DPM APPLICATION TUTORIAL

Introduction

We invite you to acquire a firsthand experience of our DPM application by following this step-by-step tutorial.

This tutorial will take you through the main activities of implementing and using our DPM application, such as implementing a Data Subject Access Request (DSAR) Flow, defining Consents, executing PII Discovery, and other DPM features.

Tutorial Project Presentation

In order to demonstrate the implementation of our DPM application, we created an environment that simulates a real-world company with multiple source systems that should be integrated with the DPM platform. To represent those source systems, the sandbox we generated for you includes two separate applications, each holding different information about the company customers.

The two applications that represent the source systems in this tutorial were selected for the purpose of demonstrating concepts. In a real-world implementation, you will of course connect to whichever and as many source applications your company uses.

Meet the Tutorial “Source Systems”

The two systems that we picked up to simulate source systems are:

Odoo is an open source ERP and CRM application. You can view more details about this application at their Website: https://www.odoo.com/.

Open Source Billing (OSB), as its name indicates, is an open source billing system. Access its Website https://opensourcebilling.org/ for more information.

When we set up the tutorial environment, we automatically generate for you not only a running instance of each of those applications, but we also generate in each of those systems an imaginary customer using the name an e-mail address you provided when initiating the tutorial.

This imaginary customer will be used throughout the tutorial to demonstrate DPM features and functionality, such as customer matching between applications, fulfilment of data access requests, keeping up with data change scenarios, and more.

Accessing and Using the "Source Systems"

As part of our tutorial, we will walk you through demonstration of how K2View's DPM automates Data Subject Requests (DSR) of different types, such as Data Subject Access Request, data rectification, data anonymization and purging.

For that purpose, as part of the different demo scenarios you will be requested to access the "Source Systems" in order to confirm that the activities were indeed executed as expected.

For example: When a DSAR is completed we will request you to verify that the data collected by the DPM are indeed "your data" as it is reflected in the source systems, or that when a request for data anonymization was completed, "your data" were anonymized at the "source systems".

The following link includes the instructions to login and navigate in those two "source systems". We will direct you to this link in each point in the tutorial where you are asked to view or use the "source systems".

Login and use of the "source environments"

Tutorial Scenarios

Follow the links below to access the step-by-step instructions for each of the tutorial topics. In each topic, use the "next" button to progress through the tutorial steps, and at the end of each topic you will have a link to return to this initial page.

Data Subject Requests

The first section of our tutorial guides you through the steps of implementing the automation and streamlining the fulfilment process of data access requests.

  • Data Subject Access Request (DSAR) - By demonstrating how to create a DSAR Request, we will lead you through the implementation steps that allow you to define the Flow and automation of any type of Data Subject Request that Data Privacy regulations may require.

  • DSAR Fulfillment Process - In this tutorial, you will simulate the scenario of a customer who submitted a DSAR, and the Flow this Request goes through from submission to fulfillment.

  • Auto Sync of Source System Changes - This tutorial demonstrates the DPM seamless synchronization with the source systems by simulating a data change at one of the source systems, and then submitting a DSAR Request for the customer.

  • Data Rectification - The steps in this section simulate the scenario of a customer submitting a Request to rectify its data. As a result, the DPM application automatically updates the data in all relevant source systems and confirm when the request fulfilment is completed.

  • Anonymize Data - This tutorial will simulate a customer Request to anonymize their data in all source systems, and follow this Request to its completion.

  • Purging Data - In this tutorial, you will simulate a customer Request to delete their data in all source systems, and follow this Request to its completion.

Personally Identifiable Information (PII) Discovery

The DPM PII discovery feature provides you with a powerful tool to identify the location where personal data is stored in your organization's systems, and then take the appropriate measures to protect it.

  • PII Discovery - In this guided tutorial, we take you through the steps of defining and executing the PII discovery process.

Managing your customer's preferences and consents is easy with DPM Consent Management capabilities.

  • Consent Management - This interactive tutorial demonstrates how to define any consent topic and the way the DPM system manages the consent preferences of each customer.

DPM APPLICATION TUTORIAL

Introduction

We invite you to acquire a firsthand experience of our DPM application by following this step-by-step tutorial.

This tutorial will take you through the main activities of implementing and using our DPM application, such as implementing a Data Subject Access Request (DSAR) Flow, defining Consents, executing PII Discovery, and other DPM features.

Tutorial Project Presentation

In order to demonstrate the implementation of our DPM application, we created an environment that simulates a real-world company with multiple source systems that should be integrated with the DPM platform. To represent those source systems, the sandbox we generated for you includes two separate applications, each holding different information about the company customers.

The two applications that represent the source systems in this tutorial were selected for the purpose of demonstrating concepts. In a real-world implementation, you will of course connect to whichever and as many source applications your company uses.

Meet the Tutorial “Source Systems”

The two systems that we picked up to simulate source systems are:

Odoo is an open source ERP and CRM application. You can view more details about this application at their Website: https://www.odoo.com/.

Open Source Billing (OSB), as its name indicates, is an open source billing system. Access its Website https://opensourcebilling.org/ for more information.

When we set up the tutorial environment, we automatically generate for you not only a running instance of each of those applications, but we also generate in each of those systems an imaginary customer using the name an e-mail address you provided when initiating the tutorial.

This imaginary customer will be used throughout the tutorial to demonstrate DPM features and functionality, such as customer matching between applications, fulfilment of data access requests, keeping up with data change scenarios, and more.

Accessing and Using the "Source Systems"

As part of our tutorial, we will walk you through demonstration of how K2View's DPM automates Data Subject Requests (DSR) of different types, such as Data Subject Access Request, data rectification, data anonymization and purging.

For that purpose, as part of the different demo scenarios you will be requested to access the "Source Systems" in order to confirm that the activities were indeed executed as expected.

For example: When a DSAR is completed we will request you to verify that the data collected by the DPM are indeed "your data" as it is reflected in the source systems, or that when a request for data anonymization was completed, "your data" were anonymized at the "source systems".

The following link includes the instructions to login and navigate in those two "source systems". We will direct you to this link in each point in the tutorial where you are asked to view or use the "source systems".

Login and use of the "source environments"

Tutorial Scenarios

Follow the links below to access the step-by-step instructions for each of the tutorial topics. In each topic, use the "next" button to progress through the tutorial steps, and at the end of each topic you will have a link to return to this initial page.

Data Subject Requests

The first section of our tutorial guides you through the steps of implementing the automation and streamlining the fulfilment process of data access requests.

  • Data Subject Access Request (DSAR) - By demonstrating how to create a DSAR Request, we will lead you through the implementation steps that allow you to define the Flow and automation of any type of Data Subject Request that Data Privacy regulations may require.

  • DSAR Fulfillment Process - In this tutorial, you will simulate the scenario of a customer who submitted a DSAR, and the Flow this Request goes through from submission to fulfillment.

  • Auto Sync of Source System Changes - This tutorial demonstrates the DPM seamless synchronization with the source systems by simulating a data change at one of the source systems, and then submitting a DSAR Request for the customer.

  • Data Rectification - The steps in this section simulate the scenario of a customer submitting a Request to rectify its data. As a result, the DPM application automatically updates the data in all relevant source systems and confirm when the request fulfilment is completed.

  • Anonymize Data - This tutorial will simulate a customer Request to anonymize their data in all source systems, and follow this Request to its completion.

  • Purging Data - In this tutorial, you will simulate a customer Request to delete their data in all source systems, and follow this Request to its completion.

Personally Identifiable Information (PII) Discovery

The DPM PII discovery feature provides you with a powerful tool to identify the location where personal data is stored in your organization's systems, and then take the appropriate measures to protect it.

  • PII Discovery - In this guided tutorial, we take you through the steps of defining and executing the PII discovery process.

Managing your customer's preferences and consents is easy with DPM Consent Management capabilities.

  • Consent Management - This interactive tutorial demonstrates how to define any consent topic and the way the DPM system manages the consent preferences of each customer.