Securing Intellectual Property

Securing Intellectual Property

Protecting Trade Secrets and Other Information Assets

1st Edition - December 1, 2008

Write a review

  • Author: Information Security
  • eBook ISBN: 9780080941417
  • Paperback ISBN: 9780750679954

Purchase options

Purchase options
DRM-free (EPub, PDF, Mobi)
Available
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order

Description

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

Key Features

  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  • Readership

    PRIMARY MARKET:
    CSO’s and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.

    SECONDARY MARKET:
    Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.

    Table of Contents

    • Foreword
      Preface
      Chapter 1:Elements of a Holistic Program
      Chapter 2: Trade Secrets and Nondisclosure Agreements
      Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
      Chapter 4: IT Services—Development, Outsourcing, and Consulting
      Chapter 5: How to Sell Your Intellectual Property Protection Program
      Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
      Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property
      Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
      Chapter 9: Physical Security: The “Duh” Factor
      Chapter 10: Protecting Intellectual Property in a Crisis Situation
      Chapter 11: Top Ten Ways to Shut Down Hackers
      Appendix 1: Mutual Non-Disclosure Agreement
      Appendix 2: Evaluation Agreement (Pro-Recipient)
      Appendix 3: Employee Agreement
      Appendix 4: Software Development Agreement
      Appendix 5: Software Consulting Agreement (Favors Consultant)
      Appendix 6: Software Consulting Agreement (Favors Customer)
      Appendix 7: Web Site Development Agreement
      Appendix 8: Web Hosting Agreement
      Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense

    Product details

    • No. of pages: 288
    • Language: English
    • Copyright: © Butterworth-Heinemann 2008
    • Published: December 1, 2008
    • Imprint: Butterworth-Heinemann
    • eBook ISBN: 9780080941417
    • Paperback ISBN: 9780750679954

    About the Author

    Information Security

    Ratings and Reviews

    Write a review

    There are currently no reviews for "Securing Intellectual Property"