Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Trade Secrets, Good Fences, and Big Data

View through CrossRef
The "fencing costs" theory of trade secrecy posits that in the absence of legal protection, holders of confidential information will overinvest in secrecy precautions relative to the social optimum. Trade secret law enhances economic efficiency--or so the theory goes--by providing a lower-cost substitute for the excessively high "fences" that firms would otherwise construct around their secrets. The goal of trade secret law, according to the theory, is to assure firms that they can rely on legal remedies rather than erecting expensive barriers to protect their confidential information.&nbsp;<br><br>While the rise of big data and the advent of artificial intelligence magnify the economic significance of trade secrecy, these same phenomena also challenge the underlying premise of the fencing costs theory: that the sole function of fences is to enable firms to capture the value of the information that those firms produce. In an algorithmic age, trade secret misappropriation significantly increases the risk that malicious actors will be able to steal identities, manipulate consumer preferences, interfere in elections, attack critical infrastructure, and inflict a range of other harms on third parties. Standard economic theory suggests that secret holders are likely to underinvest in fencing relative to the social optimum because they internalize only a small portion of these harms. Insofar as legal protection displaces private fences that might have prevented these third-party harms, it potentially exacerbates the problem of underinvestment in secrecy precautions.&nbsp;<br><br>The idea of "good fences"--secrecy precautions that protect third parties from the harms of trade secret misappropriation--turns the fencing costs theory upside down. The prevalence of third-party harms potentially undermines one important normative justification for trade secret law, but it also potentially rationalizes one otherwise-puzzling feature of trade secret law: the requirement that secret holders invest in "reasonable precautions" as a precondition for legal protection. The "reasonable precautions" requirement incentivizes secret holders to invest in fences that protect third parties from harm even when policymakers lack the ability to specify--ex ante--which secrets require protection and what forms those protections should take. Our analysis of fencing costs and reasonable precautions in the shadow of big data and AI thus shows how new technological developments-in trade secret law, as in other areas-recast and invert decades-old theoretical and doctrinal debates.
Title: Trade Secrets, Good Fences, and Big Data
Description:
The "fencing costs" theory of trade secrecy posits that in the absence of legal protection, holders of confidential information will overinvest in secrecy precautions relative to the social optimum.
Trade secret law enhances economic efficiency--or so the theory goes--by providing a lower-cost substitute for the excessively high "fences" that firms would otherwise construct around their secrets.
The goal of trade secret law, according to the theory, is to assure firms that they can rely on legal remedies rather than erecting expensive barriers to protect their confidential information.
&nbsp;<br><br>While the rise of big data and the advent of artificial intelligence magnify the economic significance of trade secrecy, these same phenomena also challenge the underlying premise of the fencing costs theory: that the sole function of fences is to enable firms to capture the value of the information that those firms produce.
In an algorithmic age, trade secret misappropriation significantly increases the risk that malicious actors will be able to steal identities, manipulate consumer preferences, interfere in elections, attack critical infrastructure, and inflict a range of other harms on third parties.
Standard economic theory suggests that secret holders are likely to underinvest in fencing relative to the social optimum because they internalize only a small portion of these harms.
Insofar as legal protection displaces private fences that might have prevented these third-party harms, it potentially exacerbates the problem of underinvestment in secrecy precautions.
&nbsp;<br><br>The idea of "good fences"--secrecy precautions that protect third parties from the harms of trade secret misappropriation--turns the fencing costs theory upside down.
The prevalence of third-party harms potentially undermines one important normative justification for trade secret law, but it also potentially rationalizes one otherwise-puzzling feature of trade secret law: the requirement that secret holders invest in "reasonable precautions" as a precondition for legal protection.
The "reasonable precautions" requirement incentivizes secret holders to invest in fences that protect third parties from harm even when policymakers lack the ability to specify--ex ante--which secrets require protection and what forms those protections should take.
Our analysis of fencing costs and reasonable precautions in the shadow of big data and AI thus shows how new technological developments-in trade secret law, as in other areas-recast and invert decades-old theoretical and doctrinal debates.

Related Results

Perencanaan Jadwal Produksi Induk pada Produksi Sweater dengan Pendekatan Time Fences
Perencanaan Jadwal Produksi Induk pada Produksi Sweater dengan Pendekatan Time Fences
Abstract. Indah Fashion is a home industry engaged in fashion in the form of sweater clothes made from knitted yarn in Indonesia. The strategy respond to the market in Indah Fashio...
<b>PERLINDUNGAN HUKUM BERDASARKAN UNDANG-UNDANG NO. 30 TAHUN 2000 TENTANG RAHASIA DAGANG</b>
<b>PERLINDUNGAN HUKUM BERDASARKAN UNDANG-UNDANG NO. 30 TAHUN 2000 TENTANG RAHASIA DAGANG</b>
As one component of intellectual property rights, trade secrets have an important position in business activities in Indonesia. Problem formulation How well do the provisions of La...
Legal Risks and Coping Strategies of Block Chain Managing Trade Secrets: Enlightenment of Chinese Experience
Legal Risks and Coping Strategies of Block Chain Managing Trade Secrets: Enlightenment of Chinese Experience
Abstract The management and legal protection of trade secrets is the common goal for all countres. Block Chain was found a huge advantage in protecting trade secrets as an ...
Analysis of the current situation of agricultural trade development between China and Ukraine
Analysis of the current situation of agricultural trade development between China and Ukraine
Purpose. As a European granary, Ukraine has rich agricultural resources. China is a country with a large population and has a large demand for food. However, the agricultural trade...
Predator-proof fences for biodiversity conservation: some lessons from dingo fences
Predator-proof fences for biodiversity conservation: some lessons from dingo fences
Using the history of dingo-proof fences in Australia, I show that several key lessons were learnt by pastoralists, but later forgotten and had to be re-learnt. Each has application...
Early Australian rabbit-proof fences: paling, slab and stub fences, modified dry stone walls, and wire netting
Early Australian rabbit-proof fences: paling, slab and stub fences, modified dry stone walls, and wire netting
AbstractFences were critical in the fight against rabbits in colonial Australia. Initially, domestic rabbits were farmed in pens or paddocks fenced with paling fences or walls. Wil...

Back to Top