Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Law
Protecting American Software In Japan, 8 Computer L.J. 111 (1988), Wean Khing Wong
Protecting American Software In Japan, 8 Computer L.J. 111 (1988), Wean Khing Wong
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Strict Products Liability And Computer Software, 8 Computer L.J. 135 (1988), L. Nancy Birnbaum
Strict Products Liability And Computer Software, 8 Computer L.J. 135 (1988), L. Nancy Birnbaum
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Preemption Of Shrink Wrap Licenses In The Wake Of Vault Corp. V. Quaid Software Ltd., 8 Computer L.J. 157 (1988), Mary Brandt Jensen
The Preemption Of Shrink Wrap Licenses In The Wake Of Vault Corp. V. Quaid Software Ltd., 8 Computer L.J. 157 (1988), Mary Brandt Jensen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The New Taiwan Copyright Law: Does It Spell Doom For Counterfeiters?, 8 Computer L.J. 171 (1988), W. Scott Lawler
The New Taiwan Copyright Law: Does It Spell Doom For Counterfeiters?, 8 Computer L.J. 171 (1988), W. Scott Lawler
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Corpis Juris Roboticum, 8 Computer L.J. 375 (1988), Raymond August
Corpis Juris Roboticum, 8 Computer L.J. 375 (1988), Raymond August
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Self-Help Legal Software And The Unauthorized Practice Of Law, 8 Computer L.J. 185 (1988), Ross D. Vincenti
Self-Help Legal Software And The Unauthorized Practice Of Law, 8 Computer L.J. 185 (1988), Ross D. Vincenti
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright, Patent, And Trade Secret Protection For Computer Software In Western Europe, 8 Computer L.J. 327 (1988), John P. Sumner, Dianne Plunkett
Copyright, Patent, And Trade Secret Protection For Computer Software In Western Europe, 8 Computer L.J. 327 (1988), John P. Sumner, Dianne Plunkett
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Return To The Stone Age . . . The Regulation Of Program Trading, 8 Computer L.J. 479 (1988), Douglas M. Stevens
Return To The Stone Age . . . The Regulation Of Program Trading, 8 Computer L.J. 479 (1988), Douglas M. Stevens
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Expert Software Systems: The Legal Implications, 8 Computer L.J. 455 (1988), Tod M. Turley
Expert Software Systems: The Legal Implications, 8 Computer L.J. 455 (1988), Tod M. Turley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Breaking The Mold: Forging A New And Comprehensive Standard Of Protection For Computer Software, 8 Computer L.J. 389 (1988), Jack Sholkoff
Breaking The Mold: Forging A New And Comprehensive Standard Of Protection For Computer Software, 8 Computer L.J. 389 (1988), Jack Sholkoff
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Exploring Computer Aided Generation Of Questions For Normalizing Legal Rules, Layman E. Allen, Charles S. Saxon
Exploring Computer Aided Generation Of Questions For Normalizing Legal Rules, Layman E. Allen, Charles S. Saxon
Book Chapters
The process of normalizing a legal rule requires a drafter to indicate where the intent is to be precise and where it is to be imprecise in expressing both the between-sentence and within-sentence logical structure of that rule. Three different versions of a legal rule are constructed in the process of normalizing it: (1) the logical structure of the present version, (2) the detailed marker version, and (3) the logical structure of the normalized version. In order to construct the third version the analyst must formulate and answer specific questions about the terms that are used to express the logical …
Communications Technology: New Challenges To Privacy, 21 J. Marshall L. Rev. 735 (1988), Fred W. Weingarten
Communications Technology: New Challenges To Privacy, 21 J. Marshall L. Rev. 735 (1988), Fred W. Weingarten
UIC Law Review
No abstract provided.
Performer's Rights And Digital Sampling Under U.S. And Japanese Law, Jessica D. Litman
Performer's Rights And Digital Sampling Under U.S. And Japanese Law, Jessica D. Litman
Articles
A year or two ago, one of my copyright students called to my attention a problem that seemed to him to pose unique difficulties for the copyright statute. The problem arises because of a technology called digital sampling.' Digital sampling is a new threat to performers' rights that has grown out of the combination of digital recording technology with music synthesizer technology. This threat is a very recent one. Indeed, the digital sampling problem is so new that copyright lawyers haven't yet figured out how to think about it.
Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed
Eavesdropping Regulation In Illinois, 21 J. Marshall L. Rev. 251 (1988), Scott O. Reed
UIC Law Review
No abstract provided.
Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers
Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers
Villanova Law Review
No abstract provided.