:::

詳目顯示

回上一頁
題名:美國經濟間諜法之研究
作者:曾勝珍 引用關係
作者(外文):Sheng-Chen Tseng
校院名稱:國立中正大學
系所名稱:法律學研究所
指導教授:陳文吟
學位類別:博士
出版日期:2005
主題關鍵詞:營業秘密競業禁止條款僱傭關係保密契約Trade SecretsNon-Competition ClausesEmployment RelationshipNon-disclosure Covenant
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:113
我國的營業秘密法自民國八十五年一月制定通過,施行至今,數年來隨著世界經濟局勢的變動,貿易型態的改變及智慧財產權保護觀念的提昇,加上我國已為WTO之會員國,目前產業競爭生存環境空前激烈,仰賴外國技術人員、專業人士,或我國協助其他發展中國家技術更新,皆易發生營業秘密剽竊,從事經濟間諜的情形。更因欠缺對不法行為之遏阻效果,影響業者研發意願,而阻撓產業技術移轉。
不僅我國,近年來以美國為例,經濟間諜利用科技工具犯案層出不窮,西元一九九六年美國制定通過「美國經濟間諜法」,即在宣示對其懲治國內營業秘密竊盜及外國經濟間諜,以維護美國本身商業資訊及其秘密的決心。我國一向與美國經貿關係往來密切,參考美國立法背景及其經驗,更可為我實務及立法政策上重要依據。EEA成為聯邦法規,條文中罕見的巨額罰金並對犯罪行為人科處剝奪自由的刑責,在遏阻國際經濟間諜罪刑,防制美國國內營業秘密剽竊或不當洩漏,已產生實質的效果。
本文藉由觀察美國經濟間諜法實體規範,研究其行為模式、行為內容及罰則,再自美國經濟間諜法之執行及效果,探求其立法真意及執行程序的瑕疵,比較規範內容的優、缺點,探討美國實務案例,及我國其他相關法律規定:民事法規、公司法、公平交易法、刑法,確認我國有關營業秘密之立法是否妥適,或有另行訂定防制經濟間諜單行法規之必要。
再比較我國營業秘密法之實體規範、司法實務與其他相關法律規定,避免造成不公平競爭,以彌補現行法規缺失,應制定劃分權責與刑責的相關立法。最後,本文探討制定相關立法之可行性,建立國內經濟間諜案件之適用法源,明文列舉經濟間諜罪刑的犯罪態樣、罰金刑責及民事賠償方式,建議為遏阻妨礙營業秘密的行為,管制高科技人才,有效保護國家科技,制定我國經濟間諜法之相關立法,有其必要性。
For many years, a major problem for law enforcement in responding to the increase in such thefts has been a glaring gap in federal law. In order to update Federal law to address the technological and economic realities of the end of the 20th century, is acting to pass the Economic Espionage Act of 1996. This bill addresses an issue of critical importance to Nation’s economic well-being.
First of all, this research analyzes the background in the area of economic intelligence and primarily focuses on the hearings of the Congress and the other related statutes, provides a brief background legislating history of the Economic Espionage Act. Secondly, introducing the definition of “economic espionage ” and the purpose of the espionage activities. The Act has prohibited acts to the individuals who did the misconducts, and define trade secret discussing the enforceability provisions and the protective orders. In addition to concern about protective orders, commentators have raised other issues regarding the enforceability of the statute, as well as the propriety and need for the criminalization of such activities. The paper also makes the analysis of the weakness and the strength of EEA.
Thirdly, this paper collects and analyzes those cases discussing the validity, construction, and application of the EEA. According to the relevant facts, the conclusion depending on the indictment is proper, the EEA could be adapted to prevent constitutional challenges. This analysis illustrates that Congress’ attempt to give clarification to the EEA resulted in further application.
The next part will focus on the trade secret laws of R.O.C., introducing several cases happened in Taiwan and the other related statutes. In order to keep trade secret, parties should make an express contract to deal with the ownership of trade secrets between or among employees/employers and joint owners. Since no penalty and civil liability in the R.O.C. Trade Secret Law (1996), it becomes very difficult to avoid violation the individual confidential right and to emphasize the importance of information security.
Finally, the issue of this paper tries to discuss the Law and intends to suggest the other new statutes to comprise the economic espionage criminals. The EEA is best viewed as an outgrowth of concern over what nations will do with the spies and spying equipment left over from the Cold War and provides us the best experiences to legislate the same act to deal with the economic espionage in R.O.C.
中文
一、書藉
1. 「簽訂競業禁止參考手冊(二版)」,行政院勞委會出版,民國九十二年五月。
2. 公平交易法相關行為處理原則,行政院公平交易委員會編印,民國八十年四月。
3. 王本耀,專利管理高手,財團法人資訊工業策進會,民國八十九年。
4. 行政解釋彙編第一冊,法務部,民國八十一年五月。
5. 吳嘉生,智慧財產權之理論與應用,五南圖書出版股份有限公司,民國九十一年十月。
6. 宋耀明、林炳輝合著,兩岸智慧財產權保護與運用,元照出版有限公司,民國九十一年七月。
7. 法務部行政解釋彙編第一冊,民國八十一年五月
8. 徐玉玲,營業秘密的保護,三民書局,民國八十二年十一月。
9. 張雪怡、李青華、李雅萍,科技產業革命,書泉出版社,民國九十年。
10. 張凱娜,營業秘密介紹,資訊市場情報中心法律研究組報告,資訊工業策進會,民國八十四年十一月十五日。
11. 陳文吟,專利法專論,五南圖書出有限公司,民國八十六年十月。new window
12. 著作權小百科,經濟部智慧財產局,民國九十年。
13. 馮震宇,了解營業秘密法—營業秘密法的理論與實務,永然文化出版股份有限公司,民國八十六年。new window
14. 勤玉華,美國經濟間諜法案例與順從程序之運用,營業秘密管理高手,經濟部財團法人資訊工業策進會科,民國八十九年三月。new window
15. 葉茂林、蘇宏文、李旦合著,營業秘密保護戰術—實務及契約範例應用,永然文化出版股份有限公司,民國八十四年五月初版。
16. 跨越2000科技法律對策(上)(下),財團法人資訊工業策進會科技法律中心,民國八十九年。
17. 認識公平交易法(增訂八版),行政院公平交易委員會編,民國九十年八月。
18. 趙晉枚、蔡坤財、周慧芳、謝銘洋、張凱娜合著,智慧財產權入門,元照出版公司,民國九十三年一月。
19. 劉博文,智慧財產權之保護與管理,揚智文化事業股份有限公司,民國九十一年。
20. 蔡明誠、陳家駿、張靜、許智誠、張凱娜等五人合著,營業秘密六十講,臺北市電腦商業同業工會,民國八十一年三月。
21. 蕭雄淋,新著作權法逐條釋義(一),五南圖書,民國九十年。
22. 營業秘密保護制度之研究,經濟部商業司著,民國八十一年十二月。
23. 謝哲勝,財產法專題研究(三),元照出版公司,民國九十一年。new window
24. 謝銘洋,「研究成果之智慧財產權歸屬與管理–兼述德國之相關制度」,智慧財產權之基礎理論,翰蘆圖書出版有限公司,民國八十四年。new window
25. 羅麗珠,營業秘密管理高手,財團法人資訊工業策進會,民國八十九年。
二、學位論文
1. 文衍正,營業秘密之侵害及其應負之法律責任,國立中正大學法律學研究所碩士論文,民國八十三年十一月。
2. 林嘉彬,營業秘密之概念及其侵害行為類型之研究,輔仁大學法律研究所碩士論文,民國八十三年七月。
3. 林慧玲,美國經濟間諜法之研析—兼述我業者因應之對策,私立東海大學法律學研究所碩士論文,民國八十九年六月。
4. 蔡文燦,侵害營業秘密民事救濟制度之研究,中國文化大學法律學研究所碩士論文,民國八十六年六月。
5. 薛西全,營業秘密法中產權歸屬合理性之研究,國立中山大學高階經營碩士班,民國九十一年七月八日。
三、期刊
1. 王衡隆,從管理者的角度建立智慧財產權,智慧財產權管理季刊,頁24-27,民國八十五年十月。
2. 古清華,公司如何建立一套簡單完整的智財權管理制度?智慧財產權管理季刊,民國八十四年一月。
3. 立法院公報,第八十四卷第六十五期,頁75-105,民國八十四年十月十九日。
4. 江元慶,「楊斌彥鬥法六年,只為破解美商騙局」,商業周刊第八四一期,頁68-72,民國九十三年一月。
5. 何美慧,美參眾院通過對侵害營業秘密的刑事罰,資訊法務透析,頁3-4,民國八十五年十月
6. 吳景源,談營業秘密法關於營業秘密之保護,萬國法律第一○七期,頁19-24,民國八十八年十月。
7. 李素貞,宣判競業禁止條款不適用於網路產業,智慧財產權月刊,民國八十九年四月。
8. 李素貞,美國經濟間諜法訴訟四維案宣判,資訊法務透析,頁5-6,民國八十九年三月號。
9. 李雅萍,美國經濟間諜法與誘陷,技術尖兵,第四十五期,頁17,民國八十七年九月。
10. 李慧君,大陸最高人民法院之營業秘密侵權糾紛案例解析,科技法律透析,頁4-5,民國九十年四月。
11. 涂榆政、經雯貴,淺釋美國商業間諜法與台灣營業秘密保護之刑罰規定,萬國法律第九十八期,頁52-60,民國八十七年四月。
12. 張訓嘉、鄭勵堅、邵瓊慧主持,企業法律講座「營業秘密之保護—兼談企業應如何定相關條款」,月旦法學雜誌第四十六期,民國八十八年三月。
13. 郭懿美,論台灣高科技工業如何因應美國經濟間諜法(EEA)?--技術移轉vs.竊取營業秘密,智慧財產季刊二十四期,頁29-41,民國八十六年。
14. 陳瑞田,智慧財產權稽核(IP Audit)與實例,智慧財產權季刊第二十四期,民國八十九年三月。
15. 曾勝珍,「美國離職後競業禁止條款」之適用探討-兼比較我國法,中正法學集刊第十四期,頁395-443,民國九十三年一月。new window
16. 曾勝珍,從「四維案」談美國經濟間諜法,嶺東學報第十三期,頁29-41,民國九十一年五月二十日。new window
17. 曾勝珍,僱傭關係中「研發成果」保護之探討,法令月刊第五十五卷第二期,頁25-48,民國九十三年二月。new window
18. 曾勝珍,營業秘密之保護,嶺東學報第八期,頁254-272,民國八十六年二月。new window
19. 曾勝珍,營業秘密與商業間諜,嶺東學報第十二期,頁319-332,民國九十年四月三十日。new window
20. 馮震宇,世界貿易組織與關稅暨貿易總協定,月旦法學雜誌試刊號,民國八十四年三月。
21. 馮震宇,從永豐案判決探討美國經濟間諜法之適用,萬國法律第一百零七期,頁2-18,民國八十八年十月。
22. 馮震宇,論營業秘密法與競爭法之關係-兼論公平法第十九條第一項第五款之適用,公平交易季刊第四卷三期,頁1-39,民國八十五年三月。new window
23. 黃三榮,論營業秘密(五)-兼評行政院版「營業秘密法」草案,萬國法律雙月刊 第八十七期,頁33-49,民國八十五年六月。
24. 楊崇森,美國法上營業秘密之保護,中興法學第二十三期,頁256,民國七十五年十一月。new window
25. 劉詠萱,美國法上營業秘密案例與「不何避免揭露」理論之淺介,資訊法務透析,頁1-9,民國八十七年十月十五日。new window
26. 蔡正廷,離職勞工競業禁止之案例類型,萬國法律第一百零七期,民國八十八年十月。
27. 蔡美智,員工電子郵件vs.營業秘密,智慧財產權管理季刊第二十三期,頁14-17,民國八十八年十二月。
28. 駱志豪,TRIPs協定對營業秘密之保護,公平交易季刊第四卷第三期,頁61-79,民國八十五年三月。
29. 羅麗珠,美國的經濟間諜法案,經濟部科技專案通報「技術尖兵」第三十二期,頁12,民國八十六年八月。
四、電子文章
1. 「我國申請加入GATT/WTO之歷史紀要」,網路資料,http://www.moeaboft.gov.tw/global_org/wto/WTO-into/into3/into02.htm (上網日期:民國九十一年十月一日)。
2. 【以突破性的作法處理人才不足問題】,經濟日報社論,民國九十一年四月十日,http://udnjob.com/issue/hightech/p2.htm (上網日期:民國九十三年四月五日)。
3. 日本不正競爭防止法(Unfair Competition Prevention Law) 本法英文譯文引自WIPO網站,http://clea.wipo.int/clea/lpext.dll/folder/infobase/la349/lae70?fn=document-frame.htm&f=templates&2.0.
4. 加入WTO對我國專利法制之影響,http://www.cyberlawyer.com.tw/alan4-1701.html.
5. 永豐經濟間諜案,http://iip.nccu.edu.tw/iip/NEW-iip/e-paper/2003/006/spy.htm (上網日期:民國九十三年三月二日)。
6. 李永然,從營業秘密談起,民國八十九年十月二十日,http://www.lawlee99.com/lawerans/viewans.asp?idno=491 (上網日期:民國九 年十二月二十七日)。
7. 李順德,【游揆:人才登陸規範不會太嚴】,經濟日報,民國九十一年四月十一日,http://udnjob.com/issue/hightech/p2.htm(上網日期:民國九十三年四月五日)。
8. 周建序,企業應如何具體防止員工洩漏營業秘密? http://www.lawtw.com/cgi-bin/dbboard/topic.cgi?forum-198&topic=9 (上網日期:民國九十年十二月二十七日)。
9. 林河名台北報導,【產業違規外移 台聯建議科刑】,http://tw.news.yahoo.com/2002/04/06/polity/udn/3165391.html (上網日期:民國九十一年四月八日)。
10. 林發立,產業界與營業秘密保護、競業禁止條款及其相關問題,http://netcity3.web.hinet.net/userdata/falilin/ (上網日期:民國九十一年十月二十日)。
11. 林發立,產業界與營業秘密保護、競業禁止條款及其相關問題,民國九十一年七月二十日,http://netcity.web.hinet.net/userdata/falilin (上網日期:民國九十一年十月二十日)。
12. 林燕翎,【學者:侵犯人民知識權利】,經濟日報,民國九十三年三月三十一日,http://udnjob.com/issue/hightech/p2.htm(上網日期:民國九十三年四月五日)。
13. 社論,【以突破性的作法處理人才不足問題】,經濟日報,民國九十一年四月十日,http://udnjob.com/issue/hightech/p2.htm(上網日期:民國九十三年四月五日)。
14. 美國商業機密被竊案例,http://www.moeacnc.gov.tw/CNCJ/CNCJ0603-9006.html (上網日期:民國九十一年四月二十日)。
15. 美國經濟間諜法,資策會科技法律中心,http://www.tipo.gov.tw/secret/secret-discription/secret-discription-12.asp (上網日期:民國九十四年四月二十五日)。
16. 翁自得,何謂營業秘密,http://www.tien-liipr.com.tw/tien_li_news/199603/19960303.htm (上網日期:民國八十八年十一月二十二日)。
17. 高科技業者應詳閱之判決 元太公司vs.離職員工,http://www.tien-lnpr.com.tw/iprjudge/secret/c20000105.html (上網日期:民國八十九年七月三日)。
18. 張靜,我國營業秘密法介紹,網址:http://www.moeaipo.gov.tw/secret_discription/secret_discription_1.asp (上網日期:八十八年九月一日)。
19. 許峻彬,【法律學者意見 蔡明誠:應明確定義高科技 避免人才滯留國外】,經濟日報,民國九十一年四月八日,http://udnjob.com/issue/hightech/p2.htm (上網日期:民國九十三年四月五日)。
20. 許智誠,台灣對營業秘密之保護,http://www.moeaipo.gov.tw/nbs12/ipo3c.htm (上網日期:民國八十八年九月七日)。
21. 陳金泉,論離職後競業禁止契約,http://www.kcchen.com.tw/law/law01-2f.htm (上網日期:民國九十二年九月十五日)。
22. 陳思廷,美國眾議院議員提出「網路安全性資訊法」(Cyber Security Information Act)法案, http://stlc.iii.org.tw/tlnews/net9010.htm#n9 (上網日期:民國九十二年八月五日)。
23. 章忠信,「營業秘密」之範圍與條件,民國九十年十月二十二日,http://ww.copyrightnote.org/ts/ts002.html (上網日期:民國九十一年四月七日)。
24. 章忠信,一九九六年經濟間諜法中譯文,民國九十年七月三十日,http://www.copyrightnote.org/ts/ts001.htm.
25. 章忠信,四維案之分析,http://www.copyrightnote.org/crnote/bbs.php?board=24&act=read&id=7(上網日期:民國九十一年二月二十三日)。
26. 章忠信,保密約定,民國九十年七月三十日,http://www.copyrightnote.org/ts/ts010.html (上網日期:民國九十一年四月八日)。
27. 章忠信,經濟間諜法簡介,民國九十一年二月二十日,http://www.copyrightnote.org/ts/ts026.html (上網日期:民國九十一年四月八日)。
28. 章忠信,營業秘密?權利?利益?,民國九十年七月三十日,http://ww.copyrightnote.org/ts/ts004.html (上網日期:民國九十一年四月七日)。
29. 章忠信,營業秘密之立法目的,民國九十一年四月十日,http://www.copyrightnote.org/ts/ts001.html (上網日期:民國九十一年八月三十日)。
30. 章忠信,營業秘密之使用、讓與及授權,民國九十年十月二十七日,http://www.copyrightnote.org/ts/ts006.html (上網日期:民國九十一年四月七日)。
31. 章忠信,營業秘密之侵害態樣,民國九十年十一月十二日,http://ww.copyrightnote.org/ts/ts008.html (上網日期:民國九十一年四月七日)。
32. 章忠信,營業秘密之歸屬,民國九十年十一月二十七日,http://www.magicpeninfly.org (上網日期:民國九十一年四月三日)。
33. 黃嘉珍,美國九六年經濟間諜法簡介,http://www.grandsoft.com/cm/046/aru462.htm, (上網日期:民國八十八年十一月二十三日)。
34. 資策會科技法律中心,網址:http://www.moeaipo.gov.tw/secret/secret discription/secretdiscription.asp.
35. 鄒秀明,【業者恐技術加速外移 黃崇仁:限制登陸留不住人 許勝雄:出國深造的都不回來了】,聯合報記者報導,民國九十一年四月九日, http://udnjob.com/issue/hightech/p2.htm(上網日期:民國九十三年四月五日)。
36. 僱用跳槽員工,小心侵害他公司之營業秘密,http://www.moeasmea.gov.tw/html (上網日期:民國八十九年七月四日)。
37. 齊魯晚報民國九十一年三月六日線上資料http://202.130.245.40/chinese/law/114914.htm.
38. 劉博文,美國經濟間諜法簡介,http://ntl.moeaipo.gov.tw/nbs12/ipo3i.htm (上網日期:民國九十一年四月八日)。
39. 劉詠萱,美國法上營業秘密案例與「不可避免揭露」理論之淺介,資訊法務透析,民國八十七年十月十五日,http://stlc.iii.org.tw/publish/infolaw/8710/871016.htm (上網日期:民國八十九年七月十一日)。new window
40. 德國不正競爭防止法英文譯文引自WIPO網站http://clea.wipo.int/clea/lpext.dll/folder/infobase/la349/lae70?fn=document-frame.htm&f=templates&2.0.
41. 蔡正廷,離職勞工競業禁止之案型,http://www.moeaipo.gov.tw/nbs12/ipo3e.htm (上網日期:民國八十八年九月九日)。
42. 謝銘洋,營業秘密之保護與管理,民國九十年十月九日,http://www.moeaipo.gov.tw/secret/secret_discription/secret_discription_2.asp (上網日期:民國九十一年四月五日)。
43. 簡榮宗,「電子郵件,洩漏營業秘密的新管道?」,數位觀察者第八十期,民國九十年七月十八日,http://www.digitalobserver.com/71-80/80/alan.htm (上網日期:民國九十二年十月二十二日)。
44. 簡榮宗,營業秘密與競業禁止條款實務解析,民國九十二年三月十八日,http://www.cyberlawyer.com.tw (上網日期:民國九十二年四月二十日)。
45. 羅麗珠,美國的經濟間諜法案,民國九十年十月十九日,http:/www.moeaipo.gov.tw/secret/secret_discription/secret_discription_8.asp (上網日期:民國九十年十二月二十六日)。
五、報章
1. 【面對經濟強權節節進逼的反省與出擊】,工商時報第三版社論,民國八十六年九月十二日。
2. 【副理將資料寄給對方再跳槽】,聯合報第二十版報導,民國九十年十二月二十八日。
3. 【楊斌彥在美被捕 公司應變】,工商時報第一版,民國八十六年九月七日。
4. 【競業禁止條款勞委會研擬範本】,聯合報第八版,民國九十一年四月十五日。
5. 丁萬鳴,【四維緊急應變:老闆是去看網賽】,聯合報第三版,民國八十六年九月七日。
6. 丁萬鳴,【企業僱用高科技人員 將須申報列管 避免晶圓廠西進造成人才外流 登陸任職人數受政府限制】,經濟日報第二版,民國九十一年四月六日。
7. 丁萬鳴,【商業間諜官司 楊斌彥絕地求生】,聯合報第二十四版,民國九十年四月十六日。
8. 王文玲,【洩漏商機判賠10倍月薪 永慶房屋離職七員工 總共要賠六百九十萬元】,聯合報,民國九十二年十月十日。
9. 王文豪,【法院認定 競業禁止約定於僱傭關係終止後消滅】,聯合報第二十二版,民國九十一年十月十七日。
10. 王仕琦、徐仁全,【台積電:未涉12吋晶圓廠】,中國時報第三版,九十一年三月七日。
11. 朱漢崙,【八吋登陸 機密流失】,自由時報第三版,民國九十一年三月七日。
12. 何佩儒,【科技人登陸 擬正面表列產業別】,經濟日報第一版,民國九十一年四月七日。
13. 何祥裕,【台灣間諜 上海老闆 竹科機密遭竊 損失千萬美金】,聯合報A13版,民國九十二年十一月八日。
14. 何祥裕,【威盛負責人涉商業間諜,王雪紅夫婦求刑四年】,聯合報A1版,民國九十二年十二月六日。
15. 何瑞玲、梁世煌,【又見商業間諜 蘭記擬求償三億】,自由時報,民國九十二年十二月七日。
16. 吳豐祥,【維持技術差距 企業比政清楚】,聯合報第十五版,民國九十一年三月七日。
17. 宋秉忠,【高科技跨海流竄 防不勝防】;崔慈悌,【經建會建議制定經濟間諜法】,民國九十一年三月八日。
18. 李永盛,【侵權案 威盛王雪紅、陳文琦被求刑四年】,自由時報第二十版,民國九十二年十二月六日。
19. 李名揚,【管制高科技人材 李遠哲質疑】,中國時報第十三版,民國九十一年四月二十三日。
20. 李彥補,【台美技術合作小心誤蹈商業間諜法】,聯合報第六版,民國八十六年九月二十五日。
21. 李順德,【敏感科技違法、輸出罰金大幅提高】,聯合報A2版,民國九十四年四月十三日。
22. 汪文豪,【向跳槽員工求償大霸電子敗訴】,聯合報第二十二版,民國九十一年十月十七日。
23. 林河名,【離職員工違反競業禁止 原雇主連帶判賠】,聯合報第九版,民國八十九年四月六日。
24. 林河名、張甄薇,【楊斌彥專利權官司打出知名度】,聯合報第三版,民國八十六年九月七日。
25. 林益民,【離職帶走商情 六人被判背信】,聯合報第十一版,民國九十一年八月十二日。
26. 法新社華英惠,【四維負責人在美遭起訴】,聯合報第二版,民國八十六年十月三日。
27. 柯佩儒,【科技人登陸擬正面表列產業別】,經濟日報第一版,民國九十一年四月七日。
28. 洪慶淋,【正峰被控竊密 蘭記擬求償三億】,中國時報,民國九十二年十二月七日。
29. 胡立宗、張麗伽,【晶圓廠洩密 可連續重罰500萬】,中時晚報,民國九十一年三月二十九日。
30. 唐嘉麗,【華日裔竊密案起訴推延半年】,世界日報第七版,民國九十一年七月十九日。
31. 徐明宣,【不用憂慮八吋晶圓赴大陸投資】,中央日報全民論壇,民國九十一年一月二十一日。
32. 徐國淦,【單純換工作可能讓他傾家蕩產】,聯合報第八版,民國九十一年四月十五日。
33. 袁世珮,【競業禁止條款 不得強迫簽訂】-離職原因若歸雇主或低職位者無限制必要,聯合報第六版,民國九十一年十二月二十六日。
34. 崔慈悌,【經建會建議制定經濟間諜法】,中國時報第三版,民國九十一年三月八日。
35. 張世忠,【國內法律嚇阻不了竊密份子 營業秘密法處分輕微,不能讓業者重視問題的嚴重性】,工商時報第四版,民國八十六年九月十二日。
36. 張世忠、張國仁,【企業當心!別誤踩間諜法網】,工商時報第四版,民國八十六年九月十二日。
37. 梁世煌,【威盛案主角:未做任何竊密行為】,自由時報第二十五版,民國九十二年十二月八日。
38. 梁家榮,【陸委會:管制並無過當 強調符合民法「競業禁止」精神】,經濟日報第二版,民國九十一年四月七日。
39. 許金龍,【經濟間諜法 霸權主義的陽謀】,聯合報第七版,民國八十九年一月七日。
40. 陳一雄、潘欣中,【台積電十二吋晶圓資料 疑被竊至大陸】,聯合報第三版,民國九十一年三月七日。
41. 陳中興,【四維企業間諜案 罪名成立】,自由時報第十九版,民國八十九年一月七日。
42. 陳正宇,【四維商業間諜官司宣判】,經濟日報第三版,民國八十九年一月七日。
43. 陳玉華,【商業間諜案 威盛:純屬誤會與巧合】,中時電子報,民國九十二年十二月七日。
44. 陳志賢、陳玉華,【涉竊密 威盛老闆求刑四年】,中國時報A1版,民國九十二年十二月六日。
45. 陳芸芸,【保護營業秘密 企業心態鬆散】,自由時報第三版,民國九十一年三月七日。
46. 陳哲宏,【營業秘密法與經濟間諜】,經濟日報,民國八十六年十月二日。
47. 傅依傑,【又傳商業間諜案】-【聯調局設計誘捕楊斌彥父女】,聯合報第三版,民國八十六年九月七日。
48. 項程鎮,【打洩密官司 刑法是利器】,自由時報第三版,民國九十一年三月七日。
49. 黃昭勇,【陳文琦:威盛尊重智財權 絕未竊密】,聯合新聞網,民國九十二年十二月七日。
50. 楊寧茵,【先驅盼分期償付 以免破產】,聯合報第二十四版,民國九十年七月二十五日。
51. 楊寧茵,【竊取商業機密 先驅判賠一億八千二百萬美元】,聯合報第九版,民國九十一年七月二十一日。
52. 劉麟,【商業間諜案 美控徐凱樂周華萍何小台11項罪名】,聯合報第一版,民國八十六年七月十二日。
53. 鄭秋霜,【陳師孟:八吋廠偷跑登陸 應給予補救過程 廠商若仍不遵守 將受到最公整絕不寬容的懲處 蔡英文:投資違規 視個案彈性處罰】,經濟日報第二版,民國九十四月五日。
54. 蕭承訓、朱虔,【台積電晶圓機密 劉芸茜轉寄中芯麥克】,中國時報第三版,民國九十一年三月八日。

外文
一、Books
1. Bouchoux Deborah E., Intellectual Property: The Law of Trademarks, Copyrights, Patents, And Trade Secrets (2000).
2. Douglas M. Isenberg, The GigaLaw 172, Random House Trade Paperback Ed. (2002)
3. Jager, Malvin F., Trade Secrets Law, Clark Boardman Company (1987).
二、Periodical Articles
1. Aircraft Worker Who Sold Stolen Software on Internet Loses Espionage Case, 20 Computer & Online Indus. Litig. Rep. 12 (Dec. 17, 2002).
2. Aircraft Worker Who Sold Stolen Software on Internet Loses Espionage Case, 16 Software Law Bulletin 10 (Jan. 2002).
3. Aircraft Worker Who Sold Stolen Software on Internet Loses Espionage Case, 17 White-Collar Crime Reporter 11 (Jan. 2003).
4. Akerman, Nick, Economic Espionage Act, 26 Nat’l L.J. 13 (Dec. 1, 2003).
5. Allen, Frederick, Secret Fomula: How Brilliant Marketing and Relentless Salesmanship Made Coca-Cola the Best-Known Product in the World, at 17 (1994).
6. Alster, Norm., The Valley of the Spies, Forbes, at 200 (Oct. 6, 1992).
7. American Society for Industrial Security/Pricewaterhouse Coopers, Trends in Proprietary Information Loss: Survey Report (1999).
8. Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, at 15, National Counterintelligence Center (1995).
9. Band, Jonathan & Levitt, Jamie A. & Adeli, Mani, Addressing Company Fears; The Economic Espionage Act: Its Application in Year One, 12 Corp. Couns. 1 (1997).
10. Band, Jonathan, The Economic Espionage Act: Its Application in Year One, Corp. Couns., 1-3 (Nov. 1997).
11. Barlow, Stacey A. & Ogden, Stasia L., Hiring, Firing, and Dealing in Corporate America Intell. Prop. To., at 5 (Mar. 1997).
12. Bennett, Edward J. 8 Business Crimes Law Report Now Including Money Laundering 9 (Oct. 2001).
13. Brendel, Neal & Paglia, Lucas, The Economic Espionage Act, Penn. L. Wkly., at 12 ( July 7, 1997).
14. Carey, Pete, Software Engineer Charged in Theft of Pentium Plans from Intel, The Seattle Times, at A8 (Sep. 24, 1995).
15. Carr Chris & Gorman Larry, The Revictimization of Companies by The Stock Market Who Report Trade Secret Theft under The Economic Espionage Act, 57 Bus. Law. 25-53 (Nov. 2001).
16. Carr, Chris, The Economic Espionage Act: Bear Trap or Mouse Trap? 8 Tex. Intell. Prop. L.J. 168 (Winter 2000).
17. Cathcart, David, Contracts with Employees: Covenants Not to Compete and Trade Secrets, 36 Ali-Aba 87 (1997).
18. Chamblee, J. Michael, Validity, Construction, and Application of Title I of Economic Espionage Act of 1996,177A.L.R. Fed. 609-623 (2002).
19. Cillufo, Frank J., Security Threats to Americans Overseas, Congressional Testimony by Federal Document Clearing House (Apr. 3, 2001).
20. Clark, Michael T., Economic Espionage: The Role of The United States Intelligence Community, 3 J. Int’l Legal Stud. 253-290 (1997).
21. Cole, Michelle, Proliferation of High Tech Firms Fosters Espionage, Idaho Statesman, at 10B (Apr. 28, 1997).
22. Collins, Cindy, Trade Secrets: The Economic Espionage Act, Friend or Foe? Inside Litigation, at 14 (Sep. 1997).
23. Commission on the Roles and Capabilities of the United States Intelligence Community, Preparing for the 21st Century: An Appraisal of U.S. Intelligence 19 (1996).
24. Congressional Record (Senate), pS12208 (1996/10/2).
25. Crock, Stan, Business Spies: The New Enemy Within? Bus. Wk., at 17 (Feb. 10, 1997).
26. Cundiff V., Maximum Security: How to Prevent Departing Employees from Putting Your Trade Secrets to Work for Your Competitors, Santa Clara Computer and High Technology Journal, Vol. 8:2 (1992).
27. Dreyfuss, Rochelle Cooper, How Well Should We Be Allowed to Hide Them? The Economic Espionage Act of 1996. 9 Fordham Intell. Prop. Media & Ent. L.J. 1-44 (1998).
28. Economic Espionage Act of 1996: Hearing on H.R. 3723 before the Subcommittee on Crime of the Committee on the Judiciary, 104th Cong. 60,63,88,90,91,94 (1996).
29. Economic Espionage Act of 1996: Hearing on H.R. 3723 before the Subcommittee on Crime of the Committee on the Judiciary, 104th Cong. 63 (1996).
30. Economic Espionage, Pit Post-Gazette, at B2 (Feb. 1, 1997).
31. Economic Espionage, Seattle Times, at A3 (Nov. 6, 1999).
32. Economic Espionage. Joint Hearing Before the Senate Select Comm. On intelligence & Subcomm. On Terrorism, Tech. & Gov’t Info. of the Senate Comm. & on the Judiciary, 104th Cong. 2 (Oct. 2, 1996).
33. Effron, Robin J., Secrets and Spies: Extraterritorial Application of the Economic Espionage Act and the Trips Agreement, 78 N.Y.U.L. Rev. 1475-1517 (Oct. 2003).
34. Epstein, Michael A. & Levi, Stuart D., Protecting Trade Secret Information: A Plan for Proactive Strategy, 43 Bus. Law. 887, 889 (1988).
35. FBI Arrests Man in Theft of Secrets of Pentium Chip Secret Gets Prison Term, San Francisco Chron, at A14 (Jun. 25, 1996).
36. Fischer, James M., An Analysis of the Economic Espionage Act of 1996, 25 Seton Hall Legis. J. 239-271 (2001).
37. H.R. Rep. 788, 104th Cong., 1st Sess., Westlaw at 13 (1996).
38. Halbert, Debora, Intellectual Property in the Year 2025, 4 Journal, Copyright Society of the U.S.A. 225 (2001)
39. Heffernan, Richard & Dan, Swartwood, Trends in Intellectual Property Loss Survey 4 (Mar. 1996).
40. Industrial Espionage by 2 Mesa Men Alleged, the Phoenix Gazette, at A1 (Aug. 31, 1993).
41. Jack Nelson, Spies Took $ 300 Billion Toll on U.S. Firms in ’97: FBI Says Espionage is Increasing, with at Least 23 Governments Targeting American Companies, Los Angeles Times, at A1 (Jan. 12, 1998).
42. James H. A. Pooley, Mark A. Lemley & Peter J. Toren, Understanding the Economic Espionage Act of 1996, 5 Tex. Intell. Prop. L.J. 177 (1997).
43. Jennings, Ann S. & Tomkies, Suzanne E., An Overlooked Site of Trade Secret and Other Intellectual Property Leaks: Academta, 8 Tex. Intell. Prop. L. J. 241, 264 (2000).
44. Joint Statement of Senators Spector and Kohl, Congressional Record at pS12213 (Oct. 2, 1996).
45. Laffert Shannon, Two Engineers Indicted for Economic Espionage Suspects Were Arrested on Their Way to China, 25 Nat’l L.J. A ll (Dec. 16, 2002).
46. Maher, Megan K. & Thompson, Jon Michael, Intellectual Property Crimes, 39 Am. Crim. L. Rev. 763-816 (2000).
47. Mangel, John., Economic Espionage Losses in the Billions Experts Say, The Plain Dealer. (Jul. 30, 2001).
48. Mann, Jim., Woolsey Cites Dangers in Economic Espionage, L.A. Times, A10 (Feb. 3, 1993).
49. Mann, Kenneth, Punitive Civil Sanctions: The Middleground Between Criminal and Civil Law, 101 Yale L.J. 1795 (1992).
50. Maslanka, Michael P. & Brillhart, Burton D., Appearances Can Be Deceiving Employment Laws Contain Hidden Dangers for GCs, 18 Tex. Law. 7 (Nov. 4, 2002).
51. Metcalfe, Susan v., Protecting Trade Secrets: Is the Remedy Worse Than the Wrong? 104 Dick. L. Rev. 503 (2000).
52. Mock and Rosenbaum, A Study of Trade Secrets Theft in High-Technology Industries, National Institute of Justice Discussion p6 (1988).
53. Nelson, Jack, Spies Took $300-Billion Toll on U.S. Firms in ’97, L.A. Times, at A1 (Jan. 12, 1998).
54. Norton, Rob., The CIA’s Mission Improbable, Fortune, at 55 (Oct. 2, 1995).
55. Palmer, Caroline, How to Spot Your Office Spy, Observer, at Business 16 (London)(Oct. 17, 1999).
56. Pitz, Marylynne Brothers Charged in Scheme to Sell PPG Trade Secrets; Competitor Offered Documents, FBI Says, Pit. Post-Gazette, at B9 (Dec. 10, 1996).
57. Pooley, James H. A., Understanding the Economic Espionage Act of 1996, 5 Tex. Intell. Prop. L.J. 177 (1997).
58. President Clinton’s Economic Strategy “The White House, A National Security Strategy of Engagement and Enlargement (Feb. 1995).
59. President’s Remarks at Central Intelligence Agency in Langley, Virginia, 31 Weekly Comp. Pres. Doc. 1238 (Jul. 14, 1995).
60. Ramo, Joshua Cooper, A Survivor’s Tale, Time, at 54 (Dec. 29, 1997).
61. Risen, James., Clinton Reportedly Orders CIA to Focus on Trade Espionage, L.A. Times, Tex. Intell. Prop at A1 (July 23, 1995).
62. Ruhl, Christopher A., Corporate and Economic Espionage: A Model Penal Approach for Legal Deterrence to Theft of Corporate Trade Secrets and Proprietary Business Information, 33 Val. U.L. Rev. 763-811 (1999).
63. Russians Arrest 6 in Computer Thefts, N.Y. Times, at D5 (Sep. 27, 1995).
64. Ryan, Robin D., The Criminalization of Trade Secret Theft Under the Economic Espionage Act of 1996: An Evaluation of United States v. Hsu, 40 F. Supp. 2d 623 (E.D.Pa. 1999), 25 Dayton L. Rev. 243-262 (2000).
65. S. Rep. No. 359, 104TH Cong., 2nd Sess. (1996).
66. S. Rep. No.359, 104th Cong., 2nd Sess. (1996).
67. Schoofs, Katherine R., Comment, Employer Beware: Missouri Puts Brakes on Interrests Protected By A Restrictive Covenant, 70 UMKC L. Rev. 171 (Fall 2001).
68. Security and Electronic Signature Standards, 63 Fed. Reg. 155 (proposed Aug. 12, 1998).
69. Segal, Terry Philip & Allegretti, D. Dennis, The Economic Espionage Act of 1996: A New Federal Prosecution Tool in the Fight Against Economic Espoinage and Trade Secret Theft, 42 BBJ 10 (Sep. 10,1998).
70. Senate Report 104-259, 104th Cong., 2d Sess (1996).
71. Sennott, Charles, Shadowy World of Spying, Rocky Mtn. News, at 2F (Feb. 2, 1997).
72. Simon, Spencer, The Economic Espionage Act of 1996, 13 Berkeley Tech. L.J. 305-317 (1998).
73. Smuelson, Pamela & Scotchmer, Suaznne, The Law and Economics of Reverse Engineering, 111 Yale L.J. 1575-1594 (2002).
74. Starkman, Dean., Secrets and Lies: The Dual Career of A Corporate Spy, Wall St. J. at B1. (Oct. 23, 1997).
75. Staunton, Denis, Electronic Spies Torture German Firms, Irish Times, at 54 (Apr. 16, 1999).
76. Stuart, Pamela B., The Criminalization of Trade Secret Theft: The Economic Espionage Act of 1996, 4 ILSA J. Int’l & Lonp. L. 373-384 (1998).
77. Sumner, John P. & Plunkett, Dianne, Copyright, Patent, and Trade Secretion for Computer Software in Western Europe, 8 Computer / L.J. 327 (1998).
78. The Cyber Security Research and Development Act (H.R.3394) was in the 107th Congress 1st Session, In The House of Representatives (Dec. 4, 2001).
79. Toole, William W., Even If A Stranger Could Create Such A Work …” Software, Piracy, and Implications of The Implied Covenant of Good Faith: Has the Sas Court Gone Too Far? 9 Computer L.J 145 (1989).
80. Troubling Issues in A Silicon Valley Spy Case, New York Times, at D1. (Jul. 8, 1996).
81. Tucker, Darren S., The Federal Government’s War on Economic Espionage, 18 U. Pa. J. Int’l Econ. L. 1109 (1997).
82. U.S. Losing High-Tech Secrets to “Student” Spies: FBI, Straits Times (Singapore), at 4 (Apr. 8, 1997).
83. Unikel, Robert, Bridgine the “Trade Secret” Gap: Protecting “Confidential Information” Not Rising to the Level of Trade Secrets, 29 Loy. U. Chi. L. J. 841-890 (1998).
84. Van, Arnam & Robert C., Business War: Economic Espionage in the United States and the European Union and the Need for Greater Trade Secret Protection, 27 N.C.J. Int’l L. & Com. Reg. 95-139 (2001).
85. Vanko, Kenneth J., “You’re Fired! And Don’t Forget Your Non-Compete…”:The Enforceability of Restrictive Covenants in Involuntary Discharge Cases, 1 DePaul Bus. & Comm. L.J. 1-47 (2002).
86. Vogel, David A., Government Agencies Can Misuse Your Trade Secret and You Can’t Stop Them, 28 Pub. Cont. L.J. 159-187 (1999).
87. Warner, William T., Economic Espionage: A Bad Idea, Nat’l L. J., Apr. 12, 1993, at 13.
88. Wintom, Ben, Intel Theft a Frame-Up?, Ariz. Republic, at A1 (Sep. 26, 1995).
89. Yates, Ronald E., Cold War: Part II, Foreign Intelligence Agencies Have New Targets – U.S. Companies, Chi. Trib., at C1 (Aug. 1993).
90. Yates, Ronald E., Corporate Cloak and Dagger, Chi. Trib., at B1 (Sep. 1, 1996).
91. Yates, Ronald E., Espionage Fight Shifts to Corporate Battlefield; Laws Offer Little Help; Cost From Spying is Put at $10 Billion a Year, Chi. Trib., at C1 (Mar. 24, 1996).
92. Young, Jeffrey, Spies Like Us, Forbes, at 70 (Jun. 3, 1996).
93. Zuckerman, M.J., Cybercrime Against Business Frequent, Costly, USA Today, at 1A (Nov. 21, 1996).
三、Electronic Articles
1. “Legislative History-Economic Espionage Act of 1996”, Congressional Record – Senate, p6, Proceedings and Debates of the 104th Congress, Second Session (Oct. 2, 1996), http://www.cybercrime.gov/EEAleghist.htm (last visited 2003/8/3).
2. 18 U.S.C. 1343, 01/03/95, Sec. 1343. Fraud by wire, radio, or television, http://trac.syr.edu/laws/18USC1343.html (last visited 2003/8/6).
3. 1998 Intel Annual Report, http://www.intel.com/intel/annual98/summary.htm (last visited 1999/4/19).
4. 965 Conspiracy to Violate the Mail Fraud or Wire Fraud Statues, http://www.usdoj.gov/usao/eousa/foia_reading_room/usam/title9/crm00965.htm (last visited 2003/8/6).
5. A Texas Perspective Gramm-Leach-Bliley Financial Services Modernization Act of 1999, P1, http://www.finmod.state.tx.us/ (last visited 2003/8/6).
6. Act Against Unfair Competition sections17, http://clea.wipo.int/clea/lpext.dll/folder/infobase/la349/lae70?fn=document-frame.htm&f=templates&2.0 (of June.7,1909; As last Amended on October 25,1994).
7. Aircraft Worker Who Sold Stolen Software On Internet Loses Espionage Case, 9 Intell. Prop. Litig. Rep. 9 (2002/12/23), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/16).
8. Aircraft Worker Who Sold Stolen Software on Internet Loses Espionage Case, 20 Computer & Online Indus. Lotig. Rep. 12 (2002/12/17), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/16).
9. Aircraft Worker Who Sold Stolen Software On Internet Loses Espionage Case, Software Law Bulletin (Jan. 2003), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/16).
10. Am. Soc’y for Indus. Sec. & Picewaterhousecoopers, Trends in Proprietary Information Loss Survey Report (2000), http://www.pwcglobal.com/extweb/ncsurvres.nsf/DocID/36951F0F6E3C1F9E852567FD006348C5?OpenDocument.
11. Andrews & Kurth, E-mail buddies go to jail, Texas Emp.L. Letter (Aug. 2001), http://web.lexis-nexis.com/universe/document.
12. Andrews & Kurth, Texas Employment Law Letter (Aug 2001), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/15).
13. Attorney General John Ashcroft Renews Approval Requirement for § 1831 Prosecutions Under the Economic Espionage Act of 1996, U.S. Department of Justice. (Mar. 1, 2002), http://www.cybercrime.gov/eea1996.htm (last visited 2003/8/3).
14. Basat, Caryl Ben., the Economic Espionage Act of 1996, 31 Int’l Law. 245 (1997), http://web.lexis-nexis.com/universe/document?_m (last visited 2003/8/18).
15. Bennett, Edward J., 8 Business Crimes Law Report Now including Money Laundering 9 (Oct. 2001), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/16).
16. Biswas, Sorojini J., The Economic Espionage Act of 1996, p1-9, http://www.myersbigel.com/tw_articles/trade_sercet.htm (last visited 2003/8/3).
17. Chicage, Illinois man Pleads Guilty to Theft of Trade Secrets, Offered to Sell Online Interpreter’s Information.Chicago, U.S. Department of Justice (Apr. 11, 2003), http://www.cybercrime.gov/sunPlea.htm.
18. Clark, Michael T., Economic Espionage: The Role of The United States Intelligence Community, 3.J. Int’l Legal Stud. 253 (1997), http://print.westlaw.com/delivery.html (last visited 2003/9/26).
19. Cohen, Jerry., Federal Issues in Trade Secret Law, 2 J. High Tech. L. 1 (2003), http://web.lexis-nexis.com/universe/document (last visited 2003/8/12).
20. Computer Crime and Intellectual Property Section (CCIPS), Economic Espionage Act (EEA) Cases (2003/7/10), http://www.cybercrime.gov/eeapub.htm (last visited 2003/8/3).
21. Court Rules In (Settled) Secrets Case, The Recorder 10 (2003/1/1), http://web.lexis-nexis.com/universe/document?_m (last visited 2003/6/16).
22. Criminalizing Trade Secret Theft: The Economic Espionage Act of 1996, http://articles.corporate.findlaw.com/articles/file/00009/003168/title/Subject/topic/Criminal%20Law (last visited 2003/6/30).
23. Cundiff, Victoria A., The Economic Espionage Act and You, 490 PLI/Pat 9-66, http://print.weslaw.com/delivery.html (last visited 2003/9/28).
24. Cybersecurity Bill Passes House, the statement of House Science Committee Chairman, http://www.house.gov/science/press.
25. David B. Fein and Mark W. Heaphy, Companies Have Options When Systems Hacked Same technologies that empower corporations can expose vital proprietary information, P1. 27 Conn. L. Trib. 5. (Oct. 15, 2001), http://web.lexis-nexis.com/universe/document (last visited 2003/6/15).
26. Defensive Tactics for Non-Disclosure Agreements,Intell. Prop. Today (Oct. 2002), http://web.lexis-nexis.com/universe/document (last visited 2003/6/15).
27. Desmet, Thierry Olivier, The Economic Espionage Act of 1996: Are We Finally Taking Corporate Spies Seriously? 22 Hous. J. Int’l. L. 93-127, http://print.westlaw.com/delivery.html (last visited 2003/10/4).
28. Deutsch, Andrew L., Practice Tip; Protecting the Co.’s Trade Secrets, Start-Up & Emerging Companies Strategist (Sep. 2002), http://web.lexis-nexis.com/universe/document (last visited 2003/6/15).
29. Douglas Pasternark and Gordon Witkin, The Lure of the Steal, 2 ONLINE U.S. NEWS, http://www.usnews.com/usnews/issue/spy.thm (last visited 1996/4/17).
30. Douma, Eric, Fair Use and Misuse: Two Guards at the Intersection of Copyrights and Trade Secret Rights Held in Software and Firmware, 42 J.L. & Tech. 37 (2002), http://web.lexis-nexis.com/universe/document?-m (last visited 2002/9/25).
31. Dreyfuss, Rochelle Cooper, How Well Should We Be Allowed To Hide Them? The Economic Espionage Act of 1996. 1998, 9 Fordham Intell. Prop. Media & Ent. L.J. 1, http://web.lexis-nexis.com/universe/document?_m.
32. Economic Espionage Act (EEA) Cases, Computer Crime and Intellectual Property Section (CCIPS)(2003/9/22), http://www.cybercrime.gov/eeapub.htm (last visited 2004/3/1).
33. Economic Espionage Act of 1996 (Senate – Oct. 02, 1996), the statement of Mr. Specter, http://thomas.loc.gov/cgi-bin/query/F?r104:4:./temp/~r1041fv7oB:71874: (last visited 2003/8/15).
34. Economic Espionage, 1996: Hearings on Economic Espionage Before the House Judiciary Committee Subcommittee on Crime (Statement of Louis J. Freeh, Director of the FBI), 104th Cong., 2d Sess. (1996/5/9). Caryl Ben Basat, the Economic Espionage Act of 1996, Summer 1997, 31 Int’l Law. 245, http://web.lexis-nexis.com/universe/document?_m (last visited 2003/8/18).
35. Electronic Communications Privacy Act, Legislation, http://legal.web.aol.com/resources/legislation/ecpa.html (last visited 2003/8/17).
36. Fein, David B. & Heaphy, Mark W., Companies Have Options When Systems Hacked Same technologies that empower corporations can expose vital proprietary information 27 Conn. L. Trib. 5 (2001/10/15), http://web.lexis-nexis.com/universe/document? (last visited 2003/6/15).
37. Fischer, James M., An Analysis of The Economic Espionage Act Of 1996, 25 Seton Hall Legis. J. 241 (2001), http://print.westlaw.com/delivery.html (last visited 2003/9/26).
38. Flor, Victoria Slind, National Law Journal Staff Reporter, New Spy Act To Boost White- Collar Defense Biz, Nat’l L.J. at A1 (1997/7/28), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/8/18).
39. Focus On New England-Legal Service Providers; Managing Intelligence And Security In the Face Of Today’s Economic And Cultural Challenges, The Metropolitan Corp. Coun. (May. 2003), http://web.lexis-nexis.com/universe/document (last visited 2003/6/15).
40. Former Intel Employee Gets Jall Time For Trade Secret Theft, White-collar Crime Reporter (Jan 2002), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/15).
41. Fortune Magazine (Apr. 16, 2000), http://www.fortune.com (last visited 2001/10/10).
42. Freedom of Information Act (FOIA), United States Department of Justice, http://www.usdoj.gov/04foia/index.html (last visited 2003/8/17).
43. Freeh, Louis. J., “Hearing on Economic Espionage”, http://www.fbi.gov/congress/economi/ecespion.htm. (last visited 2003/6/1).
44. Goldstein, Howard W., Practice Tips How Enterprise Risk Evaluations Can Help Minimize Risks Against Liability, 9 Business Crimes Law Report Now Including Money Laundering 1-3 (Apr. 2002), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/16).
45. Halligan, R. Mark, The Economic Espionage Act of 1996: The Theft of Trade Secrets is Now a Federal Crime, http://www.execpc.com/mhallign/crime.html (last visited 2003/8/28).
46. Halligan, R. Mark, The National Law Journal P. B6 (Dec.9, 1996), http://web.lexix-nexis.com/universe/document?_m=a379f321ebf8514c2c00e7a7efe23604 (last visited 2003/8/18).
47. How can you best protect your trade secret, http://www.bohanlaw.com (last visited 2003/4/21).
48. In the Spotilght: Four Cases Under the EEA, 12 The core. Couns 5 (Nov. 1997), http://web.lexis-nexis.com/universe/document (last visited 2003/8/18).
49. John P. Halfpenny, Keeping The Lid On Employee Misappropriation Of Trade Secrets Through the Use Of Confidentiality Agreements And Restrictive Covenants (2003), http://web.lexis-nexis.com/universe/document (last visited 2003/4/9).
50. Katayama, Fred, Hacker hits up to 8M credit cards, Secret Service and FBI probe security breach of Visa, MasterCard, Amex and Discover card accounts, Cnnmoney (2003/2/27), http://money.cnn.com/2003/02/18/technology/creditcards/.
51. Keeping, Your Secrets Safe, Corporate Leagl Times (Apr. 2003), http://web.lexis-nexis.com/universe/document (last visited 2003/6/15).
52. Krebs, Brain, Senator Introduces New Cybercrime Bills, Newsbytes (2002/1/29), http://www.securityfocus.com/new/317.
53. Lafferty, Shannon, Economic Espionage case could turn on trade secret tussle, The Recorder (Oct. 21, 2003), http://web.lexis-nexis.com/universe/document.
54. Lafferty, Shannon, Two engineers indicted for economic espionage Suspects were arrested on their way to China, Nat’l L.J. (2002/12/16), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/15).
55. Levin, Chaim A., Trade-Secret Thieves Face Fines, Prosecution, Nat. L. J. (1997/1/27), http://web.lexis-nexis.com/universe/document?_m.
56. Magri, Karen A., Intemational Aspects of Trade Secrets Law, http://internetaional%20Aspects%20of%20Trade%20Secrets%20Law.htm (last visited 2003/4/29).
57. Maslanka, Michael P., and Brillhart, Burton D., Appearances Can Be Deceiving Employment Laws Contain Hidden Dangers for GCs, 18 Tex. Law 7 (2002/11/4), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/15).
58. Meyerowitz, Steven A. and Fryer, Donna, Competitive Intelligence A New Revenue Stream for Firms Looking To Gain an Edge, 228 N.Y.L.J.5 (last visited 2002/8/20), http://web.lexis-nexis.com/universe/document?-m (last visited 2003/6/15).
59. Pair from Cupertino and San Jose, California, Indicted for Economic Espionage and Theft of Trade Secrets From Silicon Valley Companies, U.S. Department of Justice (2002/12/4), http://www.cybercrime.gov/yeIndict.htm (last visited 2003/9/22).
60. Pasternark, Douglas and Witkin, Gordon, The Lure of the Steal, 2 Online U.S. News, http://www.usnews.com/usnews/issue/spy.thm (last visited 1996/4/17).
61. Pooley, James, Lemley, Mark, and Toren, Peter, Understanding the Economic Espionage Act of 1996 5 Tex. Intell. Prop. L.J. 177, http://www.utexas.edu/law/journals/tiplj/vo15iss2/toren.htm (last visited 2000/8/31).
62. Pugh, C. Rachal, Intellectual Property: D. Trade Secret: 1. Employment Relationships: Berniler v. Merrill Air Engineers, 17 Berkeley Tech. L.J. 231 (2002), http://web.lexis-nexis.com/universe/document?_m=33743026636523 (last visited 2003/3/17).
63. Richard L. Ravin and Van V. Mejia, Liability Under The Digital Millennium Copyright Act & The Federal Communications Act, http://www.hartmanwinnicki.com/priacydmca.html (last visited 2003/8/6).
64. Rochelle Cooper Dreyfuss, How Well Should We Be Allowed To Hide Them? The Economic Espionage Act of 1996. 1998, 9 Fordham Intell. Prop. Media & Ent. L.J. 1, http://web.lexis-nexis.com/universe/document?_m (last visited 2003/8/12).
65. Sam Perry, Economic Espionage and Corporate Responsilbility, CJ International Online 1(March-April 1995), http://www.acsp.uic.edu/OICJ/pubs/cji/110203.htm.
66. Significant provisions of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (“USA Patriot Act”), P.L. 107-56, signed October 26, 2001, http://www.nlada.org/DMS?Documents/1006186143.01/USA%20Patriot%20Act%20Summary.pdf (last visited 2003/8/6).
67. Simon, Spencer, Intellectual Property: D. Trade Secret: a) Federal Legislation: The Economic Espionage Act of 1996.13 Berkeley Tech. L.J. 305 (1998), http://web.lexis-nexis.com/universe/document?_m (last visited 2003/8/12).
68. Slind-Flor, Victoria, New Spy Act To Boost White-Collar Defense Biz, Nat’l L.J. at A1 (Jul. 28, 1997), http://web.lexis-nexis.com/universe/document (last visited 2003/8/18).
69. Specter Statement, “Legislative History-Economic Espionage Act of 1996”, Congressional Record – Senate, p6, Proceedings and Debates of the 104th Congress, Second Session, Wednesday (Oct. 2, 1996), http://www.cybercrime.gov/EEAleghist.htm.
70. Stapleton, M.A., Laws protecting intellectual property called inadequate, Thusday (1995/4/27), http://web.lexix-nexis.com/universe/document?_m (last visited 2003/8/18).
71. Statement of Louis J.Feeh, Director of Federal Bureau of Investigation, Before the House Judiciary Committee Subcommittee on Crime Hearing On Economic Espionage May 9m 1996; P.1-3, http://www.fbi.gov/congress/economy/ecespio2.
72. Statements on Introduced Bills and Joint Resolutions (Senate – Feb. 01, 1996), http://thomas.loc.gov/cgi-bin/query/F?r104:6:./temp/~r104xC3f7h:e27014: (last visited 2003/8/15).
73. Summary of H.R.3394, The Cyber Security Research and Development Act, http://www.house.gov/science/cyber/summary.htm.
74. The Economic Security of Act 1996, Senate Feb. 1996, the statement of Mr. Specter, http://thomas.loc.gov/cgi-bin/query/F?r104:6:./temp/~r104xC3f7h:e27014: (last visited 2003/8/15).
75. The Restatement (Third) of Unfair Competition and Potential Impact on Texas, p5, http://www.utexas.edu/law/journals/tiplj/volumes/vo14iss3/meier.html (last visited 2003/8/6).
76. The Statement of Mr. Hyde and Mr. Schumer in the pH10461, Economic Espionage Act of 1996 (House of Representatives – Sep. 17, 1996), http://thomas.loc.gov/cgi-bin/query/F?r104:1:./temp/~r104OnMfKl:el: (last visited 2003/8/12).
77. The Statement of Mr. Kohl, Statements on Introduced Bills and Joint Resolutions (Senate – Feb. 01, 1996), http://thomas.loc.gov/cgi-bin/query/F?r104:6:./temp/~r104xC3f7h:e27014: (last visited 2003/8/15).
78. The Statement of Mr. Specter, Economic Espionage Act of 1996 (Senate – Oct. 2, 1996), p S.12208, http://thomas.loc.gov/cgi-bin/query/F?r104:4:./temp/~r1041fv7oB:71874: (last visited 2003/8/15).
79. Trade-Secret Thieves Face Fines, Prosecution, Nat. L. J. (Jan. 27, 1997), http://web.lexis-nexis.com/universe/document?_m (last visited 2003/8/18).
80. Tucker, Dareen S., The Federal Government’s War on Economic Espionage, 18 U.Pa. J. Int’l Econ L. 1113, http://web.lesix-nexis.com/universe/document?_m (last visited 2003/8/12).
81. U.S. Department of Justice, Pair Charged With Theft of Trade secrets From Harvard medical School (June 19, 2002), http://www.cybercrime.gov/zhuCharges.htm (last visited 2003/9/22).
82. Unfair Competition Prevention Law (Law No. 47, promulgated on May 19,1993 [Amendments by: Law No. 116, of December 14, 1994]), http://clea.wipo.int/clea/lpext.dll/folder/infobase/la349/lae70?fn=document-frame.htm&f=templates&2.0.
83. United States Department of Justice, L.A. Man Sentenced for Stealing Trade Secrets Pertaining to ‘Smart Card’ Technology (Sep. 8, 2003), http://www.cybercrime.gov/serebryanySent.htm.
84. What Purchasing Managers Should Know About Trade Secrets, Purchasing Law Report at P.11 (Dec. 2001), http://web.lexiz-nexis.com/universe/document?_m=6021 (last visited 2003/6/15).
85. What’s Inside, 9 Intell. Prop. Litig. Rep. 1 (2002/12/23), http://web.lexis-nexis.com/universe/document?_m (last visited 2003/6/16).
四、Cases
1. 94.Worldwide Auditing Servs. v. Richter, 587 A. 2d 772 (Pa. Super. 1991).
2. Anacomp, Inc. v. Shell Knob Servs., Inc., No. 93 Civ. 4003 (PKL), 1994 WL 9681m at * 12 (S.D.N.Y. Jan. 10, 1994).
3. Anderson Chem. Co. v. Green, 66 S.W. 3d 434 (Tex. Ct. App. 2001).
4. Bernier v. Merrill Air Eng’rs, 770 A. 2d 97 (Me. 2001).
5. Bilec v. Auburn & Assocs. Pension Trust, 588 A. 2d 538 (Pa. Super. Ct. 1991).
6. Bohler-Uddeholm, Am. Inc. v. Ellwood Group, Inc., 247 F. 3d 79 (3d.Cir. 2001).
7. Boldt Machinery & Tools, Inc. v. Wallace, 366 A. 2d 902 (Pa. 1976).
8. Borg-Warner Protective Servs. Corp. v. Guardsmark, Inc., 946 F. Supp. 495 (E.D.Ky. 1996).
9. Brown v. CitiCorp, 1998 WL 341610 (N.D. Ill. 1998).
10. CAE Vanguard v. Newman, 518 N.W.2d 652 (Neb. 1994).
11. Carpenter v. United States, 484 U.S. 19 (1987).
12. Chicago Lock Co. v. Fanberg, 628 F. Supp. 871(C.D. Cal 1986).
13. Christopher Boyd v. University of Illinois, 1999 WL 782492 (S.D.N.Y. Sep. 30, 1999).
14. Christopher M’s Hand Poured Fudge, Inc. v. Hennon, 699 A. 2d 1275 (Pa. Super. 1997).
15. Computer Sales Int’l, Inc. v. Collins, 723 S.W. 2d 450 (Mo. Ct. App. 1986).
16. Copier Specialists, Inc, v. Gillen, 887 P. 2d 919 (Wash. Ct. App. 1995).
17. Data Mgmt., Inc. v. Greene, 757 P. 2d 62 (Alaska 1988).
18. Dowling v. United States, 473 U.S. 207 (1985).
19. DubleClick, Inc. v. Henderson, 1997 N.Y. Misc. Lexis 577, 1997 WL 731413 (Sup. Ct. N.Y. Co. 1997).
20. E. I. duPont deNemours & Co. v. Christopher, 431 F. 2d 1012 (5th Cir. 1970), cert. Denied, 400 U.S. 1024 (1971).
21. Easy Returns Midwest, Inc. v. Schultz, 964 S.W. 2d 450 (Mo. Ct. App. 1998).
22. FMC Corp. v. Varco International Inc., 677 F. 2d 500 (5th Cir. 1982); Union Carbide Corp. v. UGI Corp., 731 F.2d 1186 (5th Cir. 1984).
23. Furr’s Inc. v. United Specialty Advertising Co., 385 S.W. 2d 456, 144 U.S.P.Q. (BNA) 513 (1964).
24. Griffin v. Oceanic Contractors, Inc. 458 U.S. 564, 102 S. Ct. 3245, 73 L. Ed. 2d 973 (1982).
25. Hapney v. Gent. Garage, Inc., 579 So. 2d 127 (Fla. Dist. Ct. App. 1991).
26. Huntington Eye Assoc., Inc. v. LoCascio, 553 S.E. 2d 773, 780 (W. Va. 2001).
27. Hyde Corp. v. Huffines, 314 S.W. 2d 763, 117 U.S.P.Q. (BNA) 44, (Tex. 1958).
28. Ikon Office Solutions, Inc. v. Belanger, 59 F. Supp. 2d 125 (D. Mass. 1999).
29. In United States v. Hsu, 155 F. 3d 189 (3d Cir. 1998).
30. J.C. Kinley, Co. v. Haynie Wire Service, 705 S.W. 2d 193 (1985).
31. Jet Spray Cooler, Inc. v. Crampton, 174 U.S.P.Q. (BNA) 272 (Mass. 1972).
32. Kadis v. Britt, 29 S.E. 2d 543 (NaCo 1994).
33. Kewanee Oil Corp. v. Bicron Corp., 416 U.S. 470, 40 L. Ed. 2d 315, 94 S.Ct. 1879 (1974).
34. Kolender v. Lawson, 461 U.S. 352 (1983).
35. LCI Communications, Inc. v. Wilson, 700 F. Supp. 1390 (W.D. Pa. 1988).
36. Licocci v. Cardinal Assocs., Inc., 432 N.E. 2d 446, 452 (Ind. Ct. App. 1982).
37. Linkco, Inc. v. Nichimen Corp., 164 F. Supp. 2d 203 (D. Mass. 2001).
38. Marbury v. Madison, 5 U.S. 137, 178, 2 L. Ed. 60 (1803).
39. Modern Laundry & Dry Cleaning Co. v. Farrer, 536 A. 2d 409 (Pa. Super. Ct. 1988).
40. Nasco, Inc. v. Gimbert, 238 S.E. 2d 368 (Ga. 1977).
41. National Employment Serv. Corp. v. Olsten Staffing Serv., Inc., 761 A. 2d 401 (N.H. 2000).
42. Office Mates 5, North Shore, Inc. v. Hazen, 599 N.E. 2d 1072, 1080-1803 (Ill. App. Ct. 1992)).
43. Overholt Crop Ins. Co. v. Travis, 941 F. 2d 1361 (8th Cir. 1991).
44. Paramount Termite Control Co v. Rector, 380 S.E. 2d 922 (Va. 1989).
45. Peat Marwick Main & Co. v. Haass, 818 S.W. 2d 381 (Tex. 1991).
46. Phone Connection, Inc. v. Harbst, 494 N.W. 2d 445 (Iowa Ct. App. 1992).
47. Poole v. Incentives Unlimited, Inc., 548 S.E. 2d 207 (S.C. 2001).
48. Prudential Ind. Co. of America v. Crouch, 606 F. Supp. 464 (S.D. Ind. 1985), aff’d, 796 F.2d 477 (7th Cir. 1986).
49. Rector-Phillips-Morse, Inc. v. Vroman, 489 S.W.2d 1, 4 (Ark. 1973).
50. Reed, Roberts Assocs. v. Strauman, 353 N.E. 2d 590, 593 (N.Y. 1976).
51. Religious Tech. Ctr. v. Netcom On-Line Comm. Servs., Inc., 923 F. Supp. 1231 (9th Cir. 1995).
52. Renee Beauty Salons, Inc. v. Blose-Venable, 652 A. 2d 1345 (Pa. Super. 1995).
53. Secure Services Technology, Inc. v. Time and Space Processing, Inc., 722 F. Supp. 1354 (E.D. VA 1989).
54. SI Handing, Inc. v. Heisley, 753 F. 2d 1244 (3d Cir. 1985).
55. Sidco Paper Co. v. Aaron, 465 Pa. 586, 352 A. 2d 250 (1976).
56. SNA, Inc. v. Array, 51 F. Supp. 2d 554 (E.D. Pa. 1999).
57. Staples v. United States, 511 U.S. 600, 619, 128 L. Ed. 2d 608, 114 S.Ct. 1793 (1994).
58. System Concepts, Inc. v. Dixon, 669 P. 2d 421 (Utah 1983).
59. Thermo-Guard, Inc. v. Cochran, 596 A. 2d 188 (Pa. Super. Ct. 1991).
60. Trailer Leasing Co. v. Assocs. Commercial Corp., No. 96 C2305, 1996 WL 392135, at 6 (N.D. Ill. July 10, 1996).
61. Tuck v. Miller, 483 S.W. 2d 898 (Tex. 1972).
62. United States v. Pin Yen Yang, 1999 U.S. Dist. Lexis 7130 (N.D. Ohio 1999) (Mar. 18, 1999).
63. United States v. Avant, 907 F. 2d 623, 625 (6th Cir. 1990).
64. United States v. Bailey, 227 F. 3d 792 (7th Cir. 2000).
65. United States v. Brown, 925 F. 2d 1301 (10th Cir. 1991).
66. United States v. Chester S. Ho, 982 F. Supp 1022 (E.D.Pa. 1999).
67. United States v. Chester S. Ho, Crim. No. 97-323-02 (E.D. Pa. Jan. 28, 1999).
68. United States v. ComTriad (D.N.J. Apr. 11, 2002).
69. United States v. Cotts, 14 F. 3d 300 (7th Cir. 1994).
70. United States v. Dai (W.D.N.Y. Aug. 23, 2001).
71. United States v. David B. Kern, 99 CR 15 DFL (E. D. Calif. March 5, 1999).
72. United States v. David T. Krumrei, 258 F. 3d 535 (Jul.26, 2001, Decided).
73. United States v. Gaudin, 515 U.S. 506, 115 S.Ct. 2313 (1995).
74. United States v. Hill, 167 F. 3d 1055, 1063 (6th Cir. 1999).
75. United States V. Hsu 155F. 3d 189 (3d Cir.1998).
76. United States v. Hsu, 185 F.R.D. 192, 50 U.S.P.Q. 2d (BNA) 1650 (E.D. Pa. 1999).
77. United States v. Hsu, 40 F. Supp. 2d 623 (E.D. Pa. 1999).
78. United States v. Huang Dao Pei, Criminal No. 98-CR-4090 (D.N.J. July 27, 1998).
79. United States v. Kai-Lo Hsu, 155 F. 3d 189 (3d Cir. 1998).
80. United States v. Kai-Lo Hsu, Criminal No.97-CR-323, 97-1965 (E.D.Pa. July 10, 1997).
81. United States v. Kai-Lo Hsu, No. Crim A. 97-323-01 (Feb. 16, 1999).
82. United States v. Kai-Lo Hsu, No. Crim.A. 97-323-01 (March 11, 1999).
83. United States v. Kissane (S.D.N.Y. Oct. 15, 2002).
84. United States v. Krumrei, 258 F. 3d 535 (6th Cir. 2001).
85. United States v. Lange, 312 F. 3d 266 (7th Cir. 2002).
86. United States v. Martin, 228 F. 3d 1 (1st Cir. 2002).
87. United States v. Morch (N.D. Cal. Mar. 21, 2001).
88. United States v. Murphy (N.D. Cal. Apr. 2, 2003).
89. United States v. Pin Yen Yang, 281 F. 3d 534 (6th Cir. 2002).
90. United States v. Pin Yen Yang, 74 F. Supp. 2d 724 (N. D. Ohio 1999).
91. United States v. Pin Yen Yang, Criminal No. 97 CR 288 (N.D. Ohio Sep. 4, 1997).
92. United States v. Powell, 423 U.S. 87, 46 L. Ed. 2d 228, 96 S. Ct. 316 (1975).
93. United States v. Saunders, 166 F. 3d 907 (7th Cir 1999).
94. United States v. Steven Louis Davis, Crim. No. 3:97-00124 (M.D. Tenn., Indictment filed Sept. 24, 1997).
95. United States v. Woodard (N.D. Cal, May 14, 2003).
96. United States v. Worthing, Crim. No. 97-9-1 (W.D. Pa., Judgment dated June 5, 1997).
97. United States v. Worthing, Crim. No. 97-9-2 (W.D. Pa., Judgment dated April 18, 1997).
98. United States v. Wu (W.D.N.Y. July 31, 2001).
99. United States v. Yang, 2002 WL 236951 (6th Cir. 2002).
100. Vantage Tech., LLC v. Cross, 17 S.W. 3d 637 (Tenn. Ct. App. 1999).
101. Vector Sec., Inc. v. Stewart, 88 F. Supp. 2d 395 (E.D. Pa. 2000).
102. Wainwright’s Travel Serv., Inc. v. Schmolk, 500 A. 2d 476 (Pa. Super. 1985).
103. Weed Eater v. Dowling, 562 S.W. 2d 898, 203 U.S.P.Q. (BNA) 635 (1978).
104. Wesley-Jessen, Inc. v. Armento, 519 F. Supp. 1352, 1358 (N.D Ga. 1981).
五、Statutes
1. 15 U.S.C. §1776.
2. 18 U.S.C. §§1905, 1906, 1907, 1909.
3. 18 U.S.C. §112.
4. 19 U.S.C. §1335.
5. 50 U.S.C. 401a(3) (1994).
6. Mail Fraud and Wire Fraud Acts, 18 U.S.C. §§2313-2314.
7. Restatement (Third) of Unfair Competition.
8. Section 757, 759 of the Restatement (First) of Torts (1939).
9. the Administrative Dispute Resolution Act (ADRA), 5 U.S.C. §571.
10. the Administrative Procedure Act (APA), 5 U.S.C. §§701-706 (1994).
11. the Cyberterrorism Preparedness Act of 2002.
12. the Economic Espionage Act (EEA), 18 U.S.C. §§1831-1839 (Supp. II 1997).
13. the Freedom of Information Act (FOIA), 5 U.S.C. §552 (1994).
14. the Trade Secrets Act (TSA), 18 U.S.C. §1905 (1994).
15. Uniform Trade Secrets Act, 14 U.L.A. 369 (1985 & Supp. 1989).
六、Official Documents
1. 142 Cong. Rec. §§ 12201, 12212, 12213 (Oct. 2, 1996).
2. 142 Cong. Rec. S12, 207-08 (Oct. 2 1996).
3. H.R. Rep. No. 104-788 (1996).
4. S. Rep. No. 104-359 (1996).
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
無相關著作
 
QR Code
QRCODE