Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (20)
- Internet Law (20)
- Science and Technology Law (20)
- Intellectual Property Law (7)
- Constitutional Law (6)
-
- Legal Education (4)
- Legal Writing and Research (4)
- Criminal Law (3)
- Law and Society (3)
- State and Local Government Law (3)
- Civil Law (2)
- Civil Rights and Discrimination (2)
- Communications Law (2)
- Contracts (2)
- Entertainment, Arts, and Sports Law (2)
- Health Law and Policy (2)
- Juvenile Law (2)
- Legal History (2)
- Medical Jurisprudence (2)
- Public Law and Legal Theory (2)
- Sexuality and the Law (2)
- Torts (2)
- Bankruptcy Law (1)
- Civil Procedure (1)
- Consumer Protection Law (1)
- Courts (1)
- Disability Law (1)
- Family Law (1)
- Institution
- Keyword
-
- Abortion (1)
- Antipsychotic medication (1)
- Can Mental Health Professionals Predict Judicial Decisionmaking Constitutional and Tort Liability Aspects of the Right of the Institutionalized Mentally Disabled to Refuse Treatment (1)
- Constitutional law (1)
- Constitutional litigation (1)
-
- Courts (1)
- Involuntarily committed (1)
- Jurisdiction (1)
- Mental illness (1)
- Mentally ill (1)
- Michael L. Perlin (1)
- Mills v. Rogers (1)
- Perlin (1)
- Privacy (1)
- Project Release (1)
- Restrictive alternative (1)
- Right of privacy (1)
- Right of publicity (1)
- Right to refuse treatment (1)
- Rivers v. Katz (1)
- State statutory (1)
- Supreme Court (1)
- Tort law (1)
- Publication
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Privacy Law
The Right Of Publicity: Commercial Exploitation Of The Associative Value Of Personality, Sheldon W. Halpern
The Right Of Publicity: Commercial Exploitation Of The Associative Value Of Personality, Sheldon W. Halpern
Vanderbilt Law Review
For more than thirty years, dispute and confusion have marked the emergence and development of the so-called "right of publicity,"' a right that is concerned with the use of attributes of a generally identifiable person to enhance the commercial value of an enterprise. A dense, complex array of cases, accompanied by and analyzed in an even denser array of commentary, has been the vehicle for adumbrating the emergent right. Battle lines are drawn over whether the creature emerging from the fermenting ooze of modern mass communications is a species of "property" or a purely personal "privacy" interest."Everywhere one finds the …
Clark Memorandum: Fall 1986, J. Reuben Clark Law School, J. Reuben Clark Law Society
Clark Memorandum: Fall 1986, J. Reuben Clark Law School, J. Reuben Clark Law Society
The Clark Memorandum
- George Sutherland Chair
- "A Good Man" (Francis R. Kirkham)
- Rex Lee Returns
- To Test or Not to Test (Ira Glasser, Michael Goldsmith)
The Origin And Development Of Washington's Independent Exclusionary Rule: Constitutional Right And Constitutionally Compelled Remedy, Sanford E. Pitler
The Origin And Development Of Washington's Independent Exclusionary Rule: Constitutional Right And Constitutionally Compelled Remedy, Sanford E. Pitler
Washington Law Review
Underlying any court's analysis of the exclusionary rule are certain basic theoretical elements that determine whether a court takes a unitary or a bifurcated approach to exclusion. To determine what theoretical elements underlie the Washington rule, the court must familiarize itself with the state rule's long history of independent application, which has never been fully explored. The court must also recognize the historical relationship between the state exclusionary rule and certain provisions of the Declaration of Rights. 6 Analysis of the Washington exclusionary rule's development reveals that, at minimum, exclusion is constitutionally compelled as the most effective remedy available to …
Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield
Privacy, Abortion, And Judicial Review: Haunted By The Ghost Of Lochner, Helen Garfield
Washington Law Review
This article poses the question whether Lochner can finally be laid to rest without repudiating all applications of substantive due process, particularly protection of privacy and autonomy. The answer to that question requires a closer look at Lochner itself, and then at Griswold, Roe, and a few of the cases in between. The answers suggested by Ely, Perry, Choper, and others will then be discussed. Finally, this article will examine the ideas and ideals of the man who first conceived the common law right of privacy, Justice Louis D. Brandeis.
System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow
System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow
UIC Law Review
No abstract provided.
A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku
A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman
The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal
The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch
Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael
17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf
A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih
The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz
Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar
The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon
Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen
Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns
Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson
Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes
Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum
Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker
Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind
Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline
Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Can Mental Health Professionals Predict Judicial Decisionmaking? Constitutional And Tort Liability Aspects Of The Right Of The Institutionalized Mentally Disabled To Refuse Treatment: On The Cutting Edge, Michael L. Perlin
Touro Law Review
No abstract provided.
Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik
Aids: Testing Democracy - Irrational Responses To The Public Health Crisis And The Need For Privacy In Serologic Testing, 19 J. Marshall L. Rev. 835 (1986), Michael L. Closen, Susan Marie Connor, Howard L. Kaufman, Mark E. Wojcik
UIC Law Review
No abstract provided.
Privacy Implications Of Consumer Credit Protection Laws, 19 J. Marshall L. Rev. 941 (1986), Paul B. Rasor
Privacy Implications Of Consumer Credit Protection Laws, 19 J. Marshall L. Rev. 941 (1986), Paul B. Rasor
UIC Law Review
No abstract provided.
The Ninth Amendment: Source Of A Substantive Right To Privacy, 19 J. Marshall L. Rev. 959 (1986), Gerald G. Watson
The Ninth Amendment: Source Of A Substantive Right To Privacy, 19 J. Marshall L. Rev. 959 (1986), Gerald G. Watson
UIC Law Review
No abstract provided.
Conceptualizing National Identification: Informational Privacy Rights Protected, 19 J. Marshall L. Rev. 1007 (1986), Eric Grossman
Conceptualizing National Identification: Informational Privacy Rights Protected, 19 J. Marshall L. Rev. 1007 (1986), Eric Grossman
UIC Law Review
No abstract provided.