Category: Technology & Digital Economy
-
IT Contract Management And Administration For Law Firms
Contract management is one area of the IT procurement process (whether for hardware or for software) that is often overlooked.
|
-
Online Gambling Laws in Singapore
Introduction Singapore laws strictly prohibit gambling and the advertising or promotion of gambling venues. Only limited exceptions exist. This article looks at the gambling laws in Singapore and how they apply to online gambling. The principal legislation are the (1) Betting Act (“BA”); (2) Common Gaming Houses Act (“CGHA”); and (3) Broadcasting (Class License) Notification…
|
-
Cloaking A Website
Cloaking allows webserver administrators to draw a virtual curtain around a Web site to mask sensitive information from outsiders. It can make a website appears as if it has been abandoned to someone while to everyone else, the website appears as “business as usual”.
|
-
Trends in Phishing 2004
According to analysts, more than 57 million adults think that they have received a phishing email, while the Anti-Phishing Working Group estimates a 38 percent average monthly growth rate in phishing attacks.
|
-
Singapore Laws On The Internet 2005
A listing of Singapore Online legal resources found on the Internet.
|
-
GNU General Public License Under German Law
In the first known court ruling anywhere in the world on the legal effects of the GNU General Public License (“GPL”), the District Court of Munich I in Germany (the “Court”) in May 2004 decided that the provisions of the GPL are enforceable under German law. The lawsuit was initiated by one of the so-called…
|
-
Model Data Protection Code For The Private Sector v1.3 (June 2003)
This Model Code outlines the minimum requirements for the protection of personal information whether or not in the form of electronic data (“personal data”). The Model code was first drafted by the Legal Sub- Committee of the National Internet Advisory Committee (NIAC). It was subsequently opened for public consultation by the Media Development Authority (MDA)…
|
-
Invisible (Confidential) Information In Electronic Documents
Problems with Metadata in Electronic Documents.
|
-
Phishing
An article generally about phishing and similar activities. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.
|
-
Spamdexing
An article about the practice of spamdexing. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.
|
-
Spamming
An article generally about spamming and similar activities. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.
|
-
E-Mail Spam
An article about e-mail spam. It is part of our Anti-Spam series and is adapted from an article in http://www.wikipedia.org.
|


