Uploaded by Manar Aj

COOP Training Report - week 4

advertisement
COOP Training Report
Week 4
Prepared by:
Manar Alajmi
1
➢ Overview
• During the troubleshooting phase the process starts with verifying if there are
any connectivity errors within the systems and document them.
• Analyze the error to determine its root cause, by examining error messages, logs,
or conducting various tests and diagnostics to pinpoint the problem.
• Resolve errors by taking the appropriate actions. Depending on the nature of the
issue.
➢ PuTTY Software
• Putty is a tool we can use to check the connectivity of systems.
• Starting with the tool's configuration, the host name or (host IP address) will be
entered, and the connection type (telnet) will be chosen.
• To verify the user access, a host password will be entered.
•
The next step is to verify the connection of the selected system to be tested by
executing the command (telnet) followed by the IP address and port number
provided by SPOC.
• If connection is refused to address the issue, a NAR request or contact with the
SPOC of the tested system will be made.
➢ OneTrust Software
• OneTrust empowers STC to navigate the complex landscape of privacy and data
protection regulations, manage data responsibly, and build trust with their
customers and stakeholders. It serves as a valuable tool for achieving and
maintaining compliance with evolving privacy laws and standards.
2
➢ Key components of STC's use of OneTrust
•
Data Mapping and Inventory: OneTrust allows STC to create a comprehensive
data inventory by identifying and categorizing personal data across the
organization. This includes information on data sources, purposes, and data
subject interactions.
•
Privacy Impact Assessments (PIAs): OneTrust facilitates the assessment of the
privacy risks associated with various data processing activities. STC can use it to
conduct PIAs, assess the impact on data subjects, and implement necessary
mitigations.
•
DSAR Portal: allowing data subjects to submit requests directly to STC and
allowing them to demonstrate compliance and automate record keeping by
operationalizing the fulfilment of data subject requests.
➢ KT Sessions
•
Data Mapping module 1:
- An overview data mapping automation list, which contains inventory, main
dashboard, assessments, etc.
- The inventory contains the processing activities which are all the gathered
information’s “attributes”.
- Inventory manager enables the user to select the type for the inventory
attributes or data lists to configure. For instance, the types could be asset,
process, vendor or entity attributes.
Two ways to create a processing activity:
1- Creating processing activity: the process of creation starts with filling the
process name, managing organization and the business process owner.
The user can select to make this process a master record which creates a
local version of it.
2- Bulk Create: this option takes the user to the backend of the system
which contains import templates, theses templates allow the user to
create the processing activity in a more in-depth manner as in adding
more details for the activity.
3
Download