Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets by Information Security

Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

byInformation Security

Other | December 9, 2008

not yet rated|write a review

Pricing and Purchase Info

$62.39 online 
$78.00
Earn 312 plum® points

In stock online

Ships free on orders over $25

Not available in stores

about

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  • Details & Specs

    Title:Securing Intellectual Property: Protecting Trade Secrets and Other Information AssetsFormat:OtherDimensions:288 pages, 1 × 1 × 1 inPublished:December 9, 2008Publisher:Elsevier ScienceLanguage:English

    The following ISBNs are associated with this title:

    ISBN - 10:0080941419

    ISBN - 13:9780080941417

    Customer Reviews of Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

    Reviews

    Extra Content

    Table of Contents

    Foreword
    Preface
    Chapter 1:Elements of a Holistic Program
    Chapter 2: Trade Secrets and Nondisclosure Agreements
    Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
    Chapter 4: IT Services-Development, Outsourcing, and Consulting
    Chapter 5: How to Sell Your Intellectual Property Protection Program
    Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
    Chapter 7: When Insiders and/or Competitors Target a Business's Intellectual Property
    Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
    Chapter 9: Physical Security: The "Duh" Factor
    Chapter 10: Protecting Intellectual Property in a Crisis Situation
    Chapter 11: Top Ten Ways to Shut Down Hackers
    Appendix 1: Mutual Non-Disclosure Agreement
    Appendix 2: Evaluation Agreement (Pro-Recipient)
    Appendix 3: Employee Agreement
    Appendix 4: Software Development Agreement
    Appendix 5: Software Consulting Agreement (Favors Consultant)
    Appendix 6: Software Consulting Agreement (Favors Customer)
    Appendix 7: Web Site Development Agreement
    Appendix 8: Web Hosting Agreement
    Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense