Securing Intellectual Property - 1st Edition - ISBN: 9780750679954, 9780080941417

Securing Intellectual Property

1st Edition

Protecting Trade Secrets and Other Information Assets

Authors: Information Security
Paperback ISBN: 9780750679954
eBook ISBN: 9780080941417
Imprint: Butterworth-Heinemann
Published Date: 1st December 2008
Page Count: 288
64.95 + applicable tax
52.95 + applicable tax
41.99 + applicable tax
69.95 + applicable tax
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

Key Features

  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  • Readership

    PRIMARY MARKET: CSO’s and security consultants, loss prevention directors, computer security managers and staff, physical security experts, corporate counsels, and computer security consultants.

    SECONDARY MARKET: Investigative law enforcement, human resource professionals, legal professionals (intellectual property lawyers), and students in security and computer security.

    Table of Contents

    Foreword Preface

    Chapter 1:Elements of a Holistic Program

    Chapter 2: Trade Secrets and Nondisclosure Agreements

    Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees

    Chapter 4: IT Services—Development, Outsourcing, and Consulting

    Chapter 5: How to Sell Your Intellectual Property Protection Program

    Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X

    Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property

    Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property

    Chapter 9: Physical Security: The “Duh” Factor

    Chapter 10: Protecting Intellectual Property in a Crisis Situation

    Chapter 11: Top Ten Ways to Shut Down Hackers

    Appendix 1: Mutual Non-Disclosure Agreement

    Appendix 2: Evaluation Agreement (Pro-Recipient)

    Appendix 3: Employee Agreement

    Appendix 4: Software Development Agreement

    Appendix 5: Software Consulting Agreement (Favors Consultant)

    Appendix 6: Software Consulting Agreement (Favors Customer)

    Appendix 7: Web Site Development Agreement

    Appendix 8: Web Hosting Agreement

    Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense

    Details

    No. of pages:
    288
    Language:
    English
    Copyright:
    © Butterworth-Heinemann 2009
    Published:
    Imprint:
    Butterworth-Heinemann
    eBook ISBN:
    9780080941417
    Paperback ISBN:
    9780750679954

    About the Author

    Reviews

    Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.