Faculty & Staff Directory

Photo of John  T. Soma

Faculty Publications

View Profile »

John T. Soma

Professor

Publications

  • Privacy Law in a Nutshell, co-authored with Stephen D. Rynerson and Erica Kitaev, 2nd edition (Thomson/West Publishing) (March 2014).
  • Chasing the Clouds without Getting Drenched: A Call for Fair Practices in Cloud Computing Services, co-authored with Melody Mosley Gates, Maury Nichols, and Ana Guitierrez, 16 Journal of Technology Law and Policy 193 (2011).
  • Bit-Wise But Privacy Foolish: Smarter E-Messaging Technologies Call for a Return to Core Privacy Principles, co-authored with Melody Mosley Gates and Michael Smith, 20 Albany Law Journal of Science and Technology 487 (2010).
  • Corporate Privacy Trend: The “Value” of Personally Identifiable Information (“PII”) Equals the “Value” of Financial Assets, 15 RICH. J.L. & TECH. 11 (2009) (co-author).
  • Privacy Law Nutshell, Thompson-West 2008.
  • Balance of Privacy vs. Security: A Historical Perspective of the USA PATRIOT Act, co-authored with Maury M. Nichols, Stephen D. Rynerson, Lance A. Maish, & Jon David Rogers, 31 Rutgers Computer & Tech. L.J. 285 Rutgers Computer and Technology Law Journal 2005.
  • An Analysis of the Use of Bilateral Agreements between Transnational Trading Groups: The U.S./EU E-Commerce Privacy Safe Harbor, co-authored with Stephen D. Rynerson & Britney D. Beall-Eder, 39 Tex. Int'l L.J. 171 Texas International Law Journal Winter 2004 Article.
  • International Take-Down Policy: A Proposal for the WTO and WIPO to Establish International Copyright Procedural Guidelines for Internet Service Providers, co-authored with Natalie A. Norman, 22 Hastings Comm. & Ent. L.J. 391 Hastings Communications and Entertainment Law Journal (COMM/ENT) Spring Summer 2000 Article.
  • Multinational Economic Netowrk Effects and the Need for an International Antitrust Response from the World Trade Organization: A Case Study in Broadcast - Media and News Corporation, co-authored with Eric K. Weingarten, 21 U. Pa. J. Int'l Econ. L. 41 University of Pennsylvania Journal of International Economic Law Spring 2000 Article.
  • Network Effects in Technology Markets: Applying the Lessons of Intel and Microsoft to Future Clashes between AntiTrust and Intellectual Property, co-authored with Kevin B. Davis, 8 J. Intell. Prop. L. 1 Journal of Intellectual Property Law Fall, 2000 Articles.
  • Sofware Patents: A U.S. and E.U. Comparison, co-authored with Kurt Leyendecker & Steven L. Webb, 8 U. Balt. Intell. Prop. L.J. 1 University of Baltimore Intellectual Property Law Journal Spring 2000 Article.
  • Encryption, Key Recovery, and Commercial Trade Secret Assets: A Proposed Legislative Model, co-authored with Charles P. Henderson, 25 Rutgers Computer & Tech. L.J. 97 Rutgers Computer and Technology Law Journal 1999 Article.
  • The Essential Facilities Doctrine in the Deregulated Telecommunications Industry, co-authored with David A. Forkner & Brian P. Jumps, 13 Berkeley Tech. L.J. 565 Berkeley Technology Law Journal Spring 1998 Article.
  • Transnational Extradition for Computer Crimes: Are New Treaties and Law Needed?, co-authored with T. Muther and H.Brissette, 34 Harvard J on Legislation 317 (1997).
  • Antitrust Pitfalls in Licensing, co-authored with Sharon K. Black & Alexander R. Smith, Practising Law Institute PLI Order No. G4-3968 June & July, 1996 Intellectual Property Antitrust 1996.
  • Computer Crime Investigation & Prosecution: Substantive Statutes & Technical and Legal Search Considerations, co-authored with E. Banker and A. Smith, Air Force L.R. (1996).
  • Computer Crime: Substantive Statutues & Technical & Legal Search Considerations, co-authored with Alexander R. Smith & Elizabeth A. Banker, 39 A.F. L. Rev. 225 Air Force Law Review 1996.
  • Computer Law: Cases - Comments and Questions, co-authored with Peter B. Maggs and James A. Sprowl, West Publishing (1991) (Including Teachers Manual) (1996 Supplement).
  • Computer Technology and the Law, McGraw Hill, Colorado Springs, Colorado (1983) (Annual Supplements through 1999). (1996).
  • Software Maintenance License Prohibitions in the EU and the US, 27 IIC 804 (No. 6 1996) (Max Planck Institute, Munich Germany).
  • The Internet and the Single Document Rule: Searching for the Four Corners of the Electronic Paper, co-authored with Alexander Neudeck, 78 J Pat & Trademark Office Society 751 (1996).
  • Legal Guide to Computer Crime: A Primer For Investigators and Lawyers, co-authored with E. Banker and A. Smith, Office of the Staff Judge Advocate, Air Force Office of Special Investigations, United States Air Force, 1995.
  • Minimizing Reverse Engineering: Sample Language for Dueal United States and European Union Software Licenses, co-authored with Sharon K. Black-Keefer & Alexander R. Smith, 24 Denv. J. Int'l L. & Pol'y 145 Denver Journal of International Law and Policy Fall, 1995.
  • Software Interoperability and Reverse Engineering, co-authored with Gus Winfield & Letty Friesen, 20 Rutgers Computer & Tech. L.J. 189 Rutgers Computer and Technology Law Journal 1994 Symposium: Current Issues of Software Copyrightability.
  • The Use of Quiet Title and Declaratory Judgment Proceedings in Computer Software Ownership Disputes, co-authored with James Shortall, Jr. & Vernon A. Evans, 71 Denv. U. L. Rev. 543 Denver University Law Review 1994.
  • A Practical Guide to Discovering Computerized Files in Complex Litigation, co-authored with Steven G. Austin, 11 Rev. Litig. 501 Review of Litigation Summer, 1992.
  • A Proposed Legal Advisors' Road map for Software Developers: On the Shoulders of Giants May No Mudball Stand, co-authored with Robert D. Sprague, M. Susan Lombardi, and Carolyn M. Lindh, 191 Denver Law Journal 68, (Spring 1991 Symposium Issue).
  • Summary Judgment and Discovery Strategies in Antitrust and RICO Actions After Matsushita v. Zenith, co-authored with Andrew P. McCallin, 36 The Antitrust Bulletin 325 (1991).
  • Advising Software Developers: Avoiding Copyright Infringements As Tough With Inconsistent Case Rules, co-authored with Robert Sprague, 9 Preventive L. R. 23 (1990).
  • Computer Security and the Protection of Sensitive But Not Classified Data: The Computer Security Act of 1987, co-authored with Elizabeth J. Bedient, 30 A.F.L. Rev. 135 (1989).
  • Software Patenting Trends: Who's Getting How Many of What?, co-authored with B.F. Smith, 1978-1987, J. Patent & Trademark Office Spring 1989.
  • Orwellian Constitutional Issues: Information Privacy, Security, and The New Technology, co-authored with with Susan J. Oran, Constitution 2000 (Chapter 8) (1988) (Carl Vinson Institute of Government, University of Georgia).
  • "Software License and Maintenance Agreements" Chapter on Selecting Software Packages for Financial Institutions co-authored with Sue Oran, (Bank Administration Institute, Chicago, Illinois) (1987).
  • A Comparison of German and U.S. Experiences in Software Copyrights, 6 International Review of Industrial Property and Copyright Law 751 (1987).
  • Cash Management After E.F. Hutton, co-authored with Michael C. Tierney, 170 The Bankers Magazine 25 (1987).
  • The Legal Environment of Commercial Database Administration, co-authored with Jay Batson, 27 Jurimetrics 297 (1987).
  • Computer and Software Law Audits, co-authored with Stephen D. Shirey, 2 Software Law Journal 201 (1986).
  • Book ReviewOut of the Inner Circle: A Hacker's Guide to Computer Security (By Bill Landreth) (Microsoft Press) (Rocky Mountain News, Book Review) (June 1985).
  • Computer Software in Public Schools, 28 Ed. Law Rep. 315 West's Education Law Reporter 1986 Commentary Dwight L. Pringle (1985).
  • Micro Tax Software: A Bargain?, 14 Colo. Law. 393 Colorado Lawyer March, 1985 Carole Thomas.
  • An Economic Analysis of Future Trends on the Development of Information for Lawyers -- Lexis, Juris, Westlaw, and FLITE, 9, Rutgers Computer and Technology Law Journal, (#2) (Aug/Sept 1983, with Andrea R. Stern). Reprinted in the Defense Law J. (April 1984).
  • Confidential Communications and Information In A Computer Era, co-authored with Lorna C. Youngs, 12 Hofstra L. Rev. 849 Hofstra Law Review Summer, 1984.
  • A Legal and Technical Assessment of the Effects of Computers on Privacy, co-authored with Richard A. Wehmhoefer, 60 Denver L.J. 449 (1983).
  • Advertising, Imperfect Competition, and The Market for Legal Services, co-authored with Rodney Peterson, Journal of Behavioral Economics (Winter 1983 Issue).
  • The Communications Regulatory Environment in the 1980's, co-authored with Rodney D. Peterson, Gary Alexander, and Curt W. Petty, Computer/Law Journal 1 (Summer 1983).
  • Antitrust Exposure In The Use of the Mini-Trial, Mini-Trial Handbook, Chapter F, (Edited by Eric D. Green) (Center for Public Resources, New York) (1982).
  • Colorado's Multidistrict Litigation Panel, co-authored with Mac V. Danford, Colorado Lawyer 1982 (October 1988).
  • Corporate and Tax Considerations for Nonprofit Organizations, co-authored with Richard G. Macklin and Peter C. Guthery, Closely Held Corporations in Colorado, Chapter 24) (Edited by Cathy S. Krendl) (Continuing Legal Education in Colorado, Inc. Publishers) (1981).
  • The Computer as a Tool for Legal Decision Making, co-authored with Thomas H. Gonser and Eileen I. Wilhelm, 27 The Practical Lawyer 11 (Sept. 1981).
  • An Antitrust Primer, 1980 Transportation Law Institute-Carrier Liability in an Evolving Regulatory Environment: Claims and Antitrust, p. 189.
  • The Computer Industry: An Economic-Legal Analysis of Its Technology and Growth, Lexington Books, D.C. Heath and Co. Lexington, MA (1976) (2nd printing).
  • A Method for Analyzing, Detecting, and Correcting Multi-collinearity, co-authored with Morris M. Kleiner, Center for Advanced Computation, Document No. 118 (1974), University of Illinois at Urbana-Champaign, Illinois, p. 47.
  • Enforcement Under the Illinois Antitrust Act, 5 Loyola University of Chicago Law Journal 25 (1974).
  • Functional Discounts: A Legal-Economic Concept Permitting New Experiments in Distribution Systems, 14 Santa Clara Lawyer 211 (1974).
  • The Legal Protection of Computer Software, co-authored with Richard M. Fischl, Center for Advanced Computation, Document No. 120 (1974), University of Illinois at Urbana-Champaign, Illinois, p 41.
  • "Antitrust Law -- Belliston V. Texaco, Inc.," 455 2d 175 (10th Circ.), cert. denied, 408 U.S. 929 (1972),", 455 2d 175 (10th Circ.), cert. denied, 408 U.S. 929 (1972).