NCJ Number
104565
Date Published
1987
Length
164 pages
Annotation
This volume explains how information has become the most important business asset and gives guidelines to security managers for protecting company information in an era of increasing use of computers and rapid technological change.
Abstract
The growing number of applications of information technology is constantly creating new vulnerabilities for businesses. Security managers must view their job as much broader than guarding facilities and property. They face five crucial tasks: (1) integrating computer technology into the corporate security function, (2) choosing and applying advanced technology to a wide range of security tasks, (3) advising business managers on how to adapt their operating approaches to the environment of the information age, (4) protecting the information resource, and (5) establishing the security function as part of the business management process. The security function must rest on careful planning and organization. Written policies and procedures should cover physical security, employee and visitor identification, actions for responding to illegal conduct, personnel security, information security, and requirements under government contracts. Figures; index; glossary; and appendixes presenting a primer on computing, a sample information security policy, and a sample security review questionnaire.