Securing Intellectual Property
Details
Klappentext Computer technologies have been embraced by everyone and are used to create, store and transmit data very quickly and efficiently. From a business perspective this is a wonderful advancement, but from a security perspective this is frightening. Trade secrets and other proprietary information can be easily disseminated with the click of a mouse. This book outlines threats to trade secrets that are often overlooked by security professionals, and shows specific, concrete steps to minimize these threats. Threats addressed include portable and covert storage devices, daily activities that seem harmless but can lead to loss of proprietary information, wireless networks, and deleted and residual data that can easily be recovered. Numerous legal issues are discussed such as the concept of inevitable disclosure as well as federal statutes such as the Economic Espionage Act, and the Computer Fraud and Abuse Act. The approach will provide a unique perspective, different from other books on t Zusammenfassung Most employers are astounded at how easily and quickly their proprietary information can get out of their control. This book offers solutions to common intellectual property problems facing security managers! computer security professionals! corporate legal counsel! and human resource managers. Inhaltsverzeichnis ForewordPreface Chapter 1 :Elements of a Holistic Program Chapter 2 : Trade Secrets and Nondisclosure Agreements Chapter 3 : Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees Chapter 4 : IT Services-Development, Outsourcing, and Consulting Chapter 5 : How to Sell Your Intellectual Property Protection Program Chapter 6 : Case Study: The Mysterious Social Engineering Attacks on Entity X Chapter 7 : When Insiders and/or Competitors Target a Business's Intellectual Property Chapter 8 : When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property Chapter 9 : Physical Security: The "Duh? Factor Chapter 10 : Protecting Intellectual Property in a Crisis Situation Chapter 11 : Top Ten Ways to Shut Down Hackers Appendix 1 : Mutual Non-Disclosure Agreement Appendix 2 : Evaluation Agreement (Pro-Recipient) Appendix 3 : Employee Agreement Appendix 4 : Software Development Agreement Appendix 5 : Software Consulting Agreement (Favors Consultant) Appendix 6 : Software Consulting Agreement (Favors Customer) Appendix 7 : Web Site Development Agreement Appendix 8 : Web Hosting Agreement Appendix 9 : U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense...
Zusammenfassung
Most employers are astounded at how easily and quickly their proprietary information can get out of their control. This book offers solutions to common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers.
Inhalt
ForewordPreface Chapter 1:Elements of a Holistic ProgramChapter 2: Trade Secrets and Nondisclosure AgreementsChapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for EmployeesChapter 4: IT Services-Development, Outsourcing, and ConsultingChapter 5: How to Sell Your Intellectual Property Protection ProgramChapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity XChapter 7: When Insiders and/or Competitors Target a Business's Intellectual PropertyChapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual PropertyChapter 9: Physical Security: The "Duh? FactorChapter 10: Protecting Intellectual Property in a Crisis SituationChapter 11: Top Ten Ways to Shut Down HackersAppendix 1: Mutual Non-Disclosure AgreementAppendix 2: Evaluation Agreement (Pro-Recipient)Appendix 3: Employee AgreementAppendix 4: Software Development AgreementAppendix 5: Software Consulting Agreement (Favors Consultant)Appendix 6: Software Consulting Agreement (Favors Customer)Appendix 7: Web Site Development AgreementAppendix 8: Web Hosting AgreementAppendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
Weitere Informationen
- Allgemeine Informationen
- GTIN 09780750679954
- Sprache Englisch
- Größe H235mm x B191mm x T22mm
- Jahr 2008
- EAN 9780750679954
- Format Kartonierter Einband
- ISBN 978-0-7506-7995-4
- Veröffentlichung 09.12.2008
- Titel Securing Intellectual Property
- Autor Information Information Security
- Untertitel Protecting Trade Secrets and Other Information Assets
- Gewicht 570g
- Herausgeber Butterworth-Heinemann
- Anzahl Seiten 288
- Genre Management