CONTENTS - Emerald
CONTENTS - Emerald
CONTENTS - Emerald
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
legally binding. This is untrue; the de ning attribute of a signature is the signer's<br />
intent, and a plaintext name at the bottom of an email message has legal force. It may<br />
be easy to forge, but then so are the manuscript signatures which have been used for<br />
centuries (see book review, this issue).<br />
041352 `Protecting information from Internet threats'<br />
MA Wright, Computer Fraud and Security Bulletin (Mar 95) pp 6{10<br />
The author describes some of the security problems of the Internet and possible<br />
countermeasures such as password discipline, rewalls and encryption.<br />
041353 `EU-Datenschutzrichtlinie: Einigung im Rat'<br />
Ulrich Wurmeling, Datenschutzberater v 19 no 2 (15/2/95) pp 4{5 (in German)<br />
A majority of the EU's Council of Ministers has rati ed the European data protection<br />
guidelines. These cover structured manual data as well as computer les; the<br />
national jurisdiction to apply will be that of the data owner's head o ce, so that for<br />
example a German rm in France will fall under German law; purely automatic decisions<br />
are forbidden on matters important to an individual such as credit decisions;<br />
data subjects can demand directly from data owners information which does not have<br />
to be reported to the data protection authorities; and data transfers within the EU<br />
become unrestricted.<br />
041354 `EU-Richtlinie vor dem Endspurt'<br />
Ulrich Wurmeling, Datenschutzberater v 18 no 12 (15/12/94) pp 1{3 (in German)<br />
A recent sitting of the ministers responsible for the EU internal market has brought<br />
European data protection guidelines signi cantly nearer. They might be enacted by the<br />
middle of 1995. UK objections to its application to manual le systems have molli ed<br />
by a decision that the o cial English translation of `Akten' shall be ` le systems' rather<br />
than ` les'.<br />
041355 `Computer Viruses | Legal Options'<br />
BP Zajac, Network Security (Feb 94) pp 9{10<br />
The USA has no case law dealing with computer viruses yet. If a virus is caught<br />
from shrink-wrapped software, then remedies may be complicated by license disclaimers.<br />
The argument would turn on whether these were overly broad.<br />
041356 `The BT hack and what it means'<br />
BP Zajac, Computer Law and Security Report v 15 no 1 (Jan/Feb 95) pp 35{36<br />
This article describes an incident in which a UK newspaper got hold of the exdirectory<br />
telephone numbers of VIPs, and discusses the apparent lack of security at<br />
British Telecom.<br />
041357 `US digital telephony legislation'<br />
BP Zajac, Computer Law and Security Report v 14 no 6 (Nov/Dec 94) pp 322-323<br />
Proposed US legislation will force telecomms carriers to provide monitoring capabilities<br />
to the government, and is likely to be passed before the next Congressional<br />
elections in 1995.<br />
25