This document discusses computer security policies and recommendations. It covers the history of computer security policies since the early 1990s. It also discusses the risks posed by lack of effective security policies, and the need for a holistic approach. The document provides recommendations for developing an effective computer security policy, including identifying assets, risks, access controls, backups, and education. It stresses the importance of well-trained security professionals with integrity.