| 000 | 06145cam a2200325 a 4500 | ||
|---|---|---|---|
| 999 |
_c30575 _d30575 |
||
| 001 | 17093136 | ||
| 003 | OSt | ||
| 005 | 20210615200930.0 | ||
| 008 | 111222s2012 enk b 001 0 eng | ||
| 010 | _a 2011052915 | ||
| 020 | _a9780199797431 (pbk. : alk. paper), 0199797439 | ||
| 020 | _a0199797439 (pbk. : alk. paper) | ||
| 035 | _a(OCoLC)ocn769289641 | ||
| 040 |
_aDLC _beng _cDLC _dYDX _dBTCTA _dYDXCP _dOCLCO _dBWX _dDLC |
||
| 042 | _apcc | ||
| 043 | _an-us--- | ||
| 050 | 0 | 0 |
_aKF3197 _b.S64 2012 |
| 082 | 0 | 0 |
_a346.7304/8 _223 |
| 100 | 1 | _aSnyder, Darin W. | |
| 245 | 1 | 0 |
_aKeeping secrets : _ba practical introduction to trade secret law and strategy / _cDarin W. Snyder and David S. Almeling. |
| 260 |
_aOxford ; _aNew York : _bOxford University Press, _cc2012. |
||
| 300 |
_axix, 149 p. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references (p. 129-141) and index. | ||
| 505 | 0 | _aTable of contents: ABOUT THE AUTHORS ; ACKNOWLEDGMENTS ; DISCLAIMERS ; INTRODUCTION ; 1. THE TRADE SECRETS OF BOUTIQUE HOTELS ; 2. SHOULD YOU BE READING THIS BOOK? ; 3. THE SCANDALOUS STRUCTURE OF THIS BOOK ; PART I: THE BASICS ; CHAPTER 1 ; TRADE SECRETS - THE BASICS ; 1. APACHE HELICOPTER AIRSTRIKES AND LADY GAGA ; 2. AN INTRODUCTION TO TRADE SECRETS ; 3. TRADE SECRETS - DEFINITION AND FOUR FAMOUS EXAMPLES ; I. INFORMATION ; II. SECRECY ; III. VALUE ; IV. REASONABLE EFFORTS ; 4. TRADE SECRET THEFT: DEFINING "MISAPPROPRIATION" ; 5. REMEDIES FOR TRADE SECRET MISAPPROPRIATION ; I. NONMONETARY RELIEF ; II. MONETARY RELIEF ; 6. CRIMINAL TRADE SECRET LAW ; 7. TRADE SECRETS VS. PATENTS: WHEN TRADE SECRETS ARE THE BEST STRATEGY, AND WHEN THEY'RE NOT ; 8. SUMMARIZING TRADE SECRET LAW ; CHAPTER 2 ; TRADE SECRETS IN CONTEXT: WHY TRADE SECRETS ARE INCREASINGLY IMPORTANT TO BUSINESSES, EMPLOYEES, AND THE ECONOMY ; 1. THE CUSTOMER LIST IN THE AGE OF GOOGLE, LINKEDIN, AND FACEBOOK ; 2. THE EVOLVING TECHNOLOGIES, SOCIAL NORMS, POLITICS, ECONOMICS, AND DOZENS OF OTHER FACTORS THAT SHAPE THE USE AND MISUSE OF TRADE SECRETS ; 3. TRADE SECRETS WERE SLOW TO DEVELOP, QUICK TO PROLIFERATE ; 4. NEW TECHNOLOGY ; 5. EMPLOYEE MOBILITY AND ATTITUDES ; 6. INCREASING VALUE ; 7. THE FLEXIBLE (AND EXPANDING) SCOPE OF TRADE SECRET LAW ; 8. THE FUTURE OF TRADE SECRETS ; PART II: FOUR KEYS TO A SUCCESSFUL TRADE SECRET STRATEGY ; CHAPTER 3 ; KEY NO. 1: HOW TO RECRUIT, HIRE, RETAIN, AND TERMINATE EMPLOYEES ; 1. MR. CHANG'S $200 MILLION "RESIGNATION" ; 2. EMPLOYEES ARE THE PRIMARY SOURCE OF TRADE SECRET MISAPPROPRIATION ; 3. HOW TO RECRUIT AND HIRE EMPLOYEES ; A. VET APPLICANTS WITH AN EYE TOWARD TRADE SECRET PROTECTION ; B. AGREEMENTS WITH INCOMING EMPLOYEES ; C. HIRING FROM COMPETITORS ; 4. HOW TO TRAIN EMPLOYEES ; 5. HOW TO TERMINATE EMPLOYEES ; 6. AN ARGUMENT AGAINST DOING NOTHING ; 7. HOW TO AVOID A $200 MILLION RESIGNATION ; CHAPTER 4 ; KEY NO. 2: INFORMATION SECURITY ; 1. FOUNDER OF ALPHA MINING SYSTEMS: "I WAS LIKE A HUSBAND WHOSE WIFE WAS GETTING IT ON THE SIDE." ; 2. THE RIGHT AND WRONG LESSONS FROM THE SORDID TALE OF ALPHA'S PLUNDERING ; 3. ONE SIZE DOES NOT FIT ALL ; 4. BASIC PROTECTIONS FOR ALL INFORMATION ; A. LIMIT ACCESS TO INFORMATION TO ONLY THOSE WHO NEED IT ; B. PLACE LEGENDS ON DOCUMENTS ; C. IMPLEMENT AN INFORMATION TRACKING SYSTEM ; D. DISPOSE OF INFORMATION PROPERLY ; E. LIMIT WHAT INFORMATION LEAVES THE COMPANY ; F. ENCOURAGE REPORTING OF VIOLATIONS AND INVESTIGATE AND PUNISH VIOLATIONS ; 5. BASIC PROTECTIONS FOR ELECTRONIC INFORMATION ; 6. NON-MEMORIALIZED DATA ; 7. RULES FOR RECEIVING TRADE SECRETS FROM OUTSIDERS ; 8. GOVERNMENT LIAISONS ; 9. INFORMATION SECURITY SHOULD NOT BE STATIC ; CHAPTER 5 ; KEY NO. 3: PHYSICAL SECURITY ; 1. A BUSINESS FEUD TURNS TOXIC ; 2. THE NON-DIGITAL WORLD OF BREAK-INS AND DUMPSTER DIVING ; 3. SECURING PHYSICAL CONFIDENTIAL INFORMATION AND THE FACILITIES THAT HOUSE SUCH INFORMATION ; 4. BE WARY OF VISITORS ; 5. A CLOSING NOTE ABOUT EMPLOYEE RESISTANCE ; CHAPTER 6 ; KEY NO. 4: AGREEMENTS TO PROTECT TRADE SECRETS ; 1. DAMPENING THE ALOHA SPIRIT ; 2. THE IMPORTANCE OF WRITTEN AGREEMENTS ; 3. CONFIDENTIALITY AND INVENTION ASSIGNMENT AGREEMENTS WITH EMPLOYEES ; 4. CONFIDENTIALITY AGREEMENTS WITH OUTSIDERS ; 5. PARTIES THAT REFUSE TO SIGN CONFIDENTIALITY AGREEMENTS ; 6. NONCOMPETITION AND NONSOLICITATION AGREEMENTS ; 7. CONFIDENTIALITY AGREEMENTS PROTECT AGAINST MOST THREATS ; PART III: TRADE SECRETS IN PRACTICE ; CHAPTER 7 ; INVESTIGATING SUSPECTED TRADE SECRETS THEFT ; 1. INFORMIX TO ORACLE'S EMPLOYEES: "CAUTION: DINOSAUR CROSSING" ; 2. AVOIDING INFORMIX'S FATE ; 3. ACT IMMEDIATELY IN RESPONSE TO SUSPECTED TRADE SECRET MISAPPROPRIATION ; 4. ATTORNEYS SHOULD DIRECT THE INVESTIGATION ; 5. CONDUCTING A TRADE SECRET INVESTIGATION ; A. GATHERING INFORMATION ; B. INTERVIEWS ; C. MONITORING ; 6. THE INVESTIGATION IS OVER. NOW WHAT? ; A. DO NOTHING ; B. FIX THE LEAK ; C. TALK TO THE ALLEGED MISAPPROPRIATOR ; D. SEND LETTERS ; E. ALTERNATIVE DISPUTE RESOLUTION ; F. FILE A CIVIL LAWSUIT ; G. NOTIFYING LAW ENFORCEMENT OFFICIALS ; 7. LOOK FIRST, LEAP SECOND ; CHAPTER 8 ; KNOWING WHAT YOU'VE GOT AND WHETHER YOU'RE DOING ENOUGH TO PROTECT IT: ; A TRADE SECRET AUDIT ; 1. AN "INFORMATION ADDICT " MISAPPROPRIATES $400 MILLION IN DUPONT'S TRADE SECRETS ; 2. A TRADE SECRET AUDIT DEFINED ; 3. TO AUDIT, OR NOT TO AUDIT? ; 4. THE AUDIT TEAM ; 5. THE CONTENT OF A TRADE SECRET AUDIT: IDENTIFYING THE COMPANY'S TRADE SECRETS, THEIR LOCATION, THEIR VALUE, AND WHAT IS BEING DONE TO PROTECT THEM ; 6. THE AUDIT REPORT ; 7. ACTING ON THE AUDIT REPORT ; 8. AUDIT, REPORT, THEN REPEAT (A FEW YEARS LATER) ; CHAPTER 9 ; TRADE SECRET LITIGATION: WORKING WITH COUNSEL ; NOTES ; TABLE OF CASES ; INDEX. | |
| 650 | 0 |
_aTrade secrets _xLaw and legislation _zUnited States. |
|
| 700 | 1 | _aAlmeling, David S. | |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||