Show Less


Protecting Information Through Criminal Law

Eli Lederman

It has often been said that information is power. This is more true in the information age than ever. The book profiles the tools used by criminal law to protect confidential information. It deals with the essence of information, the varieties of confidential information, and the basic models for its protection within the context of the Internet and social networks.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 4a: The content model: national security and trade secrets

Eli Lederman


The two parts of the fourth chapter discuss the content model, under which it is the content that endows the information (the subject matter) with a subjective or objective importance that invests the interest holder with the right to prevent others from accessing the source of information, or to prevent the lawful but restricted holders of the information from revealing or using it without authorization. This group of provisions was also enacted in order to protect information and its sources. Under the content model the interest holder of the protected object can be an individual who protects his privacy or a legal body or even a state, as is the case when the information concerns national security or trade secrets. The chapter follows the trajectory of development within this model, from the protection of confidential information of value to the community to that of information that concerns mostly individuals. The chapter notes the different extent of protection against unauthorized exposure or use that each subcategory enjoys. Special attention is dedicated to personal information, and the imprint of the information era (Internet, social networks and the communication revolution) on the social development of privacy and the growth of data mining and profiling.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.