1.Terms and Definition2.Acceptable Usage Policy3.Cloud Computing Security Policy4.Mobile device Management Policy5.Encryption Policy6.Clear Screen and Clear Disk Policy7.Virtual Private Network Policy8.Password Management Policy9.Business Continuity Policy10.Email Security Policy11.Information Technology Policy12.Compliance Procedure13.Threat and Vulnerability Management14.Risk Management Procedure15.Cyber Crisis Management Plan 16.Backup Recovery Procedure17.Procedure for Control of Documents and Records18.Virus Management Procedure19.Patch Management Procedure20.Access Control Procedure21.Network Control Access and Security Procedure22.Information System Acquisition Development and Maintenance Procedure