Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (34)
- Computer Law (33)
- Internet Law (33)
- Science and Technology Law (33)
- Torts (8)
-
- Constitutional Law (5)
- Fourteenth Amendment (4)
- Tax Law (4)
- Criminal Law (3)
- Criminal Procedure (3)
- Law Enforcement and Corrections (3)
- Legal Ethics and Professional Responsibility (3)
- Property Law and Real Estate (3)
- State and Local Government Law (3)
- Antitrust and Trade Regulation (2)
- Civil Procedure (2)
- Civil Rights and Discrimination (2)
- Commercial Law (2)
- Contracts (2)
- Fourth Amendment (2)
- Intellectual Property Law (2)
- Administrative Law (1)
- Air and Space Law (1)
- Banking and Finance Law (1)
- Business Organizations Law (1)
- Civil Law (1)
- Common Law (1)
- Construction Law (1)
- Election Law (1)
- Publication
- Publication Type
Articles 1 - 30 of 68
Full-Text Articles in Law
Jury Subornation Through Judicial Control, 43 Law & Contemp. Probs. 24 (1980), Robert G. Johnston
Jury Subornation Through Judicial Control, 43 Law & Contemp. Probs. 24 (1980), Robert G. Johnston
UIC Law Open Access Faculty Scholarship
No abstract provided.
“Plain Error” And “Fundamental Fairness”: Toward A Definition Of Exceptions To The Rules Of Procedural Default, 29 Depaul L. Rev. 753 (1980), Paul T. Wangerin
“Plain Error” And “Fundamental Fairness”: Toward A Definition Of Exceptions To The Rules Of Procedural Default, 29 Depaul L. Rev. 753 (1980), Paul T. Wangerin
UIC Law Open Access Faculty Scholarship
Historically, criminal defense counsel have been required to make timely procedural motions and contemporaneous objections to trial or pretrial errors or lose forever the right to raise those errors on appeal. In recent years, exceptions to this general rule favoring finality of litigation have proliferated. Mr. Wangerin suggests a theory underlying these previously undefined exceptions and outlines a method for identifying errors that justify appellate review despite procedural default.
Due Process And Federal Property Forfeiture Statutes: The Need For Immediate Post-Seizure Hearing, 34 Sw. L.J. 925 (1980), Kenneth Kandaras
Due Process And Federal Property Forfeiture Statutes: The Need For Immediate Post-Seizure Hearing, 34 Sw. L.J. 925 (1980), Kenneth Kandaras
UIC Law Open Access Faculty Scholarship
No abstract provided.
Municipal Liability For Police Misconduct, 51 Miss. L.J. 1 (1980), Michael P. Seng
Municipal Liability For Police Misconduct, 51 Miss. L.J. 1 (1980), Michael P. Seng
UIC Law Open Access Faculty Scholarship
No abstract provided.
Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell
Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright
An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn
Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes
Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal
Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott
Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz
Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.
Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce
The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter
Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari
Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown
Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott
Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham
On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber
A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes
The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker
Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling
Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott
Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik
Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker
The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg
Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger
Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance
Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Crimes Bibliography, 2 Computer L.J. 787 (1980), Linda A. Schulte
Computer Crimes Bibliography, 2 Computer L.J. 787 (1980), Linda A. Schulte
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.