Home > JITPL > Vol. 2 > Iss. 1 (1980)
UIC John Marshall Journal of Information Technology & Privacy Law
Volume 2 (1980), Issue 1 (1980) Computer/Law Journal - 1980
Articles
An Overview of the Legal Issues Confronting the Establishment of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980)
Melvin R. Katskee and Ann L. Wright
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980)
Robert Haydock Jr.
Terminal-Based EFT Services: The Need for Uniform Federal Legislation, 2 Computer L.J. 31 (1980)
Theresa A. Einhorn
Problems of Proof When There's a Computer Goof: Consumers Versus ATMs, 2 Computer L.J. 49 (1980)
Mark Budnitz
Authentication in EFT: The Legal Standard and the Operational Reality, 2 Computer L.J. 67 (1980)
Fred M. Greguras and David J. Sykes
Is Corporate EFT Coming of Age?, 2 Computer L.J. 87 (1980)
James W. Trotter
Legal Guidelines for Check Truncation, 2 Computer L.J. 115 (1980)
George C. White Jr.
Case Digest, 2 Computer L.J. 171 (1980)
Michael D. Scott
The Investigation, Prosecution, and Prevention of Computer Crime: A State-of-the-Art Review, 2 Computer L.J. 385 (1980)
Mary R. Volgyes
On Charging Computer Crime, 2 Computer L.J. 429 (1980)
Donald G. Ingraham
Computer Crimes Bibliography, 2 Computer L.J. 787 (1980)
Linda A. Schulte
Tax-Exempt Bond Financing of Computer Telecommunications and other High Technology Facilities, 2 Computer L.J. 805 (1980)
Fred M. Greguras
A Guide to the Use of Computers to Estimate Damages in Complex Litigation, 2 Computer L.J. 863 (1980)
Jack W. Fleming
Possible Implications of the Cost/Benefit Analysis Requirement for Regulations Under the Electronic Funds Transfer Act, 2 Computer L.J. 891 (1980)
Ralph L. Stiffler Krog
Book Reviews
Book Reviews, 2 Computer L.J. 773 (1980)
Steven I. Smith and Michael D. Scott
News Article
Case Digest, 2 Computer L.J. 777 (1980)
Drew Pomerance