Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Protecting American Software In Japan, 8 Computer L.J. 111 (1988), Wean Khing Wong Jan 1988

Protecting American Software In Japan, 8 Computer L.J. 111 (1988), Wean Khing Wong

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Strict Products Liability And Computer Software, 8 Computer L.J. 135 (1988), L. Nancy Birnbaum Jan 1988

Strict Products Liability And Computer Software, 8 Computer L.J. 135 (1988), L. Nancy Birnbaum

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Preemption Of Shrink Wrap Licenses In The Wake Of Vault Corp. V. Quaid Software Ltd., 8 Computer L.J. 157 (1988), Mary Brandt Jensen Jan 1988

The Preemption Of Shrink Wrap Licenses In The Wake Of Vault Corp. V. Quaid Software Ltd., 8 Computer L.J. 157 (1988), Mary Brandt Jensen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The New Taiwan Copyright Law: Does It Spell Doom For Counterfeiters?, 8 Computer L.J. 171 (1988), W. Scott Lawler Jan 1988

The New Taiwan Copyright Law: Does It Spell Doom For Counterfeiters?, 8 Computer L.J. 171 (1988), W. Scott Lawler

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Corpis Juris Roboticum, 8 Computer L.J. 375 (1988), Raymond August Jan 1988

Corpis Juris Roboticum, 8 Computer L.J. 375 (1988), Raymond August

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Self-Help Legal Software And The Unauthorized Practice Of Law, 8 Computer L.J. 185 (1988), Ross D. Vincenti Jan 1988

Self-Help Legal Software And The Unauthorized Practice Of Law, 8 Computer L.J. 185 (1988), Ross D. Vincenti

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright, Patent, And Trade Secret Protection For Computer Software In Western Europe, 8 Computer L.J. 327 (1988), John P. Sumner, Dianne Plunkett Jan 1988

Copyright, Patent, And Trade Secret Protection For Computer Software In Western Europe, 8 Computer L.J. 327 (1988), John P. Sumner, Dianne Plunkett

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Return To The Stone Age . . . The Regulation Of Program Trading, 8 Computer L.J. 479 (1988), Douglas M. Stevens Jan 1988

Return To The Stone Age . . . The Regulation Of Program Trading, 8 Computer L.J. 479 (1988), Douglas M. Stevens

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Expert Software Systems: The Legal Implications, 8 Computer L.J. 455 (1988), Tod M. Turley Jan 1988

Expert Software Systems: The Legal Implications, 8 Computer L.J. 455 (1988), Tod M. Turley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Breaking The Mold: Forging A New And Comprehensive Standard Of Protection For Computer Software, 8 Computer L.J. 389 (1988), Jack Sholkoff Jan 1988

Breaking The Mold: Forging A New And Comprehensive Standard Of Protection For Computer Software, 8 Computer L.J. 389 (1988), Jack Sholkoff

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Exploring Computer Aided Generation Of Questions For Normalizing Legal Rules, Layman E. Allen, Charles S. Saxon Jan 1988

Exploring Computer Aided Generation Of Questions For Normalizing Legal Rules, Layman E. Allen, Charles S. Saxon

Book Chapters

The process of normalizing a legal rule requires a drafter to indicate where the intent is to be precise and where it is to be imprecise in expressing both the between-sentence and within-sentence logical structure of that rule. Three different versions of a legal rule are constructed in the process of normalizing it: (1) the logical structure of the present version, (2) the detailed marker version, and (3) the logical structure of the normalized version. In order to construct the third version the analyst must formulate and answer specific questions about the terms that are used to express the logical …


Communications Technology: New Challenges To Privacy, 21 J. Marshall L. Rev. 735 (1988), Fred W. Weingarten Jan 1988

Communications Technology: New Challenges To Privacy, 21 J. Marshall L. Rev. 735 (1988), Fred W. Weingarten

UIC Law Review

No abstract provided.


Performer's Rights And Digital Sampling Under U.S. And Japanese Law, Jessica D. Litman Jan 1988

Performer's Rights And Digital Sampling Under U.S. And Japanese Law, Jessica D. Litman

Articles

A year or two ago, one of my copyright students called to my attention a problem that seemed to him to pose unique difficulties for the copyright statute. The problem arises because of a technology called digital sampling.' Digital sampling is a new threat to performers' rights that has grown out of the combination of digital recording technology with music synthesizer technology. This threat is a very recent one. Indeed, the digital sampling problem is so new that copyright lawyers haven't yet figured out how to think about it.


Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed Jan 1988

Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed

UIC Law Review

No abstract provided.


Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers Jan 1988

Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers

Villanova Law Review

No abstract provided.