Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Securing Intellectual Property -  Information Information Security

Securing Intellectual Property (eBook)

Protecting Trade Secrets and Other Information Assets
eBook Download: EPUB
2008 | 1. Auflage
288 Seiten
Elsevier Science (Verlag)
978-0-08-094141-7 (ISBN)
Systemvoraussetzungen
54,16 inkl. MwSt
(CHF 52,90)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.
Nearly all books that address the topic of trade secrets have the 'spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating 'paranoia” for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.
  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering

  • Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the "e;spy vs. spy perspective. The author approaches the topic from a practical business perspective and not simply creating "e;paranoia for paranoia's sake. The material for this book comes from the author's extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases. - No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers- Sample agreements and forms that address specific business needs- Coverage of threats ranging from physical security lapses to hackers to social engineering

    Front Cover 1
    Securing Intellectual Property 4
    Copyright Page 7
    Contents 8
    Preface 16
    References 18
    Chapter 1: Elements of a Holistic Program 20
    Introduction 21
    False Memes Lead People the Wrong Way 21
    From the Industrial Age to the Information Age 21
    Chapter 2: Trade Secrets and Nondisclosure Agreements 26
    Introduction 27
    Contents 27
    What Is a Trade Secret? 27
    Basis of Trade Secret Law 27
    Trade Secret Law vs. Contractual Protection of Confidential Information 28
    Technology as a Trade Secret 29
    Source Code as a Trade Secret 29
    Product Ideas-Flying under the Radar Screen 29
    Confidential Business Information 30
    Confidential Information from Third Parties 30
    Limits to Trade Secrets 30
    How Long Trade Secrets Last 30
    Patents vs. Trade Secrets 30
    Can More Than One Company Have the Same Trade Secret? 31
    Care and Protection of Trade Secrets 31
    One Person in Charge of Confidentiality Measures 32
    Controls on Access to Confidential Data 32
    Entry Control and Badges 33
    Confidentiality Legends on Documents, Code, and Other Data 33
    Agreements with Third Parties to Protect Confidentiality 34
    Confidential Undertakings by Employees and Contractors 34
    Employee Guidelines 35
    Speeches, Paper, and Presentations 35
    New Employee Orientation 35
    Exit Process 35
    Nondisclosure Agreements and Confidential Disclosure 36
    Mutual or Unilateral NDAs 36
    Defining “Confidential Information” 37
    What Written Information Is “Confidential Information”? 37
    What Oral or Visual Information Is “Confidential Information”? 38
    Carve-Outs from Confidential Information 38
    Prohibition of Disclosure 39
    Use of Confidential Information 39
    When Does Protection Time-Out? 39
    Risks from Others’ Confidential Information 40
    Two-Stage Disclosure 40
    Watch Out for “Residuals” Clauses 40
    Are There Oral Agreements for Nondisclosure? 41
    Disclosure Agreements that Are the Opposite of NDAs 41
    When You Negotiate a Deal, Should NDAs Be Superseded? 42
    Confidentiality Clauses Generally 42
    Violations of Trade Secret Law 42
    What Is Illegal under Trade Secret Law? 43
    What Is Not Illegal under Trade Secret Law? 43
    What if Trade Secrets Are Disclosed? 43
    Dealing with Violations of Trade Secrets 43
    Remedies Short of Litigation 44
    Is Taking Trade Secrets a Crime? 45
    Can Software Trade Secrets Be Licensed or Sold? 45
    Use of Counsel in Managing Trade Secrets 46
    Chapter 3: Confidentiality, Rights Transfer, and Noncompetition Agreements for Employees 48
    Introduction 49
    Note on Terminology 49
    About Employment Law Generally 50
    Contents of Employee Agreements 50
    Confidentiality Provisions 50
    Definition of “Confidential Information” 51
    Regarding Use and Protection of Confidential Information 51
    Confidentiality and Pre-Employment Communications 52
    Provisions in Aid of Enforcement 52
    Capturing Intellectual Property Rights 53
    Special Rule for California and Certain Other States 54
    Cooperation in Rights Transfer 55
    Documents and Records 55
    Noncompetition and Nonsolicitation Provisions 55
    State with Limitations on Restrictive Covenants 56
    About Consideration 56
    Getting Employees to Sign 57
    Enforceability of Provisions 57
    Nature of the Employment 57
    Reasonable Scope and Duration 58
    Noncompetition Clause 58
    Automatic Extension of Restricted Period 59
    “Blue Pencil” 59
    Enforcement of Noncompetition Agreements by Employers 59
    Do Not Delay in Addressing a Breach 59
    Remedies Short of Litigation 60
    Preliminary Injunction 60
    Obtaining Assurance of the Absence of Conflicting Prior Agreements 60
    Chapter 4: IT Services—Development, Outsourcing, and Consulting 62
    Introduction 63
    In This Chapter 63
    IT Consulting Business Model 63
    Development Deals 64
    Why Outside Development? 64
    Scale of Development Deals and the Development Forms 65
    Development Can Be a Risky Business 65
    Need for Planning and Risk Management 67
    Process Overview 67
    Writing and Responding to RFPs 68
    Elements of an RFP—From the Customer’s Point of View 68
    Responding to RFPs—From the Developer’s Point of View 70
    Agreement 71
    Getting the First Draft on the Table 71
    Structure of a Development Agreement 71
    Development Planning 72
    What Is to Be Delivered to the Customer? 73
    Requirements for Providing the Deliverables 73
    Software and Data to Be Provided for Use in Development 73
    Oversight and Management 74
    Price and Costs 74
    Acceptance 74
    Postacceptance 74
    “Detailed Design” 74
    Dealing with Informal Specifications 75
    Project Management Provisions 75
    Personnel Assigned to Development 76
    Change Management Provisions 76
    Acceptance Procedures 77
    Payment Provisions 77
    Milestone-Based 77
    Time and Materials 78
    Combinations and Variations 79
    Right Schedule 79
    Intellectual Property—Ownership and/or License 79
    What Intellectual Property Is at Stake? 80
    Copyright in the Software 80
    Patentable Inventions 80
    Trade Secrets 80
    Goals in Negotiating Intellectual Property Clauses 81
    Common Means to Deal with Intellectual Property in Agreements 81
    Developer Owns/License Grant Clause 82
    Work-Made-for-Hire Clause/Patent Clause 82
    Foreground Intellectual Property and Background Intellectual Property Clause 83
    Other Variations 84
    Avoiding Jointly Owned Intellectual Property 85
    When the Web Developer Is Also Providing Web Hosting? 85
    Subcontractors 86
    Noncompetition Clauses 86
    Provisions on Confidential Information 86
    Training and Support 87
    Warranties 87
    Disclaimers and Limitations 87
    Date Processing (Y2K) Warranties 87
    Open Source Provisions 88
    Intellectual Property Warranties and Indemnities 88
    Insurance 89
    Clause on Customer Nonsolicitation of Developer Employees 90
    Termination 90
    Dispute Resolution 91
    Boilerplate Provisions 91
    About Offshoring 92
    Other Types of Consulting Businesses and IT Services 93
    Legal Issues in Development and Consulting Businesses 94
    Employment Issues 94
    Building a Brand 94
    Conclusion 95
    Chapter 5: How to Sell Your Intellectual Property Protection Program 96
    Introduction 97
    Questions to Ask and People to Approach 98
    What Is Your Business Differentiation from Your Competitors? 99
    Who Do You Have to Protect These Differentiators From? 100
    What Are the Probabilities in Terms of Likely Attackers, Targets, and Objectives? 101
    If the Competition Obtained or Tampered with Your Intellectual Property, What Harm Would Be Done? 102
    What Security Measures Would Be Cost-Effective and Business-Enabling? 102
    Notes on Figure 5.1 103
    Notes on Figure 5.2 104
    Executives and Board Members 104
    Research and Development 104
    Manufacturing 104
    Sales and Marketing 105
    Human Resources 105
    Operations 105
    Risk Identification 105
    Implications of IP loss 106
    Notes on Figure 5.3 107
    Implementation Plan 107
    Potential Inhibitors 107
    Identified Milestones 108
    Notes on Figure 5.4 108
    Notes on Figure 5.5 109
    Executive Commitment 109
    Business Value Statement 109
    Notes 110
    Chapter 6: Case Study: The Mysterious Social Engineering Attacks on Entity X 112
    Introduction 113
    Fundamentals of Social Engineering Attacks 114
    The Mysterious Social Engineering Attacks on Entity Y 116
    Guidance for the Workforce 118
    How to Recognize Elicitation 118
    How to Handle the Caller 119
    How to Report the Incident 119
    General User-Oriented Guidance on How to Detect and Defeat Social Engineering 120
    Chapter 7: When Insiders and/or Competitors Target a Business’s Intellectual Property 122
    Introduction 123
    Lightwave Microsystems 123
    America Online 124
    Casiano Communications 125
    Corning and PicVue 126
    Avery Dennison and Four Pillars 127
    Lexar Media and Toshiba 129
    SigmaTel and Citroen 131
    3dGEO – China 132
    Chapter 8: When Piracy, Counterfeiting, and Organized Crime Target a Business’s Intellectual Property 134
    Introduction 135
    Technology Counterfeiting 138
    The Apparel Industry 139
    The Entertainment Industry 140
    Chapter 9: Physical Security: The “Duh” Factor 142
    Introduction 143
    Chapter 10: Protecting Intellectual Property in a Crisis Situation 160
    Introduction 161
    Chapter 11: Top Ten Ways to Shut Down Hackers 168
    Introduction 169
    Go Undercover 169
    Shred Everything 169
    Get Decent Locks 170
    Put that Badge Away 171
    Check Your Surveillance Gear 171
    Shut Down Shoulder Surfers 171
    Block Tailgaters 172
    Clean Your Car 172
    Watch Your Back Online 172
    Beware of Social Engineers 173
    Appendix 1: Mutual Non-Disclosure Agreement 174
    Introductory Note 175
    Mutual Non-Disclosure Agreement 175
    Appendix 2: Evaluation Agreement (Pro-Recipient) 180
    Introductory Note 181
    Evaluation Agreement 181
    Appendix 3: Employee Agreement 184
    Introductory Note 185
    Employee Agreement 185
    Exhibit A 192
    Exhibit B 193
    Exhibit C 194
    Appendix 4: Software Development Agreement 196
    Introductory Note 197
    Software Development Agreement 197
    Schedule - Specifications 216
    Schedule - Milestone and Payment Schedule 216
    Appendix 5: Software Consulting Agreement (Favors Consultant) 218
    Introductory Note 219
    Software Consulting Agreement 219
    Schedule 1 227
    Schedule of Work 227
    Appendix 6: Software Consulting Agreement (Favors Customer) 228
    Introductory Note 229
    Software Consulting Agreement 229
    Appendix 7: Web Site Development Agreement 240
    Introductory Note 241
    Web Site Development Agreement 241
    Appendix 8: Web Hosting Agreement 252
    Introductory Note 253
    Web Site Hosting Agreement 253
    Schedule A 263
    Schedule B 264
    Schedule C 265
    Schedule D 267
    Appendix 9: U.S. Department of Justice Checklist for Reporting a Theft of Trade Secrets Offense 268
    United States Department of Justice 269
    Checklist for Reporting a Theft of Trade Secrets Offense 269
    Index 274

    Erscheint lt. Verlag 9.12.2008
    Sprache englisch
    Themenwelt Informatik Netzwerke Sicherheit / Firewall
    Recht / Steuern EU / Internationales Recht
    Recht / Steuern Wirtschaftsrecht Urheberrecht
    Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
    ISBN-10 0-08-094141-9 / 0080941419
    ISBN-13 978-0-08-094141-7 / 9780080941417
    Haben Sie eine Frage zum Produkt?
    EPUBEPUB (Adobe DRM)

    Kopierschutz: Adobe-DRM
    Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
    Details zum Adobe-DRM

    Dateiformat: EPUB (Electronic Publication)
    EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

    Systemvoraussetzungen:
    PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
    eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
    Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
    Geräteliste und zusätzliche Hinweise

    Buying eBooks from abroad
    For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

    Mehr entdecken
    aus dem Bereich
    Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

    von Holger Kaschner

    eBook Download (2024)
    Springer Fachmedien Wiesbaden (Verlag)
    CHF 34,15
    Methodische Kombination von IT-Strategie und IT-Reifegradmodell

    von Markus Mangiapane; Roman P. Büchler

    eBook Download (2024)
    Springer Vieweg (Verlag)
    CHF 41,95