U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Security Coding of Electronic Products (From Designing Out Crime From Products and Systems, P 231-265, 2005, Ronald V. Clarke and Graeme R. Newman, eds. -- See NCJ-211693)

NCJ Number
211700
Author(s)
Ronald V. Clarke; Graeme R. Newman
Date Published
2005
Length
35 pages
Annotation
This chapter discusses issues to be addressed in establishing "crime proofing" codes that assess the vulnerability to theft of portable electronic devices.
Abstract
The chapter first proposes a general framework for thinking about security codes, the main elements of which are corporate social responsibility and the economic arguments for regulating faulty and risky products, with product-related crime being one of the risks. The chapter then summarizes a report that calls for the construction of a security code that establishes voluntary standards for design at the manufacturing stage. This code would identify the "criminogenic capacity" of "electronic products and the services directly related to these." The scope of the code discussed in this chapter is limited to consumer electronic products that are likely targets of theft (i.e., smaller appliances that are easily removed and transported); that are targets of crime rather than tools of crime; that do not involve services as the primary target; that do not pertain to counterfeiting or illegal copying; and that involve only physical media. Among the products that come under the code are personal computers, laptop or notebook computers, personal recording devices, digital cameras/video cameras, and mobile phones. The chapter then makes the case for a voluntary code, noting that there still must be some mechanism to establish compliance and the creation of incentives for manufacturers to comply. Elements of the code are then outlined, including the checklist for risk of theft and the checklist for product security. The scores from the two checklists provide the basis for determining the "designed against crime" status for a particular product. The administration of the code is also discussed, along with its implementation. 16 notes and 19 references