Securing Intellectual Property

Book description

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy? perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia? for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

- Numerous tables organize information and provide executive summaries for easy reference
- Provides no-nonsense solutions to the most common problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
- Written in a readable tone that cuts through technical jargon

Table of contents

  1. Brief Table of Contents
  2. Table of Contents
  3. Copyright
  4. Preface
  5. Chapter 1. Elements of a Holistic Program
    1. Introduction
    2. False Memes Lead People the Wrong Way
    3. From the Industrial Age to the Information Age
  6. Chapter 2. Trade Secrets and Nondisclosure Agreements
    1. Introduction
    2. Contents
    3. What Is a Trade Secret?
    4. Basis of Trade Secret Law
    5. Care and Protection of Trade Secrets
    6. Nondisclosure Agreements and Confidential Disclosure
    7. Violations of Trade Secret Law
    8. Dealing with Violations of Trade Secrets
    9. Is Taking Trade Secrets a Crime?
    10. Can Software Trade Secrets Be Licensed or Sold?
    11. Use of Counsel in Managing Trade Secrets
  7. Chapter 3. Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
    1. Introduction
    2. Contents of Employee Agreements
    3. Noncompetition and Nonsolicitation Provisions
  8. Chapter 4. IT Services—Development, Outsourcing, and Consulting
    1. Introduction
    2. In This Chapter
    3. IT Consulting Business Model
    4. Development Deals
    5. Process Overview
    6. Writing and Responding to RFPs
    7. Agreement
    8. Structure of a Development Agreement
    9. Development Planning
    10. About Offshoring
    11. Conclusion
  9. Chapter 5. How to Sell Your Intellectual Property Protection Program
    1. Introduction
    2. Questions to Ask and People to Approach
    3. What Is Your Business Differentiation from Your Competitors?
    4. Notes on Figure 5.1
    5. Notes on Figure 5.2
    6. Implications of IP loss
    7. Notes on Figure 5.3
    8. Notes on Figure 5.4
    9. Notes on Figure 5.5
  10. Chapter 6. Case Study
    1. Introduction
    2. Fundamentals of Social Engineering Attacks
    3. The Mysterious Social Engineering Attacks on Entity Y
    4. Guidance for the Workforce
  11. Chapter 7. When Insiders and/or Competitors Target a Business's Intellectual Property
    1. Introduction
    2. Lightwave Microsystems
    3. America Online
    4. Casiano Communications
    5. Corning and PicVue
    6. Avery Dennison and Four Pillars
    7. Lexar Media and Toshiba
    8. SigmaTel and Citroen
    9. 3dGEO – China
  12. Chapter 8. When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
    1. Introduction
    2. Technology Counterfeiting
    3. The Apparel Industry
    4. The Entertainment Industry
  13. Chapter 9. Physical Security
    1. Introduction
  14. Chapter 10. Protecting Intellectual Property in a Crisis Situation
    1. Introduction
  15. Chapter 11. Top Ten Ways to Shut Down Hackers
    1. Introduction
    2. Go Undercover
    3. Shred Everything
    4. Get Decent Locks
    5. Put that Badge Away
    6. Check Your Surveillance Gear
    7. Shut Down Shoulder Surfers
    8. Block Tailgaters
    9. Clean Your Car
    10. Beware of Social Engineers
  16. Appendix 1. Mutual Non-Disclosure Agreement
    1. Introductory Note
    2. Mutual Non-Disclosure Agreement
  17. Appendix 2. Evaluation Agreement (Pro-Recipient)
    1. Introductory Note
    2. Evaluation Agreement
  18. Appendix 3. Employee Agreement
    1. Introductory Note
    2. Employee Agreement
  19. Appendix 4. Software Development Agreement
    1. Introductory Note
    2. Software Development Agreement
  20. Appendix 5. Software Consulting Agreement (Favors Consultant)
    1. Introductory Note
    2. Software Consulting Agreement
  21. Appendix 6. Software Consulting Agreement (Favors Customer)
    1. Introductory Note
    2. Software Consulting Agreement
  22. Appendix 7. Web Site Development Agreement
    1. Introductory Note
    2. Web Site Development Agreement
  23. Appendix 8. Web Hosting Agreement
    1. Introductory Note
    2. Schedule A. Hosting Services and Fees
    3. Schedule B. Fees for Additional Services
    4. Schedule C. Service Level Agreement
    5. [Schedule D. Terms and Conditions Regarding PCI Compliance
  24. Appendix 9. U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
    1. United States Department of Justice
  25. Index
    1. SYMBOL
    2. A
    3. B
    4. C
    5. D
    6. E
    7. F
    8. G
    9. H
    10. I
    11. J
    12. K
    13. L
    14. M
    15. N
    16. O
    17. P
    18. Q
    19. R
    20. S
    21. T
    22. U
    23. V
    24. W
    25. Y

Product information

  • Title: Securing Intellectual Property
  • Author(s):
  • Release date: December 2008
  • Publisher(s): Butterworth-Heinemann
  • ISBN: 9780080941417