IVIR
Previous post
Private Copying and Downloading from Unlawful Sources
Next post
Do data protection rules protect the individual and should they? An assessment of the proposed General Data Protection Regulation