Author: Christopher Kuner Source: . Computer law and security review. Vol. 25, no. 4, 2009, pp. 307-317. Category: Information Policy Date of Journal Issue: September 2009