U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computing a Successful System

NCJ Number
136297
Journal
Security Management Volume: 36 Issue: 4 Dated: (April 1992) Pages: 58,61-62
Author(s)
B J Rauschhuber
Date Published
1992
Length
3 pages
Annotation
Apple Computer Inc., uses computer technology to enhance security in every facet of its manufacturing organization.
Abstract
Computer systems are used for training, access control, property control, security administration, investigations, recordkeeping, scheduling, and administrative tasks. Security personnel training is provided through a blend of custom-made videotapes and software. The videos provide the new officer with a basic understanding of the style and type of security at the company and overviews of the training process. The officer then learns how to operate an Apple Macintosh computer through a training software package. The trainee next continues training with the computer system, using three, automated software packages in a 5-day program. The security organization operates through the use of four file servers, each on an individual secured network called a local area network. These file servers allow various aspects of the department to operate independently yet with flexibility and control. The file servers are set up in four platforms: property control, security operations, security administration, and card access/alarm systems. An officer at a computer terminal in a lobby has available information on access control, property control, and general security procedures (plant protection procedures, phone directories, MicroMail, passdown log, and vehicle registration).