EconPapers    
Economics at your fingertips  
 

Protecting corporate intellectual property: Legal and technical approaches

Michael G. Crowley and Michael N. Johnstone

Business Horizons, 2016, vol. 59, issue 6, 623-633

Abstract: The recent FBI v. Apple case has the potential to turn a 227-year-old statute law into a tool for government agencies to gain access to personal and corporate information. Recent events such as ‘Petraeus-gate,’ hacked nude celebrity photos in the cloud, and the use of a search and seizure warrant in the United States seeking customer email contents on an extraterritorial server raise important issues for the supposedly safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This article explores the legal and technical issues raised by these matters, with emphasis on the court decision In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation and the subsequent upholding of that decision.

Keywords: Law; Privacy; Security; Encryption; Cloud services (search for similar items in EconPapers)
Date: 2016
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0007681316300817
Full text for ScienceDirect subscribers only

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:eee:bushor:v:59:y:2016:i:6:p:623-633

DOI: 10.1016/j.bushor.2016.08.004

Access Statistics for this article

Business Horizons is currently edited by C. M. Dalton

More articles in Business Horizons from Elsevier
Bibliographic data for series maintained by Catherine Liu ().

 
Page updated 2025-03-19
Handle: RePEc:eee:bushor:v:59:y:2016:i:6:p:623-633