Create a breach policy based on the 5 scholarly articles.