Automated consent through privacy agents: Legal requirements and technical architecture (English)
- New search for: Le Métayer, Daniel
- New search for: Monteleone, Shara
- New search for: Le Métayer, Daniel
- New search for: Monteleone, Shara
In:
Computer Law and Security Report
;
25
, 2
;
136-144
;
2009
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Automated consent through privacy agents: Legal requirements and technical architecture
-
Contributors:Le Métayer, Daniel ( author ) / Monteleone, Shara ( author )
-
Published in:Computer Law and Security Report ; 25, 2 ; 136-144
-
Publisher:
- New search for: Daniel Le Métayer & Shara Monteleone
-
Publication date:2009-01-01
-
Size:9 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 25, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 113
-
Editor's forewordSaxby, S. et al. | 2009
- 115
-
Data protection in Germany II: Recent decisions on online-searching of computers, automatic number plate recognition and data retentionHornung, Gerrit / Schnabel, Christoph et al. | 2009
- 123
-
Privacy impact assessment: Its origins and developmentClarke, Roger et al. | 2009
- 136
-
Automated consent through privacy agents: Legal requirements and technical architectureLe Métayer, Daniel / Monteleone, Shara et al. | 2009
- 145
-
Towards a new generation of CCTV networks: Erosion of data protection safeguards?Coudert, Fanny et al. | 2009
- 155
-
Access to the health records of deceased patients: Why the law is in need of reviewMifsud Bonnici, Jeanne Pia / Choong, Kartina A. et al. | 2009
- 165
-
The principle of security safeguards: Unauthorized activitiesDayarathna, Rasika et al. | 2009
- 173
-
Restrictions on cryptography in India – A case studyof encryption and privacyAhmad, Nehaluddin et al. | 2009
- 181
-
ECJ rules on acts of “Extraction” that infringe database rightNettleton, Ewan et al. | 2009
- 185
-
When Internet protocols and legal provisions collide: Unauthorised access and Sierra v. RitzMaurushat, Alana / Yu, Ron et al. | 2009
- 189
-
EU developments in IP, IT & telecommunications lawSmall, Harry / Dizon, Michael / Malik, Tabeebah / Kemmitt, Helen / Smith, Ben / Chin, Alison / Duduyemi of, Olufemi et al. | 2009
- 194
-
European national newsTurner, Mark et al. | 2009
- 199
-
Legal developments and industry issues relevant to IT, media and telecommunications law in key jurisdictions across the Asia PacificKennedy, Gabriela / Doyle, Sarah / Lui, Brenda et al. | 2009
- iii
-
Editorial Board| 2008