Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computers (5)
- Telecommunications (3)
- Access to information (2)
- Data (2)
- Information (2)
-
- Regulation (2)
- Services (2)
- Broadcasting (1)
- Computer (1)
- Computer crime (1)
- Computer retrieval (1)
- Computer software (1)
- Copyright protection (1)
- Court (1)
- Court of Customs and Patent Appeals (1)
- Equality (1)
- Evans v. Commonwealth (1)
- Federal copyright laws (1)
- Financial Services System (1)
- Hotel Security Checking Co. v. Lorraine Co. (1)
- Infringement (1)
- Lund v. Commonwealth (1)
- Merrill Lynch's Patent (1)
- Patent Act (1)
- Patent and Trademark Office (1)
- Patent protection (1)
- Patentability of Computer Programs (1)
- Patentable Processes (1)
- Patents (1)
- Presentations (1)
Articles 1 - 30 of 36
Full-Text Articles in Law
The Challenge Of Computer-Crime Legislation: How Should New York Respond?, Amalia M. Wagner
The Challenge Of Computer-Crime Legislation: How Should New York Respond?, Amalia M. Wagner
Buffalo Law Review
No abstract provided.
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
Indiana Law Journal
No abstract provided.
Patenting Inventions That Embody Computer Programs Held As Trade Secrets—White Consolidated Industries V. Vega Servo-Control, 713 F.2d 788 (Fed. Cir. 1983), Ellen Lauver Weber
Patenting Inventions That Embody Computer Programs Held As Trade Secrets—White Consolidated Industries V. Vega Servo-Control, 713 F.2d 788 (Fed. Cir. 1983), Ellen Lauver Weber
Washington Law Review
An inventor develops a numerical control system that allows a computer program to control the complex operation of machine tools such as drill bits. One of the elements in the numerical control system is a trade secret available only from the inventor. The inventor would like to patent the system as a whole, but an inventor must generally disclose how the invention works in order to obtain a patent. Must this inventor completely disclose how the trade secret works in order to obtain a patent on the whole system? The Federal Circuit Court of Appeals said "yes" in White Consolidated …
Computer Retrieval – Drawing The Line?, Paul Thomas
Computer Retrieval – Drawing The Line?, Paul Thomas
Dalhousie Law Journal
The Master of the Rolls in England, Sir John Donaldson, said recently that he feared the use of a proliferation of useless materials from computers in presentations before the Court. He was probably echoing what Lord Diplock had to say for the House of Lords in Roberts Petroleum Ltd. v. Bernard Kenny Ltd. (in liquidation).1 In a lengthy per curiam speech, Lord Diplock in that case commented on the use sought to be made in the House of Lords and the Court of Appeal of previous unreported Court of Appeal judgments. The transcripts of shorthand notes of oral judgments rendered …
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm
Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm
UIC Law Review
No abstract provided.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk
Virginia's Response To Computer Abuses: An Act In Five Crimes, Daniel R. Burk
University of Richmond Law Review
The threat depicted in War Games has been both rebuked as impossible and highlighted as much closer to the realm of possibility than even the creators of the movie may have surmised. Regardless of the actual possibility of a creative mind breaking through the security of the North America Air Defense Command computer with an auto-dialing modem and the simple password "JOSHUA" the adventures of the curious "hackers" and the singularly-directed criminal have been widely publicized and have captured both the fear and respect of computer owners throughout the country.
The Policy Implications Of Granting Patent Protection To Computer Software: An Economic Analysis, Jeffrey S. Goodman
The Policy Implications Of Granting Patent Protection To Computer Software: An Economic Analysis, Jeffrey S. Goodman
Vanderbilt Law Review
This Note analyzes the propriety of granting patent law protection to computer software by viewing this problem from economic, legal, public and technological policy perspectives. Part II explains the relationship between computer hardware and software, discusses the role of algorithms in software development,and traces the development of the computer software industry.Part III analyzes the economic policies underlying the patent system. Part IV identifies the patent law principles that are relevant to the software patentability issue and discusses their underlying policy foundations. Part V examines the Supreme Court's application of these principles in the leading software patent cases and concludes that …
Copyright Protection Of Systems Control Software Stored In Read Only Memory Chips: Into The World Of Gulliver's Travels, Jon O. Webster
Copyright Protection Of Systems Control Software Stored In Read Only Memory Chips: Into The World Of Gulliver's Travels, Jon O. Webster
Buffalo Law Review
No abstract provided.