El presente trabajo analiza el secreto empresarial como límite al derecho de acceso a la información ambiental reconocido en la Ley 27/2006, de 18 de julio. Dicho análisis trata de determinar, en ...primer lugar, qué debe entenderse por “datos confidenciales de carácter comercial o industrial” a la luz de la Ley 1/2019, de 20 de febrero, de Secretos empresariales, que ha venido a clarificar por fin dicho concepto. En segundo lugar, se ofrecen los criterios que la Administración debe considerar a la hora de decidir sobre el acceso a la información “sensible” de las empresas.
It is well known that sources that threaten the data privacy of economic subjects through human interference, no matter if it is accidental or on purpose, could be divided into: inner, outer, and ...combined sources. As outer sources of threatening are considered persons, who are not employed in the economic subject, but whose damaging behavior could influence negatively on the subject's safety. To this group are also classified the companies that are in charge of private security, including detective agencies as well. While working on assignments in their scope of work, these safety subjects come regularly to the data, which are regarded as a business secret and should not be published. All the collected data and knowledge during their investigation work could only be used for the original purpose and at the end of the investigation should be handed over to the client (except for the ones, which are not considered as significant for the job and which should be destroyed in a certain period of time). When keeping the business secret, a company or an agency is obligated to abide by the regulations for personal data protection, no matter if the data analysis is done automatic, half-automatic, or in some other way. If subjects of private security have a need to use personal data, this is allowed only under conditions, which are regulated by the laws in this scope of work, or with clients' consent. As for the determination of secret data, it is important to differentiate the public from secret ones and to respect public principles for the simultaneous protection of the society and the state. Additionally, a business secret should be differentiated from the professional one, as well as business intelligence from business espionage.
Kaznenopravna zaštita poslovne tajne Moslavac, Bruno
Hrvatski ljetopis za kaznene znanosti i praksu,
12/2020, Volume:
27, Issue:
2
Journal Article
Open access
Skriveni podaci karakteristični za poduzetnike zaštićeni su parcijalno u kaznenom pravu i ne naslanjaju se na građanskopravnu zaštitu poslovne tajne. Kazneno djelo odavanja i neovlaštenog ...pribavljanja poslovne tajne gospodarsko je kazneno djelo, ali je inicijativa za traženje kaznenopravne zaštite u cijelosti prepuštena slobodnoj volji nositelja poslovne tajne.
U radu je korištena deskriptivna analiza i statistička metoda radi utvrđenja ključnih elementa bića kaznenog djela i postotka odbačenih kaznenih prijava te eksplikativna analiza za pojašnjenje modaliteta i stadija izvršenja djela radi utvrđenja ustraju li oštećenici na kaznenom postupku te prijavljuju li pokušaj kaznenog djela odavanja i neovlaštenog pribavljanja poslovne tajne.
Rezultati istraživanja pokazuju da oštećenici ne pretjeruju s procjenom tržišne ili objektivne vrijednosti poslovne tajne koja je postala objektom kaznenog djela i da dominantno kaznene prijave podnose za temeljni oblik kaznenog djela. Također, počinitelje prijavljuju isključivo zbog dovršenog djela i relativno često povlačenjem prijedloga za kazneni progon onemogućavaju pravomoćno okončanje kaznenog postupka, koji u cijelosti ovisi o njihovu stavu.
Zaključno, kazneno djelo odavanja i neovlaštenog pribavljanja poslovne tajne ne participira sa značajnijim udjelom u ukupnom broju gospodarskih kaznenih djela i zbog toga što oštećenici nerijetko odustaju od prvotno iniciranog kaznenog postupka radi zaštite povrijeđene poslovne tajne, nije neophodna istovremena kaznenopravna zaštita uz građanskopravnu.
Business Espionage- Motive and Methods Radovic, Vidak
Ekonomika, Journal for Economic Theory and Practice and Social Issues,
06/2008, Volume:
54, Issue:
3-4
Journal Article
Peer reviewed
Open access
Business espionage, like a new economy discipline, somewhere unvalued, somewhere hateful, precede important place in relations between states and guide national company. Business espionage is process ...of transforming data in knowledge. Primary sense of Business espionage is to concourse comparing of concurrence, and because of that existed “gray-zone” between data acquisition and business espionage. In contrast to Serbia, of others countries in transition, outlet of important information’s are not big worse. And even if iodine case business espionage, in Serbia that’s just absolutely negation. What’s more, outlet of important information’s is not such a big worse. Those, how there explained, that’s not money, sensible object or same materially well – machine. Unlike of our irresponsibly relation, world and countries in our ambience, render it very carefulness, assign money and tutored people.
Pod pojmom razmjene u ekonomiji se podrazumjeva da dvije strane sporazumno obave transkaciju dajući jedna drugoj određeni ekvivalnet u vrijednosti. U poduzetničkoj ekonomiji to podrazumjeva da se ...kupcu da više vrijednosti nego što to čini konkurencija ostvarujući pri tome prednost koja se ogleda u boljem tržišnom položaju.
Da bi se obavila transakcia potreban je novac, dobra, informacije i zainteresovane strane. Realizacija svega navedenog ostvaruje se kroz komunikaciju strana u poslovnom odnosu uvažavajući energiju i napore koje strane ulažu da bi razumjeli uzajamne potrebe, želje,interese i zahtjeve.
Upravo ovi elementi i druge informacije omogućuju da se izgradi marketing mix i dugoročni lanac vrijednosti iz kojeg proizilazi neophodan proizvod ili usluga.
Za razliku o poslovnog informacionog sistema koji omogućava veću efikasnost i efektivnost u poslovanju , neke kompanije koriste i ilegalne metode prikupljanja informacija koje su označene kao krivično djelo u članu 254. KZFBIH „Odavanje i neovlašteno pribavljanje poslovne tajne”, ili nekog drugog oblika krivičnog djela npr. u članu 157. KZ FBiH predviđeno je kazneno djelo Špijunaže.
Za razliku od ovog nedozvoljenog načina prikupljanja informacija poslovni informacioni sistem nam omogućava da na principima ekonomske nauke predvidimo uslove budućeg poslovanja prilagođavajući uslove i poziciju za vlastito poslovanje, uvažavajući vlastite prednosti i slabosti.
Ekonomski podaci su generalno uvijek bili predmet interesovanja vojnih i političkih obavještajnih službi i kao takvi su neki od njih i bili klasifikovani kao obavještajni podaci ili tajne. U modernim uslovima poslovanja ovaj odnos postaje složeniji i zamršeniji.
U ovom se članku obrađuje problematika utvrđivanja stupnja rizika temeljem kojeg porezni savjetnici sudjeluju u provođenju mjera prevencije pranja novca i financiranja terorizma. Iznosi se povijesni ...prikaz razvoja mjesta i uloge poreznih savjetnika u međunarodnim standardima koji su svoje mjesto pronašli i u domaćem zakonodavstvu.
Konkretna procjena rizika poreznih savjetnika koja ukazuje na niski rizik poreznih savjetnika u sustavu prevencije pranja novca izložena je komparativnom analizom prijava sumnjivih transakcija poreznih savjetnika u Republici Hrvatskoj i 13 zemalja u okruženju. Kao potvrda njihovoga zakonskoga tretmana detaljno je obrađena danas važeća zakonska regulativa sprječavanja pranja novca i financiranja terorizma kojom se Republika Hrvatska u potpunosti usklađuje s međunarodnim standardima.
The study aims to show the significance of the Confidentiality and Non-Competition agreements and the extent to which they are linked to, and different from, each other. The problem of the study lies ...in the entire absence of direct legal obligations to non-competition agreement in the Palestinian law. Therefore, researchers attempt to identify each concept, the Confidentiality and Non-Competition agreements in this research. Both researchers use the descriptive analytical approach to achieve the aim of the study. Researchers describe the extent to which the Confidentiality and Non-Competition agreements are linked. Through the descriptive stage, they analyze legal texts related to the subject of the study. The study concludes with a set of findings and recommandations, the most important of which are as follows: It was better for the Palestinian legislator not to restrict the Confidentiality agreement to commercial and industrial secrets, Because it can be in any business, even if it is not industrial or commercial. Disclosure of secrets by the employer after the termination of the contractual relationship is a tort, not a contractual responsibility. The study recommends that the Palestinian legislator stipulate an explicit penalty for breaching the employee's obligation to by divulging secrets, and impose-on employers, when stipulating non-competition, to grant the employer adequate compensation to prevent him from taking other jobs.
During the first decades of America's existence as a nation, private citizens, voluntary associations, and government officials encouraged the smuggling of European inventions and artisans to the New ...World. At the same time, the young republic was developing policies that set new standards for protecting industrial innovations. This book traces the evolution of America's contradictory approach to intellectual property rights from the colonial period to the age of Jackson.
During the seventeenth and early eighteenth centuries Britain shared technological innovations selectively with its American colonies. It became less willing to do so once America's fledgling industries grew more competitive. After the Revolution, the leaders of the republic supported the piracy of European technology in order to promote the economic strength and political independence of the new nation. By the middle of the nineteenth century, the United States became a leader among industrializing nations and a major exporter of technology. It erased from national memory its years of piracy and became the world's foremost advocate of international laws regulating intellectual property.
Procedural tools aimed at access to information in general, and disclosure of documents in particular, are crucial for the effectiveness of private antitrust enforcement litigation and for ...facilitating more genuine equality of arms. Currently, profound differences exist among EU Member States’ civil procedure laws concerning disclosure of evidence held by the opponent. The transposition of the litigation disclosure mechanism contained in the Damages Directive will undermine the existing principles of Slovenian civil procedure. However, this is due to the fact that Slovenian law is outdated with regard to evidence disclosure. Not only that, it is also partially based on an erroneous premise, typical for the traditional civil law approach, whereby the principle against self-incrimination applies in civil cases in the same way as in criminal cases. As a result, the obligatory transposition of the Directive’s requirements should be perceived as a positive step for Slovenia. Yet this step will be successful only if followed by a general reassessment of evidence disclosure rules in Slovenian civil procedure law.
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and ...political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between cybercrime, cyberwarfare, and cyberterrrorism are discussed.