Author: Liam Curren and Jane Kaye Source: Computer law and security review. Vol. 26, no. 3, 2010, pp. 273-283 Category: Information Policy Date of Journal Issue: June 2010