Author: Seng Siew Lim

  • Cloaking A Website

    Cloaking A Website

    Cloaking allows webserver administrators to draw a virtual curtain around a Web site to mask sensitive information from outsiders. It can make a website appears as if it has been abandoned to someone while to everyone else, the website appears as “business as usual”.

    |

  • Trends in Phishing 2004

    Trends in Phishing 2004

    According to analysts, more than 57 million adults think that they have received a phishing email, while the Anti-Phishing Working Group estimates a 38 percent average monthly growth rate in phishing attacks.

    |

  • Singapore Country Guide 2004

    Singapore Country Guide 2004

    Some information on Singapore. Data is generally for the year 2003.

    |

  • Singapore Laws On The Internet 2005

    Singapore Laws On The Internet 2005

    A listing of Singapore Online legal resources found on the Internet.

    |

  • GNU General Public License Under German Law

    GNU General Public License Under German Law

    In the first known court ruling anywhere in the world on the legal effects of the GNU General Public License (“GPL”), the District Court of Munich I in Germany (the “Court”) in May 2004 decided that the provisions of the GPL are enforceable under German law. The lawsuit was initiated by one of the so-called…

    |

  • Building and Construction Industry Security of Payment

    Building and Construction Industry Security of Payment

    Concerning the Building and Construction Industry Security of Payment Act 2004 that provides for security of payment from clients, main contractors and sub-contractors.

    |

  • Secrets They Never Taught Me At Law School – Reflections of a Retiring Lawyer

    Secrets They Never Taught Me At Law School – Reflections of a Retiring Lawyer

    Every single person makes law affecting himself all the time. Every moment when you relate to another person is a unique law-making situation. If he thinks you were wrong, he sues you. And vice versa. If you like to have business relations with him, the two of you have an agreement which makes rules on…

    |

  • Model Data Protection Code For The Private Sector v1.3 (June 2003)

    Model Data Protection Code For The Private Sector v1.3 (June 2003)

    This Model Code outlines the minimum requirements for the protection of personal information whether or not in the form of electronic data (“personal data”). The Model code was first drafted by the Legal Sub- Committee of the National Internet Advisory Committee (NIAC). It was subsequently opened for public consultation by the Media Development Authority (MDA)…

    |

  • Invisible (Confidential) Information In Electronic Documents

    Invisible (Confidential) Information In Electronic Documents

    Problems with Metadata in Electronic Documents.

    |

  • California Incorporation

    California Incorporation

    A basic guide on incorporating in California, USA.

    |

  • Application For Permanent Residency in Singapore

    Application For Permanent Residency in Singapore

    This article sets out a brief outline of the procedure to apply for permanent residence in Singapore.

    |

  • Phishing

    Phishing

    An article generally about phishing and similar activities. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.

    |