How do you create an effective IP protection program? Our experienced panel will offer practical tips for managing IP and data in a dynamic, digital, and mobile workplace.
• Unintentional vs. malicious I. theft: understanding how good people can be reckless with IP; when and how malicious insiders are likely to strike
• Managing the ‘other insiders’ in your workplace: contractors, vendors, satellite offices, third parties
• Turning policies into practices: embedding IP protection among employees, contractors, and other insiders
• Partnering with HR and IT to ensure a cross functional approach to appropriately manage people, process, and technology