skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 118452 Find in a Library
Title: For Apple Eyes Only
Journal: Security Management  Volume:33  Issue:5  Dated:(May 1989)  Pages:26-33
Author(s): P Ohlhausen
Date Published: 1989
Page Count: 8
Type: Program/Project Description
Format: Article
Language: English
Country: United States of America
Annotation: This article describes the procedure used to implement Apple Computer Company's information protection program through employee training.
Abstract: A security consultant was hired to assume the leadership in devising an information security program. The proposed program was brought to the company's security advisory board for additions and changes, followed by approval and a suggested trial launch. Currently, the program is halfway implemented. Employees instrumental in the implementation are the protection coordinators; employees chosen by their managers to serve as information security representatives in their departments. Implementation instruments are a large binder of security guidelines, a video, an employee handbook, several layers of training, and periodic reminders and audits. Protection coordinators first attend an introductory workshop, where they receive a set of information security guidelines, which the coordinators use to design information protection procedures for their own departments. The guidebook asks protection coordinators to meet with their coworkers to develop a list of the types of confidential information in their departments. After the introductory training, protection coordinators participate in an all-day training session that includes role playing, document-marking practice, and other hands-on lessons. They also attend periodic followup workshops on specific security topics, such as securing information on desktop computers, handling nondisclosure agreements, and responding to inquisitive telephone callers. The protection coordinators then use some of the same training methods on their coworkers.
Main Term(s): Data security
Index Term(s): Security management; Security training
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.