Technology underpins everything we do, and the contracts which underpin the delivery of technology-related services are important from both an economic and social perspective.
Technology underpins everything we do, and the contracts which underpin the delivery of technology-related services are important from both an economic and social perspective.
This book interrogates the legality of corporate surveillance, offering a corrective approach to protecting privacy through litigation-not through legislation.
Die Neuauflage des HK DS-GVO/BDSG von Schwartmann/Jaspers/Thüsing/Kugelmann bietet der Datenschutzpraxis eine topaktuelle Kommentierung am Puls der Zeit.
The only book of its kind to look at how our legal system needs to change to accommodate a world in which machines, in addition to people, make decisions.
Besides the abundance of natural resources, intellectual property (IP) and technology have played a significant role in Africa's ongoing economic growth and development.
This book provides a comprehensive examination of data sharing within the EU, exploring the regulatory challenges and opportunities created by EU frameworks and policies.
This book argues that the European Court of Human Rights (ECtHR) should reconsider its approach to hate speech cases and develop a robust protection of freedom of expression as set out in the benchmark case of Handyside v the United Kingdom.
The Routledge Handbook of Social Media, Law and Society provides an international survey of social media and the law in society, blending academic, non-academic and non-governmental expertise to provide a thematic overview of social media and the law across a number of jurisdictions.
Recommended textbook for the Open University's postgraduate information security course and the recommended text for all IBITGQ ISO 27001 coursesIn this updated edition, renowned ISO 27001/27002 experts Alan Calder and Steve Watkins:Discuss the ISO 27001/27002:2022 updates;Provide guidance on how to establish a strong IT governance system and an ISMS (information security management system) that complies with ISO 27001 and ISO 27002;Highlight why data protection and information security are vital in our ever-changing online and physical environments;Reflect on changes to international legislation, e.
El derecho social a la convergencia es una manifestación de la libertad de expresión en su doble dimensión, individual y social a la vez que se inserta en el concepto de Sociedad de la Información, centrada en la persona, integradora y orientada al desarrollo, en la que todos puedan crear, consultar, utilizar y compartir la información y el conocimiento.
This book offers conceptual analyses, highlights issues, proposes solutions, and discusses practices regarding privacy and data protection in transitional times.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Resisting State Surveillance in the Digital Age provides an in-depth examination of the complexity and diversity of organised opposition to increasing state surveillance powers in the UK.
In this textbook, social media professor Jeremy Harris Lipschultz introduces students to the study of social media law and ethics, integrating legal concepts and ethical theories.
Can open source software software that is usually available without charge and that individuals are free to modify survive against the fierce competition of proprietary software, such as Microsoft Windows?
Mit dem Thema Datenschutz müssen sich alle Unternehmen auseinandersetzen, vom Solo-Selbstständigen über kleine und mittlere Betriebe bis zum Großunternehmen.
Despite massive investments in mitigation capabilities, financial crime remains a trillion-dollar global issue with impacts that extend well beyond the financial services industry.
This book provides a comprehensive analysis covering the confluence of Artificial Intelligence (AI), Cyber Forensics and Digital Policing in the context of the United Kingdom (UK), United States (US) and European Union (EU) national cybersecurity.
This book describes cyber-security issues underpinning several cyber-physical systems and several application domains, proposing a common perspective able to collect similarities as well as depict divergences and specific solution methods.
This book provides an opportunity for researchers, scientists, government officials, strategist and operators and maintainers of large, complex and advanced systems and infrastructure to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers.