Abstracts of Recent Articles and Literature
and sent to the President a bill to restore civilian control over the standards for safeguarding information stored in the nation's computers. Mr. Reagan is expected to sign the bill, the Computer Security Act of 1987. The act places responsibility for the Federal Government's computer security policy with the National Bureau of Standards. The Defense Department will retain authority only over classified national security information. The bill provides that Federal agencies do not have authority to monitor or control the use of unclassified computerized information in the private sector. The New York Times, December 24, 1987, p. A I0.
From the U.K. Shrink-Wrap Licensing, ChristopherJ. Millard. It has become common practice for software to be supplied in a sealed clear plastic package through which can be seen the terms ofa "licence agreemcnt" between the producer and the end-user. It typically includes a statement that unauthorized copies will not be made and use of the software will bc restricted to a single CPU. This article discusses the contractual status of shrink-wrap licences, protection of intellectual property rights, and exclusions and limitations of liability. The author concludes that, given the doubts about the enforceability of shrinkwrap licences and the widespread breach of, and practical impossibility of policing many provisions of such licences, it is perhaps time for a review of accepted industry practice. The Computer Law and Security Report, NovemberDecember 1987, pp. 8- I 1.
214
Radio Frequency Interfaces-Myths, Realities and a Practical Approach, Pamela L. Hughes. Computers, VDUs, communication tools, peripherals and other electronic equipment together with the interconnecting canes, all emit radiation. This is known as Radio Frequency Interference (RFI). These signals can be intercepted at a distance; data can be recreated and then video recorded or printed as hard copy. The basic equipment needed is inexpensive, readily available and not di~icult to assemble. There are several products currently available which claim to solve the problem, but there is only one satisfactory approach and that is to reduce the level of radiated signals so that they remain within the building. The means to reduce emissions include filtering techniques, low-cost shielding, specially designed circuits and cable suppression methods. The Computer Law and Security Report, NovemberDecember I987, pp. 14-15. Hong Kong Focus, Michael D. Pendleton. In Atari Inc. v. Video Technology Ltd. The Hong Kong Court of appeal refused to hold that copyright could subsist in computer software, deliberately leaving the issue open. However, there have been a number of interlocutory injunctions granted subsequent to Atari on copyright grounds. The Hong Kong superior courts may be saved from deciding the legally correct position because new copyright legislation will probably extend copyright to computer software. A Working Group on Computer Related Crime suggests that existing laws are inadequate to deal with a number of offences related to unauthorised use of computers and the informa-
tion they contain. The Computer Law and Security Report, NovemberDecember 1987, pp. 18-20.
From Australia Remote Identification and Authentication o f Computer Resource Users, Ken Weiss. Several steps need to be taken to ensure the safety ofcomputerised data. Privilege definition and encryption are important, but the most basic step is to limit access to resources to positively identified authorised users. Recognised methods of identification exist; employing them conveniently and affordably has been a problem. Recent advances make possible a new technology which can be used to provide access to authorised users and has applications including physical identification. Computer Control Quaterly, Autumn 1987, pp. 1-5. Security in the VM Environment, William H. Murray. This article describes the appearance of the VM system, both to its users and managers, pointing out the security properties, functions and features and noting their limitations. It identifies a number of products that may be useful in extending management's control over VM and its users and describes the application of some. It recommends a number of control strategies and security practices that management may find useful in achieving its security and control objectives. Computer Control Quarterly, Autumn I987, pp. 18-23. Security Planning for EFT Network Systems, A.D. Davies. This article considers the risks and some key controls that need to be