1-11 of 11 Results

  • Keyword: internet x
Clear all

Chapter

Cover Information Technology Law

2. The network of networks  

This chapter traces the history of the internet, sometimes called the network of networks. It first looks at the origins of computer networks, beginning with the introduction of the Advanced Research Projects Agency Network or ARPANET, followed by the ALOHANET and the SATNET. The chapter then outlines the development of the internet that began when Bob Kahn built an Internetwork Protocol and also explains how the modern internet functions, along with net neutrality. Finally, it considers the third network layer, the applications layer where higher-level protocols such as Hypertext Transfer Protocol make it possible to carry out operations such as web surfing.

Chapter

Cover Information Technology Law

2. The network of networks  

This chapter traces the history of the internet, sometimes called the network of networks. It first looks at the origins of computer networks, beginning with the introduction of the Advanced Research Projects Agency Network or ARPANET, followed by the ALOHANET and the SATNET. The chapter then outlines the development of the internet that began when Bob Kahn built an Internetwork Protocol and also explains how the modern internet functions, along with net neutrality. Finally, it considers the third network layer, the applications layer where higher-level protocols such as Hypertext Transfer Protocol make it possible to carry out operations such as web surfing.

Chapter

Cover Criminology Skills

4. Media and web sources  

This chapter focuses on media and web sources of information about crime and criminology. It first considers the different media sources—newspapers, broadcast media, and fiction—and explains their relevance to the study of criminology. The chapter provides detailed information on identifying and locating relevant source materials in the media, and outlines the different types of online information such as official publications, reports from criminology organizations, and interest groups, as well as blogs and forums. It discusses how to assess the usefulness, relevance, and reliability of materials.

Chapter

Cover Information Technology Law

20. Obscenity in the information society  

This chapter, which examines pornography and obscenity on the internet, first provides an overview of the UK common law standard known as the Hicklin principle and the Obscene Publications Acts. It then discusses the UK standard and US statutory interventions on pornography, the impact of the case ACLU v Reno on the regulation of sexually explicit content on the internet, pseudo-images, and images depicting child abuse as the most extreme form of pornographic image, and the policing of pseudo-images in the UK and internationally. The chapter also considers the law on non-photographic pornographic images of children, along with private regulation of pornographic imagery and the new Age-verification code for adult websites.

Chapter

Cover Information Technology Law

12. Copyright infringement in the digital environment  

This chapter analyses cases of copyright infringement in the online environment. It begins by analysing some early cases regarding file-sharing technologies, including A&M Records, Inc. v Napster, Inc., MGM Studios, Inc. v Grokster, Ltd, and Sweden v Neij et al. (the Pirate Bay case). It assesses new techniques for fighting illegal file-sharing, such as blocking access to websites offering file-sharing technology or indexes with a focus on the operation of s. 97A website blocking orders. It examines the recent Supreme Court decision in Cartier International v British Sky Broadcasting which will have substantial implications for costs in these orders. Finally, it describes the slightly controversial process known as speculative invoicing.

Chapter

Cover Information Technology Law

20. Obscenity in the information society  

This chapter, which examines pornography and obscenity on the internet, first provides an overview of the UK common law standard known as the Hicklin principle and the Obscene Publications Acts. It then discusses the UK standard and US statutory interventions on pornography, the impact of the case ACLU v Reno on the regulation of sexually explicit content on the internet, pseudo-images and images depicting child abuse as the most extreme form of pornographic image, and the policing of pseudo-images in the UK and internationally. The chapter also considers the law on non-photographic pornographic images of children, non-consensual disclosure of private sexual images (revenge porn) along with private regulation of pornographic imagery and proposals for Age Verification.

Chapter

Cover Information Technology Law

12. Copyright infringement in the digital environment  

This chapter analyses cases of copyright infringement in the online environment. It begins by analysing some early cases regarding file-sharing technologies, including A&M Records, Inc. v Napster, Inc., MGM Studios, Inc. v Grokster, Ltd, and Sweden v Neij et al. (The Pirate Bay case). It assesses new techniques for fighting illegal file-sharing, such as blocking access to websites offering file-sharing technology or indexes with a focus on the operation of s.97A website blocking orders. It examines the Supreme Court decision in Cartier International v British Sky Broadcasting and its application in the Nintendo cases Nintendo Co Ltd v Sky UK Ltd and Nintendo Co Ltd v British Telecommunications Plc. Finally, it describes the slightly controversial process known as speculative invoicing and examines the recent case of Mircom International v Virgin Media.

Chapter

Cover Jacobs, White, and Ovey: The European Convention on Human Rights

18. Freedom of Expression  

This chapter examines the protection of the freedom of expression in the European Convention on Human Rights, discusses the provisions of Article 10, and explains that the majority of cases concerning Article 10 are brought by persons who have received some penalty for defaming or insulting other people. It analyses what constitutes an interference with free expression and considers the limitations on freedom of expression. The chapter also examines the judgments made by the Strasbourg Court on several related cases, including those that involved privacy, incitement to violence and hate speech, obscenity, and blasphemy. It also covers the development of case-law concerning social media and the internet.

Book

Cover Holyoak and Torremans Intellectual Property Law
Holyoak and Torremans Intellectual Property Law provides readers with a clear introduction to UK intellectual property law, whilst carefully placing the law in its global context and acknowledging the influence of EU and other international jurisdictions over its development. The book examines the methods and reasoning behind key statutory and case decisions, and provides readers with real-life examples of intellectual property law in action, helping to bring the subject to life. Recent developments within the law relating to biotechnology patenting, IT and internet, and trade mark, imaging, and character rights are explored, providing readers with a cutting-edge analysis of the subject. Chapter introductions and concluding overviews help to set the scene and provide a succinct summary of the topic areas, whilst lists of annotated further reading offer the perfect starting point for those who wish to explore a topic further. In this, its ninth edition, the book integrates the recent developments on the Unitary Patent; examines the reform of copyright, both EU (the fundamental cases from the CJEU) and domestic; and the recast of the Trade Mark Directive.

Chapter

Cover Information Technology Law

14. Branding, trademarks, and domain names  

This chapter examines the role of trademarks in the creation of brand portfolios online, including internet addresses or domain names. It first provides an overview of branding and trademarks in the global business environment, trademark characteristics, and the distinction between registered and unregistered trademarks, and then looks at domain names as address tools and brand identifiers. The chapter also considers early disputes over rightful ownership of trademarks and domain names, examining the development of cybersquatting case law before the UK and US courts. It discusses the allocation of new generic top-level domains under the New gTLD procedure and examines the legal safeguards for trademark holders under the procedure. The primary focus of the chapter is the Internet Corporation for Assigned Names and Numbers (ICANN) Uniform Domain Name Dispute Resolution Policy and its domestic counterpart in the UK, the Nominet Dispute Resolution Service.

Chapter

Cover Information Technology Law

14. Branding, trade marks, and domain names  

This chapter examines the role of trade marks in the creation of brand portfolios online, including internet addresses or domain names. It first provides an overview of branding and trade marks in the global business environment, trade mark characteristics, and the distinction between registered and unregistered trade marks, and then looks at domain names as address tools and brand identifiers. The chapter also considers early disputes over rightful ownership of trade marks and domain names, examining the development of cybersquatting case law before the UK and US courts. It discusses the allocation of new generic top-level domains under the New gTLD procedure and examines the legal safeguards for trade mark holders under the procedure. The primary focus of the chapter is the Internet Corporation for Assigned Names and Numbers (ICANN) Uniform Domain Name Dispute Resolution Policy and its domestic counterpart in the UK, the Nominet Dispute Resolution Service.