Perform or simulate a full process end to end around the system. If sampling is involved, start with the acquisition of the sample. Identify who does what, parameters touched, documentation and systems used, data transcriptions performed, data integrity controls such as 2nd person verification or witness.Identify connections with paper systems e.g. logbooks, BPRs etc.Identify any parts of the process where there may be data integrity vulnerabilities.