Book description
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy? perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia? for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
- Numerous tables organize information and provide executive summaries for easy reference
- Provides no-nonsense solutions to the most common problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
- Written in a readable tone that cuts through technical jargon
Table of contents
- Brief Table of Contents
- Table of Contents
- Copyright
- Preface
- Chapter 1. Elements of a Holistic Program
-
Chapter 2. Trade Secrets and Nondisclosure Agreements
- Introduction
- Contents
- What Is a Trade Secret?
- Basis of Trade Secret Law
- Care and Protection of Trade Secrets
- Nondisclosure Agreements and Confidential Disclosure
- Violations of Trade Secret Law
- Dealing with Violations of Trade Secrets
- Is Taking Trade Secrets a Crime?
- Can Software Trade Secrets Be Licensed or Sold?
- Use of Counsel in Managing Trade Secrets
- Chapter 3. Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
- Chapter 4. IT Services—Development, Outsourcing, and Consulting
- Chapter 5. How to Sell Your Intellectual Property Protection Program
- Chapter 6. Case Study
- Chapter 7. When Insiders and/or Competitors Target a Business's Intellectual Property
- Chapter 8. When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
- Chapter 9. Physical Security
- Chapter 10. Protecting Intellectual Property in a Crisis Situation
- Chapter 11. Top Ten Ways to Shut Down Hackers
- Appendix 1. Mutual Non-Disclosure Agreement
- Appendix 2. Evaluation Agreement (Pro-Recipient)
- Appendix 3. Employee Agreement
- Appendix 4. Software Development Agreement
- Appendix 5. Software Consulting Agreement (Favors Consultant)
- Appendix 6. Software Consulting Agreement (Favors Customer)
- Appendix 7. Web Site Development Agreement
- Appendix 8. Web Hosting Agreement
- Appendix 9. U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
- Index
Product information
- Title: Securing Intellectual Property
- Author(s):
- Release date: December 2008
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780080941417
You might also like
book
Intellectual Property and Innovation Protection
This book analyses the various ways in which intellectual property (IP) operates in relation to innovation …
book
Protecting Your Company's Intellectual Property
A company’s most valuable assets may not be physical. This book shows how to protect them …
book
Trade Secret Theft, Industrial Espionage, and the China Threat
This book provides an overview of economic espionage as practiced by a range of nations from …
book
Protecting Your Business’ Intellectual Property: Patents, Trademarks, Copyrights, and Trade Secrets
This Element is an excerpt from The Truth About Starting a Business (9780137144501), by Bruce R. …