Source: Computer Law and Security Report, Volume 18, Number 4, 31 July 2002, pp. 282-284(3)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Discussion
Publication date: July 31, 2002