NCJ Number
153417
Journal
Trial Volume: 31 Issue: 1 Dated: (January 1995) Pages: 61-65
Date Published
1995
Length
5 pages
Annotation
This article outlines five steps to follow in implementing a computer security program for a law office.
Abstract
The first step is to itemize critical computer assets related to hardware, software, and information files. The second step is to identify the most likely and most serious risks associated with each asset (i.e., fire, water damage, theft, or electrical damage). Next, one should minimize exposure to these risks through some combination of measures, including backing up data, having all employees sign confidentiality statements, installing antivirus software, preventing hacker damage, protecting against electrical surges and failures, ensuring proper maintenance and physical security, and taking out insurance. Finally, the office computer security specialist should test the program and schedule regular computer security program reviews.