(ii) For information technology acquisitions, discuss how agency information security requirements will be met.