Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1984

UIC School of Law

Internet Law

Articles 1 - 22 of 22

Full-Text Articles in Law

Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker Jan 1984

Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles Jan 1984

Resolving Claims To Ownership Of Software And Computer-Stored Data - The Importance Of Temporary Restraining Orders And Preliminary Injunctions, 5 Computer L.J. 1 (1984), Robert C. Dorr, William P. Eigles

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas Jan 1984

Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer Jan 1984

Paine, Webber, Jackson And Curtis, Inc. V. Merrill Lynch, Pierce, Fenner & Smith: Methods Of Doing Business Held Patentable Because Implemented On A Computer, 5 Computer L.J. 101 (1984), David J. Meyer

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham Jan 1984

Fair Administration Of The Freedom Of Information Act After The Computer Revolution, 5 Computer L.J. 51 (1984), John M. Graham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley Jan 1984

Rico: Modern Weaponry Against Software Pirates, 5 Computer L.J. 143 (1984), Ronald B. Coolley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg Jan 1984

Legal And Technical Protection Through Software Locks, 5 Computer L.J. 163 (1984), Edward C. Saltzberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari Jan 1984

Latent Legal Repercussions In Electronic Financial Services And Transactions, 5 Computer L.J. 177 (1984), James V. Vergari

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii Jan 1984

Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson Jan 1984

Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr. Jan 1984

Computers In The Courtroom: Using Computer Diagnosis As Expert Opinion, 5 Computer L.J. 217 (1984), Keith H. Averill Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson Jan 1984

Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan Jan 1984

Debugging Software Escrow: Will It Work When You Need It?, 4 Computer L.J. 441 (1984), Susan H. Nycum, Dexter L. Kenfield, Margaret A. Keenan

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz Jan 1984

Dbs, The Fcc, And The Prospects For Diversity And Consumer Sovereignty In Broadcasting, 4 Computer L.J. 551 (1984), James P. Bodovitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen Jan 1984

Selected Problems In Taxation Of Computer Software, 4 Computer L.J. 605 (1984), Joel Rabinovitz, Alison Whalen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar Jan 1984

Nongovernmental Cryptology And National Security: The Government Seeking To Restrict Research, 4 Computer L.J. 573 (1984), Christy Brad Escobar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr Jan 1984

Contractual, Financial, And Tax Issues In Major Procurements, 4 Computer L.J. 465 (1984), G. F. Adam, Mark L. Gordon, Steven B. Starr

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle Jan 1984

Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey Jan 1984

Antitrust Issues Critical To Structuring Vertical Channels Of Distribution For Computer Businesses, 4 Computer L.J. 525 (1984), Warren G. Lavey

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr. Jan 1984

Software Distribution, Remarketing And Publishing Agreements, 4 Computer L.J. 625 (1984), C. Russel Hansen Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii Jan 1984

State And Federal Taxation Of Computer Software: A Functional Approach, 4 Computer L.J. 737 (1984), Christian E. Markey Iii

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson Jan 1984

Frankly, Incredible: Unconscionability In Computer Contracts, 4 Computer L.J. 695 (1984), David Himelson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.