- making spam illegal;
- empowering the user to avoid and repel spam;
- laws governing confidentiality of personal data;
- application of “unfair competition” laws;
- and conscripting the service providers to block spam in its tracks through a variety of controls
The reports provide documentation and analysis of the various ways in which these approaches have been used, or can be used, in legislation and case law in a variety of national and international fora. Workers in all fields of communications, from technologists to legal practitioners and academics to administrative policymakers, will benefit enormously from these syntheses and insights.
- making spam illegal;
- empowering the user to avoid and repel spam;
- laws governing confidentiality of personal data;
- application of “unfair competition” laws;
- and conscripting the service providers to block spam in its tracks through a variety of controls
The reports provide documentation and analysis of the various ways in which these approaches have been used, or can be used, in legislation and case law in a variety of national and international fora. Workers in all fields of communications, from technologists to legal practitioners and academics to administrative policymakers, will benefit enormously from these syntheses and insights.
Regulating Internet Abuses: Invasion of Privacy
226Regulating Internet Abuses: Invasion of Privacy
226Hardcover
Product Details
ISBN-13: | 9789041126269 |
---|---|
Publisher: | Wolters Kluwer |
Publication date: | 07/26/2007 |
Pages: | 226 |
Product dimensions: | 6.14(w) x 9.21(h) x 0.56(d) |