Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

International Trade Law

UIC School of Law

Journal

Articles 1 - 6 of 6

Full-Text Articles in Privacy Law

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren Jan 2016

The Protection Of Pioneer Innovations – Lessons Learnt From The Semiconductor Chip Industry And Its Ip Law Framework, 32 J. Marshall J. Info. Tech. & Privacy L. 151 (2016), Thomas Hoeren

UIC John Marshall Journal of Information Technology & Privacy Law

In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and …


University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin Jan 2009

University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment analyzes the proposed revisions to United States export regulations contained in the Deemed Export Advisory Committee’s 2007 report. While the Advisory Committee’s work was much needed and its recommendations laudable, this comment discusses why its recommendations must be narrowly tailored in order to preserve the competitiveness of U.S. businesses and universities in the globalizing world and to advance national security. Part II explains the regulations that govern U.S. exports, including the deemed export regulatory regime and how those rules implement a range of national obligations and interests. This Part also discusses the events that threatened to significantly burden …


A Digital Free Trade Zone And Necessarily-Regulated Self-Governance For Electronic Commerce: The World Trade Organization, International Law, And Classical Liberalism In Cyberspace, 20 J. Marshall J. Computer & Info. L. 595 (2002), Kristi L. Bergemann Jan 2002

A Digital Free Trade Zone And Necessarily-Regulated Self-Governance For Electronic Commerce: The World Trade Organization, International Law, And Classical Liberalism In Cyberspace, 20 J. Marshall J. Computer & Info. L. 595 (2002), Kristi L. Bergemann

UIC John Marshall Journal of Information Technology & Privacy Law

In the absence of a world government, cross border trade is always subject to rules that must be politically negotiated among nations that are sovereign in their own realm but not outside their borders. The author explores the development of an international trade and e-commerce paradigm in two main phases as the Internet superhighway bridges nations together. She argues that the construction of an international trading framework must strike the appropriate balance between institutional order and norms and the human and business realities of free trade and democracy. She further argues that the balance can be achieved by creating an …


Global Trends In Privacy Protection: An International Survey Of Privacy, Data Protection, And Surveillance Laws And Developments, 18 J. Marshall J. Computer & Info. L. 1 (1999), David Banisar, Simon Davies Jan 1999

Global Trends In Privacy Protection: An International Survey Of Privacy, Data Protection, And Surveillance Laws And Developments, 18 J. Marshall J. Computer & Info. L. 1 (1999), David Banisar, Simon Davies

UIC John Marshall Journal of Information Technology & Privacy Law

The right to privacy is one of the most fundamental rights recognized. References to privacy date back to ancient Greece and China. Rapid advances in information technology and high-speed data networks have had an enormous impact on privacy. Today, personal medical and financial information can easily be transmitted with and without the one knowing. Can privacy law keep up with these changes and challenges? Privacy advocates are concerned. Nearly every country in the world has some form of privacy provision in its constitution. However, the definition of privacy differs from context and environment. The authors chronicle the status of privacy …


Intellectual Property Protection Of Software: International Perspectives: Foreword, 14 J. Marshall J. Computer & Info. L. 657 (1996), Donald P. Reynolds Jan 1996

Intellectual Property Protection Of Software: International Perspectives: Foreword, 14 J. Marshall J. Computer & Info. L. 657 (1996), Donald P. Reynolds

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Software: Should The U.N. Convention On Contracts For The International Sale Of Goods Apply? A Contextual Approach To The Question, 11 Computer L.J. 197 (1991), L. Scott Primak Jan 1991

Computer Software: Should The U.N. Convention On Contracts For The International Sale Of Goods Apply? A Contextual Approach To The Question, 11 Computer L.J. 197 (1991), L. Scott Primak

UIC John Marshall Journal of Information Technology & Privacy Law

This Article is organized along the following lines. Part I is a general discussion of the Convention. It includes a factual background, a discussion of principle provisions of the Convention, a description of the temporal and geographical spheres of application of the Convention. Part one also suggests the use of available tools for uniform application; and brings the topic of dissemination of interpretation of the Convention up to date. Although article 7 of the Convention generally states an approach to interpretation, further elucidation is necessary to ensure uniformity of application. Accordingly, Part II discusses the various approaches to treaty interpretation …