Security Procedures for the IT Department