Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 38

Full-Text Articles in Computer Law

The Creator And The Benefits Of Creation: Protection Of Software In The Information Revolution, Martin Kratz Dec 1985

The Creator And The Benefits Of Creation: Protection Of Software In The Information Revolution, Martin Kratz

Dalhousie Law Journal

Mankind is presently passing through a technological revolution unlike anything seen in any prior era. In a world where the total mass of man's knowledge doubles in less than two years' information has become an increasingly valuable commodity. Similarly, the means by which information is manipulated has become evermore important. The development of the computer 2 has been the catalyst of this information revolution as it has freed man from many time consuming and monotonous tasks. The development of the computer industry has been phenomenal. 3 It has gone from its infancy in the late 1940's to a stage where …


The Protection Of Computer Software Through Shrink-Wrap License Agreements Sep 1985

The Protection Of Computer Software Through Shrink-Wrap License Agreements

Washington and Lee Law Review

No abstract provided.


Language, Communication, Computers And The Law, R. A. Samek Jun 1985

Language, Communication, Computers And The Law, R. A. Samek

Dalhousie Law Journal

There is an old story about a drunken man who is looking for an object under a street light. A policeman asks him what he is looking for. "It is my keys", he says. "Did you lose them here?" "No, over there.'" "Why then are you looking for them over here?" "Because I can see here", is the man's reply. The real significance of this story is very different from what it appears. It is not the man who is foolish but the policeman. We can only look for something from where we can see it. The alternative is to …


Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield Jan 1985

Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr Jan 1985

Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards Jan 1985

The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino Jan 1985

Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley Jan 1985

A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler Jan 1985

Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman Jan 1985

Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn Jan 1985

Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris Jan 1985

Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter Jan 1985

The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D. Jan 1985

Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss Jan 1985

The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd Jan 1985

Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam Jan 1985

The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth Jan 1985

In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick Jan 1985

The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell Jan 1985

Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin Jan 1985

Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr. Jan 1985

Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein Jan 1985

Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee Jan 1985

Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph Jan 1985

Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee Jan 1985

Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman Jan 1985

Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes Jan 1985

Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton Jan 1985

Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter Jan 1985

Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.