Show Less


Protecting Information Through Criminal Law

Eli Lederman

It has often been said that information is power. This is more true in the information age than ever. The book profiles the tools used by criminal law to protect confidential information. It deals with the essence of information, the varieties of confidential information, and the basic models for its protection within the context of the Internet and social networks.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 3: The communication model

Eli Lederman


Chapter 3 deals with the communication model, in which the linkage that forms the basis of the right to control information is between an individual and a communicative process. In some circumstances and under certain conditions, an interpersonal communication protects and shields communicative messages transferred within its framework from unauthorized exposure. Communicativeness deserves special attention because it concerns one of the most basic human traits, and many refer to it as one of the primarily human characteristics. The party transferring the message may control it to some extent both during and after its transmission. But control is relative under the protection of this model. It can be a function of the personal relations between the parties, such as a trust relationship that serves as a basis for requiring the recipient not to undermine the control of the transferring party. In other situations, the control is a function of the mode of communication or its circumstances. Communicators who reveal their intention not to make their information exchange public can prevent others from intercepting the information while in transit. The criminal provisions that constitute this model were aimed at protecting information, and through it other rights and values. The chapter follows objectives of these provisions, the trends of their development, the underlying lines of reasoning and the extent of protection.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.