T H E C O M P U T E R LAW A N D S E C U R I T Y R E P O R T
2 CLSR
over the ideas of a command driven program, a status screen depicting the status of the program's operations, or the use of particular command terms or symbols." Finally, Softklone contended that DCA had not complied with statutory formalities in that they had not displayed a proper copyright notice on all copies distributed after the registration. Citing the leading work on copyright, the judge held that placement of a notice did not have to be in the most obvious place, providing that it was sufficient to apprise anyone seeking to copy the work of the existence of the copyright. DCA had placed their copyright notice on the sign-on screen, which preceded the status screen and this was held to be sufficient. Softklone and its parent company were therefore permanently enjoined from manufacturing and distributing versions of its software clone which infringed the status screen of "Crosstalk." David Greaves, Editorial Panelist
screen was an infringement of its copyright registration on the screen. The registration which DCI had obtained was prima facie evidence of the validity of the copyright, and the burden was therefore on Softklone to produce evidence which questioned this validity. They claimed that the status screen was not copyrightable because it was a necessary expression of the idea underlying the status screen. There is an established rule of law that if there is only one way of expressing an idea, then to grant copyright protection would be to prevent use of the idea by society (Baker v Selden 101 US 99 (1879)). However where there are a number of different means of achieving a desired purpose, then the particular means chosen is not necessary to that purpose, hence there is copyrightable expression. In the present case, the judge distinguished those parts of the program that were 'ideas', which could be legally copied; and those parts which were 'expression', i.e. unrelated to how the program operated. As the defendant had copied non-essential aspects of the status screen, the judge found that there was a copyright that had been infringed. In granting copyright, the court was careful to point out that the court was not granting the plaintiff "control
The Report acknowledges the assistance of the US publication - The Computer Industry Litigation Reporter in tracing these case reports.
PUBLICATIONS DATA Intellectual property Intellectual Property Rights by Peggy A. Miller and Arthur J. Levene 1985 (Information Industry Association, 89pp. plus appendix) soft cover.
speech, prior restraints protecting publications, national security, business interests, etc.; anti-trust law and the media and the right of reporter's privilege. It contains articles, case notes, summaries and statutory references. Available from: Practising Law Institute, 810 7th Avenue, New York, NY
This work was commissioned by the Information Industry Association to provide its members with guidance in developing individual company intellectual property policies. Its purpose is to enable information executives to gain a basic understanding of the intellectual property laws and associated contract issues necessary to create intelligent copyright policies within their companies. There are sections on copyright, trademark, trade secret and semi-conductor chip protection. Chapter 2 examines contract issues and Chapter 3 discusses techniques for understanding and resolving certain common business oriented problems. The appendix contains various Copyright Office forms and circulars and other information. Available from: The Information Industry Association, 555 New Jersey Avenue NW Suite 800,
10019, USA. Telecommunications There are several books currently on the market dealing with different aspects of telecommunications. The first - Modern Telecommunication by E. Bryan Came, 1984 (Plenum Publishing, 293pp. $29.50 ISBN 0-306-41841-X takes a broad look at contemporary telecommunications including information on the motives driving the telecommunications industry on new media and services and on advancing technologies including digital facilities and their integration into the environment of future businesses and households. The author is conscious that the field contains much specialised jargon which he attempts to limit or explain in the course of describing telecommunications developments. It is well written and recommended for the person who wants to understand more about the exact nature and impact of the telecommunications revolution. Available from: Plenum Publishing, 233 Spring Street, New York, NY 10013, USA.
Washington DC 20001, USA. Communications law 'Communications Law 1986 - Course Handbook' by James C. Goodale, Chairman (Practising Law Institute, 1064 pp. and 1096 pp.) $40 Library of Congress No. 79-643817. This course handbook is one of about 150 published each year by the Practising Law Institute. Its primary function is to serve as an educational supplement to each programme. It may also be used as a reference manual by attorneys and related professionals unable to attend the sessions. The communications law programme took place in New York in November 1986. Vol. 1 looks closely at the press and television, examining libel law, the regulation of cable television, the media and the communications revolution, access to government information and the licensing and taxation of news vendors. Vol. 2 looks at the torts concerned with intrusion, disclosure of private facts, false light claims and disputes concerning misappropriation and the right of publicity. Other sections deal with advertising and commercial
second book - F o u n d a t i o n s in Business, Telecommunications Management by Kenneth C. Grover, 1986 (Plenum Publishing, 196pp). $18.95 ISBN The
0-306-42249-2, examines the implications of the continuing and rapidly accelerating technical advance of telecommunications for management. It considers the opportunities and constraints resulting from recent regulatory changes in the United States and elsewhere. The author discusses telecommunications planning, operations management and regulation and provides basic information on telecommunications systems, terminals, networks, switching and standards of service. The book is written for the decision makers of major telecommunications users, competing networks and services providers and 27
JULY - A U G U S T
THE C O M P U T E R LAW A N D S E C U R I T Y REPORT
telecommunications manufacturers facing major investment decisions. Available from: Plenum Publishing at the above address. (Prices 20% higher outside the US and Canada).
stationary satellite orbit and spectrum. Published in 1985 -, 315 pp. ISBN 0-89006-162-9 by Artech House, Inc., the document is available from Adtech Book Co., 28 Eaton Row, London SWlW 0JA.
The third book - From Telecommunications to Electronic Services by Robert Bruce, Jeffrey Cunard and Mark Director, 1986 (Butterworths, 597 pp.) £27 hardcover. ISBN 0-88063-103-1, contains the report of the study of telecommunications structures carried out by the International Institute of Communications. The study is an attempt to describe in a comprehensive way what is happening in eight major industrialised countries, what are the international consequences of those developments, and how international, economic and technological pressures are requiring changes in national policy. The study is intended to assist government policy makers, users and service providers in deciding how to respond in an era of unprecedented change. It provides a detailed guide to the statutory and regulatory developments in telecommunications in the United States, Canada, Japan, the UK, Finland, France and the Federal Republic of Germany. The study would not have been possible without the support and contributions of dozens of people in the countries examined. In the UK support was provided by Oftel, British Telecom and the Department of Trade and Industry. The work is recommended as a valuable guide to developments, subject of course to the rider that it is only accurate as of the date of completion in August 1985. Available from: Butterworths, 88 Kingsway, London WC2B 6AB or from offices overseas.
Information Technology Law Information Technology and the Law, Chris Edwards and Nigel Savage, eds., 1986 (Macmillan Publishers 284pp.) £35 ISBN 0-333-41393-8. This work provides an introduction to the field of information technology law. Apart from the editors there are nine other well-known contributors to the study, including five members of the editorial and correspondents panel of The Report. The editors rightly point out at the beginning that "it is vital professionals involved with information technology understand the impact of the law." There are twelve chapters in the book, each of which provides a basic introduction to the topic dealt with including: liability of information producers; negotiation performance and enforcement of contract; software protection; UK data privacy; transborder data flows; the law relating to computer bureaux; computer-related crime; legal issues of employing computer personnel; telecommunications and the law; computer insurance and intellectual property law reform. The book is directly aimed at data processing, information systems and computer professionals who need to know of the legal constraints upon their discipline. Available from: Macmillan Distribution Ltd., Houndmills, Basingstoke, Hants. RG21 2XS.
The next study, entitled Telecommunications for Development: Exploring New Strategies - An International Forum, contains the papers of a conference on the subject which took place in October 1986 in New York. The conference was sponsored by Intelsat (the non-profit cooperative of 112 countries that owns and operates the global communications satellite system) by New York University Department of Interactive Telecommunications, by the Economic Development Foundation, (a Washington DC based group concerned with information resources and informatics for economic and social development) and by the Intergovernmental Bureau for Informatics based in Italy that promotes electronics technologies to benefit developing countries. The purpose of the conference was to examine the efforts of countries to include telecommunications within the broader scope of national development. A major focus was the communications crisis in the developing countries which has contributed to stagnant economic conditions and human deprivation in those regions. Other topics examined include the financing of telecommunication projects, the critical need for training and education programmes in the field and the role of key international organisations. For further information contact: Intelsat, 3400 International Drive NW, Washington DC 20008-3098 USA.
The information industry The Changing World Information Industry, Satoshi Kuwahara, 1985 (Atlantic Institute for International Affairs, 71 ppo) ISSN 0571 77 95. This work is the product of the Institute's programme devoted to the study of the policy and institutional impact of information technology. The dramatic growth of the technology has caused rapid and marked changes in world economic structures. An appreciation of the implications has not kept pace; policy makers and the industries themselves have only recently begun to study the issues. This paper seeks to describe the changes in industrial direction which have been taking place, to articulate reactions of policy makers and industrial strategists to these changes, and to draw some tentative conclusions. The author comes from the Japanese Ministry for International Trade and Industry. He writes in a clear style supporting his text with useful references. Sections deal with the integration of the information industry; changes in government regulatory policies; the strategy of the firm; government policies and technology - the market and policy. Available from: The Atlantic Institute for International Affairs, 9 Avenue Hoche, 75008 Paris, France. Programming the Invisible Hand: the Computerisation of Korea and Taiwan by Maurice H. Crawford 1986 (Programme on Information Resources Policy, 138 pp). This study emerges as part of the programme on information resources policy jointly sponsored by Harvard University and the Center for Information Policy Research. It examines and analyses the computerisation of Taiwan and Korea whose manufacturers are already respected competitors of semiconductors, auxiliary equipment, components and parts, and finished computers. The study presents projections which suggest that by 1990 Korea and Taiwan will have a 5% share of the world's computer business. The study recommends a closer involvement of Taiwan and Korea in OECD consultations on economic policy and in GATT negotiations
The final study, entitled New Directions in Satellite Communications - Challenges for North and South, edited by Heather Eo Hudson, is also a conference report on an event which took place at the University of Texas in the autumn of 1984. The goal of the conference was to examine the relationship of "North" to "South" in terms of satellite applications and policy. The conference examined major initiatives and new satellite services in the industrialised world, and current and projected applications of satellite communications in the developing countries. It addressed requirements as well as policy issues, including financing, technology transfer, competition, and access to the geo28
T H E C O M P U T E R LAW A N D S E C U R I T Y R E P O R T
2 CLSR
Reporting Service Inc. PO Box 2039, Springfield, VA 22152, USA.
on trade in services. Available from: Programme on Information Resources Policy, Harvard University, 200 Aiken, Cambridge, MA 02138, USA.
The second work, International Transactions in Services - the Politics of Transborder Data Flows by Karl R Sauvant 1986 (Westview Press 372 pp). £24 ISBN 0-8133-0310-9, is the first book in the Atwater Series on the World Information Economy. The aim of the series is to "stimulate serious and informed discussion on the economic, commercial, legal and social implications of the information revolution." The study documents the emergence of the data industries, particularly the data service industries, and analyses the economic impact of transborder data flows. It reviews the importance of the service sector and the forces that shape the international services debate. It also considers the international publicpolicy framework for transborder data flows and the importance of data technologies which are likely to be at the centre of national economic development in years to come. The author is affiliated to the United Nations Centre on Transnational Corporations and a recognised expert in the field. The text is supported with statistical data and key policy documents contained in the annex. The work is strongly recommended. Available from: Wildwood Distribution Services, Unit 3 Lower Farnham Road, Alderahot, Hants, GU12 4DY.
Transnational Commerce Several studies have emerged recently on different aspects of international trade and information technology. Two studies come from the Organisation for Economic Cooperation and Development (OECD). The first, East West Technology Transfer - The Transfer of Western Technology to the USSR, by Maurice Bornstein, 1985 (OECD 190 pp.) £14 ISBN 92-64-12779-8 provides a detailed study of the transfer of technology to the USSR from the developed market economies in the OECD. It examines the Soviet interest in Western technology, the modes of transfer of Western technology to the USSR and the impact of this transfer on the Soviet economy and on Soviet foreign trade. The study contains a great deal of background statistical information and other source data. It concludes that the contribution of Western technology to the growth and development of Soviet industry as a whole, though hard to measure, appears to be modest. The second OECD study entitled International Trade in Services - Audiovisual Works, 1986 (OECD 46pp.) 50 Francs ISBN 92-64-12860-3 is the third in a series on international trade in services. It reports on economic developments within the audiovisual works sector and analyses policies and measures maintained by OECD countries that affect international trade in this area. Audiovisual works are defined in the study as animated sequences of pictures that may be accompanied by sound material when they are recorded on a physical medium, eg film magnetic tape, video disc, etc; or are transmitted directly by cable, radiowaves, etc. and are used by one or more individuals or corporate bodies for private semi-commercial or commercial purposes and have a cultural, educational, scientific advertising or entertainment content. The study examines the economic role and development of the audiovisual sector; audiovisual policies and their development and measures affecting international trade in audiovisual services in OECD member countries. Both studies are available from the OECD, 2 rue Andre-Pascal, 75775 Paris, Cedex 16, France.
Transnational corporations Transnational Corporations in World Development, 3rd Survey, United Nations Centre on Transnational Corporations 1985 (Graham & Trotman Ltd., 304pp.) £44.50/US$79 (surface mail) £51/$90 (airmail) ISBN 0-86010-508-3. This volume is the major United Nations study on the operations and practices of transnational corporations. It examines the legislative framework in which transnational corporations operate, the foreign investment climate affecting them and the economic and business trends affecting their positions now and in the future. It suggests that if relations between governments and transnational corporations are to evolve in a mutually beneficial manner, it is essential as a minimum requirement that the expectations, rights and responsibilities of all sides should be known, understood and respected. It calls for the implementation of the proposed United Nations Code of Conduct on Transnational Corporations, the objective of which is to create a comprehensive international framework covering all important questions related to transnational corporations. A mass of statistical information supports the study including a league table and business statistics on the world's 385 largest industrial corporations. There are also extensive references at the end of each chapter. Available from Graham and Trotman Ltd., Sterling House, 66 Wilton Road, London SWlV 1DE.
There are two studies which focus more closely on transborder data flow questions. The first entitled Economic and Trade Related Aspects of Transborder Data Flow: Elements of a Code for Transnational Commerce by Ronald Wellington Brown, 1986 (Studentlitteratur AB/ChartwelI-Bratt Ltd. 93pp.) £10 ISBN 0-86238 examines the broad policy questions raised by the emerging information industry. The introduction comments that the m.erger of telecommunications and computers is producing new information products and services. The resulting industry is receiving increased global attention because of its significance for economic growth and international trade. Existing policies, practices and arrangements covering telecommunications, computers, communication and trade will need to be reviewed in the light of these developments. There are sections on information flow and national sovereignty, the nature of international information transfers, proposals for a model code for transnational commerce and analysis of the legal principles governing TBDF. Available from: Transnational Data Report, Van Eeghenlaan 24, 1071 EN Amsterdam, The Netherlands or Transnational Data
Computer and data security Audit and Control of Computer Networks, I.J. Douglas and RJ. Olson 1986 (NCC Publications, 148pp.) £14.95 ISBN 0-85012-588-X. This book prov!des a useful introduction to security in wide area communications networks. It is written in non-technical language and covers all the main areas of concern. After an introduction to data communications and network control and security, it identifies various threats to security, including physical security, logical access control and the problem of hacking. Ways of protecting against typical threats are indicated with focus on data encryption and other methods of maintaining security in computer networks. Given the 29
JULY - A U G U S T
THE C O M P U T E R LAW AND S E C U R I T Y REPORT
lamentable state of corporate responses to computer security, this work is to be welcomed, for as it points out in its introduction, "many organisations are now almost totally dependent upon their communications networks. New system facifities and communications services have dramatically increased the amount of data being transmitted between computer installations and remote sites. It is clear that the availability, integrity and confidentiality of the data are essential for business success: communications networks must remain secure." Available from: John Wiley & Sons Ltd, Baffins Lane, Chichester, West Sussex PO19 1UD or The National Computing Centre Ltd., Oxford Road, Manchester M1 7ED.
Office modernisation Wiring Up the Workplace - A Practical Guide for Management, Roger Camrass and Ken Smith. 1986 (IBC Technical Services Ltd. 172pp.) ISBN 0-907882-66-5. The object of this book is to provide a comprehensive overview of the telecommunications applications likely to be found in most modern establishments with analysis of the network technologies and products that will be available to accommodate these requirements. With the increasing penetration of information technology into the workplace, there is a revolution in office communications. This requires planning well ahead for the introduction of new terminals and systems and avoiding being driven by day to day demands. The authors aim to provide an easy to understand guide to emerging communications needs within the office assisting the reader to select a suitable network and associated wiring scheme based on the understanding of the technologies currently available and those most likely to emerge in the future. The book also offers advice on project management associated with the installation of new facilities, including the selection of a reputable supplier, planning and installation and designing the cable scheme. Available from. IBC Technical Services Ltd., Bath House, 56 Holborn Viaduct, London ECIA 2EX.
Micro-data Security - Issues and Strategies for Business, Daniel J. Cronin 1986 (Prentice-Hall International, 281pp.) £16.50 ISBN 89303-672-2. The origin of this book dates back to the summer of 1985 when the author was watching the evening news. A report came on that provoked his attention. Authorities in Florida had raided the suburban headquarters of a teenage hacker band allegedly tapping into government installations. He comments further: "My immediate reaction was one of consternation - not another hacker siegel But as I listened further my reaction quickly turned to a mixture of irritation and disbelief. Authorities were reported as saying the wizard hackers had been responsible for moving NASA satellites electronically thousands of miles off-course in outer space. This book represents my commitment to challenging the many myths about computer security; my singleminded purpose is to dispel these myths and supplant them with facts." Written in the same upbeat manner as the author's comments above, this book sets out to dispose of ignorance and misunderstanding in microcomputer security. It aims to provide practical and achievable solutions to both hardware and software integrity. Topics covered include hardware theft, crash control, natural disasters, the micro environment, data back-up, DOS insecurity, access guarding, data encryption, the hardware and software approach, communications networking and security and management security controls. Available from: Prentice-Hall International 66 Wood Lane End, Hemel Hempstead, Herts HP2 4RG.
Dictionary of electronics Dictionary of Electrical, Electronics and Computer Abbreviations RR. Brown 1985 (Butterworths 237pp.) £19.95 ISBN 0-408-01210-2 This book is written to assist those trying to make their way through the jungle of acronyms and abbreviations deployed in the electronics industry. As the introduction states: "The sheer volume of abbreviations is often more of a hindrance than a help, particularly as there has been no general reference work to consult for guidance until now." The dictionary provides explanations for a wide range of acronyms and abbreviations peculiar to many activities including audio, video, computers, data and telecommunications, electrical and electronics engineering, fibre optics, instrumentation, lasers, micro-computers, microprocessors and manufacturing. Other dictionaries in the series include the Dictionary of Electronic Engineering, the Dictionary of Electronics and the Dictionary of Telecommunications. Available from: The Butterworth Group, Borough Green, Sevenoaks, Kent TN15 8P.
The Micro to Mainframe Connection, Penn Brumm 1986 (Tab Books Inc. 212pp.) £14.40 ISBN 0-8306-2637-9. This book is described as a source book for managers or systems planners who need speedy and accurate information on the latest innovations in micro-computer and mainframe integration possibilities. The study seeks to aid understanding of the techniques and principles of planning for the best use of available computer technology in the business environment. The book contains eight chapters dealing with micro and mainframe concepts, an overview of telecommunications, reasons for tying computers together, technical aspects of physical and data links between computers, technical considerations, security and protection, design and planning considerations and typical linking methods used by companies and service bureaux. There is an extensive appendix providing information on products and addresses of companies offering computer products and services. It should be noted that the book is written primarily for the US market. All the contact addresses in the appendix are therefore to American companies and suppliers. It is available in the UK from John Wiley & Sons Ltd., Baffins Lane, Chichester, West Sussex PO19 1UD.
Electronic warfare Introduction to Electronic Warfare, D. Curtis Schleher, 1986 (Adtech Book Co. Ltd. 559pp.) £61. ISBN 0-89006-142-4. The book covers a number of topics which are contained within the broad framework of the field generally known as electronic warfare. Its objective is to provide a broad overview for those working or interested in this field. As such the book is written primarily for graduate engineers who have a general appreciation of some facit of the electronic warfare field but wish to acquire a broader perspective of the overall field. Emphasis in the book is on radar-related electronic warfare applications, but also included is coverage of selected topics in communications, electronic weapon systems and command control and communications systems. Material in the book has been used to teach a number of five day short courses at George Washington University. Available from: Adtech Book Co. Ltd., 28 Eaton Row, London SwlW OJA.
30
T H E C O M P U T E R LAW A N D S E C U R I T Y R E P O R T
2 CLSR
Risk Management Risk Management Computers, Fraud and Insurance by Patrick M. Ardis and Michael J. Comer 1986 (McGraw-Hill Book Company (UK) Ltd.) hardcover £19.75 ISBN 0-07-084926-9 Approximately 75% of the book's contents are concerned with computer insurance (an appendix of check lists and policy wordings accounts for 50% of the book) and most of the policies analysed are of American origin and not available in the UK. The Lloyds wording is included (available in both the UK and the USA) as is that from the Guarantee Society (part of the General Accident Group) - the UK market leader in fidelity guarantee business. However, to be really useful to UK readers there should have been more UK wordings, and details of the computer fraud extensions that are offered by several UK insurance companies. Readers outside these two countries will find the book of considerably less value, unless American or British wordings are available in their country, or unless they buy the book for the security section and some general points on insurance. I have made the point when reviewing an Ardis/Comer seminar (1986-87 3 CLSR 31) that the strictly legal attitude, in which both insurer and insured call their lawyer in the event of a claim, is far less prevalent outside the USA. In the UK the intention of the insurance contract is still adhered to and it is rare for insurers to look for purely technical reasons to decline a claim. Much of the book is however influenced exclusively by the American attitude, and it is essential that the British reader filters and adjusts accordingly. Notwithstanding all this, I would not challenge the book's basic stance regarding insurance, which is that it is not a substitute for risk improvement, and that fidelity guarantee cover in particular should be seen as a catastrophe policy, with high limits and a high deductible. There is plenty here for the lover of the check list: a questionnaire on a variety of subjects from risk controls to corporate security policy and insurance. There is even a check list that will allow you to judge your security advisor and insurance broker! All food for thought, but again to be used with discretion, taking into account the nature of the risk and the budget available. The price was not disclosed with the review copy of this book, so I made some assumptions based on the cost of similar publications. 559 well filled pages. £60? £75? £19.75 is extremely good value, and should make it a compulsive buy for anyone remotely concerned with this subject, provided it is read with discretion. The complete novice who is unable to do this may be advised to keep well away from it.Available from McGraw-Hill Book Company (UK) Ltd, Shopperhangers Road, Maidenhead, Berks SL6 2QL.
Review by David Davies Computer Related Fraud Casebook, 1986 Edition Computer Crime Casebook, 1987 Edition Price: £50.00 each Both books are updates of previous BIS publications, and include cases that have appeared in the earlier editions, together with some more recent material. The computer related fraud book contains 193 cases, of which 32 relate to 198516. The computer crime book contains 142 cases, with 19 from 1986 and 37 from 1984/5. Each case is described fully, but without details to enable the indentification of either victim or culprit. These casebooks are therefore collections of details on losses, rather than legal
31
casebooks. Few of the incidents detailed have gone to court, apart from routine criminal proceedings. There is an introductory section to each casebook, drawing statistical and general conclusions. Like all statistics however, they need to be examined carefully. One newspaper, reviewing the casebooks, concluded that as the average number of reported cases has not increased computer crime is static. None of the statistical projections relate to computer crime or fraud as a whole, only to those cases included in the casebook. Some of the attempts to draw quite sophisticated statistical conclusions must be heavily qualified by this proviso. Apart from that, my only real criticisms of these casebooks is that they should have been more selective. The computer crime casebook is peppered with minor thefts of PC's from shops and business premises, and the computer fraud book with cases in which the computer was incidental to the crime, the criminal act being the falsification of data prior to entry. This is particularly true of the earlier cases in the book, the majority of which fall into this category, and it invalidates all the statistical conclusions if, like the writer, you consider that such incidents should not be counted as computer fraud.
Available from BIS Applied Systems, 20 Upper Ground, London SE1 9PN Review by David Davies FEATURED REVIEW Commercial Agreements and Competition Law: Practice and Procedure in the UK and EEC by Dr Nicholas Green published by Graham & Trotman, 1986. iSBN 0860107884. Price £89. Nicholas Green's book is a tour-de-force on commercial agreements and competition law. It comprises 745 pages of legal text (with around 40 lines to the page), a 31-page "Table of Cases," and 14 pages devoted to the "Contents." The book weighs just over 1.2 Kg, so it should also be a good exercise for the limp-wristed among its users. A better organised book on the subject than his work is not currently available. Two months ago, whilst visiting a large firm of solicitors in the City of London, I heard a senior partner experienced in the field describe it as an "excellent book." Hard-nosed legal practitioners rarely bestow such an accolade on books written by academics in law. In this case that honour is well-observed. The author, now a practising barrister, has written a good practical volume on the subject. The blurb on the paper sleeve of this hard-backed book claims that the book "will provide invaluable assistance not only to
practising lawyers but also to businessmen and their advisers dealing with the highly complex UK position." While this claim would be difficult for any but the most carping of critics to dispute, it undersells Nicholas Green's investigation in the book into the practical workings of EEC competition law. Around half of the work analyses the impact of Articles 85 and 86, Treaty of Rome, on commercial agreements and practices. And not only practitioners, businessmen (and women) and their advisers will find a good buy in the book. Law students, let alone their lecturers, on competition law courses should mark it down as essential reading on the subject. There is a danger, in stressing the book as a work on practice and procedure, that some academics without practice in the field might thumb their noses at it or think it unsuited for reading by their students. The very few who might be inclined towards such snobbery or view would be doing their law