Jump to ContentJump to Main Navigation
Harboring DataInformation Security, Law, and the Corporation$
Users without a subscription are not able to see the full content.

Andrea M. Matwyshyn

Print publication date: 2009

Print ISBN-13: 9780804760089

Published to Stanford Scholarship Online: June 2013

DOI: 10.11126/stanford/9780804760089.001.0001

Show Summary Details
Page of

PRINTED FROM STANFORD SCHOLARSHIP ONLINE (www.stanford.universitypressscholarship.com). (c) Copyright Stanford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in SSO for personal use.date: 16 April 2021

Information Security and Trade Secrets

Information Security and Trade Secrets

Dangers from the Inside: Employees as Threats to Trade Secrets

(p.92) 5 Information Security and Trade Secrets
Harboring Data

Elizabeth A. Rowe

Stanford University Press

This chapter discusses the risks that rogue insiders present to corporate information security, particularly with regard to trade secrets. It argues that the biggest computer security threats and accompanying threats to a company's trade secrets originate with the company's own employees. Put in criminal law terms, employees often have the motive and the opportunity that outsiders lack. Employees usually have legal access to the trade secret information by virtue of their employment relationship and can use that access to misappropriate trade secrets. Recent statistics indicate that the large majority of computer crimes are committed by employees. The chapter provides background on trade secret law, examples of disclosures that have occurred using computers, and ends with some lessons for trade secret owners.

Keywords:   information security, data security, corporate information, trade secrets, company employees, security threats, computer crimes

Stanford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.