Data Security Toolkit

Use the system list provided by the DPO to identify the administrator for each system. Get each administrator to sign an agreement relating to the system they manage,