U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Counterespionage Techniques That Work

NCJ Number
138862
Journal
Security Management Volume: 36 Issue: 9 Dated: (September 1992) Pages: 44,48-50,52
Author(s)
M Hansen
Date Published
1992
Length
5 pages
Annotation

Corporations serious about protecting their information assets must develop a comprehensive and sustainable preventive protection program for safeguarding proprietary information (SPI). The SPI program should be headed either by a full-time corporate information officer (CIO) or an information protection consultant.

Abstract

The CIO would work with the company's SPI task force, comprised of the security manager, CIO, corporate counsel, and managers from research and development, data processing, records, communications, and human resources. An effective SPI policy covers many aspects of corporate operations, including employee awareness, document classification, office security, maintenance work, meeting rooms, quiet room, communications equipment, electronic mail, video encryption, corporate telephone exchanges, computer systems and laptop computers, trade shows and presentations, and foreign travel. The firm's technical surveillance policy also requires careful consideration in terms of employee training and equipment selection.