For examples of information security plan, user identification system is authorized for only grant users to reach the database, data encryption and firewall system helps firm to delineate computer crimes from external users, and
disaster recovery plan helps computer system continually run.