Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 46

Full-Text Articles in Law

Satellite/Dish Antenna Technology: A Copyright Owner's Dilemma, Sydnee Robin Singer Jul 1984

Satellite/Dish Antenna Technology: A Copyright Owner's Dilemma, Sydnee Robin Singer

Indiana Law Journal

No abstract provided.


Scientific Evidence - An Introduction, Fredric I. Lederer May 1984

Scientific Evidence - An Introduction, Fredric I. Lederer

William & Mary Law Review

No abstract provided.


Free Speech And High Tech, Francis Dummer Fisher Feb 1984

Free Speech And High Tech, Francis Dummer Fisher

Michigan Law Review

A Review of Technologies of Freedom by Ithiel de Sola Pool and Teletext and Videotex in the United States: Market Potential, Technology, Public Policy Issues by John Tydeman, Hubert Lipinski, Richard P. Adler, Michael Nyhan and Laurence Zwimpfer.


Legal Framework Of Communications Programs In The European Space Agency, W. M. Thiebaut Jan 1984

Legal Framework Of Communications Programs In The European Space Agency, W. M. Thiebaut

Michigan Journal of International Law

The establishment of the ESC gave Europe the necessary impetus to start applications programs. In 1968, the third ESC ministerial meeting at Bad Godesberg, Federal Republic of Germany, unequivocally assigned space applications to ESRO, created the Committee of Senior Officials as an advisory board, and allocated a small budget for studies on application satellites. The Committee of Senior Officials set up a working group specifically to study possible European involvement in communication satellite programs. This working group consisted not only of representatives of the ESC and the space organizations ELDO and ESRO but also of the potential users of the …


Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers Jan 1984

Reciprocity In International Telecommunications Trade: A New Trade Barrier?, Sheryl Powers

Michigan Journal of International Law

To those advocating its use, reciprocity legislation is especially appropriate for the telecommunications industry. Only 5 percent of telecommunications equipment manufactured in the United States is exported for sale in other nations. Trade barriers, loyalty to domestic manufacturers and the importance of telecommunications to national defense systems have combined to restrict access to foreign markets in the telecommunications sector. To persuade other nations to increase market access in telecommunications, United States legislators added a requirement of reciprocity to two proposed bills, S.898 and H.R.5158. This note will examine these two bills, concluding that reciprocity is an inappropriate solution to United …


Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski Jan 1984

Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski

Michigan Journal of International Law

There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.


Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker Jan 1984

Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles Jan 1984

Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas Jan 1984

Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer Jan 1984

Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham Jan 1984

Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley Jan 1984

Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg Jan 1984

Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari Jan 1984

Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii Jan 1984

Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson Jan 1984

Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr. Jan 1984

Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson Jan 1984

Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan Jan 1984

Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz Jan 1984

Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen Jan 1984

Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar Jan 1984

Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr Jan 1984

Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle Jan 1984

Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey Jan 1984

Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr. Jan 1984

Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii Jan 1984

State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson Jan 1984

Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Eugenics And Family Planning: Exploring The Yin And The Yang, George P. Smith Ii Jan 1984

Eugenics And Family Planning: Exploring The Yin And The Yang, George P. Smith Ii

Scholarly Articles

n order to combat genetic disease, genetic engineering may (and frequently does in fact) rely upon eugenics, the science that deals with the improvement of heredity. Stated simply, a positive eugenics program seeks to develop superior qualities in man through the propagation of his superior genes; with the positive eugenists seeking to produce a 'new breed' with keener and more creative intelligence. Contrariwise, a negative eugenics program attempts only to eliminate genetic weaknesses. When seen in application, positive eugenics programs encourage the fit and 'proper' individuals to reproduce, while negative eugenics programs discourage the less fit and those with inheritable …


Wrongful Death Of The Fetus: Viability Is Not A Viable Distinction, Sheryl Anne Symonds Jan 1984

Wrongful Death Of The Fetus: Viability Is Not A Viable Distinction, Sheryl Anne Symonds

Seattle University Law Review

This Comment reviews the history of tort law treatment of the fetus who is wrongfully injured or killed. The Comment discusses case history and wrongful death statutes, with a focus on Washington law. Finally, the Comment concludes that courts should ignore viability when deciding cases of fetal wrongful death.