How can a company analyze its security needs and protect sensitive information? What are the legalities? This handbook should be of interest to anyone concerned with the techniques and systems used to restrict legal, financial, scientific, technical and other information.