DETERMINE HOW SECURITY POLICIES APPLY TO DATA AND SYSTEM ACCESS.