Watch this video on YouTube
Which requirement would have the lowest priority in information security Policy?