U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Keeping Your PCs (Personal Computers) Where They Belong

NCJ Number
113309
Journal
Security Management Volume: 32 Issue: 7 Dated: (July 1988) Pages: 53-55
Author(s)
A Laurenson
Date Published
1988
Length
3 pages
Annotation
While it is probably impossible to eliminate personal computer (PC) theft completely, a carefully designed plan can help protect the central processing unit, expansion, boards, and computer components and peripherals that may be targets of theft.
Abstract
The security plan should offer the needed level of protection with minimal interference in normal operations. Employees should be consulted early in the planning process to aid in the choice of security tools. Tools include cabinet locks, cables, boltdown devices, workstation enclosures, and alarms. The choice of tools will depend on the importance accorded by management and users to such features as strength, cost/benefit, ease of installation and daily use, flexibility, aesthetics, and data protection. Each of the available tools has advantages and disadvantages with regard to these features. Information on security products is available from many vendors, and standards for evaluating products are in development. Publications and consultants also can aid in evaluating security products. Once security tools are chosen, companywide policies and procedures on PC security should be written. An ongoing training program also is recommended to raise employee security awareness and facilitate understanding of and compliance with policies and procedures. 1 figure.

Downloads

No download available

Availability