Securing Intellectual Property: Protecting Trade Secrets and Other Information AssetsMost employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases. |
Contents
7 | |
29 | |
IT ServicesDevelopment Outsourcing and Consulting | 43 |
How to Sell Your Intellectual Property Protection Program | 77 |
Case Study The Mysterious Social Engineering Attacks on Entity X | 93 |
When Insiders andor Competitors Target a Businesss Intellectual Property | 103 |
When Piracy Counterfeiting and Organized Crime Target a Businesss Intellectual Property | 115 |
Physical Security The Duh Factor | 123 |
Evaluation Agreement ProRecipient | 161 |
Employee Agreement | 165 |
Software Development Agreement | 177 |
Software Consulting Agreement Favors Consultant | 199 |
Software Consulting Agreement Favors Customer | 209 |
Web Site Development Agreement | 221 |
Web Hosting Agreement | 233 |
US Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense | 249 |
Common terms and phrases
___YES ___NO acceptance Adidas and/or applicable assigned Avery Dennison Background Technology breach caller clause company’s competitor Confidential Information Consultant Consultant’s contract contractors copy counterfeit court created Customer’s damages deemed Deliverables Developer’s development agreement Disclosing Party disclosure documents e-mail employee agreement Employee’s employment enforcement enterprise enterprise’s Entity executive facilities fees flash memory Force Majeure hacker hire Hosting Services identified indemnification infringement injunction intellectual property rights IP Protection Program Lexar liability license Lightwave limited litigation materials Non-Disclosure Agreement nonsolicitation notice obligations option ownership parties agree party’s patent payment performance personnel Physical Security PicVue proprietary Provider’s reasonable Receiving Party remedy request restrictive covenants risk Section server SigmaTel social engineering SoftCo source code Specification Statement subcontractors termination theft third party Toshiba trade secret trade secret law violation warranty written