1. Security Policies and Implementation Issues 2. 1. Acceptable Use Policy..........................................................................................................2…