Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 30 of 34
Full-Text Articles in Privacy Law
Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield
Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr
Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards
The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino
Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley
A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman
Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter
The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.
Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss
The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd
Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam
The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick
The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell
Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin
Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.
Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee
Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph
Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee
Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes
Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter
Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Commercial User-Vendor Litigation: The User's Point Of View, 5 Computer L.J. 287 (1984), Michael D. Scott
Commercial User-Vendor Litigation: The User's Point Of View, 5 Computer L.J. 287 (1984), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz
Video Games And The First Amendment: Are Restrictive Regulations Constitutional?, 5 Computer L.J. 493 (1985), Lisa E. Kranitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Disclosure And The Computer Programmer, 5 Computer L.J. 557 (1985), Sam Kraemer
Disclosure And The Computer Programmer, 5 Computer L.J. 557 (1985), Sam Kraemer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.