Asia-Pacific news

被引:0
|
作者
Kennedy, Gabriela [1 ]
机构
[1] Mayer Brown JSM, Hong Kong, Hong Kong, Peoples R China
关键词
Asia-Pacific; IT/Information technology; Communications; Internet; Media; Law;
D O I
10.1016/j.clsr.2014.12.004
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as 'alerts' and are not submitted as detailed analyses of cases or legal developments. (C) 2015 Gabriela Kennedy. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:150 / 156
页数:7
相关论文
共 50 条
  • [21] Asia-Pacific news
    Kennedy, Gabriela
    Doyle, Sarah
    Lui, Brenda
    Computer Law and Security Review, 2009, 25 (03): : 297 - 304
  • [22] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2012, 28 (04) : 492 - 500
  • [23] Asia-Pacific news
    Kennedy, Gabriela
    Computer Law and Security Review, 2015, 31 (05): : 710 - 715
  • [24] Asia-Pacific news
    Kennedy, Gabriela
    Tran, Hong
    Lee, Karen H. F.
    Goodman, Susan
    Clitheroe, Jordan
    Chia, Jillian
    Lim, Natalie
    Ngan, Karen
    Cameron, Lisa
    Nian, Lam Chung
    Clinch, Marcus
    Tsai, Alex
    Fotiadis, John
    COMPUTER LAW & SECURITY REVIEW, 2014, 30 (05) : 604 - 613
  • [25] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2017, 33 (03) : 406 - 414
  • [26] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2014, 30 (03) : 334 - 340
  • [27] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2012, 28 (06) : 714 - 726
  • [28] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2016, 32 (04) : 659 - 668
  • [29] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2013, 29 (04) : 462 - 471
  • [30] Asia-Pacific news
    Kennedy, Gabriela
    COMPUTER LAW & SECURITY REVIEW, 2012, 28 (02) : 242 - 248