Developing an Effective Security Compliance Policy: Key Considerations