5. Information Security and Trade Secrets

2020 ◽  
pp. 92-100
Author(s):  
Elizabeth A. Rowe
Author(s):  
Roger Allan Ford

The growth of sports analytics has made professional teams more and more reliant on proprietary data and algorithms, which are only valuable as long as they remain unknown to competitors. Teams are, however, relatively poorly equipped to protect these secrets. This chapter reviews five options available to teams looking to protect their secret information: league rules and norms, nondisclosure and noncompete agreements, trade-secrecy law, criminal law, and information-security efforts. None of the legal options are perfect, since breaches can be difficult to detect and legal remedies expose teams to unwanted publicity and risks of further breaches. Teams, then, should focus their efforts on building robust security systems to prevent problems from arising in the first place. The chapter concludes by discussing trends that are likely to increase the importance of information security in professional sports.


Author(s):  
Екатерина Витальевна Логинова

Проблема разглашения данных, относящихся коммерческой тайне, в современном мире уже давно стала одной из самых значимых, поскольку информация является приоритетным ресурсом в 21 веке. На наш взгляд, все чаще и чаще возникают проблемы, связанные со сложностью распространения и защиты режима коммерческой тайны в отношении документов, имеющих электронную форму. The problem of disclosing data related to trade secrets has long become one of the most significant in the modern world, since information is a priority resource in the 21st century. In our opinion, more and more often there are problems associated with the complexity of the distribution and protection of the commercial secret regime in relation to documents in electronic form.


Author(s):  
Arnold P. Kupin ◽  

The article analyses legal regulation of trade secret phenomenon in Ukrainian legislation as well as initiates ways of above-mentioned legislation improvement. Due to the process of information society formation in Ukraine, the issues of security and protection of rights for information resources of different access level enter into in the foreground of scientific discussions. Thus, there is intensive growth practical interest to trade secrets and other related concepts. One type of confidential information is the so-called �trade secret�. The issue of protection of trade secrets is not in fact a matter of protection of information security, because one of the main characteristics that determines the mode of access to trade secrets is the ownership of this information. The article describes the development of legislation devoted to trade secret at the contemporary stage as well as emergence of essential economic and legal conditions in Ukraine for practical implementation of legal mechanisms of commercially valuable information security and protection. The above-mentioned factors determine urgency of the issue. So called �trade secret� is a king of classified information. The issue of trade secret protection at is core is not in the framework of information security; by virtue of the fact that the key characteristic that influences the access mode to trade secret is the right of ownership of this information. The definition of trade secrets given in the Civil Code of Ukraine is formulated taking into account modern international legal approaches to the understanding of trade secrets (TRIPS and NAFTA) and at the appropriate legal and technical level, although not without certain shortcomings. This definition has a cross-sectoral significance in the system of legislation of Ukraine and is applied when clarifying the content and qualifications of not only civil but also labor, administrative, criminal, procedural and other legal relations. The aim of the article is to analyze domestic legislation in order to expose the essence of trade secret and related concepts. The author determines that the establishing of information constituting a commercial secret list, which cannot be restricted to business entities access, is not sufficient. There is the need at the level of legislation to establish a special mechanism and general criteria for determining information as s trade secret. It would help citizens to exercise their right to file requests to private business corporation. During the writing of the article the following conclusions were reached. In the case of crimes against trade secrets, in fact, the criminality of the act is determined not by law, but by order of the owner of the information or the head of the enterprise, which is not a legal act. In our opinion, this situation is absurd, especially given the imperfection of the legislation governing the ownership of information. Therefore, two ways to solve the problem can be proposed, either by legislatively establishing an exhaustive list of information that can be declared a trade secret, or by abolishing criminal liability


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


Sign in / Sign up

Export Citation Format

Share Document