jo.\*:("Computer Law and Practice")
Results 1 to 25 of 187
Selection :
Shrink wraps are enforceable; an opinionMILLER, C.Computer Law and Practice. 1992, Vol 8, Num 2, pp 52-53Article
Telecommunications and competition law: recent developmentsSINGLETON, E. S.Computer Law and Practice. 1992, Vol 8, Num 1, pp 10-14Article
EC Services Directive and the IT sectorRHODES, M.Computer Law and Practice. 1992, Vol 8, Num 4, pp 121-123Article
Infringement found under Circuit Layouts ActComputer Law and Practice. 1992, Vol 8, Num 5, pp 165-167Article
Creating the régime for software licensesCAMERON, E.Computer Law and Practice. 1991, Vol 7, Num 4, pp 188-192Article
Program protection in the Federal Republic of Germany: a new decision leaves Inkasso Programm intactDREIER, T.Computer Law and Practice. 1991, Vol 7, Num 4, pp 178-181Article
The computer, the court and the curate's egg: is it hearsay or not?BRADGATE, R.Computer Law and Practice. 1991, Vol 7, Num 4, pp 174-177Article
Computer auditing; an aid to fraud investigationBENTLEY, D. F.Computer Law and Practice. 1991, Vol 7, Num 6, pp 250-256Article
Legal issues between banks sharing networksROWE, H.Special issue. Electronic Banking. Computer Law and Practice. 1990, Vol 7, Num 1, pp 2-7Book Chapter
Analysing the software contractHOYLE, C. R.Computer Law and Practice. 1990, Vol 6, Num 6, pp 190-196Article
Computer-generated evidence: implications for the corporate computer user, IMILLER, C. G.Computer Law and Practice. 1990, Vol 6, Num 6, pp 178-184Article
Alternative dispute resolution in an EDI disputeSCHIFFER, R. A; GIFKINS, M.Computer Law and Practice. 1989, Vol 6, Num 2, pp 58-61Article
EDI association standard electronic data interchange agreementComputer Law and Practice. 1989, Vol 6, Num 2, pp 65-67Article
The admissibility of computer statements in criminal trials L'admissibilité des documents sur support informatique dans les procès pénauxREVILLE, N. J.Computer Law and Practice. 1989, Vol 6, Num 1, pp 19-22Article
UNCID rules and interchange agreementsWHEBLE, B.Computer Law and Practice. 1989, Vol 6, Num 2, pp 62-64Article
Draft EC Directive on the Protection of Electronic Databases: comfort after FeistMORTON, J.Computer Law and Practice. 1992, Vol 8, Num 2, pp 38-40Article
New regulation for the protection of computer software in ChinaROTTINGER, M.Computer Law and Practice. 1992, Vol 8, Num 1, pp 29-30Article
Reverse engineering in AustraliaComputer Law and Practice. 1992, Vol 8, Num 2, pp 46-49Article
Brazil-opening up for businessDONIO BELLEGARDE NUNES, E.Computer Law and Practice. 1992, Vol 8, Num 6, pp 172-173Article
Commercial implications of the European Software DirectivePEARSON, H; MILLER, C; TURTLE, N et al.Computer Law and Practice. 1992, Vol 8, Num 1, pp 2-9Article
Software protection under Switzerland's revised Copyright ActTHOMANN, F. H.Computer Law and Practice. 1992, Vol 8, Num 5, pp 148-150Article
Technology transfer implications of electronic fund transfer systemsMADUEG BUNA, S.Computer Law and Practice. 1992, Vol 8, Num 4, pp 113-120Article
The Circuit Layouts Act 1989GAZE, B.Special issue. Australia and New Zealand. Computer Law and Practice. 1991, Vol 7, Num 3, pp 98-100Book Chapter
Computer disputes| are we catching litigation fever?YATES, J.Computer Law and Practice. 1990, Vol 6, Num 3, pp 87-91Article
Copyright protection of computer programs and video games in Austria La protection par le droit d'auteur des programmes d'ordinateur et des jeux vidéo en AutricheROTTINGER, M.Computer Law and Practice. 1990, Vol 6, Num 4, pp 132-133Article