Secrets: Managing Information Assets in the Age of CyberEspionage

James Pooley started writing about trade secrets in the 1980s. Back then, the best way for a company to protect its data was to watch who went in and out the door. In the decades since, information security has been challenged by the Internet, an emerging culture of disclosure powered by social media, sophisticated hacking tools, global supply chains, and a drive toward “open innovation,” which calls for sharing vital information with suppliers, customers, and a variety of short-term “partners.”

In short, everything has changed. Information has become the global currency of the 21st century. Managing it is no longer the exclusive province of IT or security. Every operational and strategic part of the enterprise is now involved in this critical task. Whether you’re a leader or any professional who works with information, you must walk the fine line between being open enough to generate creative energy and being careful enough that most sensitive trade secrets stay secret.

Pooley realized anyone trying to make sense of this complex new world needs a plainspoken guide that puts the subject in context and helps them make smart decisions about intellectual property and all of the (often surprising) issues that connect to it. Thus, Secrets was born. Click here for an excerpt from this deeply compelling, readable, information-packed book.

Read More
Trade Secrets (Intellectual Property Series)

This 800-page, fully footnoted law treatise, published and updated twice a year by Law Journal Press, is a comprehensive yet concise guide to this complex field. It is a suitable reference for those unfamiliar with the field, as well as a timely resource for intellectual property experts in the Information Age. Trade Secrets features a wealth of forms—entire agreements, individual contractual provisions, checklists, pleadings, suggested letters, and more—also provided on CD-ROM, so practitioners can modify them to suit a particular situation.

Read More
Computer and Information Security Handbook

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. Mr. Pooley is the author of the first chapter, "Information Security in the Modern Enterprise."

Read More
Patent Case Management Judicial Guide

Patent Case Management Judicial Guide, Third Edition (2016, Federal Judicial Center). James Pooley was one of six authors; others are Peter S. Menell; Lynn H. Pasahow; Matthew D. Powers; Steven G. Carlson; and Jeffrey G. Homrig. This guide to managing patent cases shares the results of author surveys of federal judges and describes their approaches and best practices regarding the unique challenges associated with this complex form of civil litigation.

Read More
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram