- Computer and email acceptable use policy
- Internet acceptable use policy
- Password protection policy
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.
Include at least 3 scholarly references in addition to the course textbook.
Your paper should meet the following requirements:
• Be approximately four to six pages in length, not including the required cover page and reference page.