Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1984

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 36

Full-Text Articles in Computer Law

The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen Oct 1984

The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen

Indiana Law Journal

No abstract provided.


The Challenge Of Computer-Crime Legislation: How Should New York Respond?, Amalia M. Wagner Oct 1984

The Challenge Of Computer-Crime Legislation: How Should New York Respond?, Amalia M. Wagner

Buffalo Law Review

No abstract provided.


Patenting Inventions That Embody Computer Programs Held As Trade Secrets—White Consolidated Industries V. Vega Servo-Control, 713 F.2d 788 (Fed. Cir. 1983), Ellen Lauver Weber Jul 1984

Patenting Inventions That Embody Computer Programs Held As Trade Secrets—White Consolidated Industries V. Vega Servo-Control, 713 F.2d 788 (Fed. Cir. 1983), Ellen Lauver Weber

Washington Law Review

An inventor develops a numerical control system that allows a computer program to control the complex operation of machine tools such as drill bits. One of the elements in the numerical control system is a trade secret available only from the inventor. The inventor would like to patent the system as a whole, but an inventor must generally disclose how the invention works in order to obtain a patent. Must this inventor completely disclose how the trade secret works in order to obtain a patent on the whole system? The Federal Circuit Court of Appeals said "yes" in White Consolidated …


Computer Retrieval – Drawing The Line?, Paul Thomas May 1984

Computer Retrieval – Drawing The Line?, Paul Thomas

Dalhousie Law Journal

The Master of the Rolls in England, Sir John Donaldson, said recently that he feared the use of a proliferation of useless materials from computers in presentations before the Court. He was probably echoing what Lord Diplock had to say for the House of Lords in Roberts Petroleum Ltd. v. Bernard Kenny Ltd. (in liquidation).1 In a lengthy per curiam speech, Lord Diplock in that case commented on the use sought to be made in the House of Lords and the Court of Appeal of previous unreported Court of Appeal judgments. The transcripts of shorthand notes of oral judgments rendered …


Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski Jan 1984

Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski

Michigan Journal of International Law

There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.


Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker Jan 1984

Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles Jan 1984

Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas Jan 1984

Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer Jan 1984

Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham Jan 1984

Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley Jan 1984

Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg Jan 1984

Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari Jan 1984

Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii Jan 1984

Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson Jan 1984

Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr. Jan 1984

Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson Jan 1984

Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan Jan 1984

Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz Jan 1984

Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen Jan 1984

Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar Jan 1984

Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr Jan 1984

Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle Jan 1984

Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey Jan 1984

Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr. Jan 1984

Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii Jan 1984

State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson Jan 1984

Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm Jan 1984

Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm

UIC Law Review

No abstract provided.


Copyright Protection Of Systems Control Software Stored In Read Only Memory Chips: Into The World Of Gulliver's Travels, Jon O. Webster Jan 1984

Copyright Protection Of Systems Control Software Stored In Read Only Memory Chips: Into The World Of Gulliver's Travels, Jon O. Webster

Buffalo Law Review

No abstract provided.


Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk Jan 1984

Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk

University of Richmond Law Review

The threat depicted in War Games has been both rebuked as impossible and highlighted as much closer to the realm of possibility than even the creators of the movie may have surmised. Regardless of the actual possibility of a creative mind breaking through the security of the North America Air Defense Command computer with an auto-dialing modem and the simple password "JOSHUA" the adventures of the curious "hackers" and the singularly-directed criminal have been widely publicized and have captured both the fear and respect of computer owners throughout the country.