Computers and the Law

  • A. J. Smith
Chapter
Part of the Macmillan Building and Surveying Series book series (BASS)

Abstract

At the end of this chapter you should be able to:
  • • Outline some of the more important provisions of the principal legislation concerned with the use of computers in a commercial environment including:

  • (i) copyright and similar forms of protection

  • (ii) the Data Protection Act (1984)

  • • Discuss the rights and liabilities usually conferred upon the users of ‘off the shelf software packages.

  • • Discuss the liability for errors which might arise from the use of software packages whether bought ‘off the shelf or developed in-house.

  • • Discuss the general legal issues surrounding contracts for the purchase of computer hardware and software.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arthur C, Mehta A. and Ernest-Jones T. (1988) ‘Learning the facts of life’ Computer Weekly 7.1.88 p. 18Google Scholar
  2. Bigelow R.P. and Nycum S.H. (1975) Your computer and the law Prentice-Hall InternationalGoogle Scholar
  3. Brett H. & Perry L. (eds) (1981) The legal protection of computer software ESC PublishingGoogle Scholar
  4. Computer Weekly (1988) ‘Report by the Parliamentary Correspondent’ Computer Weekly 7.1.88 p. 6Google Scholar
  5. Ernest-Jones T. (1987) ‘Software bugs can end in court’ Computer Weekly 1.10.87 p. 3Google Scholar
  6. Ernest-Jones T. (1988) ‘Software pirate is first in gaol’ Computer Weekly 14.1.88 p. 1Google Scholar
  7. Gooch B. (1986) The computer guide for builders Privately publishedGoogle Scholar
  8. Kavanagh J. (1987) ‘Officers make first strike’ Computer Weekly 29.10.87 p. 1Google Scholar
  9. Lawrence J. (1986) ‘Rent, buy, lease — a beginner’s guide’ Construction Computing January 1986 p. 8Google Scholar
  10. Nicolle L. (1987) ‘Softly softly through the law courts’ Computer Weekly 2.7.87 p. 27Google Scholar
  11. Nicolle L. (1988) ‘Nations move in to rid software sea of piracy’ Computer Weekly 21.1.88 pp. 20–21Google Scholar
  12. Savage N. & Edwards C. (1984) A Guide to the Data Protection Act 1984 Financial Training Publications LtdGoogle Scholar
  13. Sellers J. (1984) ‘Contract negotiation’ Construction Computing January 1984 pp. 29–31Google Scholar
  14. Sterling J.A.L. (1984) The Data Protection Act 1984 — a guide to the new legislation CCH Editions LtdGoogle Scholar
  15. Thomas M. (1987) ‘Protect the consumer — and yourself too’ Computer Weekly 26.11.87 pp. 34–35Google Scholar
  16. Wilson A. (1981) ‘The protection of computer programs under Common Law — procedural aspects and United Kingdom copyright law and trade secrets’ in Brett H. & Perry L. (eds.) The legal protection of computer software ESC PublishingGoogle Scholar

Copyright information

© A. J. Smith 1989

Authors and Affiliations

  • A. J. Smith
    • 1
  1. 1.Department of SurveyingTrent PolytechnicNottinghamUK

Personalised recommendations