over, under, nor alongside a computer room in case lines burst. Buildings whose outer walls are glass
should also be avoided.
2. Maintain Systems Integrity. Data stored in Army computer systems range from military payroll to
top secret information. Because of this, it is important to maintain the system's integrity. It should be
protected from threats such as espionage and sabotage. It is essential that security personnel are
aware of security measures in this area.
a. Separate Primary and Backup Systems and Files. Most banking transactions are handled by
computers. Have you ever wondered what would happen to your account, if your bank burned to the
ground? Be assured that all would not be lost. All ADP facilities have alternate areas to run and
process data. These facilities also maintain backup or alternate tape or diskette libraries. The same
security should be given to the alternate systems and tape storage as a primary.
b. Supervise Maintenance Personnel. Computer maintenance on hardware is a continuing
process. Knowledge and supervision of maintenance personnel is important. Technical experts can
verify operations of maintenance personnel. Use of such experts will ensure that the system is not
tampered with or sabotaged.
c. Protect Remote Keypunch Equipment. Keypunch equipment and locations should have
physical security equal to the material being punched or prepared.
d. Strict Enforcement of All Security Measures. Secure handling of all sensitive and classified data
should be stressed to everyone in the facility.
e. Direct Security Measures. Direct security protective measures toward the following:
(1) Data control areas.
(2) Access control (to data storage programs).
(3) Password control (for access into terminals).
3. Security Measures of Software. Security measures for software should be implemented. Software
refers to programs and routines of computers. These security measures would include the following:
a. Security of Programs. Necessary precautions should be taken to ensure knowledge of who
writes the programs. Where they are written and where they are tested and filed should also be known.
b. Data File Systems. Data file systems contain data that can be processed or produced by the
computer. These files must be provided a degree of security equal to the importance of the files.