Data Security Toolkit

Use the system list provided by the DPO to identify the administrator for each system. Get each administrator to sign an agreement relating to the system they manage,

Select from the drop down lists in the grid and add any systems containing personal data that have not been included already