Theflyonthewall Vs Barclays

Decent Essays
The case in question is Barclays Capital Inc. v. Theflyonthewall.com. Inc. To summarize,
Theflyonthewall.com was under fire from Barclays Capital for collecting financial recommendations from financial institutions and publishing them online before the instructions themselves made the information public. The law stated that facts and non-original expression was not protected by copyright law. Because these were just suggestions, not creative expression, they were not eligible.
However, it was possible to fall under the New York state tort of misappropriation (McJohn). However, this imposes liability for the copying of valuable information for those who invest in valuable information, and since the financial institutions were not direct competitors

Related Documents

  • Improved Essays

    Hrm/531 Week 1

    • 881 Words
    • 4 Pages

    Provisions of paragraphs one, seven, and eight are for employees by stipulating the roles the employees are expected to perform. Additionally, it gives wider insights on the responsibilities that are expected from employees. The provisions also provide key terms that should be followed in the contract. Question 4 The provisions of paragraphs two and four are intended to protect the confidential information of the company and its inventions.…

    • 881 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Methadone Case Study

    • 545 Words
    • 3 Pages

    I attended a hearing on your behalf in the above matter before Judge Burke in Hudson, New York on 07/18/17. The claimant was not present. His attorney, Paul Lahey, appeared by phone. As you know, this case is established for an injury to the back injury with an average weekly wage of $1,241.00. The claimant has been out of work since 2006.…

    • 545 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Unit 1: Sole Contractorship

    • 2286 Words
    • 10 Pages

    LIT1 Task A SOLE PROPRIETORSHIP: • LIABILITY – The owner and the business are considered as one and so the owner has unlimited liability for the business. Therefore the all of the owner’s personal assets, the business’s assets and the business’s future earnings may be at risk. • INCOME TAXES – All income for the business goes on the owner’s personal income tax returns whether federal, state or local. One advantage of the sole proprietorship is that the business is not a separate entity and therefore is only taxed once on this income, and another advantage is that all business liabilities may be written off as expenses to offset income. Asset depreciation is an example of this.…

    • 2286 Words
    • 10 Pages
    Improved Essays
  • Superior Essays

    P5 - Explain how employment contracts can affect security Hiring Policy At the point when procuring somebody or notwithstanding elevating somebody to an alternate employment inside of the association they have to verify that they have a decent employing record which would think back on the past occupations, in the event that they have any criminal records and a general foundation to the individual they are utilizing, references would be something which would go under this classification. Something which would go under the contracting arrangement is something many refer to as a trial period. This would be to pick up trust with the worker so that the security of the association is kept at a decent standard, this will then give the ideal for the superintendent to then sack the representative if they somehow managed to do…

    • 1688 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    For example, watering down of shares was an obstacle that Vanderbilt faced but was not known at that time. However, it is now an illegal activity thus showing how some of the events in this book shaped the current business…

    • 1161 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Question 1 -Legal Issue In this discussion, the legal issue is in regards to privacy rights. Currently, policies allow researchers to input information in a database that all organizations and/or researchers can gain access. Therefore, the privacy of the original donors becomes jeopardized because his/ her permission to release his/her information goes beyond the scope of the permission granted by the donors. By having a database that other researchers have entree to violate the donors’ right of privacy.…

    • 1480 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Collectivistic Government Fails Is the system of government deemed as corrupt? Is it true that people are created equal? Is collectivism more important and better than the individual? The novella Anthem by Ayn Rand features a man by the name of Equality 7-2521 who lives in a dystopian society and he’s held back due to his superior brain power. He is forced into a job that no one would want, such as street sweeper to force him down the totem pole.…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    An example the authors used was the Wall Street crash in 2008. The loss was not due to the shareholders financial illiteracy of the…

    • 1599 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The loss of personal data, an example of this would be the recent transgressions of the ministry of justice. In 2015 the ministry of justice failed to safeguard sensitive information about 2,935 prisoners. A hard drive containing information about the prisoner’s links to drug crime, possible leads to organised crime rings and details about the prisoner’s victims and visitors. This hard drive wasn’t encrypted so the information could be easily read by anyone, and so all the personal details could have been leaked or sold on. This incident led to a hefty fine and the result was better safeguarding practice.…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    H.R. 5800/S. 2981- Secure Data Act of 2014 The United States Constitution under the Fourth Amendment ensures our right to be free from unreasonable searches and seizures, and by extension has been interpreted to protect our right of privacy. The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized” (The Charters of Freedom). There has been much controversy as to what is considered to be protected under constitutional law relating to one’s right of privacy. Although a reasonable right to privacy is not explicitly stated in the Constitution, this particular right has developed into a civil liberty protected by the Fourth, Fifth and Fourteenth amendments.…

    • 1800 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Abel Field Case Analysis

    • 557 Words
    • 3 Pages

    The newspaper said that they were protected by the First Amendment; but the Supreme Court ruled that lies are not protected under the First Amendment. I think this ruling sets precedent for what is covered under the First Amendment when it comes to false claims. It really helped with ruling in the Abel Fields case because Abel Fields claimed that he was protected under the First Amendment; but in the case of New York Times Co. v. Sullivan it shows that lies are not protected under the First…

    • 557 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The unauthorized disclosure of personal data became a particularly widespread problem in Ecuador. Criminal gangs were sold personal information, including credit card information. No one notices these frequent crimes because of the relatively small monetary, until the local news shocked the public. There are electronic communication technologies, consist of five dimensions, social presence, media richness, asynchronicity, permanence, and spreadability.…

    • 949 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In this paper the writer will consider the moral and ethical implications of reverse engineering, competitive intelligence, and corporate espionage. This is a moral issue because it involves many facets and perspectives in which morality may be derived, justified, or altogether ill applied. Especially with respect to military projects in which corporate secretes may become important, and perhaps from a national security point of view, vital. This issue is relevant, especially in the in the modern age, because of the ease of access in which sensitive material may be gained. It must be noted that corporate espionage and reverse engineering knows no borders.…

    • 1663 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Trade Secrets

    • 1293 Words
    • 6 Pages

    TRADE SECRET A trade secret is a formula, practice, process, design, instrument, pattern, commercial method, or compilation of information not generally known or reasonably ascertainable by others by which a business can obtain an economic advantage over competitors or customers. A trade secret covers basically three aspects:- ● Not known to the public. ● Should generate economic profit to the holder (specifically for not being known by the public).…

    • 1293 Words
    • 6 Pages
    Improved Essays