Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, Rudolph J.R. Peritz Jan 1986

Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, Rudolph J.R. Peritz

Articles & Chapters

No abstract provided.


A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku Jan 1986

A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto Jan 1986

Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz Jan 1986

Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman Jan 1986

The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal Jan 1986

The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch Jan 1986

Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael Jan 1986

17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf Jan 1986

A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih Jan 1986

The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz Jan 1986

Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar Jan 1986

The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon Jan 1986

Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen Jan 1986

Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns Jan 1986

Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson Jan 1986

Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes Jan 1986

Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum Jan 1986

Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker Jan 1986

Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind Jan 1986

Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline Jan 1986

Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.