Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

by Information Security
     
 

ISBN-10: 0750679956

ISBN-13: 9780750679954

Pub. Date: 12/15/2008

Publisher: Elsevier Science

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy”

…  See more details below

Overview

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  • Read More

    Product Details

    ISBN-13:
    9780750679954
    Publisher:
    Elsevier Science
    Publication date:
    12/15/2008
    Edition description:
    New Edition
    Pages:
    288
    Product dimensions:
    7.40(w) x 9.10(h) x 0.70(d)

    Table of Contents

    Foreword
    Preface
    Chapter 1:Elements of a Holistic Program
    Chapter 2: Trade Secrets and Nondisclosure Agreements
    Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
    Chapter 4: IT Services-Development, Outsourcing, and Consulting
    Chapter 5: How to Sell Your Intellectual Property Protection Program
    Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
    Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property
    Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property
    Chapter 9: Physical Security: The “Duh” Factor
    Chapter 10: Protecting Intellectual Property in a Crisis Situation
    Chapter 11: Top Ten Ways to Shut Down Hackers
    Appendix 1: Mutual Non-Disclosure Agreement
    Appendix 2: Evaluation Agreement (Pro-Recipient)
    Appendix 3: Employee Agreement
    Appendix 4: Software Development Agreement
    Appendix 5: Software Consulting Agreement (Favors Consultant)
    Appendix 6: Software Consulting Agreement (Favors Customer)
    Appendix 7: Web Site Development Agreement
    Appendix 8: Web Hosting Agreement
    Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense

    Read More

    Customer Reviews

    Average Review:

    Write a Review

    and post it to your social network

         

    Most Helpful Customer Reviews

    See all customer reviews >