Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Entire DC Network
Canada's Inadequate Legal Protection Against Industrial Espionage, Emir Crowne, Tasha De Freitas
Canada's Inadequate Legal Protection Against Industrial Espionage, Emir Crowne, Tasha De Freitas
Chicago-Kent Journal of Intellectual Property
Canadian law provides little protection for individuals and corporations against industrial espionage. Akin to the United States' Economic Espionage Act of 1996-with its broad definition of "trade secret" and accompanying protections and remedies-we propose that Canada enact legislation at the federal level to remedy many of the deficiencies that arise in bringing a claim under the usual breach of confidence action.
The Tragedy Of The Commons: A Hybrid Approach To Trade Secret Legal Theory, Jonathan R.K. Stroud
The Tragedy Of The Commons: A Hybrid Approach To Trade Secret Legal Theory, Jonathan R.K. Stroud
Chicago-Kent Journal of Intellectual Property
Current theories governing trade secrets law incompletely and inadequately protect substantial investment in innovation, rendering them inefficient, reactionary, and largely illusory. Trade secret law exists to fill a gap between other forms of intellectual property and to encourage substantial investment in innovation and to recoup the time and money expended pursuing it, to the long-term benefit of the greater public good. Without strong trade secret protections, the “tragedy of the commons” would lead to the unfair destruction of the fruits of capital and labor and discourage investment in activities calculated to benefit the public, thus hurting our society. I propose …
Crimes Involving Intangible Property, Thomas G. Field
Crimes Involving Intangible Property, Thomas G. Field
The University of New Hampshire Law Review
[Excerpt] “A well-known cliché came to life when “[t]he pope’s butler was convicted . . . of stealing the pontiff’s private documents and leaking them to a journalist . . . .” His lawyer’s unsuccessful argument—that taking “only photocopies, not original documents” should not be criminal—prompted this paper.
When tangible property is taken, owners retain nothing. When documents or equivalents are duplicated, however, even if owners retain originals, they suffer loss of control and may lose substantial present and potential advantages, not necessarily economic. Civil redress for such losses has therefore long been available through copyright and trade secret laws. …
Two Notes On Evidence: Privileges And Hearsay, J. W. Deese
Two Notes On Evidence: Privileges And Hearsay, J. W. Deese
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Pepperdine Law Review
The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.
Whose Social Network Account: A Trade Secret Approach To Allocating Rights, Zoe Argento
Whose Social Network Account: A Trade Secret Approach To Allocating Rights, Zoe Argento
Michigan Telecommunications & Technology Law Review
Who has the superior right to a social network account? This is the question in a growing number of disputes between employers and workers over social network accounts. The problem has no clear legal precedent. Although the disputes implicate rights under trademark, copyright, and privacy law, these legal paradigms fail to address the core issue. At base, disputes over social network accounts are disputes over the right to access the people, sometimes numbering in the tens of thousands, who follow an account. This Article evaluates the problem from the perspective of the public interest in social network use, particularly the …