Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Law

A Submission To The New Zealand Government On The Plain Packaging Of Tobacco Products, Matthew Rimmer Oct 2012

A Submission To The New Zealand Government On The Plain Packaging Of Tobacco Products, Matthew Rimmer

Matthew Rimmer

EXECUTIVE SUMMARYThis submission draws upon a number of pieces of research and policy papers on the plain packaging of tobacco products including:1. Becky Freeman, Simon Chapman, and Matthew Rimmer, 'The Case for the Plain Packaging of Tobacco Products' (2008) 103 (4) Addiction 580-590.2. Matthew Rimmer, 'A Submission to the Senate Legal and Constitutional Committee on the Trade Marks Amendment (Tobacco Plain Packaging) Bill (Cth)', September 2011, https://senate.aph.gov.au/submissions/comittees/viewdocument.aspx?id=dabfcd75-9807-493f-bc99-4a7506bf493b3A. Matthew Rimmer, 'Tobacco's Mad Men Threaten Public Health', The Conversation, 23 September 2011, http://theconversation.edu.au/tobaccos-mad-men-threaten-public-health-34503B. Matthew Rimmer, 'Big Tobacco's Box Fetish: Plain Packaging at the High Court', The Conversation, 20 April 2012, https://theconversation.edu.au/big-tobaccos-box-fetish-plain-packaging-at-the-high-court-65183C. Matthew …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Walled Gardens & The Stationers’ Company 2.0, Greg Lastowka Jan 2012

Walled Gardens & The Stationers’ Company 2.0, Greg Lastowka

Greg Lastowka

Copyright law originated as a law designed to regulate the commerce of printing, not as a law designed to protect the interests of authors. The Statute of Anne changed this by vesting copyright with the author and thereby creating the possibility of pre-publication negotiations. Today that bargain is being broken. In our era of cloud-computing and Web 2.0, non-author intermediaries provide platforms that constitute the tools of authorship, the tools of publicity, and the tools of commercial distribution. Within this new ecosystem, we are seeing a return to the model of the Stationers’ Company, where legal power over authorial production …


Data Protection: Idealisms And Realisms, Rebecca Wong Dr Jan 2012

Data Protection: Idealisms And Realisms, Rebecca Wong Dr

Dr Rebecca Wong

Following proposals to consider revising the Data Protection Directive 95/46/EC (DPD) in 2011, have the changes addressed the main areas of concern that have been the focus of much discussion? The areas of concern include the application of the Directive in the online age, particularly to social networking sites and cloud computing; the minimum/maximum standard approach by the EU Member States to data protection; the relevance and application of the data protection principles. These are some of the issues that were considered in the recent Art. 29 Working Party’s Opinion on the Future of Privacy. The article will use this …


Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig Dec 2011

Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig

Jorge R Roig

Computer source code is the lifeblood of the Internet. It is also the brick and mortar of cyberspace. As such, it has been argued that the degree of control that a government can wield over code can be a powerful tool for controlling new technologies. With the advent and proliferation in the Internet of social networking media and platforms for the publication and sharing of user-generated content, the ability of individuals across the world to communicate with each other has reached truly revolutionary dimensions.
The influence of Facebook in the popular revolutions of the Arab Spring has been well documented. …