Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

UIC John Marshall Journal of Information Technology & Privacy Law

Journal

1989

Articles 1 - 22 of 22

Full-Text Articles in Privacy Law

Statutory Protection Of The Algorithm In A Computer Program: A Comparison Of The Copyright And Patent Laws, 9 Computer L.J. 125 (1989), Idelle R. Abrams Jan 1989

Statutory Protection Of The Algorithm In A Computer Program: A Comparison Of The Copyright And Patent Laws, 9 Computer L.J. 125 (1989), Idelle R. Abrams

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Microcode - Idea Or Expression?, 9 Computer L.J. 61 (1989), Robert Steinberg Jan 1989

Microcode - Idea Or Expression?, 9 Computer L.J. 61 (1989), Robert Steinberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Determining The Scope Of Copyright Protection For Computer/User Interfaces, 9 Computer L.J. 37 (1989), Janice M. Mueller Jan 1989

Determining The Scope Of Copyright Protection For Computer/User Interfaces, 9 Computer L.J. 37 (1989), Janice M. Mueller

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Assuring The Competency Of Computer-Generated Evidence, 9 Computer L.J. 103 (1989), Randy Snyder Jan 1989

Assuring The Competency Of Computer-Generated Evidence, 9 Computer L.J. 103 (1989), Randy Snyder

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Software Copyright Protection: Infringement And Eleventh Amendment Immunity, 9 Computer L.J. 163 (1989), Carl J. Franklin Jan 1989

Computer Software Copyright Protection: Infringement And Eleventh Amendment Immunity, 9 Computer L.J. 163 (1989), Carl J. Franklin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


"Even If A Stranger Could Create Such A Work . . ." Software, Piracy, And Implications Of The Implied Covenant Of Good Faith: Has The Sas Court Gone Too Far?, 9 Computer L.J. 145 (1989), William W. Toole Jan 1989

"Even If A Stranger Could Create Such A Work . . ." Software, Piracy, And Implications Of The Implied Covenant Of Good Faith: Has The Sas Court Gone Too Far?, 9 Computer L.J. 145 (1989), William W. Toole

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer-Ware: Protection And Evidence, An Israeli Draft Bill, 9 Computer L.J. 299 (1989), Moshe Shalgi Jan 1989

Computer-Ware: Protection And Evidence, An Israeli Draft Bill, 9 Computer L.J. 299 (1989), Moshe Shalgi

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright, Patent, And The Virtual Machine, 9 Computer L.J. 321 (1989), Richard L. Torczon Jan 1989

Copyright, Patent, And The Virtual Machine, 9 Computer L.J. 321 (1989), Richard L. Torczon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer-Aided Medicine: Present And Future Issues Of Liability, 9 Computer L.J. 177 (1989), Hope Mortimer Jan 1989

Computer-Aided Medicine: Present And Future Issues Of Liability, 9 Computer L.J. 177 (1989), Hope Mortimer

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computerized Check Processing De Minimus Errors In Check Description On Stop Payment Orders, 9 Computer L.J. 205 (1989), Rosario Herrera Jan 1989

Computerized Check Processing De Minimus Errors In Check Description On Stop Payment Orders, 9 Computer L.J. 205 (1989), Rosario Herrera

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computerized Knowledge Representation And Common Law Reasoning, 9 Computer L.J. 223 (1989), Ronald N. Weikers, David C. Shelton Jan 1989

Computerized Knowledge Representation And Common Law Reasoning, 9 Computer L.J. 223 (1989), Ronald N. Weikers, David C. Shelton

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Unfulfilled Promise: Use Of Computers By And For Legislatures, 9 Computer L.J. 73 (1989), Robert L. Stoyles Jan 1989

The Unfulfilled Promise: Use Of Computers By And For Legislatures, 9 Computer L.J. 73 (1989), Robert L. Stoyles

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyrighting Machine Language Computer Software - The Case Against, 9 Computer L.J. 1 (1989), Mark M. Friedman Jan 1989

Copyrighting Machine Language Computer Software - The Case Against, 9 Computer L.J. 1 (1989), Mark M. Friedman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Individual Privacy And Governmental Efficiency: Technology's Effect On The Government's Ability To Gather, Store, And Distribute Information, 9 Computer L.J. 359 (1989), C. Dennis Southard Iv Jan 1989

Individual Privacy And Governmental Efficiency: Technology's Effect On The Government's Ability To Gather, Store, And Distribute Information, 9 Computer L.J. 359 (1989), C. Dennis Southard Iv

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Preemption Of State Law By Copyright Law, 9 Computer L.J. 375 (1989), Deborah Kemp Jan 1989

Preemption Of State Law By Copyright Law, 9 Computer L.J. 375 (1989), Deborah Kemp

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Meeting Educational Challenges In The Information Age: Tax Incentives To Encourage Donations Of Computer Equipment To Elementary And Secondary Schools, 9 Computer L.J. 391 (1989), Richard A. Cohn Jan 1989

Meeting Educational Challenges In The Information Age: Tax Incentives To Encourage Donations Of Computer Equipment To Elementary And Secondary Schools, 9 Computer L.J. 391 (1989), Richard A. Cohn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane Jan 1989

Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Licenses As Personal Service Contracts, 9 Computer L.J. 491 (1989), Terrence W. Thompson Jan 1989

Software Licenses As Personal Service Contracts, 9 Computer L.J. 491 (1989), Terrence W. Thompson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Of Computer Display Screens: Summary And Suggestions, 9 Computer L.J. 417 (1989), Gregory C. Damman Jan 1989

Copyright Of Computer Display Screens: Summary And Suggestions, 9 Computer L.J. 417 (1989), Gregory C. Damman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Performance Standards Under Article 2 Of The Uniform Commercial Code, 9 Computer L.J. 465 (1989), James H. Salter Jan 1989

Software Performance Standards Under Article 2 Of The Uniform Commercial Code, 9 Computer L.J. 465 (1989), James H. Salter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Vendors' Exposure To Products Liability For Computer Viruses, 9 Computer L.J. 509 (1989), Roland B. Desilets Jr. Jan 1989

Software Vendors' Exposure To Products Liability For Computer Viruses, 9 Computer L.J. 509 (1989), Roland B. Desilets Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Navigating Uncharted Waters: The Opening Of Brazil's Software Market To Foreign Enterprise, 9 Computer L.J. 527 (1989), Mary S. White Jan 1989

Navigating Uncharted Waters: The Opening Of Brazil's Software Market To Foreign Enterprise, 9 Computer L.J. 527 (1989), Mary S. White

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.