Securing Intellectual Property

Securing Intellectual Property

Protecting Trade Secrets and Other Information Assets

1st Edition - December 1, 2008

Write a review

  • Author: Information Security
  • eBook ISBN: 9780080941417
  • Paperback ISBN: 9780750679954

Purchase options

Purchase options
DRM-free (EPub, PDF, Mobi)
Sales tax will be calculated at check-out

Institutional Subscription

Free Global Shipping
No minimum order


Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

Key Features

  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  • Readership

    CSO’s and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.

    Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.

    Table of Contents

    • Foreword
      Chapter 1:Elements of a Holistic Program
      Chapter 2: Trade Secrets and Nondisclosure Agreements
      Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
      Chapter 4: IT Services—Development, Outsourcing, and Consulting
      Chapter 5: How to Sell Your Intellectual Property Protection Program
      Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
      Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property
      Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
      Chapter 9: Physical Security: The “Duh” Factor
      Chapter 10: Protecting Intellectual Property in a Crisis Situation
      Chapter 11: Top Ten Ways to Shut Down Hackers
      Appendix 1: Mutual Non-Disclosure Agreement
      Appendix 2: Evaluation Agreement (Pro-Recipient)
      Appendix 3: Employee Agreement
      Appendix 4: Software Development Agreement
      Appendix 5: Software Consulting Agreement (Favors Consultant)
      Appendix 6: Software Consulting Agreement (Favors Customer)
      Appendix 7: Web Site Development Agreement
      Appendix 8: Web Hosting Agreement
      Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense

    Product details

    • No. of pages: 288
    • Language: English
    • Copyright: © Butterworth-Heinemann 2008
    • Published: December 1, 2008
    • Imprint: Butterworth-Heinemann
    • eBook ISBN: 9780080941417
    • Paperback ISBN: 9780750679954

    About the Author

    Information Security

    Ratings and Reviews

    Write a review

    There are currently no reviews for "Securing Intellectual Property"