Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 22 of 22
Full-Text Articles in Privacy Law
Statutory Protection Of The Algorithm In A Computer Program: A Comparison Of The Copyright And Patent Laws, 9 Computer L.J. 125 (1989), Idelle R. Abrams
Statutory Protection Of The Algorithm In A Computer Program: A Comparison Of The Copyright And Patent Laws, 9 Computer L.J. 125 (1989), Idelle R. Abrams
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Microcode - Idea Or Expression?, 9 Computer L.J. 61 (1989), Robert Steinberg
Microcode - Idea Or Expression?, 9 Computer L.J. 61 (1989), Robert Steinberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Determining The Scope Of Copyright Protection For Computer/User Interfaces, 9 Computer L.J. 37 (1989), Janice M. Mueller
Determining The Scope Of Copyright Protection For Computer/User Interfaces, 9 Computer L.J. 37 (1989), Janice M. Mueller
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Assuring The Competency Of Computer-Generated Evidence, 9 Computer L.J. 103 (1989), Randy Snyder
Assuring The Competency Of Computer-Generated Evidence, 9 Computer L.J. 103 (1989), Randy Snyder
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software Copyright Protection: Infringement And Eleventh Amendment Immunity, 9 Computer L.J. 163 (1989), Carl J. Franklin
Computer Software Copyright Protection: Infringement And Eleventh Amendment Immunity, 9 Computer L.J. 163 (1989), Carl J. Franklin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Even If A Stranger Could Create Such A Work . . ." Software, Piracy, And Implications Of The Implied Covenant Of Good Faith: Has The Sas Court Gone Too Far?, 9 Computer L.J. 145 (1989), William W. Toole
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Ware: Protection And Evidence, An Israeli Draft Bill, 9 Computer L.J. 299 (1989), Moshe Shalgi
Computer-Ware: Protection And Evidence, An Israeli Draft Bill, 9 Computer L.J. 299 (1989), Moshe Shalgi
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright, Patent, And The Virtual Machine, 9 Computer L.J. 321 (1989), Richard L. Torczon
Copyright, Patent, And The Virtual Machine, 9 Computer L.J. 321 (1989), Richard L. Torczon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Aided Medicine: Present And Future Issues Of Liability, 9 Computer L.J. 177 (1989), Hope Mortimer
Computer-Aided Medicine: Present And Future Issues Of Liability, 9 Computer L.J. 177 (1989), Hope Mortimer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computerized Check Processing De Minimus Errors In Check Description On Stop Payment Orders, 9 Computer L.J. 205 (1989), Rosario Herrera
Computerized Check Processing De Minimus Errors In Check Description On Stop Payment Orders, 9 Computer L.J. 205 (1989), Rosario Herrera
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computerized Knowledge Representation And Common Law Reasoning, 9 Computer L.J. 223 (1989), Ronald N. Weikers, David C. Shelton
Computerized Knowledge Representation And Common Law Reasoning, 9 Computer L.J. 223 (1989), Ronald N. Weikers, David C. Shelton
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Unfulfilled Promise: Use Of Computers By And For Legislatures, 9 Computer L.J. 73 (1989), Robert L. Stoyles
The Unfulfilled Promise: Use Of Computers By And For Legislatures, 9 Computer L.J. 73 (1989), Robert L. Stoyles
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyrighting Machine Language Computer Software - The Case Against, 9 Computer L.J. 1 (1989), Mark M. Friedman
Copyrighting Machine Language Computer Software - The Case Against, 9 Computer L.J. 1 (1989), Mark M. Friedman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Individual Privacy And Governmental Efficiency: Technology's Effect On The Government's Ability To Gather, Store, And Distribute Information, 9 Computer L.J. 359 (1989), C. Dennis Southard Iv
Individual Privacy And Governmental Efficiency: Technology's Effect On The Government's Ability To Gather, Store, And Distribute Information, 9 Computer L.J. 359 (1989), C. Dennis Southard Iv
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Preemption Of State Law By Copyright Law, 9 Computer L.J. 375 (1989), Deborah Kemp
Preemption Of State Law By Copyright Law, 9 Computer L.J. 375 (1989), Deborah Kemp
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Meeting Educational Challenges In The Information Age: Tax Incentives To Encourage Donations Of Computer Equipment To Elementary And Secondary Schools, 9 Computer L.J. 391 (1989), Richard A. Cohn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane
Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Licenses As Personal Service Contracts, 9 Computer L.J. 491 (1989), Terrence W. Thompson
Software Licenses As Personal Service Contracts, 9 Computer L.J. 491 (1989), Terrence W. Thompson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Of Computer Display Screens: Summary And Suggestions, 9 Computer L.J. 417 (1989), Gregory C. Damman
Copyright Of Computer Display Screens: Summary And Suggestions, 9 Computer L.J. 417 (1989), Gregory C. Damman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Performance Standards Under Article 2 Of The Uniform Commercial Code, 9 Computer L.J. 465 (1989), James H. Salter
Software Performance Standards Under Article 2 Of The Uniform Commercial Code, 9 Computer L.J. 465 (1989), James H. Salter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Vendors' Exposure To Products Liability For Computer Viruses, 9 Computer L.J. 509 (1989), Roland B. Desilets Jr.
Software Vendors' Exposure To Products Liability For Computer Viruses, 9 Computer L.J. 509 (1989), Roland B. Desilets Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Navigating Uncharted Waters: The Opening Of Brazil's Software Market To Foreign Enterprise, 9 Computer L.J. 527 (1989), Mary S. White
Navigating Uncharted Waters: The Opening Of Brazil's Software Market To Foreign Enterprise, 9 Computer L.J. 527 (1989), Mary S. White
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.