Which of the following is not a good ICT security policy?

Question 1 Report

Which of the following is not a good ICT security policy?