Review existing codes of conduct, best practises, etc. as to the ethical use of security technologies and the corresponding legal requirements - make recommendations where shortfalls exist