Watch this video on YouTube
What should an organization PRIMARILY emphasize in its IS security policy to ensure the secure handling and disposal of sensitive information?