Chapter 17
CHECKLIST
Trade Secrets
□ Stamp with “CONFIDENTIAL”
□ Control physical access
□ Use time stamps and ID logs
□ Strong password requirements
□ Encryption
□ Firewalls
□ Prohibited use of USB drives
□ Isolate development and testing environments
Copyright
□ Establish and communicate policy
□ Mark with © symbol
□ Mark with year of first publication
□ Mark with name of legal owner
□ Include textual marking in source code
□ US copyright registration
□ Register with US Customs
Joint IP
□ “Clean room” protocols
□ Isolate independent IP from joint IP
Embedded Open Source
□ Policy against embedding open source
□ Advance planning for correct embedding if at all
Internal Procedures ...
Get A Guide to IT Contracting, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.