Effective and consistent utilization and management of a company’s intangible assets is one of the most important and significant interventions a management team and board can undertake.
Archives for May 2010
It appears evident that many ‘cloud computing’ users have given little or perhaps no consideration to engaging ‘the cloud’ with some of their company’s most sensitive and proprietary information without ‘rock solid’ assurances about the indeterminate security of their information assets.
This post is not intended to convey trade secrecy as a complex, cumbersome, or burdensome process, rather to provide management teams and boards with insights, perspectives, considerations, and options.
This post describes strategies for making presentations to management teams and boards about mitigating business risks to company intangible assets.
There are literally millions of small and mid-size companies that have built their brand (reputation, image, and goodwill, etc.) around the utililation and exploitation of internally developed information but is not formally recognized or treated as being proprietary or a trade secret.