Chapter 17

Reducing Security Risks in Information Technology Contracts

CHECKLIST

Trade Secrets

  • □ Stamp with “CONFIDENTIAL”

  • □ Control physical access

  • □ Use time stamps and ID logs

  • □ Strong password requirements

  • □ Encryption

  • □ Firewalls

  • □ Prohibited use of USB drives

  • □ Isolate development and testing environments

Copyright

  • □ Establish and communicate policy

  • □ Mark with © symbol

  • □ Mark with year of first publication

  • □ Mark with name of legal owner

  • □ Include textual marking in source code

  • □ US copyright registration

  • □ Register with US Customs

Joint IP

  • □ “Clean room” protocols

  • □ Isolate independent IP from joint IP

Embedded Open Source

  • □ Policy against embedding open source

  • □ Advance planning for correct embedding if at all

Internal Procedures ...

Get A Guide to IT Contracting, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.