nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Access to the health records of deceased patients: Why the law is in need of review
|
Mifsud Bonnici, Jeanne Pia |
|
|
25 |
2 |
p. 155-164 |
artikel |
2 |
Automated consent through privacy agents: Legal requirements and technical architecture
|
Le Métayer, Daniel |
|
|
25 |
2 |
p. 136-144 |
artikel |
3 |
Data protection in Germany II: Recent decisions on online-searching of computers, automatic number plate recognition and data retention
|
Hornung, Gerrit |
|
|
25 |
2 |
p. 115-122 |
artikel |
4 |
ECJ rules on acts of “Extraction” that infringe database right
|
Nettleton, Ewan |
|
|
25 |
2 |
p. 181-184 |
artikel |
5 |
Editorial Board
|
|
|
|
25 |
2 |
p. iii-iv |
artikel |
6 |
Editor's foreword
|
Saxby, S. |
|
|
25 |
2 |
p. 113-114 |
artikel |
7 |
EU developments in IP, IT & telecommunications law
|
Small, Harry |
|
|
25 |
2 |
p. 189-193 |
artikel |
8 |
European national news
|
Turner, Mark |
|
|
25 |
2 |
p. 194-198 |
artikel |
9 |
Legal developments and industry issues relevant to IT, media and telecommunications law in key jurisdictions across the Asia Pacific
|
Kennedy, Gabriela |
|
|
25 |
2 |
p. 199-207 |
artikel |
10 |
Privacy impact assessment: Its origins and development
|
Clarke, Roger |
|
|
25 |
2 |
p. 123-135 |
artikel |
11 |
Restrictions on cryptography in India – A case studyof encryption and privacy
|
Ahmad, Nehaluddin |
|
|
25 |
2 |
p. 173-180 |
artikel |
12 |
The principle of security safeguards: Unauthorized activities
|
Dayarathna, Rasika |
|
|
25 |
2 |
p. 165-172 |
artikel |
13 |
Towards a new generation of CCTV networks: Erosion of data protection safeguards?
|
Coudert, Fanny |
|
|
25 |
2 |
p. 145-154 |
artikel |
14 |
When Internet protocols and legal provisions collide: Unauthorised access and Sierra v. Ritz
|
Maurushat, Alana |
|
|
25 |
2 |
p. 185-188 |
artikel |