Use the following guidelines to assist in preplanning tasks.
| Security | Example data needed, where applicable, and by location | Data collected | 
|---|---|---|
| Security policies | Collect information about your organization’s security policies, such as the following: 
 | 
 | 
| Separation of or delegation of duties between IT divisions within the enterprise. | 
 | |
| The degree to which users must retain control of clients, and any exceptions to such policies (such as servers, or computers used by programmers). | 
 | |
| You should collect information about how security-related issues will be handled and supported, such as the following information: 
 | 
 | 





