This mainly depends on the requirements defined by the companies security rules and definition that should be implemented with the security policy. Some examples on how to write the policy can be found at the "ComputerWorld" article entitled "How to Write an Information Security Policy".
General - General Security Policy is also known as the Enterprise Information Security Policy, organizational security policy, IT security policy or information security policy.
Director of the information security Oversight Office
The baseline security policy for Air Force base-level networks processing sensitive information
A lapse in security control or policy creates a situation where secure information can be obtained by others. Once obtained the information is often used to steal a person's identity.
Auditing the security policies.
Auditing the security policies.
The policy that states users are accountable and responsible for protecting electronic information assets on their assigned computer systems is often referred to as the "Acceptable Use Policy" (AUP) or "Information Security Policy." This policy outlines the responsibilities of users in safeguarding data and system integrity, including the proper use of passwords, adherence to security protocols, and reporting any security incidents. It emphasizes the importance of individual accountability in maintaining the security of organizational information assets.
The security of data and information is of vital importance to any organization and it is therefore a business decision as to what information should be protected and to what level. The business's approach to the protection and use of data should be contained in a security policy to which everyone in the organization should have access and the contents of which everyone should be aware. The system in place to enforce the security policy and ensure that the business's IT security objectives are met is known as the Information Security Management System (ISMS). Information Security Management supports corporate governance by ensuring that information security risks are properly managed.
Department of Defense 5200.1-R, Information Security Program Regulation
Info.security policy is all about defending unauthorised access on Internet computer, paper based document system or oral communication against attack, interrogation or theft by party or parties not authorised to have access to such data. The policy will set out where the department or company stand on information security and a procedure will accompany those policy of what systems are in place, what procedure are to be followed to maintain the security of the data and the process required in the event that the policy or preocedure is broken.
You can speak with a supervisor or manager in the security and trust department to inquire about their old policy. They should be able to provide you with information on the policy and any updates or changes that have been made.
32 cfr...