• A
  • A
  • A
  • АБB
  • АБB
  • АБB
  • А
  • А
  • А
  • А
  • А
Обычная версия сайта
Найдено 12 публикаций
Сортировка:
по названию
по году
Статья
Zharova A. K., Lloyd I. J. Computer Law & Security Review. 2018. Vol.  34. No. 6. P. 1300-1313.
Добавлено: 15 марта 2019
Статья
Yu Q. Computer Law & Security Review. 2017. Vol. 33. No. 1. P. 103-111.
Добавлено: 1 декабря 2018
Статья
Quiang Yu. Computer Law & Security Review. 2017. Vol. 33. No. 1. P. 103-111.
Добавлено: 12 октября 2017
Статья
Savelyev A. Computer Law & Security Review. 2018. P. 550-561.
Добавлено: 2 декабря 2017
Статья
Lloyd I. J. Computer Law & Security Review. 2016.
Добавлено: 10 декабря 2016
Статья
Savelyev A. Computer Law & Security Review. 2016. P. 193-210.

In my previous publication I tried to show how personal data legislation may be used for achieving national sovereignty purposes[1]. In this one I will demonstrate how open source software may be used for achieving similar purposes. However, interplay between local copyright law, public procurement law and open source community norms create lots of issues relating to the legal status and ownership in modified software based on open source. It becomes especially actual in cases with so-called copyleft open source licenses, where a collision occures between copyright as an absolute right enforceable against the world and the copyleft provisions of license agreement, which may be treated as “rights in personam” enforceable only against the licensee. Exclusive right to derivative software as an independent object of copyright may come into conflict with restrictions inherited from incoming copyleft license. This paper provides an overview and analysis of such problems faced by Russian software developers attempting to comply with Russian import substitution provisions by using open source components. Although, it is based on Russian law, it may be applicable to other jurisdictions, since it is driven by general aspects of copyright law and its interaction with private international law and contract law. The paper concludes that the developer of software, containing code licensed under GPL or other copyleft provisions receives full exclusive right to the derivative software and can commercialize it as he sees appropriate, subject only to possible claims on breach of contract, not on copyright infringement. This opens wide perspectives for using open source components regardless of the type of license used as bricks for building de-globalized economy and society based on information sovereignty principles.

 

 

[1]Alexander Savelyev. Russia’s new personal data localization regulations: A step forward or a self-imposed sanction? // Computer Law & Security Review. Volume 32/1, 2016. P. 128-145.

 

 

 

Добавлено: 26 октября 2016
Статья
Zhuravlev M., Brazhnik T. Computer Law & Security Review. 2018. Vol. 34. No. 3. P. 496-507.
Добавлено: 15 декабря 2017
Статья
Savelyev A. Computer Law & Security Review. 2015. Vol. 32. No. 1. P. 128-145.

The paper represents one of the first comprehensive analyses of Russian personal data localization regulations, which became effective at September 1, 2015. This work describes in details the main components of the data localization mechanism: triggers of its application, scope, exemptions and enforcement. It also takes into account the official and non-official interpretations of the law by Russian regulators, some of which were developed with the participation of the author. Special consideration is given to the jurisdictional aspects of the Russian data protection legislation and the criteria of its application to foreign data controllers. The author also reveals the rationale behind the adoption of data localization provisions and analyzes their possible impact on foreign companies operating in Russia and implementation of innovative IT-technologies (Cloud computing, Big Data and Internet of Things). The paper concludes that the most of the potential benefits of data localization provisions lay in the area of public law: law enforcement activities and taxation. Nevertheless, data localization provisions may still have mid-term positive impact on privacy, since they force all stakeholders to revisit the basic concepts of existing personal data legislation (the notion of personal data, data controller, processing, etc.), thus serving as a driver for re-shaping existing outdated data privacy regulations and crafting something more suitable for the modern IT-environment.

Добавлено: 16 октября 2015
Статья
Savelyev A. Computer Law & Security Review. 2014. Vol. 30(5). No. 10. P. 560-568.

Today's business environment is no longer defined exclusively by bricks and mortar. Business models of software distribution are constantly evolving as new technologies develop. Traditional retail version of software products are mostly replaced with digital distribution of copies of software products. However, these ways of software distribution are by no means exhaustive. Functionality of software is not necessarily tied with provision of the copy of the relevant program to the user. Instead he can receive access to it via the Internet without the need to install software onto his computer. This type of business model received the name "Software-as-a-Service" (SaaS) or, sometimes "Cloud Computing". The legal nature of relations arising between the user and provider of distant access to such software is subject to considerable debate in Russia. The main problem is that at first glance it resembles the features of various types of contracts, recognized in the Civil Code of Russia, although not falling completely within any of them. At the same time the type of agreement chosen by the parties defines the legal framework, which governs relevant relations and relevant tax consequences. This article aims to analyze the nature of existing relations between the user and SaaS-provider and to define whether it can be characterised as a license, service, lease or some kind of sui generis contract. Based on the analysis the author comes to a conclusion that as delivery of copies of software becomes less and less relevant for the software industry, due to the new business models implemented by vendors, the rights to use the particular copy of software around which the traditional copyright regime has been built, become more and more superseded with the right to access such software. Thus traditional contractual models developed for IP distribution (license agreements, assignment agreements) and, more generally, the legal framework of existing copyright law that is centered on the core idea of the "use" of the copy, are no longer adequate regulators in the digital era where remote access to objects of copyright will soon start to dominate.

Добавлено: 19 декабря 2013
Статья
Nurullaev R., Dimita G. Computer Law & Security Review. 2019. Vol. 35. No. 2. P. 157-172.
Добавлено: 3 марта 2019
Статья
Zharova A. K., Elin V. Computer Law & Security Review. 2017. Vol. 33. No. 4. P. 482-501.

В статье рассматривается влияние технологии больших данных на конституционные права российских граждан на частную жизнь и обеспечение безопасности персональных данных. В Российской Федерации существует ряд нормативных актов, охватывающих вопросы конфиденциальности и защиты данных, но они оказываются недостаточными для защиты прав граждан в условиях все более широкого использования массивных наборов данных и их анализа с помощью инструментов Big Data. Одна из конкретных проблем в этой связи заключается в том, что наборы данных анонимных записей, которые в настоящее время не охватываются законами о персональных данных (поскольку они не идентифицируют физических лиц), могут фактически использоваться для идентификации субъектов данных (лиц, к которым относятся данные) при их объединении и анализе с использованием инструментов больших данных. Кроме того, действующие санкции за неправомерное использование персональных данных являются незначительными и зачастую не служат сдерживающим фактором в тех случаях, когда коммерческие выгоды от использования пользовательских данных (например, с помощью целевой рекламы) намного больше. С точки зрения компаний, обрабатывающих большие данные, общая путаница в отношении определений и обязанностей затрудняет соблюдение закона, оставляя большинство из них для разработки своих собственных форм наилучшей практики, а не для выполнения четких отраслевых рекомендаций. В статье рассматриваются существующие законы и надзорные органы, обсуждается вопрос о том, насколько существующие положения недостаточны для решения новых проблем, связанных с большими данными, и предлагаются рекомендации по изменению и обновлению существующих законов и политики.

Добавлено: 12 июня 2017
Статья
Nurullaev R. Computer Law & Security Review. 2017. Vol. 33. No. 2. P. 211-222.
Добавлено: 21 октября 2016