Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (34)
- Internet Law (34)
- Science and Technology Law (33)
- Intellectual Property Law (10)
- Constitutional Law (5)
-
- First Amendment (4)
- Fourth Amendment (4)
- Administrative Law (2)
- Family Law (2)
- Fourteenth Amendment (2)
- Health Law and Policy (2)
- Medical Jurisprudence (2)
- Supreme Court of the United States (2)
- Torts (2)
- Antitrust and Trade Regulation (1)
- Communications Law (1)
- Criminal Law (1)
- Elder Law (1)
- Entertainment, Arts, and Sports Law (1)
- Evidence (1)
- International Humanitarian Law (1)
- International Law (1)
- Judges (1)
- Jurisprudence (1)
- Law and Gender (1)
- Legislation (1)
- Litigation (1)
- Sexuality and the Law (1)
- Institution
- Keyword
Articles 1 - 30 of 49
Full-Text Articles in Privacy Law
The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck
The Securing Of The Premises Exception: A Search For The Proper Balance, Adam K. Peck
Vanderbilt Law Review
This Recent Development argues that although an opinion endorsed by only two justices is not binding precedent, this portion of Segura represents an undesirable departure from the strict protections traditionally afforded a person's privacy interest in the home and leaves lower courts confused about the constitutional limitations on seizures in the home. Part II examines prior Supreme Court opinions that have defined the parameters of permissible warrantless searches and seizures. Part III explores the circuit court opinions that have developed a "securing of the premises"exception. Part IV describes Chief Justice Burger's analysis in Segura. Part V argues that the Chief …
Rethinking Roe V. Wade, Lynn D. Wardle
Closing The "Open Fields" Question: Oliver V. United States, Brian K. Jorgensen
Closing The "Open Fields" Question: Oliver V. United States, Brian K. Jorgensen
BYU Law Review
No abstract provided.
Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield
Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr
Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards
The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino
Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley
A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman
Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter
The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.
Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss
The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd
Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam
The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick
The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell
Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin
Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.
Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee
Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph
Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee
Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes
Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter
Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.