Login and Use of the "Source Environments"

On this page, you will find the instructions on how to access the two applications which we use in order to demonstrate how DPM integrates with source systems for the fulfillment of privacy-related Data Subject Requests (DSR).

The two systems that we picked up to simulate source systems are:

Source Application

Access Instructions

Access and Use Instructions

Access and Use Instructions

Your User

As part of the sandbox environment setup, we generated user credentials for you to the Odoo and OpenSourceBilling systems used in this tutorial. Your user name and password will be sent to you automatically after your registration to the tutorial.

Your Customer

We also created an artificial customer for you in each of the source systems, allowing you to submit Data Privacy Requests. The customer can be searched in those systems based on the name or email you provided to us in your registration. Details about how to search for this customer are described in the instructions that refer to each source system (see table above).

Login and Use of the "Source Environments"

On this page, you will find the instructions on how to access the two applications which we use in order to demonstrate how DPM integrates with source systems for the fulfillment of privacy-related Data Subject Requests (DSR).

The two systems that we picked up to simulate source systems are:

Source Application

Access Instructions

Access and Use Instructions

Access and Use Instructions

Your User

As part of the sandbox environment setup, we generated user credentials for you to the Odoo and OpenSourceBilling systems used in this tutorial. Your user name and password will be sent to you automatically after your registration to the tutorial.

Your Customer

We also created an artificial customer for you in each of the source systems, allowing you to submit Data Privacy Requests. The customer can be searched in those systems based on the name or email you provided to us in your registration. Details about how to search for this customer are described in the instructions that refer to each source system (see table above).