Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Telecommunications (14)
- Treaties (10)
- Satellites (9)
- Orbit (8)
- Space law (8)
-
- Access (6)
- Access to information (6)
- Data (6)
- Equitable access (5)
- Europe (5)
- Information (5)
- Regulation (5)
- Computers (4)
- Preemption (4)
- Broadcasting (3)
- Markets (3)
- Services (3)
- Technology (3)
- Change (2)
- General Agreement on Tariffs and Trade (2)
- Industries (2)
- Leases (2)
- Manufacturing (2)
- Sovereignty (2)
- Technology adoption (2)
- 1976 Copyright Act (1)
- Cable Television (1)
- Child (1)
- Copyright Owner's Dilemma (1)
- Council of Europe (1)
- Publication
- Publication Type
Articles 1 - 30 of 46
Full-Text Articles in Law
Satellite/Dish Antenna Technology: A Copyright Owner's Dilemma, Sydnee Robin Singer
Satellite/Dish Antenna Technology: A Copyright Owner's Dilemma, Sydnee Robin Singer
Indiana Law Journal
No abstract provided.
Scientific Evidence - An Introduction, Fredric I. Lederer
Scientific Evidence - An Introduction, Fredric I. Lederer
William & Mary Law Review
No abstract provided.
Free Speech And High Tech, Francis Dummer Fisher
Free Speech And High Tech, Francis Dummer Fisher
Michigan Law Review
A Review of Technologies of Freedom by Ithiel de Sola Pool and Teletext and Videotex in the United States: Market Potential, Technology, Public Policy Issues by John Tydeman, Hubert Lipinski, Richard P. Adler, Michael Nyhan and Laurence Zwimpfer.
Legal Framework Of Communications Programs In The European Space Agency, W. M. Thiebaut
Legal Framework Of Communications Programs In The European Space Agency, W. M. Thiebaut
Michigan Journal of International Law
The establishment of the ESC gave Europe the necessary impetus to start applications programs. In 1968, the third ESC ministerial meeting at Bad Godesberg, Federal Republic of Germany, unequivocally assigned space applications to ESRO, created the Committee of Senior Officials as an advisory board, and allocated a small budget for studies on application satellites. The Committee of Senior Officials set up a working group specifically to study possible European involvement in communication satellite programs. This working group consisted not only of representatives of the ESC and the space organizations ELDO and ESRO but also of the potential users of the …
Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers
Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers
Michigan Journal of International Law
To those advocating its use, reciprocity legislation is especially appropriate for the telecommunications industry. Only 5 percent of telecommunications equipment manufactured in the United States is exported for sale in other nations. Trade barriers, loyalty to domestic manufacturers and the importance of telecommunications to national defense systems have combined to restrict access to foreign markets in the telecommunications sector. To persuade other nations to increase market access in telecommunications, United States legislators added a requirement of reciprocity to two proposed bills, S.898 and H.R.5158. This note will examine these two bills, concluding that reciprocity is an inappropriate solution to United …
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Michigan Journal of International Law
There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Eugenics And Family Planning: Exploring The Yin And The Yang, George P. Smith Ii
Eugenics And Family Planning: Exploring The Yin And The Yang, George P. Smith Ii
Scholarly Articles
n order to combat genetic disease, genetic engineering may (and frequently does in fact) rely upon eugenics, the science that deals with the improvement of heredity. Stated simply, a positive eugenics program seeks to develop superior qualities in man through the propagation of his superior genes; with the positive eugenists seeking to produce a 'new breed' with keener and more creative intelligence. Contrariwise, a negative eugenics program attempts only to eliminate genetic weaknesses. When seen in application, positive eugenics programs encourage the fit and 'proper' individuals to reproduce, while negative eugenics programs discourage the less fit and those with inheritable …
Wrongful Death Of The Fetus: Viability Is Not A Viable Distinction, Sheryl Anne Symonds
Wrongful Death Of The Fetus: Viability Is Not A Viable Distinction, Sheryl Anne Symonds
Seattle University Law Review
This Comment reviews the history of tort law treatment of the fetus who is wrongfully injured or killed. The Comment discusses case history and wrongful death statutes, with a focus on Washington law. Finally, the Comment concludes that courts should ignore viability when deciding cases of fetal wrongful death.