Securing Intellectual Property

Securing Intellectual Property

4.11 - 1251 ratings - Source

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor. Nearly all books that address the topic of trade secrets have the a€œspy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating a€œparanoia for paranoiaa€™s sake. The material for this book comes from the authora€™s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases. No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers Sample agreements and forms that address specific business needs Coverage of threats ranging from physical security lapses to hackers to social engineeringIf you are not careful with documentation, the subcontractors will end up owning the intellectual property that they ... You should use a form of subcontractor agreement that has intellectual property ownership, confidentiality, and (if you want)anbsp;...

Title:Securing Intellectual Property
Author:Information Security
Publisher:Butterworth-Heinemann - 2008-12-09


You Must CONTINUE and create a free account to access unlimited downloads & streaming