Information technology law

  1. Home
  2. Docs
  3. LSE
  4. LSE Law School
  5. Information technology law

Information technology law


Lloyd, I. J. (2017). Information technology law (8th ed.). Oxford University Press.

Chapter Summary

Part I: Privacy, Anonymity, and Data Protection

  1. Privacy, Technology, and Surveillance:
  • Discusses the implications of technological advancements on privacy and surveillance.
  • Covers legislative measures like the Investigatory Powers Act.
  • Analyzes interception of communications and public/private surveillance.
  1. The Emergence of Data Protection:
  • Traces the development of data protection laws internationally and in the UK.
  • Reviews key legislation like the Data Protection Act 1998 and GDPR.
  • Discusses data security breaches, data protection officers, and transborder data flows.
  1. The Scope of Data Protection:
  • Explores concepts of personal data and sensitive personal data.
  • Examines issues of data processing, data controllers, and data processors.
  • Reviews jurisdictional issues and concludes on the adequacy of data protection.
  1. Supervisory Agencies:
  • Details the role and functions of data protection supervisory authorities.
  • Discusses procedural requirements, exemptions, and enforcement of data protection laws.
  1. The Data Protection Principles:
  • Breaks down the principles of fair and lawful processing of personal data.
  • Analyzes subject consent, processing of sensitive data, and specific factors legitimizing processing.
  1. Individual Rights and Remedies:
  • Explains the rights of data subjects, including access to personal data and rectification of inaccurate data.
  • Discusses compensation for misuse of personal information and other remedies.
  1. Sectoral Aspects of Data Protection:
  • Focuses on data protection in specific sectors like media and electronic communications.
  • Reviews sector-specific legislation and obligations of network/service providers.
  1. Transborder Data Flows:
  • Covers regulation of data transfers outside the EU.
  • Discusses Safe Harbor agreement, Privacy Shield, and adequacy of data protection in international contexts.

Part II: Computer-Related Crime

  1. National and International Responses to Computer-Related Crime:
  • Reviews conventions and guidelines like the Council of Europe Cybercrime Convention.
  • Discusses EU initiatives and their impact on combating cybercrime.
  1. Substantive Criminal Law Provisions:
  • Analyzes offenses against computer data and systems, including unauthorized access and data interference.
  • Covers denial-of-service attacks and malicious communications.
  1. Computer Fraud and Forgery:
  • Discusses computer-related forgery and fraud, including deception of machines and obtaining services dishonestly.
  1. Virtual Criminality:
  • Examines issues of internet pornography, child exploitation, and multimedia products.
  • Considers jurisdictional challenges in virtual criminality.
  1. Detecting and Prosecuting Computer Crime:
  • Reviews legislative measures for interception and communications data.
  • Discusses the Investigatory Powers Act and its implications for computer crime investigation.

Part III: Intellectual Property Issues

  1. Key Elements of the Patent System:
  • Details international patent agreements and requirements for patentability.
  • Discusses patenting software and infringement issues.
  1. Patents:
  • Explores who gets patents, the software patent wars, and the impact of patent trolls.
  • Discusses standard essential patents.
  1. Copyright Protection:
  • Reviews copyright basics, protected works, and the development of software copyright.
  • Discusses user rights, fair dealing, and digital rights management.
  1. Enforcement Issues:
  • Covers enforcement of copyright, blocking orders, and the legal basis for copyright protection.
  • Discusses cost issues and orders related to copyright infringement.
  1. Protection of Databases:
  • Analyzes traditional protection for databases and the database right.
  • Discusses court cases involving database protection.
  1. Design Rights:
  • Details the development of design right and legislative instruments.
  • Discusses registered and unregistered design right protection.
  1. Trade Mark and Domain-Name Issues:
  • Reviews the effect of trade marks and domain name hijacking.
  • Discusses trade marks and internet search engines.
  1. Internet Regulation and Domain Names:
  • Covers the governance of the internet, ICANN, and domain name disputes.
  • Discusses the future of internet governance.

Part IV: E-Commerce

  1. International and European Initiatives in E-Commerce:
  • Reviews key legal instruments like the Distance Selling Directive and the Electronic Commerce Directive.
  • Discusses choice-of-law issues and alternative dispute resolution.
  1. Electronic Money:
  • Analyzes the regulation of e-money, virtual currency, and peer-to-peer lending.
  • Discusses safeguarding arrangements and passport rights.
  1. Contractual Liability for Defective Software:
  • Reviews forms of liability for defective software and implied terms in software contracts.
  • Discusses the Consumer Rights Act 2015 and its implications for software quality.

This chapter summary provides a comprehensive overview of the topics covered in Ian J. Lloyd’s Information Technology Law (8th edition), emphasizing the evolving nature of IT law and its impact on privacy, crime, intellectual property, and e-commerce.

Key Concepts

Privacy and Data Protection

  1. Privacy and Surveillance:
    • Examines the tension between privacy rights and the needs of surveillance.
    • Investigates the legal frameworks like the Investigatory Powers Act that govern surveillance activities.
    • Analyzes the impact of modern technologies on the privacy of individuals and groups.
  2. Data Protection Principles:
    • Defines core principles such as lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, storage limitation, integrity, and confidentiality.
    • Highlights the role of data protection officers and the importance of data protection by design and by default.
  3. Data Subject Rights:
    • Details the rights afforded to individuals under data protection laws, including access to personal data, rectification, erasure (the right to be forgotten), restriction of processing, data portability, and the right to object.
    • Explores the mechanisms available for individuals to enforce their rights and seek remedies.
  4. Transborder Data Flows:
    • Discusses the regulatory requirements for transferring data across borders.
    • Highlights key frameworks like the EU-US Privacy Shield and the implications of international data transfers.

Computer-Related Crime

  1. Cybercrime Legislation:
    • Reviews international conventions such as the Council of Europe Cybercrime Convention.
    • Discusses national laws like the Computer Misuse Act 1990, detailing offenses such as unauthorized access, data interference, and system interference.
  2. Types of Cybercrime:
    • Covers various forms of cybercrime including hacking, identity theft, phishing, ransomware, and online fraud.
    • Discusses emerging issues like virtual criminality, including internet pornography and cyberbullying.
  3. Detection and Prosecution:
    • Analyzes legal tools and techniques for detecting and prosecuting cybercrime.
    • Examines the role of agencies and international cooperation in combating cybercrime.

Intellectual Property Issues

  1. Patents:
    • Explores the patenting process, requirements for patentability, and the enforcement of patents.
    • Discusses controversial issues like software patents, patent trolls, and standard essential patents.
  2. Copyright:
    • Details the basics of copyright law, the types of works protected, and the duration of copyright.
    • Explores issues of copyright infringement, fair use, and digital rights management (DRM).
  3. Trade Marks and Domain Names:
    • Reviews the importance of trademarks in the digital age and the challenges posed by domain name disputes.
    • Discusses legal frameworks like the Uniform Domain-Name Dispute-Resolution Policy (UDRP).


  1. Legal Frameworks for E-Commerce:
    • Covers key directives such as the Distance Selling Directive and the Electronic Commerce Directive.
    • Discusses the legal issues surrounding electronic contracts, consumer protection, and liability for defective products.
  2. Electronic Money and Virtual Currencies:
    • Analyzes the regulatory landscape for electronic money and virtual currencies.
    • Discusses the challenges and opportunities presented by fintech innovations like peer-to-peer lending and crowdfunding.
  3. Consumer Rights and Software:
    • Examines the implications of the Consumer Rights Act 2015 for digital products and services.
    • Details the standards for software quality, the enforceability of software licenses, and remedies for defective software.

Critical Analysis

Data Protection and Privacy

  1. Evolution of Data Protection Laws:
  • The book tracks the historical development of data protection laws from the early days of computerization to the modern era of the General Data Protection Regulation (GDPR). This historical perspective highlights how legislative frameworks have adapted to technological advancements and growing concerns over privacy.
  1. GDPR and Its Impact:
  • A critical analysis of GDPR’s introduction shows its significant impact on data protection practices globally, not just within the EU. The regulation’s extraterritorial reach underscores the global nature of data flows and the importance of compliance by organizations worldwide.
  1. Privacy vs. Security:
  • The book delves into the ongoing debate between maintaining individual privacy and ensuring national security. It examines cases where laws like the Investigatory Powers Act may overreach and infringe on personal freedoms, arguing for a balanced approach that protects both privacy and security.

Cybercrime and Legal Responses

  1. International Cooperation:
  • Highlights the necessity of international cooperation in combating cybercrime. The Council of Europe’s Cybercrime Convention and EU initiatives are discussed as essential frameworks for addressing crimes that transcend national borders.
  1. Legal and Ethical Challenges:
  • The book raises ethical questions regarding state surveillance and the use of hacking by law enforcement. It questions the ethical boundaries of such practices and calls for clear legal guidelines to prevent abuse.
  1. Challenges in Prosecution:
  • Examines the difficulties in prosecuting cybercrime, such as issues of jurisdiction and the anonymity of cybercriminals. It stresses the need for updated legal tools and international agreements to enhance the effectiveness of cybercrime prosecution.

Intellectual Property in the Digital Age

  1. Patent Law and Innovation:
  • Analyzes the tension between patent protection and innovation, particularly in the software industry. It critiques the practice of patent trolling and the challenges it poses to startups and innovators, advocating for reforms to patent laws to better support innovation.
  1. Copyright and Fair Use:
  • Discusses the balance between protecting copyright holders’ rights and allowing fair use. It explores cases where overly strict copyright enforcement stifles creativity and access to information, suggesting that copyright laws need to adapt to the realities of the digital age.
  1. Digital Rights Management (DRM):
  • Critically evaluates DRM technologies, highlighting their role in protecting intellectual property but also their potential to infringe on user rights. The book calls for a balanced approach that protects creators while ensuring users’ rights are not unduly restricted.

E-Commerce and Consumer Protection

  1. Regulatory Challenges:
  • Identifies the regulatory challenges posed by the rapid growth of e-commerce, such as ensuring consumer protection and addressing cross-border legal issues. The book argues for harmonized international regulations to provide a consistent legal framework for e-commerce.
  1. Consumer Rights Act 2015:
  • Analyzes the impact of the Consumer Rights Act 2015 on digital products and services. It discusses the act’s provisions for quality, fitness for purpose, and remedies for defective products, highlighting its significance in protecting consumers in the digital marketplace.
  1. Liability for Defective Software:
  • Discusses the complexities of assigning liability for defective software, including issues of implied terms and the enforceability of software licenses. The book calls for clearer legal standards and greater accountability for software developers.

Real-World Applications and Examples

Practical Implications for Legal and IT Professionals

  1. Data Protection Compliance:
  • Provides detailed guidance on GDPR compliance, including the roles and responsibilities of Data Protection Officers (DPOs), the importance of data audits, and the implementation of privacy by design and default.
  1. Cybersecurity Best Practices:
  • Offers practical advice for organizations on improving cybersecurity, such as conducting regular security assessments, implementing robust incident response plans, and staying informed about the latest cyber threats and legal requirements.
  1. Intellectual Property Management:
  • Advises on best practices for managing intellectual property in the digital age, including strategies for protecting patents, copyrights, and trademarks. The book emphasizes the importance of understanding and navigating the complexities of international IP law.

Case Studies and Legal Precedents

  1. Yahoo Data Breach:
  • An in-depth analysis of the Yahoo data breach case, which involved the theft of personal data from millions of users. The book discusses the legal and regulatory responses, the impact on Yahoo, and lessons learned for other organizations.
  1. Safe Harbor and Privacy Shield:
  • Examines the transition from the Safe Harbor framework to the Privacy Shield agreement for transatlantic data transfers. The book highlights the legal challenges and implications for businesses involved in international data transfers.
  1. Apple vs. Samsung:
  • Provides a detailed case study of the patent disputes between Apple and Samsung. It discusses the legal arguments, court decisions, and the broader implications for patent law and innovation in the tech industry.
  1. Investigatory Powers Act:
  • Analyzes the Investigatory Powers Act (IPA) in the UK, exploring its provisions, criticisms, and the balance it seeks between national security and individual privacy. The book discusses how the IPA has influenced other countries’ surveillance laws.

Emerging Trends and Future Directions

  1. Artificial Intelligence and Legal Personhood:
  • Explores the emerging trend of AI and robotics, including the potential for granting legal personhood to AI entities. The book discusses the legal, ethical, and societal implications of autonomous systems and their integration into various aspects of life.
  1. Blockchain and Digital Contracts:
  • Discusses the impact of blockchain technology on digital contracts and e-commerce. The book examines how blockchain can enhance transparency, security, and efficiency in contract execution and the legal challenges that need to be addressed.
  1. Data Portability and Interoperability:
  • Highlights the importance of data portability and interoperability in the digital economy. The book discusses the legal frameworks that support these concepts and their significance for competition and innovation.

This comprehensive summary provides a detailed overview of Ian J. Lloyd’s Information Technology Law (8th edition), focusing on critical analysis, real-world applications, and emerging trends in the field of IT law.

Post a Comment

Your email address will not be published. Required fields are marked *