Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 80

Full-Text Articles in Law

Reconsidering The Second Amendment: Constitutional Protection For A Right Of Security, 9 Hamline L. Rev. 69 (1986), Donald L. Beschle Jan 1986

Reconsidering The Second Amendment: Constitutional Protection For A Right Of Security, 9 Hamline L. Rev. 69 (1986), Donald L. Beschle

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Press And Politics In Nigeria: A Case Study Of Developmental Journalism, 6 B.C. Third World L.J. 85 (1986), Michael P. Seng, Gary T. Hunt Jan 1986

The Press And Politics In Nigeria: A Case Study Of Developmental Journalism, 6 B.C. Third World L.J. 85 (1986), Michael P. Seng, Gary T. Hunt

UIC Law Open Access Faculty Scholarship

No abstract provided.


Civil Procedure, 18 Loy. U. Chi. L.J. 317 (1986), Kenneth Kandaras, Catherine Wozniak Jan 1986

Civil Procedure, 18 Loy. U. Chi. L.J. 317 (1986), Kenneth Kandaras, Catherine Wozniak

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Demise Of The Praecipe, 11 S. Ill. U. L.J. 29 (1986), Diane S. Kaplan Jan 1986

The Demise Of The Praecipe, 11 S. Ill. U. L.J. 29 (1986), Diane S. Kaplan

UIC Law Open Access Faculty Scholarship

No abstract provided.


Cumulation Of Import Statistics In Injury Investigations Before The International Trade Commission, 7 Nw. J. Int'l L. & Bus. 433 (1986), William B.T. Mock Jan 1986

Cumulation Of Import Statistics In Injury Investigations Before The International Trade Commission, 7 Nw. J. Int'l L. & Bus. 433 (1986), William B.T. Mock

UIC Law Open Access Faculty Scholarship

No abstract provided.


Doing Well, Doing Good And Doing Both: A Framework For The Analysis Of Noncommercial Boycotts Under The Antitrust Laws, 30 St. Louis U. L.J. 385 (1986), Donald L. Beschle Jan 1986

Doing Well, Doing Good And Doing Both: A Framework For The Analysis Of Noncommercial Boycotts Under The Antitrust Laws, 30 St. Louis U. L.J. 385 (1986), Donald L. Beschle

UIC Law Open Access Faculty Scholarship

No abstract provided.


Skills Training In “Legal Analysis”: A Systematic Approach, 40 U. Miami L. Rev. 409 (1986), Paul T. Wangerin Jan 1986

Skills Training In “Legal Analysis”: A Systematic Approach, 40 U. Miami L. Rev. 409 (1986), Paul T. Wangerin

UIC Law Open Access Faculty Scholarship

No abstract provided.


System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow Jan 1986

System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow

UIC Law Review

No abstract provided.


A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku Jan 1986

A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto Jan 1986

Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz Jan 1986

Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman Jan 1986

The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal Jan 1986

The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch Jan 1986

Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael Jan 1986

17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf Jan 1986

A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih Jan 1986

The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz Jan 1986

Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar Jan 1986

The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon Jan 1986

Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen Jan 1986

Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns Jan 1986

Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson Jan 1986

Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes Jan 1986

Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum Jan 1986

Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker Jan 1986

Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind Jan 1986

Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline Jan 1986

Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


In What Vision Of The Constitution Must The Law Be Color-Blind, 20 J. Marshall L. Rev. 201 (1986), Laurence H. Tribe Jan 1986

In What Vision Of The Constitution Must The Law Be Color-Blind, 20 J. Marshall L. Rev. 201 (1986), Laurence H. Tribe

UIC Law Review

No abstract provided.


Tortious Interference With Visitation Rights: A New And Important Remedy For Non-Custodial Parents, 20 J. Marshall L. Rev. 307 (1986), Lawrence A. Goldman Jan 1986

Tortious Interference With Visitation Rights: A New And Important Remedy For Non-Custodial Parents, 20 J. Marshall L. Rev. 307 (1986), Lawrence A. Goldman

UIC Law Review

No abstract provided.