1. Editorial Board. Issue 2 (April 2016) Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: ii Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Professional Board. Issue 2 (April 2016) Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: iii Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. The role of technology in the fight against human trafficking: Reflections on privacy and data protection concerns. Issue 2 (April 2016) Authors: Gerry QC, Felicity; Muraszkiewicz, Julia; Vavoula, Niovi Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 205 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. European National News. Issue 2 (April 2016) Authors: Pantlin, Nick Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 369 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. EU update. Issue 2 (April 2016) Authors: Burden, Kit Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 363 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. "Invalidator" strikes back: The harbour has never been safe. Issue 2 (April 2016) Authors: Tracol, Xavier Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 345 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Liability of domain name registries: Don't shoot the messenger. Issue 2 (April 2016) Authors: Truyens, M.; Van Eecke, P. Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 327 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. The new General Data Protection Regulation: Still a sound system for the protection of individuals?. Issue 2 (April 2016) Authors: de Hert, Paul; Papakonstantinou, Vagelis Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 179 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Car hacking: Navigating the regulatory landscape. Issue 2 (April 2016) Authors: Schellekens, Maurice Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 307 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Asia-Pacific news. Issue 2 (April 2016) Authors: Kennedy, Gabriela Journal: Computer law & security review Issue: Volume 32:Issue 2(2016) Page Start: 375 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗