Infocrime : protecting information through criminal law / Eli Lederman.
2016
K3264 .L43 2016 (Map It)
Available at Cellar
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Author
Title
Infocrime : protecting information through criminal law / Eli Lederman.
Published
Cheltenham, UK, Northampton, Mass, USA : Edward Elgar Pub., [2016]
Call Number
K3264 .L43 2016
ISBN
9781785361258
1785361252
1785361252
Description
xiii, 465 pages ; 24 cm
System Control No.
(OCoLC)944472620
Bibliography, etc. Note
Includes bibliographical references and index.
Record Appears in
Portion of Title
Protecting information through criminal law
Gift
Purchased from the income of the Silver Fund
Gift

The Arthur W. Diamond Law Library
Purchased from the income of the Silver Fund
Table of Contents
Acknowledgments
xiii
1.
Concepts, terms, structure
1
1.
Introduction
1
2.
character of information
3
2.1.
Information and sources of information
3
2.1.1.
General characteristics
3
2.1.2.
Sociocultural context
5
2.2.
Communicative messages
9
2.3.
Interrelation
10
2.4.
legal perspective
12
3.
value of information
13
3.1.
information age
13
3.1.1.
new socio-technological environment
13
3.1.2.
Response of the law to changes and developments
17
3.2.
Legal protection of information
19
3.2.1.
Nature of the protection
19
3.2.2.
rights, values and interests involved
20
3.3.
Balancing rights, values and interests
26
4.
Scope and purpose of the study
30
4.1.
Scope
30
4.2.
Purpose
37
5.
Models of protection
39
2.
spatial model
43
1.
Definition
43
2.
Physical spaces
46
2.1.
Criminal trespass
46
2.1.1.
common law offense
47
2.1.2.
statutory provision[—]softer requirements and wider scope
48
2.1.3.
Protecting possession and control of information
54
2.2.
Peeping
55
2.2.1.
Substance and aims of the offense
55
2.2.2.
Axis of development
56
2.2.3.
Trespass and peeping[—]the protected spaces
60
2.3.
Interception of communicative messages
62
2.3.1.
Substance of the protection and space characteristics
62
2.3.2.
limits of protection
66
2.3.2.1.
Mailable communicative messages
67
2.3.2.2.
Time and place limitations
69
2.4.
Bodily injury
70
3.
Metaphoric-conceptual spaces
72
3.1.
Physical privacy[—]a constructive personal space
72
3.1.1.
Function and images
73
3.1.2.
personal space
74
3.2.
Computer trespass[—]cyberspace
90
3.2.1.
Computerized data and metaphoric space
90
3.2.2.
Unauthorized access to the protected space
94
3.
communication model
106
1.
Origin, scope and direction of development
106
1.1.
Interpersonal communication and its control
106
1.2.
Origins and relations
109
1.3.
From confidence-based protection to communication protection
110
2.
inner tier[—]protection against exposure by recipient
116
2.1.
rationale for protecting confidentiality
116
2.2.
Review, examination and classification
121
2.2.1.
Patient/client[—]professional confidence-based communication
121
2.2.1.1.
Client and attorney
123
2.2.1.2.
Patient and physician
125
2.2.1.3.
Patient and therapist
128
2.2.1.4.
Client and financial or economic advisor
131
2.2.2.
Intrafamilial confidence-based communications
134
2.2.2.1.
Marital confidential communication
135
2.2.2.2.
Parents and children
139
2.2.3.
Confidence-based communication[—]community representatives and individuals
142
2.2.3.1.
Congregant and clergyman
143
2.2.3.2.
News source and journalist
146
2.2.3.3.
Government agent and citizen or resident
149
2.3.
scope of the protection of confidential communication
152
2.3.1.
Number of confidence-based relations
153
2.3.2.
Modes of transferring messages
154
2.3.3.
Characteristics of protection
156
2.3.3.1.
extent of protection
156
2.3.3.2.
Modes of protection
159
3.
outer tier[—]protection from external interception
163
3.1.
Background[—]infringement of privacy
163
3.2.
Structure and scope of the protection
169
3.3.
Basic notions
173
3.3.1.
Interception through a device
173
3.3.2.
Expectation of privacy
179
4a.
content model: national security and trade secrets
182
1.
Scope and direction of development
182
1.1.
General
182
1.2.
expansion process
184
1.3.
Characteristics of the expansion
185
2.
National security information
188
2.1.
Origins and background
188
2.2.
meaning of national security information
190
2.3.
Groups of provisions
193
2.3.1.
Statutes protecting national security information
195
2.3.1.1.
Treason
195
2.3.1.2.
Espionage
200
2.3.1.3.
Official secrets
207
2.4.
Extent of protection
216
2.4.1.
Fuzzy object and discretionary boundaries
216
2.4.2.
prohibited conduct
222
2.4.3.
Summing up
225
3.
Confidential commercial information (trade secrets)
225
3.1.
Origins and background
225
3.2.
Basic approaches
232
3.3.
Scope of protection
237
3.3.1.
Indirect protection[—]extension by federal courts
237
3.3.1.1.
Interstate transportation of stolen property
237
3.3.1.2.
Stealing a "thing of value" from the federal government
243
3.3.1.3.
Obtaining property through mail or wire fraud
246
3.3.1.4.
Summing up
253
3.3.2.
Direct protection of confidential commercial information
254
3.3.2.1.
beginning of direct protection
254
3.3.2.2.
Economic Espionage Act
256
3.3.3.
Summing up
269
4b.
content model: information privacy
270
4.
Information privacy
270
4.1.
Sources and concepts
270
4.1.1.
Origins of privacy
270
4.1.2.
Information privacy
274
4.1.2.1.
General
274
4.1.2.2.
Computers and Internet[—]databases, data mining and social networking
282
4.2.
Protection of personal information by criminal law
287
4.2.1.
General provisions[—]indirect protection
290
4.2.2.
Direct protection of personal information
295
4.2.2.1.
Prohibited acquisition of personal information
296
4.2.2.2.
Unauthorized possession or use of personal information
309
4.2.2.3.
Unauthorized disclosure of personal information
317
4.2.2.4.
Summing up[—]unauthorized acquisition, possession, use or disclosure of personal information
435
5.
Summing up
439
5.
Epilogue
444
Index
449