Complying with the economic espionage act
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
<record>
<leader>00000nab a2200000 i 4500</leader>
<controlfield tag="001">MAP20071501514</controlfield>
<controlfield tag="003">MAP</controlfield>
<controlfield tag="005">20080418122833.0</controlfield>
<controlfield tag="007">hzruuu---uuuu</controlfield>
<controlfield tag="008">010118e20000301gbr|||| | |00010|eng d</controlfield>
<datafield tag="040" ind1=" " ind2=" ">
<subfield code="a">MAP</subfield>
<subfield code="b">spa</subfield>
</datafield>
<datafield tag="084" ind1=" " ind2=" ">
<subfield code="a">86</subfield>
</datafield>
<datafield tag="100" ind1="1" ind2=" ">
<subfield code="0">MAPA20080021689</subfield>
<subfield code="a">Carr, Chris</subfield>
</datafield>
<datafield tag="245" ind1="1" ind2="0">
<subfield code="a">Complying with the economic espionage act</subfield>
<subfield code="c">by Chris Carr, Jerry Furniss and Jack Morton</subfield>
</datafield>
<datafield tag="520" ind1="8" ind2=" ">
<subfield code="a">On October 11, 1996, President Clinton signed into law the Economic Espionage Act of 1996. Risk managers should be informed about the basic provisions of the Act so they can take the lead in implementing procedures to protect proprietry information and prevent contamination so neither their company nor its employees will become a criminal defendant under the Act</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080550721</subfield>
<subfield code="a">Espionaje</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080596439</subfield>
<subfield code="a">Espionaje industrial</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080558888</subfield>
<subfield code="a">Información</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080546991</subfield>
<subfield code="a">Empresas</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080591182</subfield>
<subfield code="a">Gerencia de riesgos</subfield>
</datafield>
<datafield tag="650" ind1="0" ind2="1">
<subfield code="0">MAPA20080551353</subfield>
<subfield code="a">Intrusión</subfield>
</datafield>
<datafield tag="650" ind1="1" ind2="1">
<subfield code="0">MAPA20080568863</subfield>
<subfield code="a">Estados Unidos</subfield>
</datafield>
<datafield tag="700" ind1="1" ind2=" ">
<subfield code="0">MAPA20080098834</subfield>
<subfield code="a">Furniss, Jerry</subfield>
</datafield>
<datafield tag="700" ind1="1" ind2=" ">
<subfield code="0">MAPA20080051624</subfield>
<subfield code="a">Morton, Jack</subfield>
</datafield>
<datafield tag="710" ind1="2" ind2=" ">
<subfield code="0">MAPA20080459970</subfield>
<subfield code="a">Risk and Insurance Management Society</subfield>
</datafield>
<datafield tag="773" ind1="0" ind2=" ">
<subfield code="d">New York</subfield>
<subfield code="g">March 2000 ; p. 21-24</subfield>
<subfield code="t">Risk Management</subfield>
</datafield>
</record>
</collection>