Preview

Stalk Case Study

Good Essays
Open Document
Open Document
562 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Stalk Case Study
Illinois courts have stated that secrecy is the most important requirement for information to qualify as a trade secret. Sys. Dev. Servs., Inc. v. Haarmann, 907 N.E.2d 63, 73 (2009) (citing Pope v. Alberto–Culver Co., 694 N.E.2d 615, 617 (1998)). In determining whether LawTalk is a secret, a court will examine the extent to which LawTalk is known outside of CFJ's business and the ease with which others could duplicate it. The following sub-sections examine these requirements.
1. LawTalk is not known outside of CFJ’s business because its overall organization is unique and knowledge about its existence is restricted to key personnel within CFJ.

Information made from a combination of publicly known elements can be sufficiently secret when its organization is unique and not disclosed to outsiders. George S. May Int'l Co. v. Int'l Profit Associates, 628 N.E.2d 647, 654 (1993); Computer Assocs. Int’l v. Quest Software, Inc., 333 F. Supp. 2d 688 at 700 (stating that a unique combination of software source code could be a trade secret even if it contained publicly known elements). In George, a former employer sought preliminary injunction against former employees from using a unique system of analyzing business operation in another
…show more content…
Stampede Tool Warehouse, Inc. v. May, 651 N.E.2d 209, 211 (1995). In Stampede, the plaintiff, an automotive tools and equipment distributor, brought a misappropriation action against its former employees. Id. at 209. The plaintiff alleged that knowledge about its customer list was limited to the corporation’s president, general manager, and a few others on a need-to-know basis. Id. at 211-15. The court held that plaintiff’s customer list constituted a secret. Id. at 216. The court explained that this information must be protected as a trade secret because it was not available from any public source.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The gateway matter began with Howsam’s claim that the Dean Witter, Inc. misrepresented attributes of interests she bought in four limited partnerships between 1986 and 1994. Howsam’s claim is subject to arbitration and she has decided to use the National Association of Securities Dealers arbitration process which states that no dispute over six years old may be arbitrated. The plaintiff filed with the Tenth Circuit Court of Appeals to appeal the District Court decision that Howsam has the right to arbitrate and determine the applicable statute of limitations.…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    MGT 5015 Ch Questions

    • 542 Words
    • 2 Pages

    An entrepreneur can use trade secret law to protect his or her business plans, concepts, and strategies as legal trade secrets by demonstrating to the court that reasonable security measures were adopted and continued in order to maintain the secrecy of their information. The entrepreneur must designate the appropriate information as confidential and proprietary and then protecting it by lock and key and passwords. For example, when sending emails containing confidential information, they can use a system where a password must be…

    • 542 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BIS 320 Week 4 DQs

    • 385 Words
    • 2 Pages

    DQ3: Read case study 12 in Ch. 12 of MIS Essentials. Considering the viewpoints of customers, law enforcement, personnel, investors, and management, did ChoicePoint make the best decision? Discuss your rationale for each viewpoint. Given ChoicePoint’s experience, what is the likely action of similar companies whose records are compromised in this way?…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Giere V. Eaton Corporation

    • 1323 Words
    • 6 Pages

    The case of Hauck Mfg. Co. (Hauck) v. Astec Industries Incorporated (Astec) is also a case that would support Giere. This case focuses on supposed confidential information that was exchanged for the development of burners used specifically for these businesses. The problem with this case is that all of the plaintiff’s assertions for the use of confidential information is assumed and was not proven. In that it was only alleged and not enough factual information was provided to prove that a breach of confidential information occurred. This case was found in favor of the…

    • 1323 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    3.1A Listing rule 3.1 does not apply to particular information while each of the following requirements is satisfied in relation to the information: 3.1A.1 One or more of the following 5 situations applies:      3.1A.2 3.1A.3 It would be a breach of a law to disclose the information; The information concerns an incomplete proposal or negotiation; The information comprises matters of supposition or is insufficiently definite to warrant disclosure; The information is generated for the internal management purposes of the entity; or The information is a trade secret; and…

    • 8127 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    Protecting sensitive or confidential data is paramount in many businesses. In the event such information is made public, businesses may face legal or financial ramifications. At the very least, they will suffer a loss of customer trust. In most cases, however, they can recover from these financial and other losses with appropriate investment or compensation…

    • 548 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bus Ethics

    • 7195 Words
    • 29 Pages

    3 Courts, CHAPTER Sources of Law, and Dispute Resolution TRUE-FALSE QUESTIONS 1. Federal judges are appointed for life. ANSWER: True SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 2. Court opinions are published in collections of court opinions called reporters. ANSWER: True SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 3. A cite such as 2004 WL 1208516 may be found on Westlaw. ANSWER: True SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 4. State trial courts generally have limited jurisdiction. ANSWER: False SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 5. There is no minimum monetary requirement for lawsuits involving a federal question. ANSWER: True SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 6. For diversity jurisdiction to exist there must be litigants from at least three different states. ANSWER: False SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 7. Jurisdiction over the location of property at issue in a lawsuit is called in rem jurisdiction. ANSWER: True SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 8. Negotiating business contracts by means of telephone calls or the mail is insufficient to provide state court with personal jurisdiction over an individual so long as the individual is out-of-state when such 32 33 MANAGERS AND THE LEGAL ENVIRONMENT contacts are made. ANSWER: False SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 9. Parties may never agree in advance which law will govern a dispute in the event that one develops. ANSWER: False SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 10. Federal regulations and rules are printed in the Code of Federal Regulations which is revised and updated on a yearly basis. ANSWER: True SKILL LEVEL: AACSB Analytic OBJECTIVE: AICPA Legal 11. The process of questioning the witnesses is…

    • 7195 Words
    • 29 Pages
    Satisfactory Essays
  • Better Essays

    The main purpose of the article Stalking and Age; is to look at the three different age groups when it comes to stalking. Younger stalkers are considered 16 years or younger, adult stalkers are considered 17 to 59 years, and older stalkers are 60 and over. There are differences that can appear to have implications for investigation, intervention, risk assessment, and management. In this article there is original research that was conducted. An exploratory approach was taken in this article; comparisons are made across a wide range of variables covering stalker and victim demographics, the stalking process, impact on victims, third parties, and victims’ responses to being stalked (North, Scott, & Sheridan 2014).…

    • 1779 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Based on the scenario, I think the type of stalker that my friend’s ex-boyfriend’s actions characterize is a relationship or simple obsessional stalker. According to the course text, the perpetrator and victim typically has had a previous relationship that could include friendship, marriage, or even a coworker (Gosselin, 2014). In my opinion, I think that stalking is a serious matter that should not be taken lightly. Therefore, I think that she should contact law enforcement immediately before things take a turn for the worst. According to the course text, Gosselin (2014), “simple obsession is likely to result in death of an individual (pg. 298).” I think that with her life being at risk and the fact that he is continuously following and calling her that legal actions needs to take place in order to protect her.…

    • 320 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Guidence and Couselling

    • 1533 Words
    • 7 Pages

    Information is the key asset in most organizations. Companies gain a competitive advantage by knowing how to use that information. The threat comes from others who would like to acquire the information or limit business opportunities by interfering with normal business processes.…

    • 1533 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Partial Liquidation

    • 794 Words
    • 4 Pages

    [ 1 ]. Miller, Roger LeRoy., Gaylord A. Jentz, and Frank B. Cross. West 's Business Law: Extended Case Approach.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    NDA format

    • 2511 Words
    • 11 Pages

    is proprietary to the Disclosing Party and not generally known to the public, whether in tangible or…

    • 2511 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    trade secret

    • 2663 Words
    • 9 Pages

    Trade secrets are different from other business secrets, for example, the amount or other terms of a secret bid for a contract or the salary of certain employees, or the security investments made or contemplated, or the date fixed for the announcement of a new policy or for bringing out a new model.…

    • 2663 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    ADVANCED e-SECURITY

    • 451 Words
    • 2 Pages

    When a computer is used as an active tool to conduct an attack on another information asset, that computer is then considered the subject of an attack.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays