Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Law
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, Rudolph J.R. Peritz
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, Rudolph J.R. Peritz
Articles & Chapters
No abstract provided.
A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku
A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman
The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal
The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch
Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael
17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf
A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih
The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz
Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar
The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon
Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen
Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns
Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson
Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes
Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum
Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker
Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind
Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline
Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.