This course will focus on establishing the balance between business use and safeguard policies. It will concentrate on preparation of policies based on the different security domains based on business process. This course extends to cover laws governing breach of security policies and response mechanisms. Learners must begin by understanding business process before a security policy can be established. Processes are examined to visualize underlying security weaknesses and vulnerabilities and to assess the frameworks necessary for drafting an appropriate IT Security Policy.