Protecting corporate intellectual property: Legal and technical approaches
Michael G. Crowley and
Michael N. Johnstone
Business Horizons, 2016, vol. 59, issue 6, 623-633
Abstract:
The recent FBI v. Apple case has the potential to turn a 227-year-old statute law into a tool for government agencies to gain access to personal and corporate information. Recent events such as ‘Petraeus-gate,’ hacked nude celebrity photos in the cloud, and the use of a search and seizure warrant in the United States seeking customer email contents on an extraterritorial server raise important issues for the supposedly safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This article explores the legal and technical issues raised by these matters, with emphasis on the court decision In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation and the subsequent upholding of that decision.
Keywords: Law; Privacy; Security; Encryption; Cloud services (search for similar items in EconPapers)
Date: 2016
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://www.sciencedirect.com/science/article/pii/S0007681316300817
Full text for ScienceDirect subscribers only
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:eee:bushor:v:59:y:2016:i:6:p:623-633
DOI: 10.1016/j.bushor.2016.08.004
Access Statistics for this article
Business Horizons is currently edited by C. M. Dalton
More articles in Business Horizons from Elsevier
Bibliographic data for series maintained by Catherine Liu ().