Information Systems homework help

Define security policy conformance and why it is important?