Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Law
Criminal Trade Secret Theft Cases Against Judgment Proof Defendants In Texas And California, Michelle Evans, Kurt M. Saunders
Criminal Trade Secret Theft Cases Against Judgment Proof Defendants In Texas And California, Michelle Evans, Kurt M. Saunders
William & Mary Business Law Review
Trade secret theft is a costly and ongoing risk to many businesses. As the two most populous states, California and Texas are home to numerous businesses that own trade secrets. Although civil remedies afford one source of relief when a trade secret has been stolen or disclosed, collecting on a judgment may be impossible due to the Homestead laws in both states, which effectively render the defendants judgment proof. In such cases, another alternative is to consider a criminal prosecution under the Federal Economic Espionage Act or state law. The same misconduct that results in civil liability can also violate …
Snapshot Of Trade Secret Developments, Elizabeth A. Rowe
Snapshot Of Trade Secret Developments, Elizabeth A. Rowe
William & Mary Law Review Online
As we enter the second year of the DTSA, this Article presents a snapshot of developments to assess whether there appears to be any significant doctrinal changes afoot in trade secret litigation— including civil and/or criminal—during the past year. Professors David Levine and Christopher Seaman provided some empirical data and quantitative analysis of the case filings during the first year of litigation under the DTSA (from May 2016 to May 2017). This Article complements their excellent work by taking a qualitative look at some of the substantive rulings from the following year. My assessment based on this limited sampling is …
Causing Damage Without Authorization: The Limitations Of Current Judicial Interpretations Of Employee Authorization Under The Computer Fraud And Abuse Act, Garrett D. Urban
Causing Damage Without Authorization: The Limitations Of Current Judicial Interpretations Of Employee Authorization Under The Computer Fraud And Abuse Act, Garrett D. Urban
William & Mary Law Review
No abstract provided.
Trademarks And The Boundaries Of The Firm, Dan L. Burk, Brett H. Mcdonnell
Trademarks And The Boundaries Of The Firm, Dan L. Burk, Brett H. Mcdonnell
William & Mary Law Review
Coase's theory of the firm has become a familiar tool to analyze the structure and organization of businesses. Such analyses have increasingly focused on property-based theories of the firm, including intellectual property. In previous work we have discussed the application of this model to patents, copyrights, and trade secrets. Here we take up the theory of the firm with regard to trademarks, which act as signals of firm reputation, and so have application and effects that differ substantially from other forms of intellectual property. Using the framework from our previous analyses, we examine the propensity of trademarks to lower transaction …
Accomodation Of Federal Patents And The State Interest In Trade Secrets
Accomodation Of Federal Patents And The State Interest In Trade Secrets
William & Mary Law Review
No abstract provided.