0 Comments
Answer:
(a) True
Step-by-step explanation:
Security policies must have all this so as to protect the organization from threats, including computer security threats, and how to handle situations when they do occur.