This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are auditing and assessing the adequacy of an organization's information security policy. Which of the following sources of information would be the most suitable for you to use in making this determination?