Author: Pieter Kleve and Richard De Mulder Source: Computer law and security report. Vol. 24, no. 3, 2008, pp. 223-232. Category: Information Policy Date of Journal Issue: September 2008