Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Privacy Law

Straining The Capacity Of The Law: The Idea Of Computer Crime In The Age Of The Computer Worm, 11 Computer L.J. 299 (1991), Brenda Nelson Dec 1990

Straining The Capacity Of The Law: The Idea Of Computer Crime In The Age Of The Computer Worm, 11 Computer L.J. 299 (1991), Brenda Nelson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Litigate And Arbitrate: A Hybrid Method Of Alternative Dispute Resolution, 10 Computer L.J. 517 (1990), Dennis S. Deutsch Jan 1990

Litigate And Arbitrate: A Hybrid Method Of Alternative Dispute Resolution, 10 Computer L.J. 517 (1990), Dennis S. Deutsch

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Crime And The Computer Fraud And Abuse Act Of 1986, 10 Computer L.J. 71 (1990), Christopher D. Chen Jan 1990

Computer Crime And The Computer Fraud And Abuse Act Of 1986, 10 Computer L.J. 71 (1990), Christopher D. Chen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Taxation Of Software Development Costs: Debugging The Proposed Regulations, 10 Computer L.J. 335 (1990), Wade R. Sjogren Jan 1990

Taxation Of Software Development Costs: Debugging The Proposed Regulations, 10 Computer L.J. 335 (1990), Wade R. Sjogren

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Nec V. Intel: A Guide To Using "Clean Room" Procedures As Evidence, 10 Computer L.J. 453 (1990), David S. Elkins Jan 1990

Nec V. Intel: A Guide To Using "Clean Room" Procedures As Evidence, 10 Computer L.J. 453 (1990), David S. Elkins

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Bulls & Bears & Bugs: Computer Investment Advisory Programs That Go Awry, 10 Computer L.J. 47 (1990), Wayne Hagendorf Jan 1990

Bulls & Bears & Bugs: Computer Investment Advisory Programs That Go Awry, 10 Computer L.J. 47 (1990), Wayne Hagendorf

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Hardware And Software Protection In Canada, 10 Computer L.J. 483 (1990), George E. Fisk, Jane E. Clark Jan 1990

Hardware And Software Protection In Canada, 10 Computer L.J. 483 (1990), George E. Fisk, Jane E. Clark

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Protection Against Foreign Competition In The United States, 10 Computer L.J. 393 (1990), Heon Hahm Jan 1990

Computer Protection Against Foreign Competition In The United States, 10 Computer L.J. 393 (1990), Heon Hahm

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram Jan 1990

Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Divestiture As A Legislative Solution To The Anti-Consumer Effects Of Airline Ownership Of Computer Reservation Systems, 10 Computer L.J. 1 (1990), John Evans Jan 1990

Divestiture As A Legislative Solution To The Anti-Consumer Effects Of Airline Ownership Of Computer Reservation Systems, 10 Computer L.J. 1 (1990), John Evans

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Scarlet Letter "A": Aids In A Computer Society, 10 Computer L.J. 233 (1990), M. Nicole Van Dam Jan 1990

The Scarlet Letter "A": Aids In A Computer Society, 10 Computer L.J. 233 (1990), M. Nicole Van Dam

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyrighted Software And Tying Arrangements: A Fresh Appreciation For Per Se Illegality, 10 Computer L.J. 413 (1990), Daniel Dik Jan 1990

Copyrighted Software And Tying Arrangements: A Fresh Appreciation For Per Se Illegality, 10 Computer L.J. 413 (1990), Daniel Dik

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Canada, Copyright, Computers: Impact And Analysis In An International Perspective Or From Gutenberg To Uruguay: Protecting The Soul Of A New Machine, 10 Computer L.J. 265 (1990), Peter Heeseok Kang Jan 1990

Canada, Copyright, Computers: Impact And Analysis In An International Perspective Or From Gutenberg To Uruguay: Protecting The Soul Of A New Machine, 10 Computer L.J. 265 (1990), Peter Heeseok Kang

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole Jan 1990

Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Small Business Reliance On Computer Software: There Should Be Protection, 10 Computer L.J. 635 (1990), Julie Delluomo Jan 1990

Small Business Reliance On Computer Software: There Should Be Protection, 10 Computer L.J. 635 (1990), Julie Delluomo

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Tax Returns And The Preparer Penalties, 10 Computer L.J. 551 (1990), Michael W. Traynham Jan 1990

Electronic Tax Returns And The Preparer Penalties, 10 Computer L.J. 551 (1990), Michael W. Traynham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Joint Ventures In The Semiconductor Industry, 10 Computer L.J. 581 (1990), Brian E. Whitley Jan 1990

Joint Ventures In The Semiconductor Industry, 10 Computer L.J. 581 (1990), Brian E. Whitley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Normative Analysis Of Disclsoure, Privacy, And Computers: The State Cases, 10 Computer L.J. 603 (1990), Eve H. Karasik Jan 1990

A Normative Analysis Of Disclsoure, Privacy, And Computers: The State Cases, 10 Computer L.J. 603 (1990), Eve H. Karasik

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Privacy: The Workplace Issue Of The '90s, 23 J. Marshall L. Rev. 591 (1990), David F. Linowes, Ray C. Spencer Jan 1990

Privacy: The Workplace Issue Of The '90s, 23 J. Marshall L. Rev. 591 (1990), David F. Linowes, Ray C. Spencer

UIC Law Review

No abstract provided.


The Electronic Communications And Privacy Act: Discriminatory Treatment For Similar Technology, Cutting The Cord Of Privacy, 23 J. Marshall L. Rev. 661 (1990), Timothy R. Rabel Jan 1990

The Electronic Communications And Privacy Act: Discriminatory Treatment For Similar Technology, Cutting The Cord Of Privacy, 23 J. Marshall L. Rev. 661 (1990), Timothy R. Rabel

UIC Law Review

No abstract provided.


Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen Jan 1990

Florida Star V. B.J.F.: The Rape Of The Right To Privacy, 23 J. Marshall L. Rev. 731 (1990), Barbara Lynn Pedersen

UIC Law Review

No abstract provided.


New York V. Sullivan: Shhh .... Don't Say The A Word - Another Outcome-Oriented Abortion Decision, 23 J. Marshall L. Rev. 753 (1990), Christopher C. Kendall Jan 1990

New York V. Sullivan: Shhh .... Don't Say The A Word - Another Outcome-Oriented Abortion Decision, 23 J. Marshall L. Rev. 753 (1990), Christopher C. Kendall

UIC Law Review

No abstract provided.