Performed to determine the capability of
current privacy management to support each of the business and technical
requirements uncovered during an audit or privacy assessment, if any exist;
requires reviewing the capabilities of current systems, management tools,
hardware, operating systems, administrator expertise, system locations,
outsourced services and physical infrastructure.