Hacking including the measures that must be taken in order to protect data
The need to identify the inputs, outputs and processing of the current system, problems with the current system, the user and information requirements for the new system
Privacy and confidentiality of data transfer