Securing intellectual property protecting trade secrets and other information assets
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address...
Corporate Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Burlington, MA
Butterworth-Heinemann/Elsevier
2009
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Elements of a holistic program
- Trade secrets and nondisclosure agreements
- Confidentiality, rights transfer, and noncompetition agreements for employees
- IT services : development, outsourcing, and consulting
- How to sell your intellectual property protection program
- Case study : the myserious social engineering attacks on entity X
- When insiders and/or competitors target a business's intellectual property
- When piracy, counterfeiting, and organized crime target a business's intellectual property
- Physical security : the "duh" factor
- Protecting intellectual property in a crisis situation
- Top ten ways to shut down hackers
- Includes bibliographical references and index