skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 118450 Find in a Library
Title: R and D (Research and Development) Security: Dealing With Diversity
Journal: Security Management  Volume:33  Issue:6  Dated:(June 1989)  Pages:89-92
Author(s): P Ohlhausen
Date Published: 1989
Page Count: 4
Type: Program/Project Description
Format: Article
Language: English
Country: United States of America
Annotation: In the research-and-development field as practiced by Science Applications International Corporation (SAIC), operations diversity requires a core security program tailored to the needs of specific contractors.
Abstract: As a research and development specialist on national security, high-technology products, energy, the environment, and health, SAIC handles contracts so diverse that a blanket approach to security could not succeed. The goal of physical security at SAIC is to protect the facility from its primary threats: foreign governments and foreign private enterprises that seek classified and unclassified information pivotal to U.S. technological leadership. The first line of defense is physical security. Security devices used include proximity access control cards, closed-circuit television cameras mounted outside buildings, visitor control, intrusion and environmental alarms, facility earthquake-resistant design, and procedures to preserve the anonymity of key personnel, both inside and outside the building. Information security policy derives from the security department. A computer-based document-control system maintains accountability, tracks documents from origin to termination, and maintains a historical file. The company is in the process of implementing the use of bar codes to track documents and establish a chain of accountability. Controls at copy machines also help track paper flow. The security department conducts security training for employees, with updates for the introduction of new security techniques. The company operates eight or nine different government security programs depending on the nature of contract operations.
Main Term(s): Security management
Index Term(s): Industrial espionage; Research and development
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=118450

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.