This document discusses the importance of security policies in managing the risks associated with technology deployment. It covers various policies such as acceptable use policy, access control policy, information security policy, change management policy, incidence response policy, remote access policy, and disaster recovery policy. Additionally, it provides recommendations for dealing with cyber crime, including raising awareness, leveraging trusted resources, building an economic framework, working with invested partners, and implementing a response plan.