Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Who Are These People? New Generation Employees And Trade Secrets, Elizabeth A. Rowe Sep 2008

Who Are These People? New Generation Employees And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Traditional approaches to examining the efficacy of trade secret protection in the workplace are often focused on technological and process based measures. Indeed, much attention has focused on the use of technology, by itself, to stem trade secret misappropriation. This Article offers a novel approach to the problem by incorporating contextual factors that might be important to trade secret protection and focuses on the people. It also, for the first time, applies sociological theories about employee theft to trade secret misappropriation. Working from the outside in, the Article examines first the reported societal effects on the values of those workers …


Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe Sep 2008

Rethinking "Reasonable Efforts" To Protect Trade Secrets In A Digital World, Elizabeth Rowe

Elizabeth A Rowe

The very technological tools in use today that increase the efficiency with which companies do business create challenges for trade secret protection. They make trade secrets easier to store, easier to access, easier to disseminate, and more portable, thus increasing the risks that trade secrets will be destroyed. While secrecy is the sine qua non of trade secret protection, it can be difficult to accomplish. There is a tension between the need to keep information secret and modern technological methods that allow the information to be easily accessed, reproduced, and disseminated. In trade secret misappropriation cases, courts evaluate the sufficiency …


Ceo Postings: Leveraging The Internet’S Communications Potential While Managing The Message To Maintain Corporate Governance Interests In Information Security, Reputation And Compliance, Margo E. K. Reder May 2008

Ceo Postings: Leveraging The Internet’S Communications Potential While Managing The Message To Maintain Corporate Governance Interests In Information Security, Reputation And Compliance, Margo E. K. Reder

Margo E. K. Reder

CEO POSTINGS –

LEVERAGING THE INTERNET’S COMMUNICATIONS POTENTIAL WHILE MANAGING THE MESSAGE TO MAINTAIN CORPORATE GOVERNANCE INTERESTS IN INFORMATION SECURITY, REPUTATION AND COMPLIANCE

By Margo E. K. Reder

For approximately eight years, Whole Foods Market, Inc. [Whole Foods] CEO John Mackey posted messages to Yahoo! Financial’s online message board for Whole Foods. Rather than using his real name, Mr. Mackey like many posters to chat rooms, created an online alter ego and posted his comments under a pseudonym. As “Rahodeb” Mr. Mackey promoted his Whole Foods chain, boasted about personal stock gains in Whole Foods stock, company plans and performance …


Identifying And Keeping The Genie In The Bottle: The Practical And Legal Realities Of Trade Secrets In Bankruptcy Proceedings, Sharon Sandeen Jan 2008

Identifying And Keeping The Genie In The Bottle: The Practical And Legal Realities Of Trade Secrets In Bankruptcy Proceedings, Sharon Sandeen

Faculty Scholarship

Anyone who has been paid attention to developments in the world of business over the past quarter century can attest to the fact that intellectual property (IP) is a hot commodity. Indeed, in contrast to the companies that emerged out of the Industrial Revolution, the companies that have spawned as part of the so-called “Information Age” attribute much of their value and future prospects to intangible, rather than tangible, assets. Unfortunately, while bankruptcy courts have generally recognized the need to distinguish between tangible and intangible assets, particularly when determining whether a claim is secured or unsecured, they often fail to …