This document provides a comprehensive checklist to help create or audit an IT security policy. The checklist covers a wide variety of topics including web browsing, usernames/passwords, email, file access permissions, backups, disaster recovery, physical security, and security for PCs/laptops. For each topic, it lists key planning items and considerations to develop a thorough policy that protects organizational assets and data.