Securing intellectual property protecting trade secrets and other information assets
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address...
Autor Corporativo: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Butterworth-Heinemann/Elsevier : Syngress/Elsevier
c2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627708806719 |
Tabla de Contenidos:
- Elements of a holistic program
- Trade secrets and nondisclosure agreements
- Confidentiality, rights transfer, and noncompetition agreements for employees
- IT services : development, outsourcing, and consulting
- How to sell your intellectual property protection program
- Case study : the myserious social engineering attacks on entity X
- When insiders and/or competitors target a business's intellectual property
- When piracy, counterfeiting, and organized crime target a business's intellectual property
- Physical security : the "duh" factor
- Protecting intellectual property in a crisis situation
- Top ten ways to shut down hackers.