4.Network security policy--users are only able to access company networks and servers via unique logins that demand authentication, including passwords, biometrics, ID cards, or tokens.The policy should outline the level of authority over data and IT systems for each organizational role.You should monitor all systems and record all login attempts.Authority and access control policy Hierarchical pattern--a senior manager may have the authority to decide what data can be shared and with whom.The security policy may have different terms for a senior manager vs. a junior employee.5.