000027609 000__ 02295cam\a22003735i\4500 000027609 001__ 27609 000027609 003__ SzGeWIPO 000027609 005__ 20230626170453.0 000027609 008__ 151014s2015 cau|||||r|||| 001 0 eng d 000027609 020__ $$a9780996391009 000027609 035__ $$a(wipo). 000027609 035__ $$a(OCoLC)934835337 000027609 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000027609 041__ $$aeng 000027609 050_4 $$aHD38.7$$b.P66 2015 000027609 084__ $$aF 634 POO.S 000027609 1001_ $$aPooley, James,$$eauthor. 000027609 24510 $$aSecrets :$$bmanaging information assets in the age of cyberespionage /$$cJames Pooley. 000027609 264_1 $$aMenlo Park, CA :$$bVerus Press,$$c[2015] 000027609 300__ $$axviii, 284 pages :$$billustrations, forms ;$$c23 cm 000027609 336__ $$atext$$btxt$$2rdacontent 000027609 337__ $$aunmediated$$bn$$2rdamedia 000027609 338__ $$avolume$$bnc$$2rdacarrier 000027609 5050_ $$a1. Secrecy in the age of the internet; 2. What is a trade secret?; 3. Who owns information?; 4. How the law protects secrets; 5. Managing your information assets; 6. contracts; 7. espionage and competitive intelligence; 8. Avoiding contamination; 9. Employees who leave to compete; 10. Disputes and lawsuits; 11. Secrecy and government; 12. Criminal theft of information; 13. Secrets in the global market. 000027609 5203_ $$a"Information is the business asset of the 21st century. So our impulse may be to guard it. Yet in a flat global economy, we have to share it--not just with employees but also partners, vendors, customers and consultants. Here's the risk: secrets falling into the wrong hands can destroy a project, or even bring down a company. And the same technology that enables seamless communication also makes data theft easy, cheap and hard to detect. So what can managers and business owners do to protect and exploit their competitive advantage, maintain productive relationships, and avoid lawsuits? In 'Secrets' [find the answers to] ... identify and reduce your risk of information loss; deal with employees leaving to join or start a competitor; manage your data on the internet and in the cloud; build an information protection program with best practices; respond when you find a breach of confidentiality."--Back cover. 000027609 650_0 $$aConfidential business information$$xManagement. 000027609 650_0 $$aBusiness intelligence$$xSecurity measures. 000027609 650_0 $$aTrade secrets. 000027609 650_4 $$aTrade secret 000027609 650_4 $$aInternet 000027609 7001_ $$aMalone, Michael S.$$q(Michael Shawn),$$d1954-$$ewriter of foreword. 000027609 942__ $$2ddc$$cMON 000027609 952__ $$w2015-10-14$$p2015-0162$$r24.97$$u42123$$bMAIN$$10$$kF 634 POO.S$$v2015-10-14$$zTagged$$70 000027609 980__ $$aBIB 000027609 999__ $$c30052$$d30052