U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Internal Corporate Security of Computers and Trade Secrets (From Prevention and Prosecution of Computer and High Technology Crime, P 7.1-7.54, 1989, Stanley S Arkin, et al. -- See NCJ-119326)

NCJ Number
119330
Author(s)
S S Arkin; B A Bohrer; D L Cuneo; J P Donohoe; J M Kaplan; R Kasanof; A J Levander; S Sherizen
Date Published
1989
Length
54 pages
Annotation
Corporate security related to computer systems, computerized data, and trade secrets is explained in terms of its basic principles and practical approaches, as well as the need for information security to be part of corporate strategic planning.
Abstract
Information security receives inadequate support from most corporations, although top management is concerned about security. However, top management often believes that its data processing operations are much more tightly controlled than do the heads of internal audit departments and data processing managers. Top management needs to recognize that changes related to computer technology and liabilities require new corporate efforts to protect information. Major assets and resources affected by computerization include information, services, negotiables, personnel, inventories, and equipment. Potential proprietary information requiring protection includes financial information, organizational information, marketing information, and technical information. Security measures should include organizational measures, security administration, personnel security, physical security, environmental controls, disaster controls, communications security, and computer security. Protective strategies include containment, deterrence, obfuscation, and recovery. The major approaches to information security are based on physical security, procedural security, technical security, telecommunications security, and contingency planning. A program to protect information should use four steps: planning, implementation, evaluation, and reporting. List of professional organizations and 16 references.