Question: This is a risk control question so please answer accordingly. A computer hacker extracted the secret recipe of a soft drink manufacturer's best-selling soft drink
This is a risk control question so please answer accordingly.
A computer hacker extracted the secret recipe of a soft drink manufacturer's best-selling soft drink and then anonymously e-mailed the recipe to the manufacturer's competitors. The hacker remained unidentified. Can the competitors use the recipe? Explain in detail why or why not.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
