Protecting corporate intellectual property: Legal and technical approaches

Document Type

Journal Article

Publication Title

Business Horizons

Publisher

Elsevier

Place of Publication

United States

School

Security Research Institute

RAS ID

22825

Comments

Crowley, M.G., & Johnstone, M.N. (2016). Protecting corporate intellectual property: Legal and technical approaches. Business Horizons, 59(6), 623-633. Available here.

Abstract

The recent FBI v. Apple case has the potential to turn a 227-year-old statute law into a tool for government agencies to gain access to personal and corporate information. Recent events such as ‘Petraeus-gate,’ hacked nude celebrity photos in the cloud, and the use of a search and seizure warrant in the United States seeking customer email contents on an extraterritorial server raise important issues for the supposedly safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This article explores the legal and technical issues raised by these matters, with emphasis on the court decision In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation and the subsequent upholding of that decision. © 2016

DOI

10.1016/j.bushor.2016.08.004

Access Rights

subscription content

Share

 
COinS