Category: Technology & Digital Economy

  • IT Contract Management And Administration For Law Firms

    IT Contract Management And Administration For Law Firms

    Contract management is one area of the IT procurement process (whether for hardware or for software) that is often overlooked.

    |

  • Online Gambling Laws in Singapore

    Online Gambling Laws in Singapore

    Introduction Singapore laws strictly prohibit gambling and the advertising or promotion of gambling venues. Only limited exceptions exist. This article looks at the gambling laws in Singapore and how they apply to online gambling. The principal legislation are the (1) Betting Act (“BA”); (2) Common Gaming Houses Act (“CGHA”); and (3) Broadcasting (Class License) Notification…

    |

  • Cloaking A Website

    Cloaking A Website

    Cloaking allows webserver administrators to draw a virtual curtain around a Web site to mask sensitive information from outsiders. It can make a website appears as if it has been abandoned to someone while to everyone else, the website appears as “business as usual”.

    |

  • Trends in Phishing 2004

    Trends in Phishing 2004

    According to analysts, more than 57 million adults think that they have received a phishing email, while the Anti-Phishing Working Group estimates a 38 percent average monthly growth rate in phishing attacks.

    |

  • Singapore Laws On The Internet 2005

    Singapore Laws On The Internet 2005

    A listing of Singapore Online legal resources found on the Internet.

    |

  • GNU General Public License Under German Law

    GNU General Public License Under German Law

    In the first known court ruling anywhere in the world on the legal effects of the GNU General Public License (“GPL”), the District Court of Munich I in Germany (the “Court”) in May 2004 decided that the provisions of the GPL are enforceable under German law. The lawsuit was initiated by one of the so-called…

    |

  • Model Data Protection Code For The Private Sector v1.3 (June 2003)

    Model Data Protection Code For The Private Sector v1.3 (June 2003)

    This Model Code outlines the minimum requirements for the protection of personal information whether or not in the form of electronic data (“personal data”). The Model code was first drafted by the Legal Sub- Committee of the National Internet Advisory Committee (NIAC). It was subsequently opened for public consultation by the Media Development Authority (MDA)…

    |

  • Invisible (Confidential) Information In Electronic Documents

    Invisible (Confidential) Information In Electronic Documents

    Problems with Metadata in Electronic Documents.

    |

  • Phishing

    Phishing

    An article generally about phishing and similar activities. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.

    |

  • Spamdexing

    Spamdexing

    An article about the practice of spamdexing. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.

    |

  • Spamming

    Spamming

    An article generally about spamming and similar activities. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.

    |

  • E-Mail Spam

    E-Mail Spam

    An article about e-mail spam. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.

    |