Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 18 of 18
Full-Text Articles in Privacy Law
Straining The Capacity Of The Law: The Idea Of Computer Crime In The Age Of The Computer Worm, 11 Computer L.J. 299 (1991), Brenda Nelson
Straining The Capacity Of The Law: The Idea Of Computer Crime In The Age Of The Computer Worm, 11 Computer L.J. 299 (1991), Brenda Nelson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Litigate And Arbitrate: A Hybrid Method Of Alternative Dispute Resolution, 10 Computer L.J. 517 (1990), Dennis S. Deutsch
Litigate And Arbitrate: A Hybrid Method Of Alternative Dispute Resolution, 10 Computer L.J. 517 (1990), Dennis S. Deutsch
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Crime And The Computer Fraud And Abuse Act Of 1986, 10 Computer L.J. 71 (1990), Christopher D. Chen
Computer Crime And The Computer Fraud And Abuse Act Of 1986, 10 Computer L.J. 71 (1990), Christopher D. Chen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Taxation Of Software Development Costs: Debugging The Proposed Regulations, 10 Computer L.J. 335 (1990), Wade R. Sjogren
Taxation Of Software Development Costs: Debugging The Proposed Regulations, 10 Computer L.J. 335 (1990), Wade R. Sjogren
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Nec V. Intel: A Guide To Using "Clean Room" Procedures As Evidence, 10 Computer L.J. 453 (1990), David S. Elkins
Nec V. Intel: A Guide To Using "Clean Room" Procedures As Evidence, 10 Computer L.J. 453 (1990), David S. Elkins
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Bulls & Bears & Bugs: Computer Investment Advisory Programs That Go Awry, 10 Computer L.J. 47 (1990), Wayne Hagendorf
Bulls & Bears & Bugs: Computer Investment Advisory Programs That Go Awry, 10 Computer L.J. 47 (1990), Wayne Hagendorf
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Hardware And Software Protection In Canada, 10 Computer L.J. 483 (1990), George E. Fisk, Jane E. Clark
Hardware And Software Protection In Canada, 10 Computer L.J. 483 (1990), George E. Fisk, Jane E. Clark
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Protection Against Foreign Competition In The United States, 10 Computer L.J. 393 (1990), Heon Hahm
Computer Protection Against Foreign Competition In The United States, 10 Computer L.J. 393 (1990), Heon Hahm
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram
Digital Sound Sampling And A Federal Right Of Publicity: Is It Live Or Is It Macintosh?, 10 Computer L.J. 365 (1990), Tamara J. Byram
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Divestiture As A Legislative Solution To The Anti-Consumer Effects Of Airline Ownership Of Computer Reservation Systems, 10 Computer L.J. 1 (1990), John Evans
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Scarlet Letter "A": Aids In A Computer Society, 10 Computer L.J. 233 (1990), M. Nicole Van Dam
The Scarlet Letter "A": Aids In A Computer Society, 10 Computer L.J. 233 (1990), M. Nicole Van Dam
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyrighted Software And Tying Arrangements: A Fresh Appreciation For Per Se Illegality, 10 Computer L.J. 413 (1990), Daniel Dik
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Canada, Copyright, Computers: Impact And Analysis In An International Perspective Or From Gutenberg To Uruguay: Protecting The Soul Of A New Machine, 10 Computer L.J. 265 (1990), Peter Heeseok Kang
Canada, Copyright, Computers: Impact And Analysis In An International Perspective Or From Gutenberg To Uruguay: Protecting The Soul Of A New Machine, 10 Computer L.J. 265 (1990), Peter Heeseok Kang
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole
Tort Liability For Artificial Intelligence And Expert Systems, 10 Computer L.J. 127 (1990), George S. Cole
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Small Business Reliance On Computer Software: There Should Be Protection, 10 Computer L.J. 635 (1990), Julie Delluomo
Small Business Reliance On Computer Software: There Should Be Protection, 10 Computer L.J. 635 (1990), Julie Delluomo
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Tax Returns And The Preparer Penalties, 10 Computer L.J. 551 (1990), Michael W. Traynham
Electronic Tax Returns And The Preparer Penalties, 10 Computer L.J. 551 (1990), Michael W. Traynham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Joint Ventures In The Semiconductor Industry, 10 Computer L.J. 581 (1990), Brian E. Whitley
Joint Ventures In The Semiconductor Industry, 10 Computer L.J. 581 (1990), Brian E. Whitley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Normative Analysis Of Disclsoure, Privacy, And Computers: The State Cases, 10 Computer L.J. 603 (1990), Eve H. Karasik
A Normative Analysis Of Disclsoure, Privacy, And Computers: The State Cases, 10 Computer L.J. 603 (1990), Eve H. Karasik
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.