What is the right of access by the data subject? What does a request for access to personal data look like? What should I do if I receive a request to access to the personal data? Who processes a request and what needs to be considered?
What rules apply for using the business IT infrastructure safely? What must you consider when using the Internet? How should email accounts and emails be protected? What considerations apply to mobile devices?