology & Computer Weekly Publications, 327pp) UK £85.00/US $ 153.00 ISBN: 0-946395-63-2
77 -- 78Bernard P. Zajac Jr.. Computer viral risks - is the worst yet to come? an eerie look into the future
79 -- 81Gordon Hughes. Australian computer virus prosecution Lynn v Barylak (February 1991) county court victoria
82 -- 0David Davies. A review of the new Lloyds electronic and computer crime policy
83 -- 0Bernard P. Zajac Jr.. Ethics and computing (Part II)
84 -- 85August Bequai. Legislative/regulatory developments in information technology and law from the US
95 -- 96Mark Lewis. European initiatives in public procurement: Editor: Mark Meredith (Worldwide Information Inc. European Community Law Series, 1990, ISBN 2-88316-004-X)

Volume 7, Issue 1

2 -- 6F. H. Charbon, H. K. W. Kaspersen. Summary of the report "computer crime in the Netherlands"
27 -- 0Chris Hennessy. Proposal for a [European community] council decision in the field of information security
28 -- 30David Lindsay. Encryption and regulatory controls in Europe
31 -- 32Elissa Soave, Rosin Wilson. Software and the law: The producer's viewpoint - A report on project scope study for the EC
33 -- 34Gordon Hughes. Hughes v Canon Australia Pty Ltd - a case of loose promises
35 -- 36David P. Lewis. Application of anti-piracy provisions of the copyright act 1968