Opinion
Computing Applications Legally speaking

Reverse Engineering Under Siege

Posted
  1. Introduction
  2. Reverse Engineering and Trade-Secret Law
  3. Anti-Reverse-Engineering Clauses
  4. Secrets Leak on the Internet
  5. DeCSS and the DMCA
  6. Conclusion
  7. References
  8. Author
  9. Footnotes





First Amendment defenses are rare in trade-secret cases because trade-secret law contains limiting principles that make recourse to the First Amendment unnecessary.






Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More