One Last Word

Author(s):  
Pascale Chapdelaine

‘One last word’ offers by way of conclusion, a reflection on the challenges that copyright law will continue to face in regulating older forms together with newer forms of works and methods of dissemination, and by inviting the reader to consider other areas of law (cloud computing, privacy law, state surveillance, taxation) where the analytical framework presented in the book may find application.

2018 ◽  
Vol 16 (4) ◽  
pp. 399-409
Author(s):  
Smith Oduro-Marfo

This paper discusses Ghana’s erstwhile Religious Bodies Registration Law (PNDC Law 221) passed by the Provisional National Defence Council (PNDC) in 1989 and the associated bans placed on the Jehovah’s Witnesses and Mormon sects. First, the paper analyzes how the state’s surveillance moves engendered lateral and anti-surveillance practices. Second, Eric Stoddart’s concept of (in)visibility is used as an analytical framework to track how both the surveilling entity (the state and community surveillers) and the surveilled (religious bodies and their members) actively partook in constructing the visibility and invisibility of the surveilled. The paper concludes that the state’s theoretical ambition of religious surveillance was not fully matched in practice, as implementation was mediated by a pragmatic blend of “seeing” and “unseeing.” Also, the response of the religious sects to the surveillance involved a strategic pursuit of simultaneous visibility and invisibility.


2013 ◽  
Vol 2013 ◽  
pp. 1-14 ◽  
Author(s):  
Chi-Hua Chen ◽  
Hui-Fei Lin ◽  
Hsu-Chia Chang ◽  
Ping-Hsien Ho ◽  
Chi-Chun Lo

Cloud computing has become a popular topic for exploration in both academic and industrial research in recent years. In this paper, network behavior is analyzed to assess and compare the costs and risks associated with traditional local servers versus those associated with cloud computing to determine the appropriate deployment strategy. An analytic framework of a deployment strategy that involves two mathematical models and the analytical hierarchy process is proposed to analyze the costs and service level agreements of services involving using traditional local servers and platform as service platforms in the cloud. Two websites are used as test sites to analyze the costs and risks of deploying services inGoogle App Engine(GAE) (1) the website ofInformation and Finance of Management(IFM) at theNational Chiao Tung University(NCTU) and (2) the NCTU website. If the examined websites were deployed in GAE, NCTU would save over 83.34% of the costs associated with using a traditional local server with low risk. Therefore, both the IFM and NCTU websites can be served appropriately in the cloud. Based on this strategy, a suggestion is proposed for managers and professionals.


Web Services ◽  
2019 ◽  
pp. 1917-1940
Author(s):  
Sylvia Kierkegaard

Concerns about government snooping in the wake of revelations by whistle blower Edward Snowden have deterred enterprises and IT professionals from keeping sensitive data in the clouds. Moving towards cloud-based computing has emerged and has gained acceptance as a solution to the tasks related to the processing of information. However, cloud computing carries serious risks to business information. The questions around risk and compliance are still largely unknown and need to be ironed out. Cloud computing opens numerous legal, privacy, and security implications, such as copyright, data loss, destruction of data, identity theft, third-party contractual limitations, e-discovery, risk/insurance allocation, and jurisdictional issues. This chapter discusses the associated legal risks inherent in cloud computing, in particular the international data transfer between EU and non-EU states.


2021 ◽  
Author(s):  
Kevin McGillivray

In Government Cloud Procurement, Kevin McGillivray explores the question of whether governments can adopt cloud computing services and still meet their legal requirements and other obligations to citizens. The book focuses on the interplay between the technical properties of cloud computing services and the complex legal requirements applicable to cloud adoption and use. The legal issues evaluated include data privacy law (GDPR and the US regime), jurisdictional issues, contracts, and transnational private law approaches to addressing legal requirements. McGillivray also addresses the unique position of governments when they outsource core aspects of their information and communications technology to cloud service providers. His analysis is supported by extensive research examining actual cloud contracts obtained through Freedom of Information Act requests. With the demand for cloud computing on the rise, this study fills a gap in legal literature and offers guidance to organizations considering cloud computing.


2021 ◽  
pp. 1-57
Author(s):  
Jack Maxwell ◽  
Joe Tomlinson

In October 2020, the Court of Justice of the European Union (CJEU), sitting as a Grand Chamber, handed down its preliminary rulings in Privacy International v. Secretary of State for Foreign and Commonwealth Affairs (Privacy International) and in the joined cases of La Quadrature du Net v. Premier ministre and Ordre des barreaux francophones et germanophone v. Conseil des ministers (La Quadrature du Net). In Privacy International, the CJEU held that member states are precluded from enacting laws enabling bulk transmission of communications data from providers to the state. In La Quadrature du Net, it laid down requirements for various types of data processing, including bulk and targeted retention and automated analysis, and held for the first time that bulk retention of communications data could be justified on national security grounds. The judgments represent a significant development of the CJEU's jurisprudence on communications data processing and state surveillance, as the European Union (EU) continues to move towards a new digital privacy law.


2016 ◽  
pp. 2032-2054
Author(s):  
Sylvia Kierkegaard

Concerns about government snooping in the wake of revelations by whistle blower Edward Snowden have deterred enterprises and IT professionals from keeping sensitive data in the clouds. Moving towards cloud-based computing has emerged and has gained acceptance as a solution to the tasks related to the processing of information. However, cloud computing carries serious risks to business information. The questions around risk and compliance are still largely unknown and need to be ironed out. Cloud computing opens numerous legal, privacy, and security implications, such as copyright, data loss, destruction of data, identity theft, third-party contractual limitations, e-discovery, risk/insurance allocation, and jurisdictional issues. This chapter discusses the associated legal risks inherent in cloud computing, in particular the international data transfer between EU and non-EU states.


Author(s):  
Sylvia Kierkegaard

Concerns about government snooping in the wake of revelations by whistle blower Edward Snowden have deterred enterprises and IT professionals from keeping sensitive data in the clouds. Moving towards cloud-based computing has emerged and has gained acceptance as a solution to the tasks related to the processing of information. However, cloud computing carries serious risks to business information. The questions around risk and compliance are still largely unknown and need to be ironed out. Cloud computing opens numerous legal, privacy, and security implications, such as copyright, data loss, destruction of data, identity theft, third-party contractual limitations, e-discovery, risk/insurance allocation, and jurisdictional issues. This chapter discusses the associated legal risks inherent in cloud computing, in particular the international data transfer between EU and non-EU states.


2022 ◽  
pp. 125-145
Author(s):  
Pedro Pina

Advances in the field of digital technology are constantly introducing new levels of controversy into copyright policy. Blockchain is the most recent technology with significative impact in digital copyright. Combined with smart contracts, blockchain enables new efficient forms of distribution of copyrighted works and also a new model of private ordering regarding the control of uses of works on the Internet. The chapter aims to examine the relationship and the most relevant intersections between blockchain, digital exploitation of copyrighted works, copyright law, and privacy law.


Sign in / Sign up

Export Citation Format

Share Document