Articles published on Scope Of Protection
Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
1214 Search results
Sort by Recency
- New
- Research Article
- 10.69971/lra.3.2.2025.133
- Dec 8, 2025
- Legal Research & Analysis
- Joydeep Chowdhury + 1 more
Current research reveals the rapid growth of digital platforms for flexible work in Bangladesh, a sector that is expanding quickly but remains structurally fragile. The study combines doctrinal analysis of laws, judicial precedents, and platform terms with empirical evidence drawn from document review using socio-legal methods. The law does not clearly recognize platform workers, leaving most of them outside the scope of basic labor protections. Bangladesh Labor Act 2006 contains protections for identifiable employers and established workplaces, but does not correspond to disperse, app mediated labor. Platform management—through opaque algorithmic practices and unilateral deactivation—further increases income instability and limits meaningful avenues for redress. Existing social protection mechanisms are ill-suited to intermittent and informal earnings, creating uneven vulnerabilities along gender and socio-economic lines. Proposed reforms include legal recognition of dependent “gig workers,” portable social security benefits, mandatory platform transparency, compulsory insurance, and accessible dispute-resolution mechanisms. The research aims to contribute to policy discussions and academic understanding of legal texts.
- New
- Research Article
- 10.3390/land14122335
- Nov 27, 2025
- Land
- Yanjun Chen + 6 more
Systematic biodiversity and ecosystem service (ES) conservation is vital for ecological sustainability and human well-being. This study combines MaxEnt, Zonation, InVEST, and MSPA models to identify Conservation Priority Areas (CPAs) in the Wujiang River Basin (WJRB), integrating biodiversity hotspots, ESs, and landscape connectivity. Results reveal CPAs span 1.13 × 104 km2 (primarily downstream), but existing natural reserves (NRs) cover only 24.86% of these critical zones, leaving over 75% unprotected in this region. Current NRs occupy 0.62 × 104 km2, with 5.82% of the basin (mainly upstream) available for targeted expansion. Spatial analysis reveals mismatches, such as some NRs protecting low-value ecological areas, resulting in imbalanced coverage. Expanding NRs across the board is less effective than adjusting protection scope or management strategies in areas of spatial mismatch, based on identified CPAs. This can involve establishing new reserves and appropriately relaxing land-use restrictions to allow compatible activities within them. New conservation planning should prioritize large, interconnected CPA regions to enhance landscape coherence. Simultaneously, integrating ecological compensation mechanisms can align protection goals with local livelihood improvements, fostering community engagement. This approach addresses critical gaps and enhances conservation efficiency by strategically directing resources toward high-value, vulnerable ecosystems. The methodology offers a replicable framework for balancing ecological preservation and human needs in river basin management.
- New
- Research Article
- 10.3390/cells14231878
- Nov 27, 2025
- Cells
- Yu Xia + 8 more
Cognitive impairment remains one of the most prevalent and debilitating sequelae of traumatic brain injury (TBI), profoundly compromising long-term quality of life. Nevertheless, effective treatment options are limited, as the complexity of post-TBI pathology often exceeds the protective scope of conventional neuroprotective strategies. Accumulating research has revealed regulated cell death (RCD) as a central driver of neuronal loss and cognitive decline post-TBI. Consequently, targeting RCD pathways has emerged as a promising strategic direction for alleviating post-TBI cognitive impairment. This review provides an analysis of the molecular mechanisms underlying five major RCD forms, including apoptosis, necroptosis, pyroptosis, ferroptosis, and cuproptosis. Furthermore, it critically assesses the therapeutic potential of these pathways while examining their complex interplay in post-TBI cognitive impairment. By systematically synthesizing recent advances in targeted therapeutic strategies, we highlight that targeting RCD pathways paves the way for highly effective and precise therapeutic modalities against post-TBI cognitive impairment, although challenges in multi-target combination therapies and brain delivery warrant further investigation.
- New
- Research Article
- 10.54254/2753-7102/2025.29861
- Nov 20, 2025
- Advances in Social Behavior Research
- Kaiyan Shen
As Large Language Models (LLMs) become increasingly embedded in news production, their tendency to generate hallucinated contentfabricated or misleading information presented as factraises serious legal concerns. This paper examines the implications of such content through the lens of both copyright and personality rights, focusing on civil defamation, privacy infringement, and unauthorized reproduction of third-party materials. Using a comparative doctrinal methodology, it analyzes regulatory and tort law frameworks in China and the United States, with particular attention to the heightened standards for public figure defamation in U.S. law and the broader scope of reputational protection under Chinese civil law. By bridging the intersection of copyright and personality rights, this study offers a novel perspective on the legal classification and liability of AI-generated news. It further proposes actionable compliance strategies for media organizations and generative AI providers, including content review mechanisms and attribution standards. Finally, the paper reflects on future governance trendsespecially the tension between innovation and accountabilityas jurisdictions worldwide grapple with the social and legal consequences of hallucinated media content.
- Research Article
- 10.14296/ac.v7i1.5838
- Nov 3, 2025
- Amicus Curiae
- Mariza Avgeri
This article explores the jurisprudence of the European Court of Human Rights (ECtHR) in relation to gender identity and asylum. It argues that the right to privacy and moral autonomy under Article 8 of the European Convention on Human Rights must be interpreted to include public expressions of sexual and gender identity. As such, presentation, recognition and social expression are intrinsic to one’s identity, preference and desire, particularly for trans and gender non-conforming individuals. The first part of the article examines post-Goodwin ECtHR case law on gender identity to clarify the scope of protection offered under the Convention. The second part analyses the extraterritorial application of Article 8 in asylum cases, focusing on sexuality-based claims and the absence of trans-specific case law. The article concludes by highlighting that the performance and recognition of gender identity in public spaces is inseparable from the exercise of Convention rights and must be legally protected in asylum contexts. The blurring of the public/private divide is particularly critical where validation by state and society affects one’s gender expression and risk of persecution. Keywords: gender identity; asylum; ECHR; privacy; Article 8; trans rights; public/private divide; moral integrity; persecution; legal recognition.
- Research Article
- 10.5604/01.3001.0055.4570
- Oct 30, 2025
- Roczniki Administracji i Prawa
- Piotr Krzyżaniak
Strike is the main form of resistance to exploitation and the workers’ struggle for improved working conditions. Apart from the factual dimension, the strike also exists in legal reality. The functioning of the institution of the strike in the polish legal system has undergone its own evolution, starting with the total ban on strikes in the partitioned states, through the freedom to strike in II RP and PRL, to the right to strike. The difference between the freedom to strike and the right to strike, although seemingly subtle, has serious practical consequences and raises the question of the scope of the real protection of this fundamental means of workers’ resistance.
- Research Article
- 10.37276/sjh.v7i2.432
- Oct 28, 2025
- SIGn Jurnal Hukum
- Rizki Rahmawati + 2 more
Copyright protection for musical works is a vital aspect of the music industry. However, the practice of using songs commercially without the creator’s authorization remains a significant problem that violates both economic and moral rights. This research aims to analyze the scope of legal protection for song copyrights under Law Number 28 of 2014 and the challenges of its enforcement. It also critically examines the Panel of Judges’ legal reasoning in Case Number 92/Pdt.Sus-HKI/Copyright/2024/PN Niaga Jkt.Pst concerning the determination of the Performer’s liability and the application of civil sanctions. This normative legal research employs a qualitative analysis of primary and secondary legal materials, drawing on statutory, case, and conceptual approaches. The findings indicate that although Law Number 28 of 2014 provides a robust basis for protection, various enforcement challenges persist. Case Number 92/Pdt.Sus-HKI/Copyright/2024/PN Niaga Jkt.Pst affirmed the occurrence of copyright infringement by the Performer. The ruling found the Performer liable despite the presence of an organizer. It also imposed economic damage sanctions by referencing parameters within criminal provisions. However, the court rejected the claim for moral rights damages for lack of proof. This case has implications for affirming the Performer’s liability and the paradigm for imposing sanctions in song copyright disputes. It also promotes increased legal awareness within the Indonesian music industry.
- Research Article
- 10.5539/jpl.v18n4p68
- Oct 25, 2025
- Journal of Politics and Law
- Xuanyi Wang
The opening for signature of the Council of Europe Framework Convention on Artificial Intelligence and Human Rights, Democracy and the Rule of Law (hereinafter “the Convention”) in 2024 marks a symbolic event in the field of AI governance. The Convention sets a good example for the international community to prevent and govern risks to human rights, democracy, and the rule of law encountered in the process of AI governance. By analyzing the Convention's regulatory objects, basic positions, implementation methods, and approaches, this paper points out that the Convention itself does not create new types of human rights or obligations of human right; yet instead it relies on the existing human rights treaty framework to stipulate the basic principles that a series of AI activities shall abide by. The Convention has a set framework and inherent ambiguity. Compared to the “soft law” model of other related international documents, the Convention adopts a “hard law” model, yet its specific implementation still counts on domestic legislative, law enforcement, and judicial activities. Although its implementation effects remain to be seen, its “human-centred” regulatory approach, which covers a broad scope of protection for individual rights and interests and emphasizes the rights of specific groups, is worthy of reference.
- Research Article
- 10.5171/2025.4540025
- Oct 22, 2025
- Communications of International Proceedings
- Agnieszka Skoczylas-Tworek
The growing scale of abuse, fraud, and irregularities contributes to the development of tools aimed at limiting them. One such tool is legal regulations related to the implementation of whistleblowing systems. This is addressed by the provisions of the EU Whistleblowers Directive, which obliged EU countries to implement this tool into national law. Due to numerous delays, this implementation was finally completed in 2025. Hence, only a few studies on the implementation of this tool have been conducted so far. The aim of the publication was to fill this gap to some extent by analyzing the implementation of selected provisions of EU Directive 2019/1937 into the national law of EU countries. In addition, using the example of one country, the effectiveness of the organization of the whistleblowing system in selected entities required by law to establish it was assessed. The methodology used was based on a quantitative and qualitative analysis aimed at verifying whether Member States had not only implemented selected provisions of the Directive, but also what individual solutions they had adopted in this regard. The results of the analysis showed that the adopted legal regulations on whistleblowing at the level of EU countries are not exhaustive and leave actors free to shape them. The Directive provides an excellent premise for laying the foundations for the development of the whistleblowing tool in EU countries, however, it is necessary to take the right approach to its implementation, not limiting it to the adoption of a minimum framework only, but to expand its scope of action and protection at the national level, so that it is an effective tool for reducing widespread violations of the law, unethical and corrupt behavior at both the organizational and state levels.
- Research Article
- 10.56557/upjoz/2025/v46i195287
- Oct 17, 2025
- UTTAR PRADESH JOURNAL OF ZOOLOGY
- Tamjeeda Nisar + 9 more
Genetic engineering is the technique of altering an organism’s genetic composition through the introduction of desired genes, often referred to as recombinant DNA technology or gene manipulation. In agriculture, this technology has been applied to develop transgenic plants with insect and herbicide resistance, tolerance to biotic and abiotic stress, and enhanced nutritional profiles. Genetically modified (GM) crops such as Bt cotton and Bt maize have significantly reduced pest infestations, lowered pesticide usage by up to 50%, and increased yields by 20–30% in several regions. Similarly, RNA interference (RNAi) based pest control has been successfully employed against major crop pests such as the corn rootworm and cotton bollworm, offering species-specific and environmentally safer alternatives to chemical pesticides. Genome editing tools, particularly CRISPR/Cas9, are being harnessed to engineer durable resistance against viruses, fungi, and insect pests in staple crops like rice, wheat, and tomato. These approaches not only reduce dependence on chemical pesticides but also contribute to sustainable agriculture by lowering production costs and minimizing environmental impacts. With continuous innovations in genetic pest control, the scope of crop protection and yield enhancement is expanding, demonstrating the transformative role of genetic engineering in modern agriculture.
- Research Article
- 10.38044/2686-9136-2025-6-3
- Oct 16, 2025
- Digital Law Journal
- D V Graf
Computer games have become an integral part of leisure activities for millions of people around the world. At the same time, the desire of players to gain a competitive advantage and the will to achieve immediate results often encourage the users to employ cheats, i.e., software tools enabling victories to be achieved dishonestly. The spread of cheats undermines the principles of fair play and creates unequal conditions for users. This, in turn, leads to a decrease in the gaming audience and, as a result, entails losses for publishers. In addition, cheats often infringe on the exclusive rights of copyright holders. In this regard, the legal issues of cheats, especially in the context of protecting the copyrights of video game copyright holders, represent a relevant research direction. This study aims to characterize cheats and anti-cheat technologies from the legal point of view, to determine their conformity with the provisions of copyright laws and with user agreements, to establish the type of responsibility of the creators of cheats, as well as to identify whether cheats are always deemed unacceptable from the legal point of view. The research was conducted using the methods of formal legal and comparative legal analysis. The former was used to assess the scope of copyright protection of video games and to discuss the capacity of individual norms to cover cheats. The latter was used to compare norms concerning technological means of copyright protection, the scope of copyright protection of video games, etc. As a result, several legal qualifications of cheats (from the point of view of criminal and civil law) were proposed. It was concluded that most modern online game cheats violate the exclusive rights of the authors as well as the provisions of user agreements. In this regard, there is a growing demand for anti-cheating technologies, which are in essence technological means of copyright protection, and in some jurisdictions, the very fact of their circumvention may result in liability.
- Research Article
- 10.54195/eirj.24701
- Oct 6, 2025
- European Insolvency and Restructuring Journal
- Alina Holze + 1 more
Tax law and insolvency law rarely intersect with Public International Law and European Law. Yet, a case currently before the Court of Justice of the European Union (CJEU) directly addresses this intersection. It thereby offers a valuable opportunity to explore the interplay between these areas of law. The legal debate mainly revolves around the interpretation of Article 6 (1) of the EU Insolvency Regulation (EIR), which has not often been dealt with yet.
- Research Article
- 10.3389/fenvs.2025.1650454
- Oct 1, 2025
- Frontiers in Environmental Science
- Yaping Ren + 4 more
Under the background of global anthropocene and climate change, as a key spatial unit to maintain the function of native ecosystems, the study of precise identification and spatial distribution of wilderness is of great scientific value to enhance the effectiveness of rewilding practice. Taking the wilderness in Henan Province as a case study area, the thesis constructs the evaluation index system of wilderness in Henan Province by using the Boolean identification and multi-objective evaluation methods based on the analysis of the concept and connotation of wilderness, identifies the spatial distribution of wilderness in Henan Province, and analyzes the current status of protection and the vacancy of protection in Henan Province. The results of the study show that 1) in horizontal space, high-quality wilderness in Henan Province is mainly concentrated in the high-elevation and water-system peripheral areas in the north, west and south, while low-quality wilderness is dominant in the central plains and the periphery of the major transportation arteries. 2) In terms of vertical spatial distribution, the quality of wilderness increases with elevation, with a high proportion of low- and medium-quality wilderness in low-elevation areas, while high-quality wilderness is most distributed in high-elevation (800–1200 m) areas. 3) The area of wilderness in Henan Province is 20,052.60 km2, and the area of wilderness covered by nature reserves is only 3,017.40 km2, i.e., 84.95% of the existing wilderness is not included in the scope of protection, and there is a large area of protection gaps in the wilderness area, which urgently needs to be strengthened in terms of planning, reasonable protection and management. The results of this study can provide a theoretical basis for the development of scientific and reasonable wilderness protection policies in nature reserves, and are of significance in promoting the in-depth development of wilderness protection in Henan Province.
- Research Article
- 10.52554/kjcl.2025.112.85
- Sep 30, 2025
- The Korean Association of Civil Law
- Mooryung Lee
In principle, a contract is retroactively invalid if it has grounds for nullity or revocation. However, for long-term contracts that have already been executed, the restriction on retroactive effect is often considered due to the difficulty of restitution and the safety of transactions. While this issue primarily arises in employment/partnership contracts, a general theory applicable to all kinds of long-term contract could be also considered. In Germany and Austria, where these discussions have been detailed, it's common to restrict the retroactive effect in aforementioned contract types. However, even there, the prevailing view holds that retroactive effect is accepted in cases involving violations of mandatory provisions, public order and fraud or duress. For other long-term contracts, such as lease, the prevailing view is to stick to the retroactive effect. Expanding the theory of restricting retroactive effect is considered cautiously in general. In Korea and Japan, discussions on this topic have been relatively less substantial until now. However, in Korea, a recent high court decision on a franchise contract is expected to be a good catalyst for coming discussions. And in Japan, the revision of its Civil Code regarding partnership contract is anticipated to serve a similar role. To truly satisfy the purpose of nullity and revocation regulations, the retroactive effect should be maintained even in long-term contracts. Security of transactions could still be protected through existing provisions, and this approach is sometimes necessary to adjust an appropriate scope of protection. While there is a great ‘necessity’ to recognize retroactive effect and restitution, the 'difficulty' of restitution - the main ground for restricting retroactive effect – cannot be a meaningful criterion for distinguished regulations between single-performance and long-term contracts. Its legitimacy and effectiveness are also questionable. Although that concept itself cannot be entirely denied, it should only serve as a supplementary last resort. One could also consider restricting retroactive effect and instead addressing the disadvantages to a contract party caused by nullity or revocation through compensation for damages(tort liability). However, there is clear limitations to this approach. First, the establishment of liability is not guaranteed. And even if that liability is established, the problem of assessing the correct value of performance, which causes the difficulty of restitution, recurs in terms of estimating damages. In litigation practice, based on the assumption of retroactive effect, the limitation on retroactive effect should only be declared at the end of the trial when the difficulty of restitution is confirmed. Prematurely restricting the retroactive effect depending on the type of contract is just a hasty conclusion.
- Research Article
- 10.2196/67390
- Sep 3, 2025
- Journal of Medical Internet Research
- Maomin Jiang + 6 more
BackgroundIn the digital health era, telemedicine has become a key driver of health care reform and innovation globally. Understanding the factors influencing residents’ choices of telemedicine services is crucial for optimizing service design, enhancing user experience, and developing effective policy measures.ObjectiveThis study aims to explore the key factors influencing Chinese residents’ choices of telemedicine services, including consultation fee, physician qualifications, appointment waiting time, scope of services, privacy protection, and service hours. The study also analyzes preference heterogeneity among residents with different demographic characteristics to provide scientific evidence for optimizing telemedicine services in the digital health era.MethodsThis study used a mixed methods design combining qualitative interviews and a discrete choice experiment. Interviews identified key telemedicine attributes, informing the discrete choice experiment scenarios. Preferences and willingness to pay were analyzed using mixed logit and latent class models.ResultsResidents’ preferences for telemedicine services were primarily shaped by the scope of services, appointment waiting time, and privacy protection, with substantial willingness to pay for more comprehensive, secure, and timely services. The optimal telemedicine services configuration—offering consultation plus prescription, high privacy, immediate access, 24-hour availability, and expert physicians—yielded a maximum willingness to pay of RMB 661.6 (a currency exchange rate of US $1=RMB 7.1803 is applicable). Latent class analysis revealed pronounced heterogeneity: while privacy and service scope remained universally prioritized, older, male, rural, and less-educated residents favored broader coverage, easier platforms, and lower costs; younger, female, and highly educated groups preferred faster, higher-quality, and more privacy-sensitive services.ConclusionsThis study reveals key drivers and significant demographic heterogeneity in Chinese residents’ preferences for telemedicine services. Residents demonstrated a high willingness to pay for comprehensive services (eg, “consultation + prescription”), enhanced privacy protection, and shorter appointment waiting times. Additionally, the study innovatively identified 3 distinct resident profiles: “Diverse-Service-Oriented,” “Utility-Oriented,” and “Value-Oriented,” and proposed differentiated optimization strategies to effectively address diverse resident needs, thereby promoting equitable access and efficient adoption of telemedicine services.
- Research Article
- 10.1007/s12026-025-09675-w
- Aug 27, 2025
- Immunologic research
- Yadira Lobaina + 10 more
Since the beginning of the COVID-19 pandemic, various groups around the world have intensively worked in the development of vaccine candidates against SARS-CoV-2. Several vaccines have been approved in the past years; the majority is based on the Spike or RBD proteins and employs parenteral administration routes. Considering the recent history of coronavirus zoonotic events, which are known to have caused serious human health problems, the development of vaccines with a broad scope of protection and the potential to cut/reduce the transmission remains in the spotlight. The current global pandemic preparedness initiatives have also promoted the preclinical evaluation of a new group of coronavirus vaccines. In line with current needs, the goal of the present work is the preclinical evaluation, in two different mice strains, of a novel nasal vaccine candidate based on two highly conserved sarbecovirus proteins, S2 and nucleocapsid (N). The vaccine preparation, containing a CpG ODN as adjuvant, was able to generate high antibody titers against both antigens, in sera and bronchoalveolar lavages. This humoral response results cross-reactive to SARS-CoV-1 and MERS-CoV. In addition, the preparation induces IFNγ secretion, and a marked IgG2a response, against both proteins at the systemic compartment, consistent with the development of a Th1 pattern. Although further evaluations should be done, the level of cross-reactivity and the mucosal response obtained constitute promising features of this vaccine candidate.
- Research Article
- 10.55606/jurrish.v4i4.6341
- Aug 7, 2025
- Jurnal Riset Rumpun Ilmu Sosial, Politik dan Humaniora
- Ghufron Rosadi Hidayah + 2 more
The development of digital technology has had a significant impact on people's lives, including the protection of citizens' privacy rights. One key issue that has emerged is the management and protection of personal data, which is increasingly vulnerable to misuse. This study aims to examine and compare the personal data protection provisions stipulated in the 2024 Electronic Information and Transactions Law (ITE Law) and Law Number 27 of 2022 concerning Personal Data Protection (PDP Law). The research method used is a normative approach with comparative study techniques. The study focuses on the legal substance, scope of data protection, and institutional roles in implementing both regulations. The analysis shows that the ITE Law remains general in nature, lacking specific detailed regulations governing personal data protection mechanisms. Meanwhile, the PDP Law presents a more systematic and comprehensive specific regulation, referencing international principles such as the General Data Protection Regulation (GDPR) in the European Union. However, several implementation challenges exist, including overlapping authority between institutions, inconsistencies in legal norms, and limited adequate legal infrastructure. This situation has the potential to create regulatory dualism and complicate the law enforcement process. Therefore, steps are needed to harmonize the ITE Law and the PDP Law, strengthen the capacity of institutions responsible for data protection, and increase the digital literacy of the public so that citizens' digital rights can be optimally protected in the digital era.
- Research Article
- 10.51473/rcmos.v1i2.2025.1223
- Aug 5, 2025
- RCMOS - Revista Científica Multidisciplinar O Saber
- Bruno Mendes Figueiredo + 1 more
Religious freedom is a fundamental right ensured by the Brazilian Federal Constitution, being essential for pluralistic coexistence in a democratic society. However, this freedom finds its limits when it infringes upon other fundamental rights, such as the right to dignity and non-discrimination. In this context, hate speech against LGBTQIAPN+ individuals emerges as a challenge that must be combated, as the protection of this group needs to be balanced with freedom of expression and religious freedom. This article, through a qualitative methodology of bibliographic, legislative, and jurisprudential analysis, examines the tension between religious freedom and hate speech against LGBTQIAPN+ individuals in light of the Direct Action of Unconstitutionality by Omission (ADO) 26 and the Writ of Injunction (MI) 4733. These actions are significant in this context, providing guidelines on the applicability and limits of religious freedom in the face of the need to protect the dignity of LGBTQIAPN+ individuals. The investigation is justified by the importance of ensuring that fundamental rights coexist in a balanced manner, promoting a more humanized and inclusive society. The general objective of this study is to analyze how the jurisprudence of the Federal Supreme Court (STF), through ADO 26 and MI 4733, addresses the intersection between religious freedom and hate speech against LGBTQIAPN+ individuals. The specific objectives include: exploring the concept of religious freedom and its scope of constitutional protection; examining hate speech and its impacts on LGBTQIAPN+ individuals; analyzing the STF's decisions in ADO 26 and MI 4733, identifying the main arguments and grounds used, as well as evaluating the implications of these decisions for the protection of fundamental rights in a context of religious plurality. The analysis of ADO 26 and MI 4733 aims to understand the STF's considerations and how it has balanced religious freedom with the need to combat hate speech. It is expected to identify criteria and parameters that can guide future judicial decisions and public policies, promoting effective protection of LGBTQIAPN+ rights without unduly infringing upon religious freedom. Furthermore, the study may highlight the importance of continuous dialogue among different social and institutional actors to build a more inclusive and respectful society towards diversity.
- Research Article
- 10.56334/sei/8.10.15
- Aug 5, 2025
- Science, Education and Innovations in the context of modern problems
- Ouassila Mezili
The Scope of Protection for Engineering Works in the Literary and Artistic Property System
- Research Article
- 10.52152/800078
- Jul 31, 2025
- Lex localis - Journal of Local Self-Government
- Ting Wang + 1 more
Abstract: In the process of patenting traditional Chinese medicine (TCM) technology, the patent system has gradually deviated from its original purpose and philosophy of TCM. This has resulted in a majority of TCM technical information being protected as trade secrets in practice, rather than through patents. Protecting TCM technical information as trade secrets can be highly appropriate. However, due to the need for technological innovation and protecting public interest, there is an inherent conflict between information disclosure and confidentiality in trade secret protection of TCM technology. Moreover, when TCM technical information that was originally a trade secret gets reclassified as a state secret, the boundaries between private and public rights become blurred. The space for private rights protection gets encroached upon as public law protection becomes more generalized, leading to issues of rent-seeking behavior. To address these problems and find an optimal approach to protecting TCM technology trade secrets, several measures can be taken: 1) Adhere to the principle of balancing stakeholder interests 2) Reasonably divide the scope of TCM technical information disclosure based on different disclosure needs and purposes 3) Use various means to clarify the boundaries between trade secrets and state secrets in TCM 4) Limit the scope of TCM state secret protection to improve accuracy in determining TCM state secrets and curb the trend of over-generalizing state secret protection in TCM.