{"title":"间谍活动转向经济:后苏联时代的反间谍诉讼","authors":"Craig P. Ehrlich","doi":"10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H","DOIUrl":null,"url":null,"abstract":"<p>In the post-Cold War era, foreign economic espionage is a looming threat. The author examines in detail the litigation options for American corporations that fall victim to trade secret theft by a foreign government or agent. These options include a request that criminal prosecution be brought by the U.S. Justice Department under the recently enacted Economic Espionage Act of 1996. The corporation itself may file a civil suit for compensation based on the common laws of trade secrets or the Uniform Trade Secrets Act, as well as the federal Racketeer Influenced and Corrupt Organizations Act. Among the types of defendants who might be prosecuted or sued are foreign governments that steal or receive trade secrets, private individuals or companies that help a foreign government commit misappropriation, and private entities that knowingly receive the stolen information. Common “litigation shields” used by foreign governments include claims of sovereign immunity, act of state, and diplomatic immunity. Each of these doctrines is examined, and case precedents where they were upheld or found inapplicable are cited. Analyzing these precedents, the author concludes that economic espionage by foreign government agents for delivery to a commercial enterprise should not be held subject to immunity. © 1997 John Wiley & Sons, Inc.</p>","PeriodicalId":100295,"journal":{"name":"Competitive Intelligence Review","volume":"8 3","pages":"38-52"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H","citationCount":"1","resultStr":"{\"title\":\"Espionage turns economic: Litigation as counter-espionage in the post-Soviet era\",\"authors\":\"Craig P. Ehrlich\",\"doi\":\"10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In the post-Cold War era, foreign economic espionage is a looming threat. The author examines in detail the litigation options for American corporations that fall victim to trade secret theft by a foreign government or agent. These options include a request that criminal prosecution be brought by the U.S. Justice Department under the recently enacted Economic Espionage Act of 1996. The corporation itself may file a civil suit for compensation based on the common laws of trade secrets or the Uniform Trade Secrets Act, as well as the federal Racketeer Influenced and Corrupt Organizations Act. Among the types of defendants who might be prosecuted or sued are foreign governments that steal or receive trade secrets, private individuals or companies that help a foreign government commit misappropriation, and private entities that knowingly receive the stolen information. Common “litigation shields” used by foreign governments include claims of sovereign immunity, act of state, and diplomatic immunity. Each of these doctrines is examined, and case precedents where they were upheld or found inapplicable are cited. Analyzing these precedents, the author concludes that economic espionage by foreign government agents for delivery to a commercial enterprise should not be held subject to immunity. © 1997 John Wiley & Sons, Inc.</p>\",\"PeriodicalId\":100295,\"journal\":{\"name\":\"Competitive Intelligence Review\",\"volume\":\"8 3\",\"pages\":\"38-52\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1002/(SICI)1520-6386(199723)8:3<38::AID-CIR11>3.0.CO;2-H\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Competitive Intelligence Review\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C38%3A%3AAID-CIR11%3E3.0.CO%3B2-H\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Competitive Intelligence Review","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/%28SICI%291520-6386%28199723%298%3A3%3C38%3A%3AAID-CIR11%3E3.0.CO%3B2-H","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1