Watch this video on YouTube
Which document is typically reviewed during a compliance audit to verify that an organization has formally assigned responsibility for information security?