Watch this video on YouTube
What is the most important item to include in an information security policy?