Author: Yves Poullet Source: Computer law and security review. Vol. 25, no. 3, 2009, pp. 211-226. Category: Information Policy Date of Journal Issue: September 2009