1. Identify the various ways that agency or organization security policies can be influenced.
2. Compare and contrast the difference between legislation and other regulatory documents, i.e., guidance, standards, directives, executive orders, etc.
3. Discuss the standards in legislation and other regulatory instruments that require compliance by an organization
4. Develop policies to comply with requisite information security standards.