{"title":"盗窃商业秘密现在已成为联邦犯罪","authors":"R. Mark Halligan","doi":"10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M","DOIUrl":null,"url":null,"abstract":"<p>The Economic Espionage Act of 1996 (the EEA) for the first time makes trade secret theft a federal crime, subject to penalties including fines, forfeiture, and imprisonment, and greatly expands the federal government's power to investigate economic espionage cases. Trade secret theft is broadly defined to cover all acts of trade secret appropriation without authorization. The EEA was intended to fill gaps in the federal law and to create a national scheme to protect U.S. proprietary business information. © 1997 John Wiley & Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"7-12"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M","citationCount":"5","resultStr":"{\"title\":\"The theft of trade secrets is now a federal crime\",\"authors\":\"R. Mark Halligan\",\"doi\":\"10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Economic Espionage Act of 1996 (the EEA) for the first time makes trade secret theft a federal crime, subject to penalties including fines, forfeiture, and imprisonment, and greatly expands the federal government's power to investigate economic espionage cases. Trade secret theft is broadly defined to cover all acts of trade secret appropriation without authorization. The EEA was intended to fill gaps in the federal law and to create a national scheme to protect U.S. proprietary business information. © 1997 John Wiley & Sons, Inc.</p>\",\"PeriodicalId\":100295,\"journal\":{\"name\":\"Competitive Intelligence Review\",\"volume\":\"8 3\",\"pages\":\"7-12\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<7::AID-CIR4>3.0.CO;2-M\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Intelligence Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C7%3A%3AAID-CIR4%3E3.0.CO%3B2-M\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C7%3A%3AAID-CIR4%3E3.0.CO%3B2-M","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5