Muutke küpsiste eelistusi

E-raamat: Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 09-Dec-2008
  • Kirjastus: Butterworth-Heinemann Ltd
  • Keel: eng
  • ISBN-13: 9780080941417
  • Formaat - EPUB+DRM
  • Hind: 51,86 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 09-Dec-2008
  • Kirjastus: Butterworth-Heinemann Ltd
  • Keel: eng
  • ISBN-13: 9780080941417

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

- Numerous tables organize information and provide executive summaries for easy reference
- Provides no-nonsense solutions to the most common problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
- Written in a readable tone that cuts through technical jargon

Muu info

Provides a "one stop shop" for those interested in protecting their trade secrets!
Preface xv
Elements of a Holistic Program
1(6)
Introduction
2(1)
False Memes Lead People the Wrong Way
2(1)
From the Industrial Age to the Information Age
2(5)
Trade Secrets and Nondisclosure Agreements
7(22)
Introduction
8(1)
Contents
8(1)
What Is a Trade Secret?
8(1)
Basis of Trade Secret Law
8(4)
Trade Secret Law vs. Contractual Protection of Confidential Information
9(1)
Technology as a Trade Secret
10(1)
Source Code as a Trade Secret
10(1)
Product Ideas---Flying under the Radar Screen
10(1)
Confidential Business Information
11(1)
Confidential Information from Third Parties
11(1)
Limits to Trade Secrets
11(1)
How Long Trade Secrets Last
11(1)
Patents vs. Trade Secrets
11(1)
Can More Than One Company Have the Same Trade Secret?
12(1)
Care and Protection of Trade Secrets
12(5)
One Person in Charge of Confidentiality Measures
13(1)
Controls on Access to Confidential Data
13(1)
Entry Control and Badges
14(1)
Confidentiality Legends on Documents, Code, and Other Data
14(1)
Agreements with Third Parties to Protect Confidentiality
15(1)
Confidential Undertakings by Employees and Contractors
15(1)
Employee Guidelines
16(1)
Speeches, Paper, and Presentations
16(1)
New Employee Orientation
16(1)
Exit Process
16(1)
Nondisclosure Agreements and Confidential Disclosure
17(6)
Mutual or Unilateral NDAs
17(1)
Defining ``Confidential Information''
18(1)
What Written Information Is ``Confidential Information''?
18(1)
What Oral or Visual Information Is ``Confidential Information''?
19(1)
Carve-Outs from Confidential Information
19(1)
Prohibition of Disclosure
20(1)
Use of Confidential Information
20(1)
When Does Protection Time-Out?
20(1)
Risks from Others' Confidential Information
21(1)
Two-Stage Disclosure
21(1)
Watch Out for ``Residuals'' Clauses
21(1)
Are There Oral Agreements for Nondisclosure?
22(1)
Disclosure Agreements that Are the Opposite of NDAs
22(1)
When You Negotiate a Deal, Should NDAs Be Superseded?
23(1)
Confidentiality Clauses Generally
23(1)
Violations of Trade Secret Law
23(1)
What Is Illegal under Trade Secret Law?
24(1)
What Is Not Illegal under Trade Secret Law?
24(1)
What if Trade Secrets Are Disclosed?
24(1)
Dealing with Violations of Trade Secrets
24(2)
Remedies Short of Litigation
25(1)
Is Taking Trade Secrets a Crime?
26(1)
Can Software Trade Secrets Be Licensed or Sold?
26(1)
Use of Counsel in Managing Trade Secrets
27(2)
Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees
29(14)
Introduction
30(1)
Note on Terminology
30(1)
About Employment Law Generally
31(1)
Contents of Employee Agreements
31(5)
Confidentiality Provisions
31(1)
Definition of ``Confidential Information''
32(1)
Regarding Use and Protection of Confidential Information
32(1)
Confidentiality and Pre-Employment Communications
33(1)
Provisions in Aid of Enforcement
33(1)
Capturing Intellectual Property Rights
34(1)
Special Rule for California and Certain Other States
35(1)
Cooperation in Rights Transfer
36(1)
Documents and Records
36(1)
Noncompetition and Nonsolicitation Provisions
36(7)
State with Limitations on Restrictive Covenants
37(1)
About Consideration
37(1)
Getting Employees to Sign
38(1)
Enforceability of Provisions
38(1)
Nature of the Employment
38(1)
Reasonable Scope and Duration
39(1)
Noncompetition Clause
39(1)
Automatic Extension of Restricted Period
40(1)
``Blue Pencil''
40(1)
Enforcement of Noncompetition Agreements by Employers
40(1)
Do Not Delay in Addressing a Breach
40(1)
Remedies Short of Litigation
41(1)
Preliminary Injunction
41(1)
Obtaining Assurance of the Absence of Conflicting Prior Agreements
41(2)
IT Services---Development, Outsourcing, and Consulting
43(34)
Introduction
44(1)
In This
Chapter
44(1)
IT Consulting Business Model
44(1)
Development Deals
45(3)
Why Outside Development?
45(1)
Scale of Development Deals and the Development Forms
46(1)
Development Can Be a Risky Business
46(2)
Need for Planning and Risk Management
48(1)
Process Overview
48(1)
Writing and Responding to RFPs
49(3)
Elements of an RFP---From the Customer's Point of View
49(2)
Responding to RFPs---From the Developer's Point of View
51(1)
Agreement
52(1)
Getting the First Draft on the Table
52(1)
Structure of a Development Agreement
52(1)
Development Planning
53(20)
What Is to Be Delivered to the Customer?
54(1)
Requirements for Providing the Deliverables
54(1)
Software and Data to Be Provided for Use in Development
54(1)
Oversight and Management
55(1)
Price and Costs
55(1)
Acceptance
55(1)
Postacceptance
55(1)
``Detailed Design''
55(1)
Dealing with Informal Specifications
56(1)
Project Management Provisions
56(1)
Personnel Assigned to Development
57(1)
Change Management Provisions
57(1)
Acceptance Procedures
58(1)
Payment Provisions
58(1)
Milestone-Based
58(1)
Time and Materials
59(1)
Combinations and Variations
60(1)
Right Schedule
60(1)
Intellectual Property---Ownership and/or License
60(1)
What Intellectual Property Is at Stake?
61(1)
Copyright in the Software
61(1)
Patentable Inventions
61(1)
Trade Secrets
61(1)
Goals in Negotiating Intellectual Property Clauses
62(1)
Common Means to Deal with Intellectual Property in Agreements
62(1)
Developer Owns/License Grant Clause
63(1)
Work-Made-for-Hire Clause/Patent Clause
63(1)
Foreground Intellectual Property and Background Intellectual Property Clause
64(1)
Other Variations
65(1)
Avoiding Jointly Owned Intellectual Property
66(1)
When the Web Developer Is Also Providing Web Hosting?
66(1)
Subcontractors
67(1)
Noncompetition Clauses
67(1)
Provisions on Confidential Information
67(1)
Training and Support
68(1)
Warranties
68(1)
Disclaimers and Limitations
68(1)
Date Processing (Y2K) Warranties
68(1)
Open Source Provisions
69(1)
Intellectual Property Warranties and Indemnities
69(1)
Insurance
70(1)
Clause on Customer Nonsolicitation of Developer Employees
71(1)
Termination
71(1)
Dispute Resolution
72(1)
Boilerplate Provisions
72(1)
About Offshoring
73(3)
Other Types of Consulting Businesses and IT Services
74(1)
Legal Issues in Development and Consulting Businesses
75(1)
Employment Issues
75(1)
Building a Brand
75(1)
Conclusion
76(1)
How to Sell Your Intellectual Property Protection Program
77(16)
Introduction
78(1)
Questions to Ask and People to Approach
79(1)
What Is Your Business Differentiation from Your Competitors?
80(4)
Who Do You Have to Protect These Differentiators From?
81(1)
What Are the Probabilities in Terms of Likely Attackers, Targets, and Objectives?
82(1)
If the Competition Obtained or Tampered with Your Intellectual Property, What Harm Would Be Done?
83(1)
What Security Measures Would Be Cost-Effective and Business-Enabling?
83(1)
Notes on Figure 5.1
84(1)
Notes on Figure 5.2
85(2)
Executives and Board Members
85(1)
Research and Development
85(1)
Manufacturing
85(1)
Sales and Marketing
86(1)
Human Resources
86(1)
Operations
86(1)
Risk Identification
86(1)
Implications of IP loss
87(1)
Notes on Figure 5.3
88(1)
Implementation Plan
88(1)
Potential Inhibitors
88(1)
Identified Milestones
89(1)
Notes on Figure 5.4
89(1)
Notes on Figure 5.5
90(3)
Executive Commitment
90(1)
Business Value Statement
90(1)
Notes
91(2)
Case Study: The Mysterious Social Engineering Attacks on Entity X
93(10)
Introduction
94(1)
Fundamentals of Social Engineering Attacks
95(2)
The Mysterious Social Engineering Attacks on Entity Y
97(2)
Guidance for the Workforce
99(4)
How to Recognize Elicitation
99(1)
How to Handle the Caller
100(1)
How to Report the Incident
100(1)
General User-Oriented Guidance on How to Detect and Defeat Social Engineering
101(2)
When Insiders and/or Competitors Target a Business's Intellectual Property
103(12)
Introduction
104(1)
Lightwave Microsystems
104(1)
America Online
105(1)
Casiano Communications
106(1)
Corning and PicVue
107(1)
Avery Dennison and Four Pillars
108(2)
Lexar Media and Toshiba
110(2)
SigmaTel and Citroen
112(1)
3dGEO - China
113(2)
When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property
115(8)
Introduction
116(3)
Technology Counterfeiting
119(1)
The Apparel Industry
120(1)
The Entertainment Industry
121(2)
Physical Security: The ``Duh'' Factor
123(18)
Introduction
124(17)
Protecting Intellectual Property in a Crisis Situation
141(8)
Introduction
142(7)
Top Ten Ways to Shut Down Hackers
149(6)
Introduction
150(1)
Go Undercover
150(1)
Shred Everything
150(1)
Get Decent Locks
151(1)
Put that Badge Away
152(1)
Check Your Surveillance Gear
152(1)
Shut Down Shoulder Surfers
152(1)
Block Tailgaters
153(1)
Clean Your Car
153(1)
Watch Your Back Online
153(1)
Beware of Social Engineers
154(1)
Appendix 1 Mutual Non-Disclosure Agreement
155(6)
Introductory Note
156(1)
Mutual Non-Disclosure Agreement
156(5)
Appendix 2 Evaluation Agreement (Pro-Recipient)
161(4)
Introductory Note
162(1)
Evaluation Agreement
162(3)
Appendix 3 Employee Agreement
165(12)
Introductory Note
166(1)
Employee Agreement
166(11)
Exhibit A
173(1)
Exhibit B
174(1)
Exhibit C
175(2)
Appendix 4 Software Development Agreement
177(22)
Introductory Note
178(1)
Software Development Agreement
178(21)
Schedule___Specifications
197(1)
Schedule___Milestone and Payment Schedule
197(2)
Appendix 5 Software Consulting Agreement (Favors Consultant)
199(10)
Introductory Note
200(1)
Software Consulting Agreement
200(8)
Schedule 1
208(1)
Schedule of Work
208(1)
Appendix 6 Software Consulting Agreement (Favors Customer)
209(12)
Introductory Note
210(1)
Software Consulting Agreement
210(11)
Appendix 7 Web Site Development Agreement
221(12)
Introductory Note
222(1)
Web Site Development Agreement
222(11)
Appendix 8 Web Hosting Agreement
233(16)
Introductory Note
234(1)
Web Site Hosting Agreement
234(10)
Schedule A
244(1)
Schedule B
245(1)
Schedule C
246(2)
Schedule D
248(1)
Appendix 9 U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense
249(6)
United States Department of Justice
250(5)
Checklist for Reporting a Theft of Trade Secrets Offense
250(5)
Index 255