skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 113309 Find in a Library
Title: Keeping Your PCs (Personal Computers) Where They Belong
Journal: Security Management  Volume:32  Issue:7  Dated:(July 1988)  Pages:53-55
Author(s): A Laurenson
Date Published: 1988
Page Count: 3
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: While it is probably impossible to eliminate personal computer (PC) theft completely, a carefully designed plan can help protect the central processing unit, expansion, boards, and computer components and peripherals that may be targets of theft.
Abstract: The security plan should offer the needed level of protection with minimal interference in normal operations. Employees should be consulted early in the planning process to aid in the choice of security tools. Tools include cabinet locks, cables, boltdown devices, workstation enclosures, and alarms. The choice of tools will depend on the importance accorded by management and users to such features as strength, cost/benefit, ease of installation and daily use, flexibility, aesthetics, and data protection. Each of the available tools has advantages and disadvantages with regard to these features. Information on security products is available from many vendors, and standards for evaluating products are in development. Publications and consultants also can aid in evaluating security products. Once security tools are chosen, companywide policies and procedures on PC security should be written. An ongoing training program also is recommended to raise employee security awareness and facilitate understanding of and compliance with policies and procedures. 1 figure.
Main Term(s): Computer privacy and security
Index Term(s): Security systems; Security training
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.