U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Five Easy Steps to Computer Security

NCJ Number
153417
Journal
Trial Volume: 31 Issue: 1 Dated: (January 1995) Pages: 61-65
Author(s)
J Howie
Date Published
1995
Length
5 pages
Annotation
This article outlines five steps to follow in implementing a computer security program for a law office.
Abstract
The first step is to itemize critical computer assets related to hardware, software, and information files. The second step is to identify the most likely and most serious risks associated with each asset (i.e., fire, water damage, theft, or electrical damage). Next, one should minimize exposure to these risks through some combination of measures, including backing up data, having all employees sign confidentiality statements, installing antivirus software, preventing hacker damage, protecting against electrical surges and failures, ensuring proper maintenance and physical security, and taking out insurance. Finally, the office computer security specialist should test the program and schedule regular computer security program reviews.