Author: Dara Hallinan and others Source: Computer Law and Security Review. Vol. 28, no. 3, 2012. pp.263-272. Category: Information Policy Date of Journal Issue: March 2013