Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Comparative and Foreign Law (15)
- State and Local Government Law (15)
- Intellectual Property Law (14)
- Computer Law (12)
- Internet Law (12)
-
- Privacy Law (12)
- Science and Technology Law (12)
- Criminal Law (9)
- International Law (9)
- Civil Law (8)
- Courts (7)
- Legal History (7)
- Civil Procedure (6)
- Legislation (6)
- Constitutional Law (5)
- Judges (4)
- Litigation (4)
- Transnational Law (4)
- European Law (3)
- Family Law (3)
- Housing Law (3)
- International Trade Law (3)
- Jurisprudence (3)
- Law and Society (3)
- Property Law and Real Estate (3)
- Administrative Law (2)
- Civil Rights and Discrimination (2)
- Criminal Procedure (2)
- Environmental Law (2)
- Publication
- Publication Type
Articles 1 - 30 of 56
Full-Text Articles in Law
Haitians: Seeking Refuge In The United States, 7 Geo. Immigr. L.J. 747 (1993), Joyce A. Hughes, Linda R. Crane
Haitians: Seeking Refuge In The United States, 7 Geo. Immigr. L.J. 747 (1993), Joyce A. Hughes, Linda R. Crane
UIC Law Open Access Faculty Scholarship
No abstract provided.
Survey Of Illinois Law: Tort Developments, 17 S. Ill. U. L.J. 961 (1993), Kenneth Kandaras
Survey Of Illinois Law: Tort Developments, 17 S. Ill. U. L.J. 961 (1993), Kenneth Kandaras
UIC Law Open Access Faculty Scholarship
No abstract provided.
In A Conflict Between Equal Rights For Women And Customary Law, The Botswana Court Of Appeal Chooses Equality, 24 U. Tol. L. Rev. 563 (1993), Michael P. Seng
In A Conflict Between Equal Rights For Women And Customary Law, The Botswana Court Of Appeal Chooses Equality, 24 U. Tol. L. Rev. 563 (1993), Michael P. Seng
UIC Law Open Access Faculty Scholarship
No abstract provided.
Family Values And The Supreme Court, 25 Conn. L. Rev. 427 (1993), Linda R. Crane
Family Values And The Supreme Court, 25 Conn. L. Rev. 427 (1993), Linda R. Crane
UIC Law Open Access Faculty Scholarship
No abstract provided.
Family Surrogate Laws: A Necessary Supplement To Living Wills And Durable Powers Of Attorney, 38 Vill. L. Rev. 103 (1993), Ardath A. Hamann
Family Surrogate Laws: A Necessary Supplement To Living Wills And Durable Powers Of Attorney, 38 Vill. L. Rev. 103 (1993), Ardath A. Hamann
UIC Law Open Access Faculty Scholarship
No abstract provided.
Reverse Mortgages: A Financial Planning Device For The Elderly, 1 Elder L.J. 75 (1993), Celeste M. Hammond
Reverse Mortgages: A Financial Planning Device For The Elderly, 1 Elder L.J. 75 (1993), Celeste M. Hammond
UIC Law Open Access Faculty Scholarship
An analysis of the merits of reverse mortgages from individual and public policy perspectives is the subject of Professor Hammond's article. She argues that the elderly's typical "house rich, but cash poor" problem warrants approval of a method which allows the elderly to tap their home equity for income purposes while allowing them to remain in their homes. Professor Hammond analyzes other means for tapping equity and finds each lacking in its ability to accomplish the stated goal. She also describes the three types of reverse mortgages currently available. Finally, Professor Hammond sets forth a list of legal issues that …
Restitution For Intangible Gains, 54 La. L. Rev. 339 (1993), Paul T. Wangerin
Restitution For Intangible Gains, 54 La. L. Rev. 339 (1993), Paul T. Wangerin
UIC Law Open Access Faculty Scholarship
No abstract provided.
The First Amendment Right To Petition Government For A Redress Of Grievances: Cut From A Different Cloth, 21 Hastings Const. L.Q. 15 (1993), Julie M. Spanbauer
The First Amendment Right To Petition Government For A Redress Of Grievances: Cut From A Different Cloth, 21 Hastings Const. L.Q. 15 (1993), Julie M. Spanbauer
UIC Law Open Access Faculty Scholarship
No abstract provided.
A Multidisciplinary Analysis Of The Structure Of Persuasive Arguments, 16 Harv. J.L. & Pub. Pol'y 195 (1993), Paul T. Wangerin
A Multidisciplinary Analysis Of The Structure Of Persuasive Arguments, 16 Harv. J.L. & Pub. Pol'y 195 (1993), Paul T. Wangerin
UIC Law Open Access Faculty Scholarship
No abstract provided.
Religion And The Law In The Commonwealth Of Independent States And The Baltic Nations, 4 Touro J. Transnat'l L. 103 (1993), Ralph Ruebner, Mary L. Martin, Carolyn H. Gasey
Religion And The Law In The Commonwealth Of Independent States And The Baltic Nations, 4 Touro J. Transnat'l L. 103 (1993), Ralph Ruebner, Mary L. Martin, Carolyn H. Gasey
UIC Law Open Access Faculty Scholarship
No abstract provided.
Charles Evans Hughes And The Blaisdell Decision: A Historical Study Of Contract Clause Jurisprudence, 72 Or. L. Rev. 513 (1993), Samuel R. Olken
Charles Evans Hughes And The Blaisdell Decision: A Historical Study Of Contract Clause Jurisprudence, 72 Or. L. Rev. 513 (1993), Samuel R. Olken
UIC Law Open Access Faculty Scholarship
No abstract provided.
Totem And The God Of The Philosophers: How A Freudian Vocabulary Might Clarify Constitutional Discourse, 35 J. Church & State 521 (1993), Joel R. Cornwell
Totem And The God Of The Philosophers: How A Freudian Vocabulary Might Clarify Constitutional Discourse, 35 J. Church & State 521 (1993), Joel R. Cornwell
UIC Law Open Access Faculty Scholarship
No abstract provided.
Promises To Keep: American Views Of Developments In Chinese Copyright Law, 6 Software L.J. 273 (1993), Mark E. Wojcik, Michael Osty
Promises To Keep: American Views Of Developments In Chinese Copyright Law, 6 Software L.J. 273 (1993), Mark E. Wojcik, Michael Osty
UIC Law Open Access Faculty Scholarship
No abstract provided.
Security Requirements And Evidentiary Issues In The Interchange Of Electronic Documents: Steps Toward Developing A Security Policy, 12 J. Marshall J. Computer & Info. L. 425 (1993), Peter N. Weiss
UIC John Marshall Journal of Information Technology & Privacy Law
As the business world turns from using paper to electronic documents, the security aspects of electronic documents must be examined. No law has dealt with the security of electronic documents. Therefore, guidelines for assessing the relative security of an electronic document compared to its paper counterpart is essential to the continuing success of the electronic document in the business world. Aspects of the legal admissibility of electronic documents follow that of traditional paper documents. A finding that a document, paper or electronic, is genuine and reliable allows it to pass the scrutiny of legal admissibility. In order to prove a …
The Impact Of Nafta On The United States Computer Industry: Why Trade Reforms Will Spark Increased Exports To Mexico, 12 J. Marshall J. Computer & Info. L. 467 (1993), Michelle A. Kaiser
The Impact Of Nafta On The United States Computer Industry: Why Trade Reforms Will Spark Increased Exports To Mexico, 12 J. Marshall J. Computer & Info. L. 467 (1993), Michelle A. Kaiser
UIC John Marshall Journal of Information Technology & Privacy Law
This article focuses on computer industry trade barriers in Mexico that the North American Free Trade Agreement (NAFTA) will eliminate. The two trade barriers that have caused problems for the U.S. in exporting computer products and services into Mexico are high protective tariffs and software piracy. NAFTA is needed by American vendors and manufacturers of computer products and services in order to keep from remaining as outsiders to Mexico’s market. This comment first discusses the background on trade relations between the United States and Mexico. It then demonstrates why NAFTA is essential to increased computer exports into Mexico, which includes …
The Best Mode Requirement In United States Patent Practice In 1993, 12 J. Marshall J. Computer & Info. L. 353 (1993), Kenneth R. Adamo
The Best Mode Requirement In United States Patent Practice In 1993, 12 J. Marshall J. Computer & Info. L. 353 (1993), Kenneth R. Adamo
UIC John Marshall Journal of Information Technology & Privacy Law
This article discusses the best mode requirement set forth in section 112 of the United States Patent Act. This requirement is unique to United States patent law and must be satisfied by every utility patent application filed with the United States Patent and Trademark Office. This article then discusses how decisions of the United States Court of Appeals for the Federal Circuit have helped clarify and refine the best mode requirement and its application to patents in the field of computer technology (i.e., In re Hayes Microcomputer Products). Then it discusses how these holdings have made this already difficult area …
E-Law: Legal Issues Affecting Computer Information Systems And System Operator Liability, 12 Computer L.J. 101 (1993), David Loundy
E-Law: Legal Issues Affecting Computer Information Systems And System Operator Liability, 12 Computer L.J. 101 (1993), David Loundy
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Legality Of Disassembly Of Computer Programs, 12 Computer L.J. 1 (1993), David L. Hayes
The Legality Of Disassembly Of Computer Programs, 12 Computer L.J. 1 (1993), David L. Hayes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Works For Hire Revisited: Aymes V. Bonelli, 12 Computer L.J. 17 (1993), Sue Ganske Mota
Works For Hire Revisited: Aymes V. Bonelli, 12 Computer L.J. 17 (1993), Sue Ganske Mota
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Computer Fraud And Abuse Act - A New Perspective: Let The Punishment Fit The Damage, 12 J. Marshall J. Computer & Info. L. 445 (1993), Joseph P. Daly
The Computer Fraud And Abuse Act - A New Perspective: Let The Punishment Fit The Damage, 12 J. Marshall J. Computer & Info. L. 445 (1993), Joseph P. Daly
UIC John Marshall Journal of Information Technology & Privacy Law
This comment discusses computer virus crimes under the Computer Fraud and Abuse Act of 1986. More specifically, it addresses the inadequate sentencing scheme of this act. The comment first discusses computer viruses in general and the Computer Fraud and Abuse Act. The comment proposes a new sentencing scheme by which individual sentences would be allocated according to the damages caused by a computer virus propagator. It also illustrates the utility of such a scheme in both current criminal and civil law. It then discusses the ways in which computer virus damages can be quantified. The conclusion of this comment is …
An Analysis That Is Not "Ad Hoc": The Bifurcated Uniform Analysis That The Federal Courts Should Follow To Determine Computer Program Copyright Nonliteral Infringement, 12 J. Marshall J. Computer & Info. L. 485 (1993), Michael J. Bendel
UIC John Marshall Journal of Information Technology & Privacy Law
This article examines the issues surrounding software copyright protection and the problem of inconsistent court analysis across the country. After reviewing the problems particular to software copyright, the author recommends a new course of court analysis that would bring consistent analysis and decisions to this growing area of law. Courts have begun to examine the scope of protection the Copyright Act grants to computer software beyond the literal text of the software's programming language. Two classifications for computer programs have developed: literal, which focuses on the actual text of the program, and non-literal, which is concerned with organization, structure and …
Recent Developments In Computer Law: An Update, 12 J. Marshall J. Computer & Info. L. 395 (1993), Bradley J. Hulbert
Recent Developments In Computer Law: An Update, 12 J. Marshall J. Computer & Info. L. 395 (1993), Bradley J. Hulbert
UIC John Marshall Journal of Information Technology & Privacy Law
This article provides an overview of case law that had developed in 1993 relating to computers, summarizing cases in the following fourteen areas of the law: 1. Administrative - This section briefs a case holding that the Bush Administration's e-mail records fell within the scope of the Federal Records Act. 2. Anti-trust - This section includes: an overview of a case defining "sham" lawsuits and a summary of a case holding that a large software firm's supplier requirements may define a relevant market for an anti-trust analysis. 3. Civil Procedure - This section gives a brief summary of a case …
Trespassers Will Be Prosecuted: Computer Crime In The 1990s, 12 Computer L.J. 61 (1993), Glenn D. Baker
Trespassers Will Be Prosecuted: Computer Crime In The 1990s, 12 Computer L.J. 61 (1993), Glenn D. Baker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The New Medium Of Expression: Introducing Virtual Reality And Anticipating Copyright Issues, 12 Computer L.J. 175 (1993), Greg S. Weber
The New Medium Of Expression: Introducing Virtual Reality And Anticipating Copyright Issues, 12 Computer L.J. 175 (1993), Greg S. Weber
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Patent Protection: A Problem-Solution Theory For Harmonizing The Precedent, 12 Computer L.J. 25 (1993), Lance L. Vietzke
Software Patent Protection: A Problem-Solution Theory For Harmonizing The Precedent, 12 Computer L.J. 25 (1993), Lance L. Vietzke
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Harmonization Of International Patent Law: Introduction, 26 J. Marshall L. Rev. 437 (1993), Donald S. Chisum
The Harmonization Of International Patent Law: Introduction, 26 J. Marshall L. Rev. 437 (1993), Donald S. Chisum
UIC Law Review
No abstract provided.
The Long, Strange Trip Of Willful And Wanton Misconduct And A Proposal To Clarify The Doctrine, 26 J. Marshall L. Rev. 363 (1993), Dan Groth Jr.
The Long, Strange Trip Of Willful And Wanton Misconduct And A Proposal To Clarify The Doctrine, 26 J. Marshall L. Rev. 363 (1993), Dan Groth Jr.
UIC Law Review
No abstract provided.
The Cause, Effect And Constitutional Consequence Of Unequal Funding: Public Education In Illinois, 26 J. Marshall L. Rev. 399 (1993), John F. Watson
The Cause, Effect And Constitutional Consequence Of Unequal Funding: Public Education In Illinois, 26 J. Marshall L. Rev. 399 (1993), John F. Watson
UIC Law Review
No abstract provided.
Jaws Xvi: The Exceptions That Ate Rule 220, 26 J. Marshall L. Rev. 189 (1993), Charles W. Chapman
Jaws Xvi: The Exceptions That Ate Rule 220, 26 J. Marshall L. Rev. 189 (1993), Charles W. Chapman
UIC Law Review
No abstract provided.
An Overview Of Changes To The Patent Law Of The United States After The Patent Law Treaty, 26 J. Marshall L. Rev. 497 (1993), Richard C. Wilder
An Overview Of Changes To The Patent Law Of The United States After The Patent Law Treaty, 26 J. Marshall L. Rev. 497 (1993), Richard C. Wilder
UIC Law Review
No abstract provided.