Key Employees, Restrictive Covenants, and Nondisclosure Agreements
IT relationships often require your vendors and employees to interact with and to come into possession of your company's proprietary information. Unfortunately, from time to time vendors or employees may decide to use your company's information for their own benefit, or even for the purpose of competing with your company. While any attempt to misappropriate your company's information in this way will be disruptive, there are some relatively simple techniques that you can use to protect your company and minimize the harm and disruption if an attempted theft occurs. In addition, even in the absence of misappropriation or theft, you may want to control and limit the extent to which ...
Get CIO Wisdom II: More Best Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.