NCJ Number
113309
Journal
Security Management Volume: 32 Issue: 7 Dated: (July 1988) Pages: 53-55
Date Published
1988
Length
3 pages
Annotation
While it is probably impossible to eliminate personal computer (PC) theft completely, a carefully designed plan can help protect the central processing unit, expansion, boards, and computer components and peripherals that may be targets of theft.
Abstract
The security plan should offer the needed level of protection with minimal interference in normal operations. Employees should be consulted early in the planning process to aid in the choice of security tools. Tools include cabinet locks, cables, boltdown devices, workstation enclosures, and alarms. The choice of tools will depend on the importance accorded by management and users to such features as strength, cost/benefit, ease of installation and daily use, flexibility, aesthetics, and data protection. Each of the available tools has advantages and disadvantages with regard to these features. Information on security products is available from many vendors, and standards for evaluating products are in development. Publications and consultants also can aid in evaluating security products. Once security tools are chosen, companywide policies and procedures on PC security should be written. An ongoing training program also is recommended to raise employee security awareness and facilitate understanding of and compliance with policies and procedures. 1 figure.