Setting up a Web site - Managing the legal risks

被引:3
|
作者
Smith, GJH
机构
关键词
Internet; legal matters;
D O I
10.1108/10662249610127300
中图分类号
F [经济];
学科分类号
02 ;
摘要
Suggests that with the increasing sophistication and complexity of Web sites, and the prospect of serious business being done through them, a review of the legal aspects of the site should be an integral part of the site design process. Discusses different ways of setting up a Web site, some of the legal consequences that attach to each and some ways of managing the risk of liability.
引用
收藏
页码:24 / &
页数:8
相关论文
共 50 条
  • [1] Avoiding copyright and other legal pitfalls in setting up your Web site
    English, EP
    [J]. JOURNAL OF ADVERTISING RESEARCH, 1997, 37 (02) : 92 - 95
  • [2] The technical side of setting up a Web site
    [J]. Ind Distrib, 6 (99):
  • [3] CONSTRUCTION MANUAL - SETTING UP YOUR OWN WEB SITE
    CUTLER, M
    GRAY, M
    [J]. INTERNET WORLD, 1995, 6 (02): : 26 - 28
  • [4] Managing legal risk in web contracting
    Lambrick, John
    [J]. Telecommunication Journal of Australia, 2002, 52 (01)
  • [5] MANAGING PERSONNEL - WATCH OUT FOR THE LEGAL RISKS
    PARRY, AE
    [J]. DATA MANAGEMENT, 1983, 21 (10): : 42 - 45
  • [6] Managing Legal, Consumers and Commerce Risks in Phishing
    Dinna, N. M. N.
    Leau, Y. B.
    Habeeb, S. A. H.
    Yanti, A. S.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 26, PARTS 1 AND 2, DECEMBER 2007, 2007, 26 : 562 - +
  • [7] A MODEL FOR MANAGING PRIVATE COMPANY LEGAL RISKS AND HARNESSING LEGAL OPPORTUNITIES
    Miller, Sandra K.
    Greenberg, Penelope Sue
    Tucker, James J., III
    [J]. ATLANTIC LAW JOURNAL, 2013, 15 : 1 - 55
  • [8] Managing and monitoring Web site accessibility
    Abou-Zahra, Shadi
    [J]. COMPUTERS HELPING PEOPLE WITH SPECIAL NEEDS, PROCEEDINGS, 2006, 4061 : 192 - 198
  • [9] Legal risks of Web-based marketing
    Riff, IJ
    Okamoto, JK
    [J]. CD-ROM PROFESSIONAL, 1996, 9 (08): : 112 - 113
  • [10] Establishing web sites - Legal issues and risks
    Miller, N
    [J]. COMPUTERS & SECURITY, 1996, 15 (03) : 198 - 202