Create a written IT securitypolicy that identifies critical assets and defines policies for physical security, account management, and backup and recovery among other areas.
The latter, entitled "An Aging Flower Child's Crusade, " (see the attached) appears in the weekly column written for the Times by the Center for Security Policy's director, Frank J.