Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 24 of 24
Full-Text Articles in Law
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm
Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm
UIC Law Review
No abstract provided.
Intrustions Upon Informational Seclusion In The Computer Age, 17 J. Marshall L. Rev. 831 (1984), John A. Mclaughlin
Intrustions Upon Informational Seclusion In The Computer Age, 17 J. Marshall L. Rev. 831 (1984), John A. Mclaughlin
UIC Law Review
No abstract provided.