Preface |
|
xv | |
|
Elements of a Holistic Program |
|
|
1 | (6) |
|
|
2 | (1) |
|
False Memes Lead People the Wrong Way |
|
|
2 | (1) |
|
From the Industrial Age to the Information Age |
|
|
2 | (5) |
|
Trade Secrets and Nondisclosure Agreements |
|
|
7 | (22) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
Basis of Trade Secret Law |
|
|
8 | (4) |
|
Trade Secret Law vs. Contractual Protection of Confidential Information |
|
|
9 | (1) |
|
Technology as a Trade Secret |
|
|
10 | (1) |
|
Source Code as a Trade Secret |
|
|
10 | (1) |
|
Product Ideas---Flying under the Radar Screen |
|
|
10 | (1) |
|
Confidential Business Information |
|
|
11 | (1) |
|
Confidential Information from Third Parties |
|
|
11 | (1) |
|
|
11 | (1) |
|
How Long Trade Secrets Last |
|
|
11 | (1) |
|
Patents vs. Trade Secrets |
|
|
11 | (1) |
|
Can More Than One Company Have the Same Trade Secret? |
|
|
12 | (1) |
|
Care and Protection of Trade Secrets |
|
|
12 | (5) |
|
One Person in Charge of Confidentiality Measures |
|
|
13 | (1) |
|
Controls on Access to Confidential Data |
|
|
13 | (1) |
|
|
14 | (1) |
|
Confidentiality Legends on Documents, Code, and Other Data |
|
|
14 | (1) |
|
Agreements with Third Parties to Protect Confidentiality |
|
|
15 | (1) |
|
Confidential Undertakings by Employees and Contractors |
|
|
15 | (1) |
|
|
16 | (1) |
|
Speeches, Paper, and Presentations |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Nondisclosure Agreements and Confidential Disclosure |
|
|
17 | (6) |
|
Mutual or Unilateral NDAs |
|
|
17 | (1) |
|
Defining ``Confidential Information'' |
|
|
18 | (1) |
|
What Written Information Is ``Confidential Information''? |
|
|
18 | (1) |
|
What Oral or Visual Information Is ``Confidential Information''? |
|
|
19 | (1) |
|
Carve-Outs from Confidential Information |
|
|
19 | (1) |
|
Prohibition of Disclosure |
|
|
20 | (1) |
|
Use of Confidential Information |
|
|
20 | (1) |
|
When Does Protection Time-Out? |
|
|
20 | (1) |
|
Risks from Others' Confidential Information |
|
|
21 | (1) |
|
|
21 | (1) |
|
Watch Out for ``Residuals'' Clauses |
|
|
21 | (1) |
|
Are There Oral Agreements for Nondisclosure? |
|
|
22 | (1) |
|
Disclosure Agreements that Are the Opposite of NDAs |
|
|
22 | (1) |
|
When You Negotiate a Deal, Should NDAs Be Superseded? |
|
|
23 | (1) |
|
Confidentiality Clauses Generally |
|
|
23 | (1) |
|
Violations of Trade Secret Law |
|
|
23 | (1) |
|
What Is Illegal under Trade Secret Law? |
|
|
24 | (1) |
|
What Is Not Illegal under Trade Secret Law? |
|
|
24 | (1) |
|
What if Trade Secrets Are Disclosed? |
|
|
24 | (1) |
|
Dealing with Violations of Trade Secrets |
|
|
24 | (2) |
|
Remedies Short of Litigation |
|
|
25 | (1) |
|
Is Taking Trade Secrets a Crime? |
|
|
26 | (1) |
|
Can Software Trade Secrets Be Licensed or Sold? |
|
|
26 | (1) |
|
Use of Counsel in Managing Trade Secrets |
|
|
27 | (2) |
|
Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees |
|
|
29 | (14) |
|
|
30 | (1) |
|
|
30 | (1) |
|
About Employment Law Generally |
|
|
31 | (1) |
|
Contents of Employee Agreements |
|
|
31 | (5) |
|
Confidentiality Provisions |
|
|
31 | (1) |
|
Definition of ``Confidential Information'' |
|
|
32 | (1) |
|
Regarding Use and Protection of Confidential Information |
|
|
32 | (1) |
|
Confidentiality and Pre-Employment Communications |
|
|
33 | (1) |
|
Provisions in Aid of Enforcement |
|
|
33 | (1) |
|
Capturing Intellectual Property Rights |
|
|
34 | (1) |
|
Special Rule for California and Certain Other States |
|
|
35 | (1) |
|
Cooperation in Rights Transfer |
|
|
36 | (1) |
|
|
36 | (1) |
|
Noncompetition and Nonsolicitation Provisions |
|
|
36 | (7) |
|
State with Limitations on Restrictive Covenants |
|
|
37 | (1) |
|
|
37 | (1) |
|
Getting Employees to Sign |
|
|
38 | (1) |
|
Enforceability of Provisions |
|
|
38 | (1) |
|
|
38 | (1) |
|
Reasonable Scope and Duration |
|
|
39 | (1) |
|
|
39 | (1) |
|
Automatic Extension of Restricted Period |
|
|
40 | (1) |
|
|
40 | (1) |
|
Enforcement of Noncompetition Agreements by Employers |
|
|
40 | (1) |
|
Do Not Delay in Addressing a Breach |
|
|
40 | (1) |
|
Remedies Short of Litigation |
|
|
41 | (1) |
|
|
41 | (1) |
|
Obtaining Assurance of the Absence of Conflicting Prior Agreements |
|
|
41 | (2) |
|
IT Services---Development, Outsourcing, and Consulting |
|
|
43 | (34) |
|
|
44 | (1) |
|
|
44 | (1) |
|
IT Consulting Business Model |
|
|
44 | (1) |
|
|
45 | (3) |
|
|
45 | (1) |
|
Scale of Development Deals and the Development Forms |
|
|
46 | (1) |
|
Development Can Be a Risky Business |
|
|
46 | (2) |
|
Need for Planning and Risk Management |
|
|
48 | (1) |
|
|
48 | (1) |
|
Writing and Responding to RFPs |
|
|
49 | (3) |
|
Elements of an RFP---From the Customer's Point of View |
|
|
49 | (2) |
|
Responding to RFPs---From the Developer's Point of View |
|
|
51 | (1) |
|
|
52 | (1) |
|
Getting the First Draft on the Table |
|
|
52 | (1) |
|
Structure of a Development Agreement |
|
|
52 | (1) |
|
|
53 | (20) |
|
What Is to Be Delivered to the Customer? |
|
|
54 | (1) |
|
Requirements for Providing the Deliverables |
|
|
54 | (1) |
|
Software and Data to Be Provided for Use in Development |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
Dealing with Informal Specifications |
|
|
56 | (1) |
|
Project Management Provisions |
|
|
56 | (1) |
|
Personnel Assigned to Development |
|
|
57 | (1) |
|
Change Management Provisions |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
Combinations and Variations |
|
|
60 | (1) |
|
|
60 | (1) |
|
Intellectual Property---Ownership and/or License |
|
|
60 | (1) |
|
What Intellectual Property Is at Stake? |
|
|
61 | (1) |
|
Copyright in the Software |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (1) |
|
Goals in Negotiating Intellectual Property Clauses |
|
|
62 | (1) |
|
Common Means to Deal with Intellectual Property in Agreements |
|
|
62 | (1) |
|
Developer Owns/License Grant Clause |
|
|
63 | (1) |
|
Work-Made-for-Hire Clause/Patent Clause |
|
|
63 | (1) |
|
Foreground Intellectual Property and Background Intellectual Property Clause |
|
|
64 | (1) |
|
|
65 | (1) |
|
Avoiding Jointly Owned Intellectual Property |
|
|
66 | (1) |
|
When the Web Developer Is Also Providing Web Hosting? |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
Provisions on Confidential Information |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
Disclaimers and Limitations |
|
|
68 | (1) |
|
Date Processing (Y2K) Warranties |
|
|
68 | (1) |
|
|
69 | (1) |
|
Intellectual Property Warranties and Indemnities |
|
|
69 | (1) |
|
|
70 | (1) |
|
Clause on Customer Nonsolicitation of Developer Employees |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
73 | (3) |
|
Other Types of Consulting Businesses and IT Services |
|
|
74 | (1) |
|
Legal Issues in Development and Consulting Businesses |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
How to Sell Your Intellectual Property Protection Program |
|
|
77 | (16) |
|
|
78 | (1) |
|
Questions to Ask and People to Approach |
|
|
79 | (1) |
|
What Is Your Business Differentiation from Your Competitors? |
|
|
80 | (4) |
|
Who Do You Have to Protect These Differentiators From? |
|
|
81 | (1) |
|
What Are the Probabilities in Terms of Likely Attackers, Targets, and Objectives? |
|
|
82 | (1) |
|
If the Competition Obtained or Tampered with Your Intellectual Property, What Harm Would Be Done? |
|
|
83 | (1) |
|
What Security Measures Would Be Cost-Effective and Business-Enabling? |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (2) |
|
Executives and Board Members |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
89 | (1) |
|
|
90 | (3) |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (2) |
|
Case Study: The Mysterious Social Engineering Attacks on Entity X |
|
|
93 | (10) |
|
|
94 | (1) |
|
Fundamentals of Social Engineering Attacks |
|
|
95 | (2) |
|
The Mysterious Social Engineering Attacks on Entity Y |
|
|
97 | (2) |
|
Guidance for the Workforce |
|
|
99 | (4) |
|
How to Recognize Elicitation |
|
|
99 | (1) |
|
|
100 | (1) |
|
How to Report the Incident |
|
|
100 | (1) |
|
General User-Oriented Guidance on How to Detect and Defeat Social Engineering |
|
|
101 | (2) |
|
When Insiders and/or Competitors Target a Business's Intellectual Property |
|
|
103 | (12) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Avery Dennison and Four Pillars |
|
|
108 | (2) |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (2) |
|
When Piracy, Counterfeiting, and Organized Crime Target a Business's Intellectual Property |
|
|
115 | (8) |
|
|
116 | (3) |
|
Technology Counterfeiting |
|
|
119 | (1) |
|
|
120 | (1) |
|
The Entertainment Industry |
|
|
121 | (2) |
|
Physical Security: The ``Duh'' Factor |
|
|
123 | (18) |
|
|
124 | (17) |
|
Protecting Intellectual Property in a Crisis Situation |
|
|
141 | (8) |
|
|
142 | (7) |
|
Top Ten Ways to Shut Down Hackers |
|
|
149 | (6) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
Check Your Surveillance Gear |
|
|
152 | (1) |
|
Shut Down Shoulder Surfers |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
Beware of Social Engineers |
|
|
154 | (1) |
|
Appendix 1 Mutual Non-Disclosure Agreement |
|
|
155 | (6) |
|
|
156 | (1) |
|
Mutual Non-Disclosure Agreement |
|
|
156 | (5) |
|
Appendix 2 Evaluation Agreement (Pro-Recipient) |
|
|
161 | (4) |
|
|
162 | (1) |
|
|
162 | (3) |
|
Appendix 3 Employee Agreement |
|
|
165 | (12) |
|
|
166 | (1) |
|
|
166 | (11) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (2) |
|
Appendix 4 Software Development Agreement |
|
|
177 | (22) |
|
|
178 | (1) |
|
Software Development Agreement |
|
|
178 | (21) |
|
Schedule___Specifications |
|
|
197 | (1) |
|
Schedule___Milestone and Payment Schedule |
|
|
197 | (2) |
|
Appendix 5 Software Consulting Agreement (Favors Consultant) |
|
|
199 | (10) |
|
|
200 | (1) |
|
Software Consulting Agreement |
|
|
200 | (8) |
|
|
208 | (1) |
|
|
208 | (1) |
|
Appendix 6 Software Consulting Agreement (Favors Customer) |
|
|
209 | (12) |
|
|
210 | (1) |
|
Software Consulting Agreement |
|
|
210 | (11) |
|
Appendix 7 Web Site Development Agreement |
|
|
221 | (12) |
|
|
222 | (1) |
|
Web Site Development Agreement |
|
|
222 | (11) |
|
Appendix 8 Web Hosting Agreement |
|
|
233 | (16) |
|
|
234 | (1) |
|
Web Site Hosting Agreement |
|
|
234 | (10) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
246 | (2) |
|
|
248 | (1) |
|
Appendix 9 U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense |
|
|
249 | (6) |
|
United States Department of Justice |
|
|
250 | (5) |
|
Checklist for Reporting a Theft of Trade Secrets Offense |
|
|
250 | (5) |
Index |
|
255 | |