Author: Rebecca Wong Source: Computer law and security review. Vol. 27, no. 1, 2011. pp. 53-57 Category: Information Policy Date of Journal Issue: March 2011