Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo Jan 2016

Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo

Brooklyn Journal of Corporate, Financial & Commercial Law

Trade secrets are one of a corporation’s most valuable assets. However, they lack adequate protection under federal law, leaving them vulnerable to theft and misappropriation. As technology advances, it becomes easier and less time consuming for individuals and entities to access and steal trade secrets to a corporation’s detriment. Most often these thefts involve stealing trade secrets in an intangible form. Current legislation fails to adequately protect intangible trade secrets, leaving them vulnerable to theft. An amendment to the National Stolen Property Act that encompasses intangible trade secrets would close a loophole that currently exists relating to intangible assets, allowing …


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …