
Securing Intellectual Property
Protecting Trade Secrets and Other Information Assets
Free Global Shipping
No minimum orderDescription
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
Key Features
Readership
PRIMARY MARKET:
CSO’s and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.
SECONDARY MARKET:
Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.
CSO’s and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.
SECONDARY MARKET:
Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.
Table of Contents
- Foreword
Preface
Chapter 1:Elements of a Holistic Program
Chapter 2: Trade Secrets and Nondisclosure Agreements
Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
Chapter 4: IT Services—Development, Outsourcing, and Consulting
Chapter 5: How to Sell Your Intellectual Property Protection Program
Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property
Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
Chapter 9: Physical Security: The “Duh” Factor
Chapter 10: Protecting Intellectual Property in a Crisis Situation
Chapter 11: Top Ten Ways to Shut Down Hackers
Appendix 1: Mutual Non-Disclosure Agreement
Appendix 2: Evaluation Agreement (Pro-Recipient)
Appendix 3: Employee Agreement
Appendix 4: Software Development Agreement
Appendix 5: Software Consulting Agreement (Favors Consultant)
Appendix 6: Software Consulting Agreement (Favors Customer)
Appendix 7: Web Site Development Agreement
Appendix 8: Web Hosting Agreement
Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
Product details
- No. of pages: 288
- Language: English
- Copyright: © Butterworth-Heinemann 2008
- Published: December 1, 2008
- Imprint: Butterworth-Heinemann
- eBook ISBN: 9780080941417
- Paperback ISBN: 9780750679954
About the Author
Information Security
Ratings and Reviews
There are currently no reviews for "Securing Intellectual Property"