home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Hacker Chronicles - A…the Computer Underground
/
The Hacker Chronicles - A Tour of the Computer Underground (P-80 Systems).iso
/
cud2
/
cud203c.txt
< prev
next >
Wrap
Text File
|
1992-09-26
|
14KB
|
351 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 2, Issue #2.03 (Sepember 14, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
------------------------------
Date: Mon, 10 Sep 90 22:24:24 -0400
From: Timothy C Wolfson TTUNIX.BITNET
Subject: Tim Wolfson's address, cite list
********************************************************************
*** CuD #2.03: File 3 of 4: Bibliography of Law Articles ***
********************************************************************
Below is a list of articles published in legal periodicals that may be of
interest to your readers. This list is in no way meant to be all inclusive,
I'm sure I've left out (or not yet discovered) many pertinent pieces.
24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987
Kimi N. NuraKami 24 AMCRLR 623
PLI Order No. C4-4175 Civil RICO 1986
PREDICATE ACTS OF MAIL FRAUD AND WIRE FRAUD June 1, 1986 Brad D. Brian
141 PLI/Lit 79
63 U. Det. L. Rev. 843
COPYRIGHT--Bootleg Records--Copyright infringement in the form of unauthorized
phonograph recordings, when such records are shipped interstate, does not fall
within the reach of the National Stolen Property Act. Dowling v. United
States, 105 S. Ct. 3127 (1985). Summer, 1986 Kenneth Adamczyk
13 Legal Econ. 44 ELECTRONIC BULLETIN BOARD SYSTEM PROVER BBS
November/December, 1987 Rees W. Morrison 13 LEGEC 44
39 Fed.Com.L.J. 217
An Electronic Soapbox: Computer Bulletin Boards and the First Amendment
October, 1987 Eric C. Jensen 39 FCLJ 217
Public Utilities Fortnightly The March of Events November 9, 1989
NEW MEXICO ELECTRONIC BULLETIN BOARD AVAILABLE AT COMMISSION
124 No. 10 Fortnight 50
PLI Order No. G4-3847
How to Handle Basic Copyright and Trademark Problems A Satellite Program
PATENT AND TRADEMARK OFFICE: PROSECUTING APPLICATIONS FOR TRADEMARK
REGISTRATION, AND INTER PARTES PRACTICE BEFORE THE TRADEMARK TRIAL AND APPEAL
BOARD February 13, 1990 Roberta S. Bren 288 PLI/Pat 135
PLI Order No.G4-3844
Patents, Copyrights, Trademarks, and Literary Property Course Handbook Series
THE LICENSING OF COMPUTER SOFTWARE PROGRAMS January 1, 1990
Gerald E. Lester 287 PLI/Pat 293
PLI Order No. 64-3839 Communications Law 1989
THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY
FRAMEWORK AND DEVELOPING TRENDS November 9,1989 Richard E. Wiley
283 PLI/Pat 327
57 Geo. Wash. L. Rev. 1459
THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE
August 1, 1989 M. Ethan Katsh 57 GWLR 1459
75 A.B.A.J. 82 THE FUTURE OF TECHNOLOGY IN LAW FIRMS July, 1989
Jon E. Klemens 75 ABAJ 82
44 Bus. Law. 1081 ELECTRONIC FUND TRANSFERS May, 1989
David B. Goldstein, Edward L. Rubin, Dewey B. Morris,
Charles P. Seibold, Richard P. Kessler, Jr., Richard S. Wyde.
PLI Order No. G4-3831 Protecting Trade Secrets 1989
PROTECTING TRADE SECRETS: LEGAL THEORIES April 1, 1989 Michael J. Hutter
269 PLI/Pat 9
PLI Order No. A4-4255
Law Practice Management for the Solo and Small Office Practitioners
Conquer the Computer It's your ticket to tomorrow and the key to a more
effective and competitive practice April 1, 1989 JAMES A. EIDELMAN
492 PLI/Comm 353
54 W.Educ.L.Rep. 761
COMPUTER VIRUSES: LEGAL AND POLICY ISSUES FACING COLLEGES AND UNIVERSITIES
1989 David R. Johnson, J.D. Thomas P. Olson, J.D.,
David G. Post, Ph.D., J.D. 54 WELR 761
PLI Order No. G4-3821/3 Communications Law 1988
THE MEDIA AND THE COMMUNICATIONS REVOLUTION: AN OVERVIEW OF THE REGULATORY
FRAMEWORK AND DEVELOPING TRENDS November 10, 1988 Richard E. Wiley
262 PLI/Pat 681
XXIX B.C.L.Rev. 803
COPYRIGHTED SOFTWARE: SEPARATING THE PROTECTED EXPRESSION FROM UNPROTECTED
IDEAS, A STARTING POINT September, 1988 J. Dianne Brinson
XXIX BCLR 803
21 J. Marshall L. Rev. 735
COMMUNICATIONS TECHNOLOGY: NEW CHALLENGES TO PRIVACY Summer, 1988
Fred W. Weingarten 21 JMARLR 735
63 N.Y.U.L.Rev. 416
DON'T TOUCH THAT DIAL: RADIO LISTENING UNDER THE ELECTRONIC COMMUNICATIONS
PRIVACY ACT OF 1986 May, 1988 Fred Jay Meyer 63 NYULR 416
14 Legal Econ. 30 ELECTRONIC COMMUNICATIONS A LAWYER'S PRIMER
April, 1988 Carl G. Roberts Rees W. Morrison Greg H. Schlender
14 LEGEC 30
PLI Order No. G4-3804
Telecommunications 1987: Current Developments In Policy and Regulation
AN OVERVIEW OF INTERNATIONAL ISSUES December 10, 1987 P. Michael Nugent
244 PLI/Pat 145
PLI Order No. G4-3804
Telecommunications 1987: Current Developments In Policy and Regulation
REALITY RELEARNED December 10, 1987 Lawrence W. DeMuth, Jr.
244 PLI/Pat 133
24 Am. Crim. L. Rev. 623 MAIL AND WIRE FRAUD Winter, 1987
Kimi N. NuraKami 24 AMCRLR 623
13 Legal Econ. 28 LEGAL TECHNOLOGY: PRESENT AND FUTURE TRENDS
November/December, 1987 Gordon L. Jacobs 13 LEGEC 28
73 A.B.A.J. 50 HOW COMPUTERS MADE US BETTER LAWYERS May 15, 1987
Joshua Stein 73 ABAJ 50
72 Iowa L.Rev. 1015
The National Security Agency and Its Interference with Private Sector Computer
Security May, 1987 Renae Angeroth Franks 72 IALR 1015
27 Va. J. Int'l. L. 575
Statutory Improvements to the Foreign Availability Process for High Technology
National Security Export Controls Spring, 1987 Richard T. Horan, Jr.
42 Bus.Law. 614 COMPUTER LAW February, 1987
Bernard G. Helldorfer, Harold J. Daw, William E. Hirschberg, Darrell K.
Fennell, and Andrew W. Hoffmann 42 BUSLAW 614
67 B.U.L.Rev. 179
WARRANT REQUIREMENT FOR SEARCHES OF COMPUTERIZED INFORMATION January, 1987
C. Ryan Reetz
40 Vand.L.Rev. 1 Free Speech, Copyright, and Fair Use January, 1987
L. Ray Patterson
10 U.Ark.Little Rock L.J. 55
WHAT IS COMPUTER CRIME, AND WHY SHOULD WE CARE? 1987-88
Michael C. Gemignani 10 UARLRLJ 55
13 Rutgers Computer And Tech.L.J. 451
THE ELECTRUNIC COMMUNICATIONS PRIVACY ACT OF 1986: THE CHALLENGE OF APPLYING
AMBIGUOUS STATUTORY LANGUAGE TO INTRICATE TELECOMMUNICATION TECHNOLOGIES
1987 Russell S. Burnside 13 RUCTLJ 451
PLI Order No. G4-3790 Protecting Trade Secrets 1986
LEGAL THEORIES AND RECENT DEVELOPMENTS May 1, 1986 Michael J. Hutter
224 PLI/Pat 11
20 Colum.J.L.Soc.Prob. 89
Teleinformatics, Transborder Data Flows and the Emerging Struggle for
Information: An Introduction to the Arrival of the New Information Age 1986
ANTHONY PAUL MILLER
Judicature Articles August-September 1989
TECHNOLOGY IN APPELLATE COURTS: THE NINTH CIRCUIT'S EXPERIENCE WITH ELECTRONIC
MAIL Stephen L. Wasby 73 JUDICATURE 90
Judicature Focus August-September, 1988
TECHNOLOGY COMES TO THE COURTS Paul Nejelski 72 JUDICATURE 136
38 Cath.U.L.Rev. 401
THE FIRST AMENDMENT INVALIDITY OF FCC OWNERSHIP REGULATIONS Winter, 1989
Jonathan W. Emord 38 CATHULR 401
38 Cath.U.L.Rev. 299
RED LIONS, TIGERS AND BEARS; BROADCAST CONTENT REGULATION AND THE FIRST
AMENDMENT Winter, 1989 Charles D. Ferris Terrence J. Leahy
38 CATHULR 299
38 Cath.U.L.Rev. 471
THE DIVERSITY PRINCIPLE AND THE MFJ INFORMATION SERVICES RESTRICTION: APPLYING
TIME-WORN FIRST AMENDMENT ASSUMPTIONS TO NEW TECHNOLOGIES Winter, 1989
Richard A. Hindman 38 CATHULR 471
57 Geo. Wash. L. Rev. 1459
THE FIRST AMENDMENT AND TECHNOLOGICAL CHANGE: THE NEW MEDIA HAVE A MESSAGE
August 1, 1989 M. Ethan Katsh 57 GWLR 1459
57 Geo. Wash. L. Rev. 1495
ON UNDERSTANDING THE FIRST AMENDMENT STATUS OF CABLE: SOME OBSTACLES IN THE WAY
August 1, 1989 Jerome A. Barron 57 GWLR 1495
38 Emory L.J. 715
THE ILLEGITIMACY OF THE PUBLIC INTEREST STANDARD AT THE FCC July 1, 1989
William T. Mayton 38 EMORYLJ 715
PLI Order No. G4-3826/1
Cable Television Law 1989: Dealing with the New Challenges
TELEPHONE COMPANY ENTRY INTO VIDEO PROGRAMMING March 1, 1989 Frank W. Lloyd
266 PLI/Pat 9
87 Mich.L.Rev. 499
FREE SPEECH AND THE 'ACID BATH': AN EVALUATION AND CRITIQUE OF JUDGE RICHARD
POSNER'S ECONOMIC INTERPRETATION OF THE FIRST AMENDMENT November, 1988
Peter J. Hammer 87 MILR 499
86 Mich.L.Rev. 1269 QUESTIONING BROADCAST REGULATION May, 1988
Jonathan Weinberg 86 MILR 1269
1988 Duke L.J. 329 CABLE TELEVISION AND THE FREEDOM OF EXPRESSION
April/June, 1988 Daniel Brenner 1988 DUKELJ 329
VI Yale L. Pol'y Rev. 449
Ad Hoc Access: The Regulation of Editorial Advertising on Television and Radio
1988 Rhonda Brown VI YLLPR 449
39 Hastings L.J. 165
The TRAC to Fairness: Teletext and the Political Broadcasting Regulations
November, 1987 GAIL A. FLESHER 39 HSTLJ 165
21 U.Mich.J.L.Ref. 137
THE RIGHT TO SPEAK, THE RIGHT TO HEAR, AND THE RIGHT NOT TO HEAR: THE
TECHNOLOGICAL RESOLUTION TO THE CABLE/PORNOGRAPHY DEBATE Fall/Winter, 1987-88
Michael I. Meyerson 21 UMIJLR 137
8 Cardozo L.Rev. 317
AN EXCESS OF ACCESS: THE CABLE COMMUNICATIONS POLICY ACT OF 1984 AND FIRST
AMENDMENT PROTECTION OF EDITORIAL DISCRETION December, 1986 Adam R. Spilka
8 CDZLR 317
75 Geo.L.J. 361 A Press Privilege for the Worst of Times
October, 1986 David Joseph Onorato
35 Emory L.J. 563
CABLE LEASED ACCESS AND THE CONFLICT AMONG FIRST AMENDMENT RIGHTS AND FIRST
AMENDMENT VALUES Summer, 1986 William E. Lee
XX Suffolk U.L.Rev. 1 FREE SPEECH IN AN ECONOMIC PERSPECTIVE
Spring, 1986 Richard A. Posner
33 U. Kan. L. Rev. 305
INDEPENDENT BUT INADEQUATE: STATE CONSTITUTIONS AND PROTECTION OF FREEDOM OF
EXPRESSION Winter, 1985 Todd F. Simon
58 S.Cal.L.Rev. 1351 CONTROLLING THE CONTENT OF PRINT AND BROADCAST
September, 1985 MATTHEW L. SPITZER
22 Harv.J.Legis. 503
TELEPHONE PORNOGRAPHY: FIRST AMENDMENT CONSTRAINTS ON SHIELDING CHILDREN FROM
DIAL-A-PORN Summer, 1985 JOHN C. CLEARY
133 U. Pa. L. Rev. 661
A PROPOSED MODEL OF THE SOVEREIGN/PROPRIETARY DISTINCTION March, 1985
Teresa Gillen
98 Harv.L.Rev. 747
INFORMATION TECHNOLOGY AND THE STRUCTURE OF SECURITIES REGULATION
February, 1985 Donald C. Langevoort
98 Harv.L.Rev. 205
Leading Cases of the 1983 Term--Constitutional Law: Freedom of Speech, Press,
and Association--Restrictions on Public Broadcasters' Rights to Editorialize
November, 1984 98 HVLR 205
38 U.Miami L.Rev. 769
A Common Law for the Ages of Intellectual Property Septemer, 1984
DAN ROSEN
25 Harv. Int'l L.J. 299
The British Telecommunications Decision: Toward a New Telecommunications Policy
in the Common Market March, 1984 Slida A. Wall
8 Nova L.J. 631
Communications Revolutions and Legal Revolutions: The New Media and the Future
of Law March, 1984 M. Ethan Katsh
82 Mich.L.Rev. 981 FREE SPEECH AND HIGH TECH February, 1984
Francis Dummer Fisher 82 MILR 981
XIII Fordham Urb.L.J. 801
ELECTRONIC PUBLISHING: FIRST AMENDMENT ISSUES IN THE TWENTY-FIRST CENTURY
1984 Lynn Becker
97 Harv.L.Rev. 584
SAFEGUARDING THE FIRST AMENDMENT IN THE TELECOMMUNICATIONS ERA TECHNOLOGIES OF
FREEDOM. By Ithiel de Sola Pool. Cambridge, Massachusetts: Belknap Press
of Harvard University Press. 1983. Pp. 299. $20. December, 1983
Mario L. Baeza
36 Vand.L.Rev. 985
Global Governance of Global Networks: A Survey of Transborder Data Flow in
Transition May, 1983 Anne W. Branscomb 36 VNLR 985
38 Cath.U.L.Rev. 365
INFORMATION AS PROPERTY: DO RUCKELSHAUS AND CARPENTER SIGNAL A CHANGING
DIRECTION IN INTELLECTUAL PROPERTY LAW? Winter, 1989 Pamela Samuelson
38 CATHULR 365
47 U.Pitt.L.Rev. 1185
ALLOCATING OWNERSHIP RIGHTS IN COMPUTER-GENERATED WORKS Summer, 1986
Pamela Samuelson
47 U. Pitt. L. Rev. 1131
THE UNCERTAIN CASE FOR SPECIAL LEGISLATION PROTECTING COMPUTER SOFTWARE
Summer, 1986 Leo J. Raskind
32 Wayne L.Rev. 1191
PROPOSED JUDICIAL GUIDELINES FOR DECIDING SOFTWARE INFRINGEMENT ACTIONS
Spring, 1986 SUSAN L. MASHOUR
16 Rutgers Computer and Tech.L.J. 323
DIGITAL MEDIA AND THE CHANGING FACE OF INTELLECTUAL PROPERTY LAW
Winter, 1990 Pamela Samuelson
_____________________________________________________________________
| Tim Wolfson | Internet: tcwst@unix.cis.pitt.edu |
| Pitt Law | CCNet : tcwst@CISUNX |
| PGH, PA 15260 | UUCP : tcwst@cisunx.uucp |
| (412) 486-0182 | Bitnet : TCWST@PITTVMS.BITNET |
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+