NCJ Number
115931
Journal
Security Management Volume: 33 Issue: 2 Dated: (February 1989) Pages: 58,60,62
Date Published
1989
Length
3 pages
Annotation
Establishing and operating a comprehensive program for safeguarding a company's proprietary information involves seven steps, based on an awareness of how competitors gather intelligence, how to stop or slow these actions, and how to prevent them from recurring.
Abstract
Both legal and illegal methods are used to gather information about competitors. Competitors often use the normal points of release of information and gather the escaping information. The two basic rules related to intelligence gathering are that information is exchanged whenever money is exchanged and that published information does not necessarily mean public information. Ways to slow down corporate data leaks include reviewing public relations documents or other documents released, eliminating noncompliance information from filings, starting employee awareness programs, and briefing employees before trade shows. The steps involved in developing a comprehensive program of safeguards include developing a policy statement, developing personnel procedures relating to information protection, developing document controls, establishing communications security, establishing physical safeguards, monitoring and evaluating compliance, and marketing the program. Security managers should also prevent their own firm's staff from using illegal and unethical methods of intelligence gathering.