43
Views
0
CrossRef citations to date
0
Altmetric
Miscellany

The Extension of the Criminal Law to Protecting Confidential Commercial Information: Comments on the Issues and the Cyber-Context

Pages 147-162 | Published online: 21 Jul 2010

References

  • Law Commission for England and Wales Legislating the Criminal Code: Misuse of Trade Secrets, Law Com CP 150, 1997, hereinafter Consultation Paper on Misuse of Trade Secrets.
  • Gurry , F . 1984 . Breach of Confidence , 7 – 8 . Oxford : Clarendon Press . Consultation Paper on Misuse of Trade Secrets, para 3.1
  • Hull , J . 1998 . Commercial Secrecy: Law and Practice , 3 – 4 . London : Sweet & Maxwell .
  • Dean , R . 1990 . Law of Trade Secrets , 8 – 10 . Sydney : Law Book Company .
  • Pooley , J . 1997 . Trade Secrets , New York : Law Journal Seminars Press . Section 1.03[3]
  • Jager , M F . 1996 . Trade Secrets Law , West Group . Section 1.04
  • Arup , C . 1993 . Innovation, Policy and Law , 123 Cambridge University Press .
  • Davies , R B and Saltmarsh , G . 1995 . “ 'An international overview of the incidence of economic crime' ” . In The Regulation and Prevention of Economic Crime Internationally , Edited by: Reuvid , J . 91 – 112 . London : Kogan Page .
  • Thorburn , J A . 1996 . 'Defining confidential business information' . SPG International Law Practicum , 9 : 6 – 8 . See generally on the problem of definition
  • Fairbairn , K G and Thorburn , J A . 1998 . Law of Confidential Business Information , Aurora : Canada Law Book . ch. 3
  • DuVal , B S . 1986 . 'The occasions of secrecy' . University of Pittsburgh Law Review , 47 : 579 588 Faccenda Chicken Ltd v Fowler [1986] 1 All ER 617, 627
  • Landes , W , Posner , R and Friedman , D . 1991 . 'Some economics of trade secret law' . Journal of Economic Perspectives , 5 : 61
  • 1992 . 'Trade secret misappropriation: a cost-benefit response to the Fourth Amendment analogy' . Harvard Law Review , 106 : 461
  • Atkins , B . 1996 . 'Trading secrets in the information age: can trade secret law survive The Internet?' . University of Illinois Law Review , 4 : 1151 1152 – 1154 .
  • Cundiff , V A . 1997 . 'Trade secrets and The Internet: a practical perspective' . Computer Law , 14 : 6 7
  • Denning , D E . 1999 . Information Warfare and Security , New York : ACM Press . These latter situations are more appropriately addressed in a political forum between governments and can be excluded from this discussion, see
  • Fraumann , E . 1997 . 'Economic espionage: security missions redefined' . Public Administration Review , 57 : 303
  • Mossinghoff , G , Mason , J D and Oblon , D . 1997 . 'The Economic Espionage Act: a new federal regime of trade secret protection' . Journal of the Patent Office and Trademark Society , 79 : 191 192 – 193 .
  • Porteous , S . 1995 . “ 'Economic/commercial interests and intelligence services' ” . Commentary No 59 Ottawa : CSIS .
  • 1996 . “ 'Economic security' ” . Ottawa : CSIS . For an economic treatment of these issues
  • Whitney , M and Gaisford , J . 1996 . 'Economic espionage as strategic trade policy' . Canadian Journal of Economics , : 627
  • Weinrib , A S . 1988 . 'Information and property' . University of Toronto Law Journal , 36 : 117 133 For example, Murray v Yorkshire Fund Managers Ltd [1998] 1 W L R 951; Boardman v Phipps [1967] 2 AC 46, 107
  • Penner , J E . 1997 . The Idea of Property in Law , 119 Oxford : Clarendon Press .
  • Nigri , D Fisch and Harris , J W . 1997 . “ 'Theft of information and the concept of property in the information age' ” . In Property Problems, From Genes to Pensions , 48 – 60 . London : Kluwer . For a general review of the law on this point, see
  • Dean , R . The Law of Trade Secrets 53 – 83 .
  • Ricketson , S . 1977 . 'Confidential information--a new proprietary interest' . Melbourne University Law Review , 11 : 223 – 245 . 289 – 315 .
  • Weinrib , A S . “ 'Information and property' ” . 117
  • Stuckey , J E . 1981 . 'The equitable action for Breach of confidence: is information ever property?' . Sydney Law Review , 9 : 402
  • Soltysinski , S J . 1986 . 'Are trade secrets property?' . International Review of Industrial Property & Copyright Law , 3 : 331
  • Nimmer , R T and Krauthaus , P A . 1992 . 'Information as a commodity: new imperatives of commercial law' . Law & Contemporary Problems , 55 : 103 For a general review of the American position, see
  • Beckerman-Rodau , A . 1994 . 'Are ideas within the traditional definition of property: a jurisprudential analysis' . Arkansas Law Review , 47 : 603
  • Goff , Lord and Jones , G . 1993 . The Law of Restitution , 4th edn , London : Sweet & Maxwell . ch 35-36
  • Birks , P . 1989 . An Introduction to the Law of Restitution , 343 – 346 . Oxford : Clarendon Press .
  • Friedmann , D . 1998 . “ 'Restitution for wrongs: the basis of liability' ” . In Restitution: Past, Present and Future , Edited by: Cornish , W R , Nolan , R , O'Sullivan , J and Virgo , G . 133 – 154 . 150 Oxford : Hart Publishing .
  • Cross , J T . 1991 . 'Protecting confidential information under the criminal law of theft and fraud' . Oxford Journal of Legal Studies , 11 : 264
  • Tunkel , V . 1995 . 'Industrial espionage: what can the law do?' . Denning Law Journal , : 99 103
  • Jones , G . “ 'Restitution of benefits obtained in breach of another's confidence' ” . 463
  • Wacks , R . 1995 . Privacy and Press Freedom , 61 London : Blackstone Press . Franklin v Giddens [1978] Qd. R. 72
  • Cornish , W R . 1975 . 'Protection of confidential information in English law' . International Review of Industrial Property & Copyright Law , 6 : 43 50 53
  • Kitch , E . 1996 . 'The expansion of trade secrecy protection and the mobility of management employees: a new problem for the law' . South Carolina Law Review , 47 : 659
  • Whitaker , R . 1999 . The End of Privacy , 55 New York : WW Norton .
  • Hanlon-Leh , N . 1998 . 'Lessons from cyberspace and outerspace: the scientology cases' . Summer Brief , 17 : 48 RTC and Bridge Publications Inc. v FACT NET Inc., Wollersheim and Penny, 901 F. Supp. 1519 (D Colo., 1995) and 901 F. Supp. 1528 (D. Colo., 1995); RTC v Lerma, 908 F. Supp. 1353 (ED Va, 1995). See
  • Lynch , G E . 1997 . 'The role of the criminal law in policing corporate misconduct' . Law & Contemporary Problems , 60 : 23 64
  • Steele , C and Trenton , A . 1998 . 'Trade secrets: the need for criminal liability' . European Intellectual Property Law Review , 20 ( 5 ) : 188 192
  • Bone , R G . 1998 . 'A new look at trade secrets law: doctrine in search of justification' . University of California Law Review , 86 : 241 296
  • Kitch , E . 1980 . 'The law and economics of rights in valuable information' . Journal of Legal Studies , 13 : 683 Ruckelhaus v Monsanto Co, 467 US 986 (1984). See R Milgrim Trade Secrets, Section l.7 for the authoritative American position respecting the incorporation of both proprietary and tort approaches to the protection of trade secrets. Also, M Jager Trade Secrets Law, Section 4-15
  • Deutch , M . 1997 . 'The property concept of trade secrets in anglo-American law: an ongoing debate' . University of Richmond Law Review , 31 : 313
  • Jones , G . 1970 . 'Restitution of benefits obtained in breach of another's confidence' . Law Quarterly Review , 86 : 63 464 Gurry Breach of Confidence, pp 58-61; Cadbury Schweppes Inc v FBI Foods Inc (1999), 167 DLR (4th) 577; Lac Minerals Ltd v International Corona Resources Ltd (1989), 61 DLR (4th) 14, 47 (SCC); Aquaculture Corp. v. New Zealand Green Mussel Co. Ltd (1985), 5 IPR 353 (NZCA); Moorgate Tobacco Co. Lt. v Philip Morris (No.2) (1984), 156 CLR 414 (Aust HC)
  • Meagher , R P , Gummow , W M C and Lehane , J R F . 1992 . Equity Doctrines and Remedies , 3rd edn , Sydney : Butterworths . Kitechnology B V v Unicor Gmbh [1995] FSR 765, para 4103
  • Hicks , L L and Holbein , J R . 1997 . 'Convergence of national intellectual property norms in international trading arrangements' . American University Journal of International Law & Policy , 12 : 769
  • Reichman , J H . 1993 . 'Beyond the historical lines of demarcation: competition law, intellectual property rights, and international trade after GATT's Uruguay Round' . Brooklyn Journal of International Law , 20 : 75 76
  • Shaker , S M and Gembicki , M P . 1999 . The WarRoom Guide to Competitive Intelligence , 223 – 228 . New York : McGraw Hill . ASIS conducts research on industrial property losses; see the 1998 Report, covering 1996-1997, by R Heffernan and D Swartwood ASIS, 1998. A similar survey is the 1996 Information Systems Security Survey in
  • Fialka , J . 1997 . War by Other Means: Economic Espionage in America , New York : WW Norton & Co . For example
  • 1996 . 'Stealing the spark: why economic espionage works in America' . Washington Quarterly , 19 : 175
  • Winkler , I . 1997 . Corporate Espionage , Prima Publishing .
  • Parad , B. 1997 . Commercial Espionage: 79 Ways Competitors Can Get Any Business Secret , Skokie : Global Connection . are just a few of the books recently published
  • Burr , S L . 1996 . 'Protecting business secrets in national and international commerce' . Science Communication , 17 : 274
  • Mock , L F and Rosenbaum , D . 1988 . “ 'A study of trade secrets theft in high technology industries' ” . Washington : US National Institute of Justice .
  • Ballon , I C . 1997 . 'The law of The Internet: developing a framework for making new law (II)' . Cyberspace Law , 10 : 16
  • Hanley , S M . 1998 . 'International internet regulation: a multinational approach' . John Marshall Journal of Computer & Information Law , 16 : 997
  • Basler , R P , Pratt , M D and Dunlap , L A . 1953 . The Collected Works of Abraham Lincoln , New Brunswick : Rutgers University Press . Lecture on Discoveries and Inventions, supplemented

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.