Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker Jan 1984

Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles Jan 1984

Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas Jan 1984

Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer Jan 1984

Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham Jan 1984

Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley Jan 1984

Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg Jan 1984

Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari Jan 1984

Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii Jan 1984

Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson Jan 1984

Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr. Jan 1984

Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson Jan 1984

Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan Jan 1984

Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz Jan 1984

Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen Jan 1984

Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar Jan 1984

Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr Jan 1984

Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle Jan 1984

Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey Jan 1984

Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr. Jan 1984

Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii Jan 1984

State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson Jan 1984

Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm Jan 1984

Admitting Computer Generated Records: A Presumption Of Reliability, 18 J. Marshall L. Rev. 115 (1984), Peter M. Storm

UIC Law Review

No abstract provided.


Intrustions Upon Informational Seclusion In The Computer Age, 17 J. Marshall L. Rev. 831 (1984), John A. Mclaughlin Jan 1984

Intrustions Upon Informational Seclusion In The Computer Age, 17 J. Marshall L. Rev. 831 (1984), John A. Mclaughlin

UIC Law Review

No abstract provided.