This publication is presented to you through Paradigm Publishing Services
Stanford University Press
Chapter
Licensed
Unlicensed
Requires Authentication
5. Information Security and Trade Secrets
Dangers from the Inside: Employees as Threats to Trade Secrets
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Table of Contents v
- Acknowledgments ix
- Author Biographies xi
-
Section I: Introducing Corporate Information Security
- Introduction 3
- 1. Looking at Information Security Through an Interdisciplinary Lens 19
-
Section II : The Dual Nature of Information- Information as a Consumer and Corporate Asset
- 2. The Information Vulnerability Landscape 33
- 3. Reporting of Information Security Breaches 50
- 4. Information Security and Patents 64
- 5. Information Security and Trade Secrets 92
-
Section III : U.S. Corporate Information Security Regulation and Its Shortcomings
- 6. Information Security of Health Data 103
- 7. Information Security of Financial Data 121
- 8. Information Security of Children’s Data 145
-
Section IV: The Future of Corporate Information Security and Law
- 9. Information Security and Contracts 159
- 10. Information Security, Law, and Data-Intensive Business Models 202
- Conclusion 228
- Notes 235
- Bibliography 295
- Index 333
Chapters in this book
- Frontmatter i
- Table of Contents v
- Acknowledgments ix
- Author Biographies xi
-
Section I: Introducing Corporate Information Security
- Introduction 3
- 1. Looking at Information Security Through an Interdisciplinary Lens 19
-
Section II : The Dual Nature of Information- Information as a Consumer and Corporate Asset
- 2. The Information Vulnerability Landscape 33
- 3. Reporting of Information Security Breaches 50
- 4. Information Security and Patents 64
- 5. Information Security and Trade Secrets 92
-
Section III : U.S. Corporate Information Security Regulation and Its Shortcomings
- 6. Information Security of Health Data 103
- 7. Information Security of Financial Data 121
- 8. Information Security of Children’s Data 145
-
Section IV: The Future of Corporate Information Security and Law
- 9. Information Security and Contracts 159
- 10. Information Security, Law, and Data-Intensive Business Models 202
- Conclusion 228
- Notes 235
- Bibliography 295
- Index 333