Computer security is constantly in the news. We know how to prevent the headline making incidents but practices are often flawed and incidents occur. This series is intended to result in a robust set of policies that will yield a resilient and appropriate level of protection. The Computer Security Policy is a key stone element. This policy introduces the concept of "compliant" and "non-compliant" computing devices, which will be carried throughout the series. Policies should be easy to understand, with a goal of broad acceptance of the requirements. This policy is based on the controls of ISO 27001 and SP 800-53 Version 3 (US).