Skip to content
  • There are no suggestions because the search field is empty.

Getting to know Cerivo

Understand how Cerivo can help you elevate your GRC program.

Introduction

Welcome to Cerivo.

Whether you’re just getting started or returning to your work, this guide gives you a clear overview of each area in the platform and how they fit together.


Dashboard

Get a clear view of where you stand.

See your progress, understand what’s outstanding, and track how tasks are planned across the months ahead.


Systems

Build a structured overview of where your data lives.

Map your systems and set up routines for maintaining and deleting data, so nothing is left unmanaged.


Vendors

Keep control of your vendor relationships.

Track data processors, manage agreements, and stay on top of audits.
You can also document third-country transfers and your legal basis for them.


Processing Activities

Create and maintain your Records of Processing Activities.

This is where you document how personal data is used across your organization, giving you a clear, up-to-date foundation for compliance.


Task Manager

Create, maintain and delegate tasks.

See all tasks in one place, whether recurring or ad hoc, and assign responsibilities across your team to keep work moving.


Risk assessments

Identify and manage risk in a structured way.

Document risks to both data subjects and your organization, and track how they are mitigated over time.


Incident Manager (data breaches)

Log and review incidets (E.g. data breaches)

Build a clear record of incidents so you can identify patterns and respond more effectively.


Customers

Manage relationships where you act as a data processor.

Keep track of agreements and document any conditions beyond standard terms.


DPIA

Document Data Protection Impact Assessments in a structured and connected way.

Link them to relevant systems, risks, and processing activities so everything stays aligned.


TIA

Document Transfer Impact Assessments with the same structured approach.

Keep all related information connected and easy to review.


Request log

Track requests from data subjects.

Maintain clear documentation so you can respond consistently to your customers.


Security incidents

Log and review security incidents. (E.g. cyber attack)

Identify patterns and use them to strengthen your security measures over time.


Governance

Manage the frameworks you follow, such as ISO 27001, NIS2, or CIS18.

Track your progress, maintain structure, and generate reporting for stakeholders.


Additional functionality

Depending on your plan, you may also have access to the following modules.

These extend Cerivo to support deeper risk management, documentation, and governance.