1 online resource (xvii, 270 pages) : illustrations, forms
Contents
Elements of a holistic program -- Trade secrets and nondisclosure agreements -- Confidentiality, rights transfer, and noncompetition agreements for employees -- IT services : development, outsourcing, and consulting -- How to sell your intellectual property protection program -- Case study : the myserious social engineering attacks on entity X -- When insiders and/or competitors target a business's intellectual property -- When piracy, counterfeiting, and organized crime target a business's intellectual property -- Physical security : the "duh" factor -- Protecting intellectual property in a crisis situation -- Top ten ways to shut down hackers
Summary
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address the topic of trade secrets have the "spy vs. spy? perspective. The author approaches the topic from a practical business perspective and not simply creating "paranoia? for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics co