Skip to content

Securing Intellectual Property Protecting Trade Secrets and Other Information Assets

Spend $50 to get a free DVD!

ISBN-10: 0750679956

ISBN-13: 9780750679954

Edition: 2009

Authors: John Mallery, Information Security Staff

List price: $72.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address the topic of trade secrets have the spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating paranoia for paranoias sake. The material for this book comes from the authors extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases. - Numerous tables organize information and provide executive summaries for easy reference - Provides no-nonsense solutions to the most common problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers - Written in a readable tone that cuts through technical jargon
Customers also bought

Book details

List price: $72.95
Copyright year: 2009
Publisher: Elsevier Science & Technology Books
Publication date: 12/9/2008
Binding: Paperback
Pages: 288
Size: 7.25" wide x 9.00" long x 0.50" tall
Weight: 1.232
Language: English

Foreword
Preface
Elements of a Holistic Program
Trade Secrets and Nondisclosure Agreements
Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
IT Services-Development, Outsourcing, and Consulting
How to Sell Your Intellectual Property Protection Program
Case Study: The Mysterious Social Engineering Attacks on Entity X
When Insiders and/or Competitors Target a Business's Intellectual Property
When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
Physical Security: The "Duh" Factor
Protecting Intellectual Property in a Crisis Situation
Top Ten Ways to Shut Down Hackers
Mutual Non-Disclosure Agreement
Evaluation Agreement (Pro-Recipient)
Employee Agreement
Software Development Agreement
Software Consulting Agreement (Favors Consultant)
Software Consulting Agreement (Favors Customer)
Web Site Development Agreement
Web Hosting Agreement
U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense