Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 22 of 22
Full-Text Articles in Law
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.