The Resource Secrets : managing information assets in the age of cyberespionage, James Pooley
Secrets : managing information assets in the age of cyberespionage, James Pooley
Resource Information
The item Secrets : managing information assets in the age of cyberespionage, James Pooley represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Biddle Law Library - University of Pennsylvania Law School.This item is available to borrow from 1 library branch.
Resource Information
The item Secrets : managing information assets in the age of cyberespionage, James Pooley represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Biddle Law Library - University of Pennsylvania Law School.
This item is available to borrow from 1 library branch.
- Summary
- "Information is the business asset of the 21st century. So our impulse may be to guard it. Yet in a flat global economy, we have to share it--not just with employees but also partners, vendors, customers and consultants. Here's the risk: secrets falling into the wrong hands can destroy a project, or even bring down a company. And the same technology that enables seamless communication also makes data theft easy, cheap and hard to detect. So what can managers and business owners do to protect and exploit their competitive advantage, maintain productive relationships, and avoid lawsuits? In 'Secrets' [find the answers to] ... identify and reduce your risk of information loss; deal with employees leaving to join or start a competitor; manage your data on the internet and in the cloud; build an information protection program with best practices; respond when you find a breach of confidentiality."--Back cover
- Language
- eng
- Extent
- xviii, 284 pages
- Note
-
- Introduction by author Michael S. Malone
- Includes index
- Contents
-
- Introduction
- Secrecy in the age of the internet
- What is a trade secret?
- Who owns information?
- How the law protects secrets
- Managing your information assets
- Contracts
- Espionage and competitive intelligence
- Avoiding contamination
- Employees who leave to compete
- Disputes and lawsuits
- Secrecy and government
- Criminal theft of information
- Secrets in the global market
- Appendix 1. Employee confidentiality and invention assignment agreement
- Appendix 2. Confidentiality (nondisclosure) agreements
- Appendix 3. Non-confidentiality agreement
- Appendix 4. Consultant agreement
- Appendix 5. Idea submission response and contract
- Appendix 6. Warning letters
- Isbn
- 9780996391009
- Label
- Secrets : managing information assets in the age of cyberespionage
- Title
- Secrets
- Title remainder
- managing information assets in the age of cyberespionage
- Statement of responsibility
- James Pooley
- Language
- eng
- Summary
- "Information is the business asset of the 21st century. So our impulse may be to guard it. Yet in a flat global economy, we have to share it--not just with employees but also partners, vendors, customers and consultants. Here's the risk: secrets falling into the wrong hands can destroy a project, or even bring down a company. And the same technology that enables seamless communication also makes data theft easy, cheap and hard to detect. So what can managers and business owners do to protect and exploit their competitive advantage, maintain productive relationships, and avoid lawsuits? In 'Secrets' [find the answers to] ... identify and reduce your risk of information loss; deal with employees leaving to join or start a competitor; manage your data on the internet and in the cloud; build an information protection program with best practices; respond when you find a breach of confidentiality."--Back cover
- Cataloging source
- MNT
- http://library.link/vocab/creatorName
- Pooley, James
- Illustrations
-
- illustrations
- forms
- Index
- index present
- LC call number
- HD38.7
- LC item number
- .P66 2015
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorDate
- 1954-
- http://library.link/vocab/relatedWorkOrContributorName
- Malone, Michael S.
- http://library.link/vocab/subjectName
-
- Trade secrets
- Confidential business information
- Business intelligence
- Business intelligence
- Trade secrets
- http://bibfra.me/vocab/relation/writerofforeword
- IrlrL6XcE3c
- Label
- Secrets : managing information assets in the age of cyberespionage, James Pooley
- Note
-
- Introduction by author Michael S. Malone
- Includes index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
-
- text
- still image
- Content type code
-
- txt
- sti
- Content type MARC source
-
- rdacontent
- rdacontent
- Contents
- Introduction -- Secrecy in the age of the internet -- What is a trade secret? -- Who owns information? -- How the law protects secrets -- Managing your information assets -- Contracts -- Espionage and competitive intelligence -- Avoiding contamination -- Employees who leave to compete -- Disputes and lawsuits -- Secrecy and government -- Criminal theft of information -- Secrets in the global market -- Appendix 1. Employee confidentiality and invention assignment agreement -- Appendix 2. Confidentiality (nondisclosure) agreements -- Appendix 3. Non-confidentiality agreement -- Appendix 4. Consultant agreement -- Appendix 5. Idea submission response and contract -- Appendix 6. Warning letters
- Dimensions
- 23 cm
- Extent
- xviii, 284 pages
- Isbn
- 9780996391009
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations, forms
- System control number
- (OCoLC)934835337
- Label
- Secrets : managing information assets in the age of cyberespionage, James Pooley
- Note
-
- Introduction by author Michael S. Malone
- Includes index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
-
- text
- still image
- Content type code
-
- txt
- sti
- Content type MARC source
-
- rdacontent
- rdacontent
- Contents
- Introduction -- Secrecy in the age of the internet -- What is a trade secret? -- Who owns information? -- How the law protects secrets -- Managing your information assets -- Contracts -- Espionage and competitive intelligence -- Avoiding contamination -- Employees who leave to compete -- Disputes and lawsuits -- Secrecy and government -- Criminal theft of information -- Secrets in the global market -- Appendix 1. Employee confidentiality and invention assignment agreement -- Appendix 2. Confidentiality (nondisclosure) agreements -- Appendix 3. Non-confidentiality agreement -- Appendix 4. Consultant agreement -- Appendix 5. Idea submission response and contract -- Appendix 6. Warning letters
- Dimensions
- 23 cm
- Extent
- xviii, 284 pages
- Isbn
- 9780996391009
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations, forms
- System control number
- (OCoLC)934835337
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/portal/Secrets--managing-information-assets-in-the-age/P7IaJaQK3cA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/portal/Secrets--managing-information-assets-in-the-age/P7IaJaQK3cA/">Secrets : managing information assets in the age of cyberespionage, James Pooley</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Secrets : managing information assets in the age of cyberespionage, James Pooley
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/portal/Secrets--managing-information-assets-in-the-age/P7IaJaQK3cA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/portal/Secrets--managing-information-assets-in-the-age/P7IaJaQK3cA/">Secrets : managing information assets in the age of cyberespionage, James Pooley</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>