Securing Intellectual Property (eBook)
288 Seiten
Elsevier Science (Verlag)
978-0-08-094141-7 (ISBN)
Nearly all books that address the topic of trade secrets have the 'spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating 'paranoia” for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the "e;spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating "e;paranoia for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases. - No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers- Sample agreements and forms that address specific business needs- Coverage of threats ranging from physical security lapses to hackers to social engineering
Front Cover 1
Securing Intellectual Property 4
Copyright Page 7
Contents 8
Preface 16
References 18
Chapter 1: Elements of a Holistic Program 20
Introduction 21
False Memes Lead People the Wrong Way 21
From the Industrial Age to the Information Age 21
Chapter 2: Trade Secrets and Nondisclosure Agreements 26
Introduction 27
Contents 27
What Is a Trade Secret? 27
Basis of Trade Secret Law 27
Trade Secret Law vs. Contractual Protection of Confidential Information 28
Technology as a Trade Secret 29
Source Code as a Trade Secret 29
Product Ideas-Flying under the Radar Screen 29
Confidential Business Information 30
Confidential Information from Third Parties 30
Limits to Trade Secrets 30
How Long Trade Secrets Last 30
Patents vs. Trade Secrets 30
Can More Than One Company Have the Same Trade Secret? 31
Care and Protection of Trade Secrets 31
One Person in Charge of Confidentiality Measures 32
Controls on Access to Confidential Data 32
Entry Control and Badges 33
Confidentiality Legends on Documents, Code, and Other Data 33
Agreements with Third Parties to Protect Confidentiality 34
Confidential Undertakings by Employees and Contractors 34
Employee Guidelines 35
Speeches, Paper, and Presentations 35
New Employee Orientation 35
Exit Process 35
Nondisclosure Agreements and Confidential Disclosure 36
Mutual or Unilateral NDAs 36
Defining “Confidential Information” 37
What Written Information Is “Confidential Information”? 37
What Oral or Visual Information Is “Confidential Information”? 38
Carve-Outs from Confidential Information 38
Prohibition of Disclosure 39
Use of Confidential Information 39
When Does Protection Time-Out? 39
Risks from Others’ Confidential Information 40
Two-Stage Disclosure 40
Watch Out for “Residuals” Clauses 40
Are There Oral Agreements for Nondisclosure? 41
Disclosure Agreements that Are the Opposite of NDAs 41
When You Negotiate a Deal, Should NDAs Be Superseded? 42
Confidentiality Clauses Generally 42
Violations of Trade Secret Law 42
What Is Illegal under Trade Secret Law? 43
What Is Not Illegal under Trade Secret Law? 43
What if Trade Secrets Are Disclosed? 43
Dealing with Violations of Trade Secrets 43
Remedies Short of Litigation 44
Is Taking Trade Secrets a Crime? 45
Can Software Trade Secrets Be Licensed or Sold? 45
Use of Counsel in Managing Trade Secrets 46
Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees 48
Introduction 49
Note on Terminology 49
About Employment Law Generally 50
Contents of Employee Agreements 50
Confidentiality Provisions 50
Definition of “Confidential Information” 51
Regarding Use and Protection of Confidential Information 51
Confidentiality and Pre-Employment Communications 52
Provisions in Aid of Enforcement 52
Capturing Intellectual Property Rights 53
Special Rule for California and Certain Other States 54
Cooperation in Rights Transfer 55
Documents and Records 55
Noncompetition and Nonsolicitation Provisions 55
State with Limitations on Restrictive Covenants 56
About Consideration 56
Getting Employees to Sign 57
Enforceability of Provisions 57
Nature of the Employment 57
Reasonable Scope and Duration 58
Noncompetition Clause 58
Automatic Extension of Restricted Period 59
“Blue Pencil” 59
Enforcement of Noncompetition Agreements by Employers 59
Do Not Delay in Addressing a Breach 59
Remedies Short of Litigation 60
Preliminary Injunction 60
Obtaining Assurance of the Absence of Conflicting Prior Agreements 60
Chapter 4: IT Services—Development, Outsourcing, and Consulting 62
Introduction 63
In This Chapter 63
IT Consulting Business Model 63
Development Deals 64
Why Outside Development? 64
Scale of Development Deals and the Development Forms 65
Development Can Be a Risky Business 65
Need for Planning and Risk Management 67
Process Overview 67
Writing and Responding to RFPs 68
Elements of an RFP—From the Customer’s Point of View 68
Responding to RFPs—From the Developer’s Point of View 70
Agreement 71
Getting the First Draft on the Table 71
Structure of a Development Agreement 71
Development Planning 72
What Is to Be Delivered to the Customer? 73
Requirements for Providing the Deliverables 73
Software and Data to Be Provided for Use in Development 73
Oversight and Management 74
Price and Costs 74
Acceptance 74
Postacceptance 74
“Detailed Design” 74
Dealing with Informal Specifications 75
Project Management Provisions 75
Personnel Assigned to Development 76
Change Management Provisions 76
Acceptance Procedures 77
Payment Provisions 77
Milestone-Based 77
Time and Materials 78
Combinations and Variations 79
Right Schedule 79
Intellectual Property—Ownership and/or License 79
What Intellectual Property Is at Stake? 80
Copyright in the Software 80
Patentable Inventions 80
Trade Secrets 80
Goals in Negotiating Intellectual Property Clauses 81
Common Means to Deal with Intellectual Property in Agreements 81
Developer Owns/License Grant Clause 82
Work-Made-for-Hire Clause/Patent Clause 82
Foreground Intellectual Property and Background Intellectual Property Clause 83
Other Variations 84
Avoiding Jointly Owned Intellectual Property 85
When the Web Developer Is Also Providing Web Hosting? 85
Subcontractors 86
Noncompetition Clauses 86
Provisions on Confidential Information 86
Training and Support 87
Warranties 87
Disclaimers and Limitations 87
Date Processing (Y2K) Warranties 87
Open Source Provisions 88
Intellectual Property Warranties and Indemnities 88
Insurance 89
Clause on Customer Nonsolicitation of Developer Employees 90
Termination 90
Dispute Resolution 91
Boilerplate Provisions 91
About Offshoring 92
Other Types of Consulting Businesses and IT Services 93
Legal Issues in Development and Consulting Businesses 94
Employment Issues 94
Building a Brand 94
Conclusion 95
Chapter 5: How to Sell Your Intellectual Property Protection Program 96
Introduction 97
Questions to Ask and People to Approach 98
What Is Your Business Differentiation from Your Competitors? 99
Who Do You Have to Protect These Differentiators From? 100
What Are the Probabilities in Terms of Likely Attackers, Targets, and Objectives? 101
If the Competition Obtained or Tampered with Your Intellectual Property, What Harm Would Be Done? 102
What Security Measures Would Be Cost-Effective and Business-Enabling? 102
Notes on Figure 5.1 103
Notes on Figure 5.2 104
Executives and Board Members 104
Research and Development 104
Manufacturing 104
Sales and Marketing 105
Human Resources 105
Operations 105
Risk Identification 105
Implications of IP loss 106
Notes on Figure 5.3 107
Implementation Plan 107
Potential Inhibitors 107
Identified Milestones 108
Notes on Figure 5.4 108
Notes on Figure 5.5 109
Executive Commitment 109
Business Value Statement 109
Notes 110
Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X 112
Introduction 113
Fundamentals of Social Engineering Attacks 114
The Mysterious Social Engineering Attacks on Entity Y 116
Guidance for the Workforce 118
How to Recognize Elicitation 118
How to Handle the Caller 119
How to Report the Incident 119
General User-Oriented Guidance on How to Detect and Defeat Social Engineering 120
Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property 122
Introduction 123
Lightwave Microsystems 123
America Online 124
Casiano Communications 125
Corning and PicVue 126
Avery Dennison and Four Pillars 127
Lexar Media and Toshiba 129
SigmaTel and Citroen 131
3dGEO – China 132
Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property 134
Introduction 135
Technology Counterfeiting 138
The Apparel Industry 139
The Entertainment Industry 140
Chapter 9: Physical Security: The “Duh” Factor 142
Introduction 143
Chapter 10: Protecting Intellectual Property in a Crisis Situation 160
Introduction 161
Chapter 11: Top Ten Ways to Shut Down Hackers 168
Introduction 169
Go Undercover 169
Shred Everything 169
Get Decent Locks 170
Put that Badge Away 171
Check Your Surveillance Gear 171
Shut Down Shoulder Surfers 171
Block Tailgaters 172
Clean Your Car 172
Watch Your Back Online 172
Beware of Social Engineers 173
Appendix 1: Mutual Non-Disclosure Agreement 174
Introductory Note 175
Mutual Non-Disclosure Agreement 175
Appendix 2: Evaluation Agreement (Pro-Recipient) 180
Introductory Note 181
Evaluation Agreement 181
Appendix 3: Employee Agreement 184
Introductory Note 185
Employee Agreement 185
Exhibit A 192
Exhibit B 193
Exhibit C 194
Appendix 4: Software Development Agreement 196
Introductory Note 197
Software Development Agreement 197
Schedule - Specifications 216
Schedule - Milestone and Payment Schedule 216
Appendix 5: Software Consulting Agreement (Favors Consultant) 218
Introductory Note 219
Software Consulting Agreement 219
Schedule 1 227
Schedule of Work 227
Appendix 6: Software Consulting Agreement (Favors Customer) 228
Introductory Note 229
Software Consulting Agreement 229
Appendix 7: Web Site Development Agreement 240
Introductory Note 241
Web Site Development Agreement 241
Appendix 8: Web Hosting Agreement 252
Introductory Note 253
Web Site Hosting Agreement 253
Schedule A 263
Schedule B 264
Schedule C 265
Schedule D 267
Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense 268
United States Department of Justice 269
Checklist for Reporting a Theft of Trade Secrets Offense 269
Index 274
Erscheint lt. Verlag | 9.12.2008 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► EU / Internationales Recht | |
Recht / Steuern ► Wirtschaftsrecht ► Urheberrecht | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 0-08-094141-9 / 0080941419 |
ISBN-13 | 978-0-08-094141-7 / 9780080941417 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich