Author: Scott, M.D.
Source: Computer Law and Security Report, Volume 17, Number 3, 1 May 2001, pp. 192-193(2)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Discussion
Publication date: May 1, 2001