To see the other types of publications on this topic, follow the link: Views on trade secrets.

Journal articles on the topic 'Views on trade secrets'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Views on trade secrets.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Eklund, Mia Catharina. "Monitoring employees’ e-mail correspondence and Internet use – A Finnish perspective – PART I." European Labour Law Journal 10, no. 2 (May 23, 2019): 116–33. http://dx.doi.org/10.1177/2031952519852110.

Full text
Abstract:
This article examines the prerequisites under which a private sector employer is and should be able to monitor its employees’ use of e-mail and Internet. For purposes of this examination, the article analyses the meaning of the Trade Secrets Directive’s provision requiring the trade secret holder to take reasonable steps to protect its trade secrets, in order to ascertain whether the provision requires the employer to monitor its employees’ e-mail correspondence and Internet use to gain the protection under the Trade Secrets Directive and the relevant Finnish legislation implementing the Trade Secrets Directive. The article also examines the relevant ECtHR case law, and especially the Bărbulescu case, as well as the Article 29 Working Party’s principles applicable to the monitoring of employees’ e-mail correspondence and Internet use. To provide a national context, the article examines the prerequisites under which a Finnish private sector employer may monitor its employees’ use of e-mail and Internet, or more specifically the prerequisites under which the employer may process traffic data, as well as the prerequisites under which an employer may open and retrieve its employees’ e-mails. The Finnish legislation applicable to e-mail and Internet monitoring is particularly interesting as it is significantly more restrictive for employers than the criteria set by the ECtHR and the Article 29 Working Party. Examining Finnish legislation in this context is also interesting, because there has been extensive public debate on whether having legislation in place that enables the employer under certain circumstances to monitor its employees’ e-mail correspondence is at all necessary and justified. Such views have first and foremost been supported by the argument that monitoring employees’ e-mails constitutes an intrusion into the employee’s right to privacy and secrecy of correspondence. Also, Finland is so far the only EU Member State that has enacted a specific act regulating the processing of employee data. The purpose of this article is to provide an overview of the prerequisites under which monitoring of employees’ e-mail correspondence and Internet use is permitted based on ECtHR case law (as well as the relevant guidelines issued by the Article 29 Working Party) and applicable Finnish legislation, and to reflect on the extent to which an employer should have the right to monitor its employees’ e-mail correspondence and Internet use, to ensure inter alia compliance and adequate protection of trade secrets. The purpose of this article is also to provide understanding on the applicable Finnish legal framework as an example of a European national approach highlighting the divergence between the level of protection afforded in different EU Member States and to reflect on why the subject matter is so sensitive.
APA, Harvard, Vancouver, ISO, and other styles
2

Raimova, Nargiza. "Improving of legal regulation of trade secrets in the Republic of Uzbekistan." Общество и инновации 1, no. 2 (November 18, 2020): 260–69. http://dx.doi.org/10.47689/2181-1415-vol1-iss2-pp260-269.

Full text
Abstract:
Information, exactly confidential information, is the most important component of the development of society in formative modern world. The current civil society is gradually turning from an informed to the information, so we can fearlessly say that the 21th century is considered to be the age of information. Information is a very important and necessary element of any activity of man, society and the state in the public, social-economic and political spheres. It is noted in the article that the problems related to the fact that the legislation provides a wide range of powers by government organs in the different tests that may affect the interests of sensitive enterprise because unset concrete facets of government intervention in economic activities of enterprises considered painful for entrepreneurs in many countries. It is concluded that the commercial valuable information is the right of every establishment for keeping secretness of it's industrial, commercial and financial operations, as well as proper documentation. It presents great interest in securing a wide range of problems related to those which information belong to a commercial secrets, as far as possible lifts the curtain for partners, competitors, government organs not to cause adverse effects on its business. Based on the study of foreign experience and scientific and theoretical views, ways to improve legislation in the field of regulation of confidential information were investigated. Based on the results of the analysis, relevant conclusions were drawn and proposals were developed for the current legislation
APA, Harvard, Vancouver, ISO, and other styles
3

BAREEVA, Irkyam Adgamovna, Sergey Mikhailovich VASIN, Galina Alekseevna SUGROBOVA, and Lunika Nikolaevna KORCHAGINA. "Social Partnership in Human Resources Management." Journal of Advanced Research in Law and Economics 8, no. 8 (August 30, 2018): 2339. http://dx.doi.org/10.14505/jarle.v8.8(30).04.

Full text
Abstract:
The present article provides a retrospective analysis of the views of various authors on the problem of social partnership, considering social partnership as an alternative to social confrontation, as a means to harmonize the interests of various social groups in the process of resolving emerging contradictions in various areas of public practice. It was pointed out that partnership allows striking a balance of mutual interests in achieving an overall objective, effectively allocating the available resources and opportunities. The article presents the analysis of the activities of a trade union organization as a social partner, the analysis of social and labor relations in an industrial business. The authors have revealed significant problems in the field of social partnership, on which they have developed several practical recommendations.The analysis is based on social activity index calculation in a trade union organization. To comply with confidentiality requirements, property rights and trade secrets, the enterprise name is not listed.
APA, Harvard, Vancouver, ISO, and other styles
4

Fataruba, Sabri. "TRIPs dalam Kaitannya dengan Perlindungan Hukum Terhadap Rahasia Dagang, Desain Industri dan Desain Tata Letak Sirkuit Terpadu Di Indonesia." SASI 26, no. 1 (May 19, 2020): 1. http://dx.doi.org/10.47268/sasi.v26i1.207.

Full text
Abstract:
Participation in the WTO has given consequences to its member countries, including Indonesia, to harmonize its laws in the field of Intellectual Property Rights for full compliance or full compliance as a minimum requirement and guidelines for WTO member countries to contain new norms and has a higher standard and contains strict law enforcement provisions as set by the TRIPs. In view of these matters, Indonesia has harmonized the existing laws in the field of Intellectual Property Rights and made legal norms in accordance with the standards set by the TRIPs for several fields of Intellectual Property Rights which had not yet been enacted at the time, where 3 ( three) including Law Number 30 of 2000 concerning Trade Secrets, Law Number 31 of 2000 concerning Industrial Design and Law Number 32 of 2000 concerning Layout Designs of Integrated Circuits, the regulations also meet the standards set by TRIPs , in order to provide adequate legal protection to guarantee the rights of Owners of Trade Secrets and Designers and to ensure that other unauthorized parties do not abuse them, so as to motivate the owners of trade secrets and designers to continue to be creative in creating and/or designing, as well also stimulates other communities to do same things.
APA, Harvard, Vancouver, ISO, and other styles
5

Connan, J. "Use and trade of bitumen in antiquity and prehistory: molecular archaeology reveals secrets of past civilizations." Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences 354, no. 1379 (January 29, 1999): 33–50. http://dx.doi.org/10.1098/rstb.1999.0358.

Full text
Abstract:
Natural asphalt (or bitumen) deposits, oil seepage and liquid oil shows are widespread in the Middle East, especially in the Zagros mountains of Iran. Ancient people from northern Iraq, south–west Iran and the Dead Sea area extensively used this ubiquitous natural resource until the Neolithic period (7000 to 6000 BC). Evidence of earlier use has been recently documented in the Syrian desert near (Boëda et al. 1996) near El Kown, where bitumen–coated flint implements, dated to 40,000 BC (Mousterian period), have been unearthed. This discovery at least proves that bitumen was used by Neanderthal populations as hafting material to fix handles to their flint tools. Numerous testimonies, proving the importance of this petroleum–based material in Ancient civilizations, were brought to light by the excavations conducted in the Near East as of the beginning of the century. Bitumen remains show a wide range of uses that can be classified under several headings. First of all, bitumen was largely used in Mesopotamia and Elam as mortar in the construction of palaces (e.g. the Darius Palace in Susa), temples, ziggurats (e.g. the so–called ‘Tower of Babel’ in Babylon), terraces (e.g. the famous ‘Hanging Gardens of Babylon’) and exceptionally for roadway coating (e.g. the processional way of Babylon). Since the Neolithic, bitumen served to waterproof containers (baskets, earthenware jars, storage pits), wooden posts, palace grounds (e.g. in Mari and Haradum), reserves of lustral waters, bathrooms, palm roofs, etc. Mats, sarcophagi, coffins and jars, used for funeral practices, were often covered and sealed with bitumen. Reed and wood boats were also caulked with bitumen. Abundant lumps of bituminous mixtures used for that particular purpose have been found in storage rooms of houses at Ra's al–Junayz in Oman. Bitumen was also a widespread adhesive in antiquity and served to repair broken ceramics, fix eyes and horns on statues (e.g. at Tell al–Ubaid around 2500 BC). Beautiful decorations with stones, shells, mother of pearl, on palm trees, cups, ostrich eggs, musical instruments (e.g. the Queen's lyre) and other items, such as rings, jewellery and games, have been excavated from the Royal tombs in Ur. They are on view in the British Museum. With a special enigmatic material, commonly referred to as ‘bitumen mastic’, the inhabitants of Susa sculpted masterpieces of art which are today exhibited in the Louvre Museum in Paris. This unique collection is presented in a book by Connan and Deschesne (1996). Last, bitumen was also considered as a powerful remedy in medical practice, especially as a disinfectant and insecticide, and was used by the ancient Egyptians to prepare mixtures to embalm the corpses of their dead. Modern analytical techniques, currently applied in the field of petroleum geochemistry, have been adapted to the study of numerous archaeological bituminous mixtures found in excavations. More than 700 bituminous samples have been analysed during the last decade, using gas chromatography alone and gas chromatography coupled with mass spectrometry and isotopic chemistry (carbon and hydrogen mainly). These powerful tools, focused on the detailed analysis of biomarkers in hydrocarbon fractions, were calibrated on various well–known natural sources of bitumen in Iraq, Syria, Iran, Bahrain and Kuwait. These reference studies have made it possible to establish the origins of bitumen from numerous archaeological sites and to document the bitumen trade routes in the Middle East and the Arabo–Persian Gulf. Using a well–documented case history, Tell el ‘Oueili (5800 to 3500 BC) in South Mesopotamia, we will illustrate in this paper how these new molecular and isotopic tools can help us to recognize different sources of bitumen and to trace the ancient trade routes through time. These import routes were found to vary with major cultural and political changes in the area under study. A second example, referring to the prehistoric period, describes bitumen traces on flint implements, dated from Mousterian times. This discovery, from the Umm El Tlel excavations near El Kown in Syria, was reported in 1996 in Boëda et al . At that time, the origin of the bitumen had not been elucidated due to contamination problems. Last year, a ball of natural oil–stained sands, unearthed from the same archaeological layer, allowed us to determine the source of the bitumen used. This source is regional and located in the Jebel Bichri, nearly 40 km from the archaeological site. The last case history was selected to illustrate another aspect of the investigations carried out. Recent geochemical studies on more than 20 balms from Egyptian mummies from the Intermediate, Ptolemaic and Roman periods have revealed that these balms are composed of various mixtures of bitumen, conifer resins, grease and beeswax. Bitumen occurs with the other ingredients and the balms studied show a great variety of molecular compositions. Bitumen from the Dead Sea area is the most common source but some other sources (Hit in Iraq?) are also revealed by different molecular patterns. The absolute amount of bitumen in balms varies from almost zero to 30% per weight.
APA, Harvard, Vancouver, ISO, and other styles
6

Čamaj, Juraj, Štefan Čarný, and Adrián Šperka. "Possibilities of Obtaining Rail Transport Data for the Purpose of Updating the Source Data of the ERIC Mobile Application." Transport technic and technology 16, no. 2 (December 1, 2020): 1–4. http://dx.doi.org/10.2478/ttt-2020-0007.

Full text
Abstract:
AbstractThe flow of information is important in any area of human life. That’s why people try to develop applications to support the flow of information. But then it is also important to protect information, which means that not all employees have access to all information. In practice, this means above all a competitive advantage over other companies in the same sector. The purpose of the article is to define the positive and negative aspects of trade secrets from the customer’s point of view in passenger and freight rail transport. The main goal is to connect the information systems of individual infrastructure managers and carriers into the ERIC MOBILE application in compliance with the conditions of modularity.
APA, Harvard, Vancouver, ISO, and other styles
7

Čamaj, Juraj, Štefan Čarný, and Adrián Šperka. "Possibilities of Obtaining Rail Transport Data for the Purpose of Updating the Source Data of the ERIC Mobile Application." Transport technic and technology 16, no. 2 (December 1, 2020): 1–4. http://dx.doi.org/10.2478/ttt-2020-0007.

Full text
Abstract:
Abstract The flow of information is important in any area of human life. That’s why people try to develop applications to support the flow of information. But then it is also important to protect information, which means that not all employees have access to all information. In practice, this means above all a competitive advantage over other companies in the same sector. The purpose of the article is to define the positive and negative aspects of trade secrets from the customer’s point of view in passenger and freight rail transport. The main goal is to connect the information systems of individual infrastructure managers and carriers into the ERIC MOBILE application in compliance with the conditions of modularity.
APA, Harvard, Vancouver, ISO, and other styles
8

Kiguru, Gatitu, Phyllis W. Mwangi, Purity M. Nthiga, and Caryn Kimuyu. "Language and Witchcraft as a Trade: Insights from, Machakos County, Kenya." Revista Internacional de Organizaciones, no. 23 (September 18, 2019): 59–77. http://dx.doi.org/10.17345/rio23.59-77.

Full text
Abstract:
Witchcraft is defined as the use of magical powers for healing, seeing into the future, causing harm or for religion. The belief in the powers of witchcraft is widespread in Africa. Due to these perceived magical powers people from different walks of life seek for various forms of treatments from witchdoctors. As such, witchcraft in Africa is a trade complete with a marked use of language that sustains in in modern society. This article reports on an analysis of language used by witchdoctors in Machakos County in Kenya, and respondents’ views about witchcraft. The objectives of the study were twofold. One was to identify and describe the language strategies that mark witchcraft as trade. The second objective was to explore the socio-psychological factors governing the use of the language by witchdoctors. Two witchdoctors were purposively sampled: one male and one female. The primary data were collected through recorded interviews of the witchdoctors. It was found that the witchdoctors use various language strategies to attract and retain clientele and that these strategies are a factor of the socio-psychological environment in which the witchdoctors operate. Moreover, the study established that witchdoctor still find relevance in the modern Kenyan society because of prevalent beliefs about social and medical problems. This paper thus argues that language is an important tool in the witchcraft trade that serves to purposely obscure meaning in order to shroud the trade in secrecy, enhance social exclusion and consequently sustain the belief in the magical powers of the witchdoctors.
APA, Harvard, Vancouver, ISO, and other styles
9

Wallach, Lori. "Trade Secrets." Foreign Policy, no. 140 (January 2004): 70. http://dx.doi.org/10.2307/4147524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vertreace, Martha M. "Trade Secrets." College English 48, no. 7 (November 1986): 686. http://dx.doi.org/10.2307/377373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

HANSON, DAVID J. "Trade Secrets." Chemical & Engineering News 88, no. 3 (January 18, 2010): 23. http://dx.doi.org/10.1021/cen-v088n003.p023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

King, Eric. "Trade Secrets." Index on Censorship 41, no. 4 (November 30, 2012): 81–86. http://dx.doi.org/10.1177/0306422012465540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

MORSE, PAIGE MARIE. "PROTECTING TRADE SECRETS." Chemical & Engineering News 75, no. 48 (December 1997): 8–11. http://dx.doi.org/10.1021/cen-v075n048.p008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.

Full text
Abstract:
This article focuses on advantages to protect intellectual property by keeping it under wraps. There are some things that just cannot keep from getting out. Probably nothing in the law breeds as many myths as trade secrets. One positive aspect of trade secrets is that they can protect things patents cannot, since the general definition of a trade secret is any information that is in some way valuable, provided that reasonable efforts are used to maintain the secret. Trade secret protection can also last indefinitely. Patents, by contrast, expire 20 years after they are filed. The problem with trade secrets begins when engineering managers rely on trade secrets without understanding their limits or use trade secrets as a fall-back business decision. Conducting regular trade secret audits is a mechanism where a trade secret specialist gains an understanding of a company’s secrets, ensures that they are sufficiently defined, and that they are adequately protected. After the product is released, its high-level functionality is no longer a trade secret, but could be protected via a patent. Marketing literature and data sheets are also no longer trade secrets because they are usually made public.
APA, Harvard, Vancouver, ISO, and other styles
15

Staley, Daniel. "Keeping Secrets." Mechanical Engineering 132, no. 08 (August 1, 2010): 31–33. http://dx.doi.org/10.1115/1.2010-aug-3.

Full text
Abstract:
This article explains how companies can handle confidential information properly to reduce leaks to competitors. Once a company identifies what information is or contains a trade secret, it is beneficial to list all trade secrets and sensitive material in a central register or secure computer database. Classifying trade secrets can also help determine how valuable a particular trade secret is to the company. Companies can restrict disclosure of trade secrets to key employees with a “need to know.” They can also require key employees to sign individual secrecy and noncompete agreements, making them personally liable for unauthorized disclosures. If possible, the agreement should be executed before hiring the employee. For those already on the payroll, the agreement should include a statement that the trade secret restrictions are being applied as part of a standard policy applicable to all employees. Companies also need to do their housekeeping. They need a regularly scheduled review of the trade secret portfolio to remove items that should no longer be considered trade secrets and perhaps to reclassify others.
APA, Harvard, Vancouver, ISO, and other styles
16

Kolasa, M. "Trade secrets for beginners." Journal of Intellectual Property Law & Practice 8, no. 3 (February 20, 2013): 251–52. http://dx.doi.org/10.1093/jiplp/jps219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sable, Martin H. "Industrial Espionage/Trade Secrets:." Behavioral & Social Sciences Librarian 4, no. 1 (May 24, 1985): 1–78. http://dx.doi.org/10.1300/j103v04n01_01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Irish, V. "Keeping mum [trade secrets]." Engineering Management 15, no. 3 (June 1, 2005): 28–29. http://dx.doi.org/10.1049/em:20050307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Basuchoudhary, Atin, and Nicola Searle. "Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets." Computers & Security 87 (November 2019): 101591. http://dx.doi.org/10.1016/j.cose.2019.101591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

McGonagle, John. "Protecting trade secrets under the Uniform Trade Secrets Act: Practical advice for executives." Competitive Intelligence Review 8, no. 3 (1997): 97–98. http://dx.doi.org/10.1002/(sici)1520-6386(199723)8:3<97::aid-cir22>3.0.co;2-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rosier, Paul. "Trade Secrets: A Moyers Report." Public Historian 26, no. 2 (2004): 128–29. http://dx.doi.org/10.1525/tph.2004.26.2.128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Lashko, Gary. "Nepotism, archaeology and trade secrets." Housing, Care and Support 10, no. 4 (December 2007): 2–3. http://dx.doi.org/10.1108/14608790200700021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Rønde, Thomas. "Trade Secrets and Information Sharing." Journal of Economics & Management Strategy 10, no. 3 (August 1, 2001): 391–417. http://dx.doi.org/10.1162/105864001316907991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Samuelson, Pamela. "Trade secrets vs. free speech." Communications of the ACM 46, no. 6 (June 2003): 19–23. http://dx.doi.org/10.1145/777313.777329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Kappes, Kurt, and Michael Wexler. "Trade secrets: a legal update." IEEE Engineering Management Review 36, no. 3 (2008): 68. http://dx.doi.org/10.1109/emr.2008.4648893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Courage, Noel, and Janice Calzavara. "Protecting Trade Secrets in Canada." Cold Spring Harbor Perspectives in Medicine 5, no. 9 (May 18, 2015): a024489. http://dx.doi.org/10.1101/cshperspect.a024489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Price, W. N., and A. K. Rai. "Are trade secrets delaying biosimilars?" Science 348, no. 6231 (April 9, 2015): 188–89. http://dx.doi.org/10.1126/science.aab1684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hamer, Susan. "The importance of trade secrets." Nursing Management 18, no. 10 (February 24, 2012): 11. http://dx.doi.org/10.7748/nm2012.03.18.10.11.p7649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Eisenstein, Michael. "Fluorescent parasite reveals trade secrets." Nature Methods 2, no. 7 (July 2005): 489. http://dx.doi.org/10.1038/nmeth0705-489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kumar, Abhijeet, and Adrija Mishra. "Protecting Trade Secrets in India." Journal of World Intellectual Property 18, no. 6 (November 2015): 335–46. http://dx.doi.org/10.1111/jwip.12050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ronde, Thomas. "Trade Secrets and Information Sharing." Journal of Economics Management Strategy 10, no. 3 (September 2001): 391–417. http://dx.doi.org/10.1111/j.1430-9134.2001.00391.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Radack, David V. "The uniform trade secrets act." JOM 58, no. 1 (January 2006): 72. http://dx.doi.org/10.1007/s11837-006-0072-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Kling, Howard. "Trade Secrets: The Hidden Costs of Free Trade (review)." Labor Studies Journal 30, no. 4 (2006): 96–98. http://dx.doi.org/10.1353/lab.2005.0084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hofmann, Ekkehard, and Georg von Wangenheim. "Trade secrets versus Cost Benefit Analysis." International Review of Law and Economics 22, no. 4 (December 2002): 511–26. http://dx.doi.org/10.1016/s0144-8188(02)00117-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kolasa, M. "A Trade Secrets Act for Germany?" Journal of Intellectual Property Law & Practice 7, no. 5 (April 9, 2012): 384–85. http://dx.doi.org/10.1093/jiplp/jps024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Medd, Kerry, and Antoinette Konski. "Workplace programs to protect trade secrets." Nature Biotechnology 21, no. 2 (February 2003): 201–3. http://dx.doi.org/10.1038/nbt0203-201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Caputo, D., M. Maloof, and G. Stephens. "Detecting Insider Theft of Trade Secrets." IEEE Security & Privacy Magazine 7, no. 6 (November 2009): 14–21. http://dx.doi.org/10.1109/msp.2009.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Tattay, Levente. "Protection of trade secrets in Hungary." Journal of Intellectual Property Law & Practice 14, no. 8 (August 1, 2019): 622–31. http://dx.doi.org/10.1093/jiplp/jpz071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

McKee, M., and R. Labonte. "European Commission's proposals on trade secrets." BMJ 350, mar11 11 (March 11, 2015): h1369. http://dx.doi.org/10.1136/bmj.h1369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ettredge, Michael, Feng Guo, and Yijun Li. "Trade secrets and cyber security breaches." Journal of Accounting and Public Policy 37, no. 6 (November 2018): 564–85. http://dx.doi.org/10.1016/j.jaccpubpol.2018.10.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Powell, John, and Pádraic Kennedy. "XLVIII: Lord Kimberley and the foundation of Liberal Irish policy: annotations to George Sigerson’s Modern Ireland: its vital questions, secret societies, and government (1868)." Irish Historical Studies 31, no. 121 (May 1998): 91–114. http://dx.doi.org/10.1017/s0021121400013717.

Full text
Abstract:
Late in 1868 the Dublin doctor, author and nationalist George Sigerson (c. 1836–1925) published, under the title Modern Ireland, a collection of widely quoted articles he had written for the Daily Chronicle during the previous year. Among the bewildering flood of Irish commentary on British rule, his was notable for its clear exposition and its moderate tone. From the perspective of the Liberal Party, on the verge of being returned to office, Sigerson’s observations were valuable in representing the views of a moderate, middle-class Irish element which might co-operate in implementing a liberal policy acceptable to all parties in both England and Ireland. His credentials as a nationalist were impeccable, yet he had not been seduced by the Fenian inclination towards violence. The book prompted modest praise from critics and enjoyed a reasonable success in the book trade, going through several printings and two editions. One man who read the first edition was John Wodehouse, first earl of Kimberley (1826–1902), the immediate past viceroy of Ireland, who annotated profusely as he read. His notes are unusual in that they are extensive (52 of 393 pages were annotated), spread throughout the text, and generally lengthy (averaging twenty words per annotated page). A few involve the kinds of ethnically disparaging remarks to which he was prone. However, the majority deal with substantive issues with which Kimberley as viceroy had had to deal (Fenianism and land improvement) or would be dealing later that year as part of Gladstone’s first government (disestablishment and land reform).
APA, Harvard, Vancouver, ISO, and other styles
42

Torremans, Paul L. C. "The road towards the harmonisation of trade secrets law in the European Union." Revista La Propiedad Inmaterial, no. 20 (December 15, 2015): 27. http://dx.doi.org/10.18601/16571959.n20.02.

Full text
Abstract:
Trade secrets have traditionally been protected in various ways by national laws in the European Union. The international intellectual property treaties offered only a limited common core. From this starting point this article examines the new EU draft directive on trade secrets. The aim is not to put in place a comprehensive EU regime for the protection of trade secrets. There will only be a partial harmonisation of the national laws of the Member States, focussing on the unlawful acquisition, disclosure and use of trade secrets, and that harmonization will be of a minimalist nature in the sense that Member States may provide, in compliance with the provisions of the Treaty, for more far-reaching protection against the unlawful acquisition, use or disclosure of trade secrets than that required in the Directive.
APA, Harvard, Vancouver, ISO, and other styles
43

Milligan, R. B., and C. E. Sieve. "Adequately identifying trade secrets in California trade secret misappropriation litigation." Journal of Intellectual Property Law & Practice 4, no. 10 (September 14, 2009): 703–5. http://dx.doi.org/10.1093/jiplp/jpp139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Handelsman, Jeffrey H. "“New Federal Trade Secret Legislation—The “Defend Trade Secrets Act””." Journal of Generic Medicines: The Business Journal for the Generic Medicines Sector 13, no. 1 (August 20, 2016): 34–36. http://dx.doi.org/10.1177/1741134316665438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Jackson, Margaret. "Keeping secrets: International developments to protect undisclosed business information and trade secrets." Information, Communication & Society 1, no. 4 (December 1998): 467–87. http://dx.doi.org/10.1080/13691189809358983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Friedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.

Full text
Abstract:
Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.
APA, Harvard, Vancouver, ISO, and other styles
47

Jovičić, Katarina. "Trade secrets: Definition and basics of protection." Strani pravni zivot, no. 1 (2018): 7–19. http://dx.doi.org/10.5937/spz1801007j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gross, Gregory W. "Trade Secrets: Chaucer, the Pardoner, the Critics." Modern Language Studies 25, no. 4 (1995): 1. http://dx.doi.org/10.2307/3195486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Warden, David E., and Joe Phillips. "Management: Identifying, Preserving, and Defending Trade Secrets." Journal of Petroleum Technology 58, no. 05 (May 1, 2006): 42–46. http://dx.doi.org/10.2118/0506-0042-jpt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rees, Frank. "Trade secrets in software design and logic." Computer Fraud & Security 1998, no. 3 (March 1998): 11. http://dx.doi.org/10.1016/s1361-3723(97)86602-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography