Elements of a holistic program -- Trade secrets and nondisclosure agreements -- Confidentiality, rights transfer, and noncompetition agreements for employees -- IT services : development, outsourcing, and consulting -- How to sell your intellectual property protection program -- Case study : the myserious social engineering attacks on entity X -- When insiders and/or competitors target a business's intellectual property -- When piracy, counterfeiting, and organized crime target a business's intellectual property -- Physical security : the "duh" factor -- Protecting intellectual property in a crisis situation -- Top ten ways to shut down hackers