

Author: Rowe H.
Publisher: Elsevier
ISSN: 0267-3649
Source: Computer Law and Security Report, Vol.19, Iss.6, 2003-12, pp. : 490-496
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content








European Data Protection Law Review (EDPL), Vol. 2, Iss. 2, 2016-07 ,pp. :