skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 84097 Find in a Library
Title: Safeguarding Trade Secrets
Journal: Security Management  Volume:26  Issue:7  Dated:(July 1982)  Pages:44-48
Author(s): W C Dunlop
Date Published: 1982
Page Count: 5
Format: Article
Language: English
Country: United States of America
Annotation: The Texas Instruments Proprietary Security Guide for Trade Secret Special Control Programs provides guidance for perimeter construction, access controls, and administrative requirements.
Abstract: When a guide is being drafted for a new trade secret special control program, a security administrator, the program manager, and a patent attorney determine what information will be revealed through any type of media in the program. The four sections of the guide (1) list the types of information that must be designated as trade secrets and thus safeguarded from unauthorized disclosure, (2) prescribe marking requirements, (3) indicate physical security requirements, and (4) list administrative security requirements. Perimeter construction guidelines specify the minimum height and building material for the walls, as well as the material and locking methods for the doors. Access control guidelines describe the purpose of such control, the definition of unauthorized access, restrictions on photographs, when lock combinations should be changed, the retrieval of employee access instruments, and when to reprogram the access system. Eighteen items are listed as administrative requirements, ranging from the designation of security coordinators and monitors to a review of all photographic requests by the patents manager.
Index Term(s): Business security; Industrial espionage; Personnel identification systems; Physical crime prevention
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.