State the implementation of a security policy
The implementation of a security policy should invariably cover all parameters of security such as physical access to the server, method of storage and disposal of confidential documents, including access to the network and Internet usage.