Securing Intellectual Property

  • ID: 1763185
  • Book
  • 288 Pages
  • Elsevier Science and Technology
1 of 4
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the "spy vs. spy? perspective. The author approaches the topic from a practical business perspective and not simply creating "paranoia? for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

- No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers- Sample agreements and forms that address specific business needs- Coverage of threats ranging from physical security lapses to hackers to social engineering

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Note: Product cover images may vary from those shown
2 of 4
Chapter 1:Elements of a Holistic Program
Chapter 2: Trade Secrets and Nondisclosure Agreements
Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
Chapter 4: IT Services-Development, Outsourcing, and Consulting
Chapter 5: How to Sell Your Intellectual Property Protection Program
Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
Chapter 7: When Insiders and/or Competitors Target a Business's Intellectual Property
Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
Chapter 9: Physical Security: The "Duh” Factor
Chapter 10: Protecting Intellectual Property in a Crisis Situation
Chapter 11: Top Ten Ways to Shut Down Hackers
Appendix 1: Mutual Non-Disclosure Agreement
Appendix 2: Evaluation Agreement (Pro-Recipient)
Appendix 3: Employee Agreement
Appendix 4: Software Development Agreement
Appendix 5: Software Consulting Agreement (Favors Consultant)
Appendix 6: Software Consulting Agreement (Favors Customer)
Appendix 7: Web Site Development Agreement
Appendix 8: Web Hosting Agreement
Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense

Note: Product cover images may vary from those shown
3 of 4


4 of 4
Information Security
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown