Protecting corporate intellectual property: Legal and technical approaches
Document Type
Journal Article
Publication Title
Business Horizons
Publisher
Elsevier
Place of Publication
United States
School
Security Research Institute
RAS ID
22825
Abstract
The recent FBI v. Apple case has the potential to turn a 227-year-old statute law into a tool for government agencies to gain access to personal and corporate information. Recent events such as ‘Petraeus-gate,’ hacked nude celebrity photos in the cloud, and the use of a search and seizure warrant in the United States seeking customer email contents on an extraterritorial server raise important issues for the supposedly safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This article explores the legal and technical issues raised by these matters, with emphasis on the court decision In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation and the subsequent upholding of that decision. © 2016
DOI
10.1016/j.bushor.2016.08.004
Access Rights
subscription content
Comments
Crowley, M.G., & Johnstone, M.N. (2016). Protecting corporate intellectual property: Legal and technical approaches. Business Horizons, 59(6), 623-633. Available here.