Paper Details  
 
   

Has Bibliography
12 Pages
3105 Words

 
   
   
    Filter Topics  
 
     
   
 

Trade Secrets

ropping through wiretapping, bugging offices, or capturing cellular telephone conversations. * Penetrating a computer system through hacking into the network, hard drive, or software. Physical Access of Protected Environments * Using direct illegal observation and surreptitious photography. * Using surveillance and reconnaissance. * Trespassing on a competitor's property. * Stealing proprietary information contained in drawings and documents or on floppy disks and CD ROMs. Access to Personnel Working in Protected Environments * Utilizing the services of a prostitute for blackmail purposes. * Using a "swallow" (good looking woman) or a "raver" (good looking man) to form a close personal relationship with an employee having knowledge of trade secrets. * Hiring a competitor's employee who has the specific knowledge desired. * Bribing a supplier or employee. * Planting an agent or "mole" on the competitor, whose true identity is hidden and whose true task is to compromise key employees, tap into the computer databases, and intercept all communications with the goal of ferreting out confidential research, technologies, and information. * Conducting false employment interviews with competitor's employees who have knowledge of trade secrets. Nonintrusive Methods The use of nonintrusive methods to gather nonproprietary information from open so...

< Prev Page 6 of 12 Next >

    More on Trade Secrets...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA