1. Computer and email acceptable use policy
2. Internet acceptable use policy
3. Password protection policy
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.
4 pages without references and title page
4 scholarly references