Open Access. Powered by Scholars. Published by Universities.®

Privacy Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 49

Full-Text Articles in Privacy Law

The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck Nov 1985

The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck

Vanderbilt Law Review

This Recent Development argues that although an opinion endorsed by only two justices is not binding precedent, this portion of Segura represents an undesirable departure from the strict protections traditionally afforded a person's privacy interest in the home and leaves lower courts confused about the constitutional limitations on seizures in the home. Part II examines prior Supreme Court opinions that have defined the parameters of permissible warrantless searches and seizures. Part III explores the circuit court opinions that have developed a "securing of the premises"exception. Part IV describes Chief Justice Burger's analysis in Segura. Part V argues that the Chief …


Rethinking Roe V. Wade, Lynn D. Wardle May 1985

Rethinking Roe V. Wade, Lynn D. Wardle

BYU Law Review

No abstract provided.


Closing The "Open Fields" Question: Oliver V. United States, Brian K. Jorgensen Mar 1985

Closing The "Open Fields" Question: Oliver V. United States, Brian K. Jorgensen

BYU Law Review

No abstract provided.


Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield Jan 1985

Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr Jan 1985

Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards Jan 1985

The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino Jan 1985

Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley Jan 1985

A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler Jan 1985

Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman Jan 1985

Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn Jan 1985

Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris Jan 1985

Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter Jan 1985

The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D. Jan 1985

Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss Jan 1985

The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd Jan 1985

Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam Jan 1985

The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth Jan 1985

In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick Jan 1985

The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell Jan 1985

Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin Jan 1985

Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr. Jan 1985

Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein Jan 1985

Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee Jan 1985

Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph Jan 1985

Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee Jan 1985

Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman Jan 1985

Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes Jan 1985

Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton Jan 1985

Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter Jan 1985

Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.