Analysis of Judicial Practice in Cases Involving Violations of the Requirements for the Protection of Trade Secrets Carried out by Employees of Organizations
( Pp. 39-44)

More about authors
Anna K. Zharova
Institute of State History of the Russian Academy of Sciences
Moscow, Russian Federation Russian G.V.Plekhanov Economic University, Moscow, Russian Federation
Abstract:
Annotation. The purpose of the research is to analyze the positions of civil, arbitration and criminal courts in cases involving violations of the requirements for the protection of commercial secrets committed by persons admitted to this information in the performance of official duties. Restricted access information is particularly valuable for the organization, but its protection should be ensured by taking measures, which include legal, organizational and technical measures. The legislation obliges the holder of restricted access information to take such measures. Result. Actions of employees admitted to restricted access information that formally do not violate the requirements of local regulations of the organization, but go beyond the limits established by law can be qualified by courts as offenses. Criminal courts prioritize the requirements of a special law regulating relations related to a certain category of restricted access information, which simultaneously with access restrictions may not relate to commercial secrets.
How to Cite:
Zharova A. K. Analysis of Judicial Practice in Cases Involving Violations of the Requirements for the Protection of Trade Secrets Carried out by Employees of Organizations // ECONOMIC PROBLEMS AND LEGAL PRACTICE. 2023. Vol. 19. № 5. P. 39-44. (in Russ.) EDN: UPEYMK
Reference list:
Chen, C. Restricted Mean Value Theorems and the Metric Theory of Restricted Weyl Sums / C. Chen, I. E. Shparlinski // Quarterly Journal of Mathematics. —2021. —Vol. 72, No. 3. —P. 885–919. —DOI 10.1093/qmath/haaa052.—EDN COQDUS.
Chugunova, N. I. On the problem of ensuring APCS information security / N. I. Chugunova, O. V. Maslova, A. I. Kuklina // Современные тенденции развития науки и технологий. —2015. —No. 2-2. —P. 171–173. —EDN TYRTNR.
Samaha, . F , Seshadri P, Iqbal N., Stern L. Effects of carbohydrate-restricted diet versus a fat-and calorie-restricted diet on lipid subfractions / F. F. Samaha, P. Seshadri, N. Iqbal, L. Stern // Journal of the American College of Cardiology. —2003. —Vol. 41, No. 6 S1. —P. 243. —DOI 10.1016/S0735-1097(03)81716-3. —EDN ETDECF.
Vilinov, I. E. A comprehensive solution for ensuring information security of an industrial facility infrastructure / I. E. Vilinov, A. V. Volodin, V. V. Dergachev // Telecommunications and Radio Engineering. —2013. —Vol. 72, No. 3. —P. 181–193. —DOI 10.1615/TelecomRadEng.v72.i3.10. —EDN RFCMSF.
Yuan, Ji. X. Restricted Cohomology of Restricted Lie Superalgebras / Ji. X. Yuan, L. Yu. Chen, Ya. Cao // Acta Mathematica Sinica. —2022. —Vol. 38, No. 11. —P. 2115–2130. —DOI 10.1007/s10114-022-1088-4. —EDN WRYQJJ.
Zharova, A. Ensuring the information security of information communication technology users in Russia / A. Zharova // International Journal of Cyber Criminology. —2019. —Vol. 13, No. 2. —P. 255–269. —DOI 10.5281/zenodo.3698141. —EDN LTMESV.
Zhou, R. Relationship between the restricted AKNS flows and the restricted KdV flows / R. Zhou // Chinese Annals of Mathematics. Series B. —2012. —Vol. 33, No. 2. —P. 191–206. —DOI 10.1007/s11401-012-0703-6. —EDN PLNWHB.
Beketova N.A. How to properly and reliably protect confidential information? HR practitioner. 2022. No. 2. pp. 133–176.
Ganzha, M. V. Problems of criminalization of access to restricted computer information at the present stage / M. V. Ganzha // Jurist-Pravoved. —2023. —№ 2(105). —Pp. 88–93. —EDN FBNQKY.
Gibadullina Z. How programmers are legally caught stealing trade secrets for competitors. Labor Law. 2021. No. 3. pp. 43–50.
Goncharova V.A. Disclosure of confidential information at the stage of negotiations (Article 434.1 of the Civil Code of the Russian Federation): problems of consistency of legal regulation. Economy and law. 2022. No. 11. pp. 83–91.
Zharova A.K. Ensuring the protection of the state from computer attacks in the ICT sphere. Proceedings of the Institute of State and Law of the Russian Academy of Sciences. —2022. —Vol. 17, No. 4. —pp. 100–125. —DOI 10.35427/2073-4522-2022-17-4-zharova.
Kovalenko, A. O. Legal regimes of restricted access information in legal proceedings / A. O. Kovalenko // Russian Justice. —2020. —No. 12. —PP. 37–55. —DOI 10.37399/issn2072-909X.2020.12.37-55. —EDN UGXKTY.
Martasov D. Commercial secret of the company: issues of judicial practice. Labor law. 2021. No. 3. pp. 101–108.
Poleshchuk, D. G. The legal regime and types of information of limited dissemination in legislation / D. G. Poleshchuk // Justice of Belarus. —2021. —№ 8(233). —Pp. 5–9. —EDN HJABYT.
Leaks of restricted access information: judicial practice // Information protection. Inside. —2020. —№ 2(92). —Pp. 80–85. —EDN SLXHKL.
Keywords:
restricted access information, trade secrets, crimes, misdemeanors, bank secrecy.


Related Articles

1. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR LOPASHENKO N.A. Pages: 16-18 Issue №10864
Scale of risks of migration processes criminality
migration crime migrants crimes against foreign citizens crimes committed by foreign citizens
Show more
11. YOUNG SCIENTISTS IN ACTUAL CRIMIAL LAW PROBLEMS SOLVING Pages: 241-243 Issue №17728
Features improvement of aggravating circumstances stipulated in Art. 290 of the Criminal Code (bribery)
corruption crimes mechanism improvement officials
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 159-162 Issue №4088
THE USE OF TECHNICAL DEVICES AND INFORMATION TECHNOLOGIES FOR CRIMINAL PURPOSES AS A CIRCUMSTANCE AGGRAVATING THE CRIMINAL LIABILITY
information security crimes cynicism social danger computer
Show more
5. Criminal law Pages: 149-153 Issue №3884
History of the development of the legislation of the Republic of Tajikistan, of responsibility for sexual assault
crimes sodomy lesbianism violence punished
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 163-166 Issue №4088
TO THE QUASTION OF QUALIFICATION OF CRIMES, PROVIDED BY CLAUSE 179 OF THE CRIMINAL CODE OF THE RUSSIAN FEDERATION
crimes economy coercion the deal housing
Show more
3. CRIMINAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 200-204 Issue №21729
Criminal Legal Description of Fraud Committed with the Use of Information and Telecommunication Technologies
fraud cybercrimes crimes cyberfraud information technology
Show more
8. Forensics; Forensic expertise; Operational and search activities Pages: 165-167 Issue №5215
TYPES OF CRIMES COMMITTED IN THE BUILDING DESIGN DEVELOPMENT
the building complex the stages of construction crimes committed in the development negotiation and approval of the initial permits and design estimates
Show more
7. Criminal; Criminal enforcement law Pages: 177-181 Issue №6998
Organizational and management factors, contributing to the commission of crimes against life and health in prisons
crimes health life determinants organizational and managerial activities
Show more
6. CRIMINAL LAW, CRIMINAL ENFORCEMENT LAW, V.P. REVIN"S SCIENTIFIC SCHOOL Pages: 150-153 Issue №2615
Some aspects of criminal policy in the protection sphere turn of currency values
criminal policy its implementation crimes currency values economic security
Show more
11. CRIMINAL LAW AND CRIMINOLOGY; CRIMINAL ENFORCEMENT LAW 12.00.08 Pages: 243-246 Issue №17214
Legal regulation of punishments for crimes committed by officials in the sphere of economic activity
corruption punishment officials crimes anti-corruption expertise
Show more