Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets by Information SecuritySecuring Intellectual Property: Protecting Trade Secrets and Other Information Assets by Information Security

Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

byInformation Security, Information Information Security

Other | December 9, 2008

Pricing and Purchase Info

$62.39 online 
$78.00 list price save 20%
Earn 312 plum® points
Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers

Sample agreements and forms that address specific business needs

Coverage of threats ranging from physical security lapses to hackers to social engineering

Title:Securing Intellectual Property: Protecting Trade Secrets and Other Information AssetsFormat:OtherDimensions:288 pages, 1 × 1 × 1 inPublished:December 9, 2008Publisher:Elsevier ScienceLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0080941419

ISBN - 13:9780080941417

Reviews

Table of Contents

Foreword
Preface
Chapter 1:Elements of a Holistic Program
Chapter 2: Trade Secrets and Nondisclosure Agreements
Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
Chapter 4: IT Services-Development, Outsourcing, and Consulting
Chapter 5: How to Sell Your Intellectual Property Protection Program
Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X
Chapter 7: When Insiders and/or Competitors Target a Business's Intellectual Property
Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
Chapter 9: Physical Security: The "Duh" Factor
Chapter 10: Protecting Intellectual Property in a Crisis Situation
Chapter 11: Top Ten Ways to Shut Down Hackers
Appendix 1: Mutual Non-Disclosure Agreement
Appendix 2: Evaluation Agreement (Pro-Recipient)
Appendix 3: Employee Agreement
Appendix 4: Software Development Agreement
Appendix 5: Software Consulting Agreement (Favors Consultant)
Appendix 6: Software Consulting Agreement (Favors Customer)
Appendix 7: Web Site Development Agreement
Appendix 8: Web Hosting Agreement
Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense