U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Practicing PC Protection

NCJ Number
114159
Journal
Security Management Volume: 32 Issue: 10 Dated: (October 1988) Pages: 49-52
Author(s)
C M Berger
Date Published
1988
Length
4 pages
Annotation
The problem of personal computer (PC) security, both physical and data security, should be approached by a team consisting of a security/loss prevention specialist, a technical coordinator, and a training expert.
Abstract
The loss specialist should be responsible for access control and passwords, physical security of equipment, evaluation and installation of encryption software, administration and control of keys, and confidentiality of proprietary information. The technical advisor handles evaluation and acquisition of hardware and software, updating employees, and trouble-shooting. The training expert should have responsibility for evaluation of training needs and hands-on instruction. Hardware, software, disk drives, diskettes, backup, and hard copy issues all must be addressed individually since all have security-related implications. Specific employees should be responsible for seeing that the company's PC policies and procedures are followed. Communication of policies and procedures is best accomplished in small group session. Attendees should be furnished with a copy of the procedures manual and shown a video emphasizing the importance of PC security. The manual should be discussed, and PC audit procedures should be reviewed. Random audits can help ensure employee accountability and compliance with security procedures. A PC audit form is included.