Companies have security protocols for whatever they want to protect. What they consider protecting is their business. New product prototypes, or just random possible product explorations are a common example. And the protocols they use (special enclosures, training people on how to not be obvious) are figured out the same way they are in computing, In fact the core terminology we use in computer security comes from physical security.
And security protocols go back thousands of years. You can read about them in ancient literature,
And security protocols go back thousands of years. You can read about them in ancient literature,