This document provides information about developing effective information security policies. It discusses key components of information security policies like specifying penalties for unacceptable behavior and including an appeals process. The document also covers different types of policies, such as enterprise, issue-specific, and system-specific policies. It emphasizes that policies must be properly developed, distributed, understood, agreed to, applied, and enforced to be effective.