Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

A Sociological Approach To Misappropriation, Elizabeth A. Rowe Oct 2009

A Sociological Approach To Misappropriation, Elizabeth A. Rowe

UF Law Faculty Publications

Social science and law are not strangers. In analyzing legal issues, scholars have often utilized theoretical or methodological approaches from the social sciences. While economics appears to be the prevalent branch of social science in legal analysis, sociology, with its focus on group (as opposed to individual) behavior, can be a suitable approach where, for instance, the application and interpretation of the law is based largely on contextual factors and on behavior. Trade secret law is one of these areas. Public policy arguments and value judgments loom large in these cases. Trade secret law regulates commercial ethics and morality, and …


Privilege-Wise And Patent (And Trade-Secret)-Foolish?: How The Courts' Misapplication Of The Military And State Secrets Privilege Violates The Constitution And Endangers National Security, Davida H. Isaacs, Robert M. Farley Jan 2009

Privilege-Wise And Patent (And Trade-Secret)-Foolish?: How The Courts' Misapplication Of The Military And State Secrets Privilege Violates The Constitution And Endangers National Security, Davida H. Isaacs, Robert M. Farley

Faculty Scholarship

It is every inventor's nightmare: a valuable idea, stolen, with no legal recourse. Yet that is precisely what happened in Lucent v. Crater, where the Federal Circuit permitted the Federal Government to defeat the inventors' claims using the military and state secrets privilege. In light of the recent upsurge in the Government's invocation of this privilege, it is time to scrutinize more carefully courts' highly deferential response to its use. There is little question that the executive branch must be able to invoke the privilege in order to ensure that national security is not imperiled by public disclosure of information. …