Tag Discuss how this and other information security considerations will affect the design and development process for new information systems.