Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security) - Softcover

Information Security, Information

 
9780750679954: Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

Synopsis

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.

  • No-nonsense solutions to the most common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers
  • Sample agreements and forms that address specific business needs
  • Coverage of threats ranging from physical security lapses to hackers to social engineering
  • "synopsis" may belong to another edition of this title.

    From the Back Cover

    Security has always been a major concern to businesses that have proprietary information, but as the instances of intellectual property theft rise from year to year, it is becoming more and more essential for businesses to stay abreast of the latest trends and technologies in the field. An effective security program is the surest way to protect a business from intellectual property theft, and the content in this book will help security managers to understand and address the dangers that face them. This book outlines threats to trade secrets that are commonly overlooked by security professionals, and shows specific, concrete steps to minimize these threats. Threats addressed include portable and covert storage devices, daily activities that seem harmless but can lead to loss of proprietary information, wireless networks, and deleted and residual data that can easily be recovered. Protect your organization from threats within and without!

    "About this title" may belong to another edition of this title.