Jump to ContentJump to Navigation
Security Awarness For Everyone
Centers for Disease Control and Prevention
Site Contents
 Main Page
 PC Security
 Physical Security
 Social Engineering
 E-mail Usage
 Internet Usage
 Software Piracy
 Who to Contact

PC Security in the Office

A stolen computer represents more than the loss of a physical asset. CDC is entrusted with information, kept on our automated systems, that is highly sought by the ‘wrong parties’. This includes individually identified health data, industry wide data, proprietary information from private companies, anti-terrorism data, and data regarding pending governmental decisions affecting the health of the nation.

Some foreign governments openly support or practice corporate espionage and "information warfare" to obtain intellectual properties, cause harm to systems, or hide their attempted activities by appearing to be someone else.

Theft or unauthorized access to your system can often be done in a matter of seconds, but can be avoided by adhering to the following tips:

  • Install a security cable or locking device;
  • Logout of the system when you are finished working (Doing so will allow you to log onto the LAN from elsewhere, if needed, will document your action of closing your active session (protecting you), and will serve an a positive example to others);
  • Enable your screen saver with password, max time 8 minutes (Setting a maximum of 8 minutes of non-use before the screen-saver is activated represents a reasonable balance of efficient use and reliable protection);
  • Use a power-on password (This can deter unauthorized persons from accessing your computer, but its use can interfere with technical staff, and should be done only with written permission of your LAN Administrator)

PC Security

PC Security on the Road
Go to Top

This CD-ROM was produced April 8, 2003
from the original content of "Security Awareness for Everyone."

Copywrite 2001 Security Awareness, Inc.

Centers for Disease Control and Prevention