Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

Front Cover
Butterworth-Heinemann, Dec 9, 2008 - Law - 288 pages
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  •  

    Contents

    Trade Secrets and Nondisclosure Agreements
    7
    Confidentiality Rights Transfer and Noncompetition Agreements for Employees
    29
    IT ServicesDevelopment Outsourcing and Consulting
    43
    How to Sell Your Intellectual Property Protection Program
    77
    Case Study The Mysterious Social Engineering Attacks on Entity X
    93
    When Insiders andor Competitors Target a Businesss Intellectual Property
    103
    When Piracy Counterfeiting and Organized Crime Target a Businesss Intellectual Property
    115
    Physical Security The Duh Factor
    123
    Evaluation Agreement ProRecipient
    161
    Employee Agreement
    165
    Software Development Agreement
    177
    Software Consulting Agreement Favors Consultant
    199
    Software Consulting Agreement Favors Customer
    209
    Web Site Development Agreement
    221
    Web Hosting Agreement
    233
    US Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
    249

    Protecting Intellectual Property in a Crisis Situation
    141
    Top Ten Ways to Shut Down Hackers
    149
    Mutual NonDisclosure Agreement
    155

    Common terms and phrases

    Bibliographic information