https://store-images.s-microsoft.com/image/apps.38812.797c986f-4b74-40c0-a1bc-888f9cfc4766.51a241b1-0e78-433f-bb6c-4567cb66a68a.a7951c2d-1aaf-4bc6-80c6-947151b235d6

Privacy Management Workshop | Microsoft Priva

Epiq Global

Epiq's Privacy Management Workshop enables customers to safeguard personal information and manage privacy risk using Microsoft 365 Priva Priva Privacy Risk Management

Epiq conducts an in depth workshop over 5 days and 5 sessions to educate customers on how Microsoft 365 Priva Privacy Risk Management can facilitate and manage their organizations privacy.

The Privacy Management Workshop allows customers to see how they can safeguard personal information and manage privacy risk by identifying PI and other regulatory data, automating risk mitigation, and preventing privacy incidents by empowering data owners to make smart data governance decisions. In addition, the workshop also allows customers to visualize how they can accomplish subject rights requests at scale and respond with confidence using Microsoft 365 and Priva Privacy Risk Management.


WORKSHOP MILESTONES AND SESSIONS

Milestone 1: Project Kickoff and Discovery
• High-level overview of the Microsoft 365 Priva Workshop and objectives
• Identify privacy stakeholders, confirming early-stage information for the workshop
• Discover current use cases and business issues around Privacy Risk Management (“PRM”)
• Discover how Subject Right Requests (“SRR”) requests are currently managed
• Discuss existing SRR and PRM solutions and processes
• Introduce the Microsoft 365 privacy viewpoint
• Provide an explanation of Microsoft 365 Priva and a high-level demonstration
• Define project timelines

Milestone 2: Priva Workshop
Epiq will demonstrate Priva functionality through 5 sessions.
Session 1
• Overview of the Priva dashboard, Global Settings, Data Profile, Policy types and trends, and SharePoint Online Global Sharing Settings
• Creation of custom policies designed to support existing regulations (e.g. CCPA, GDPR, HIPAA and PCI)
• Creation of test data and generation of sharing activity

Session 2
• Review of the findings, of data profile, of oversharing of sensitive data and data transfers
• End user and admin experience
• Discuss policy tuning and validating results
• SRR Creation for Data Access and Data Export utilizing test data

Session 3
• Review of SRR data collected in previous session
• Demonstration of SRR collaboration and production
• Demonstration of “Right to be Forgotten” data deletion functionality
• Define next steps

Session 4
• Discuss results, outcomes
• Gather feedback and define next steps

Rychlý přehled

https://store-images.s-microsoft.com/image/apps.24606.797c986f-4b74-40c0-a1bc-888f9cfc4766.51a241b1-0e78-433f-bb6c-4567cb66a68a.7299af9b-85fc-4b5d-bd64-88854399281f
https://store-images.s-microsoft.com/image/apps.9795.797c986f-4b74-40c0-a1bc-888f9cfc4766.51a241b1-0e78-433f-bb6c-4567cb66a68a.73c73a62-3c94-4347-8462-238ced263a81
https://store-images.s-microsoft.com/image/apps.45310.797c986f-4b74-40c0-a1bc-888f9cfc4766.b15867f6-edfb-40f1-92b8-45462f3ed380.7ab57901-dfa5-4f9f-9b1b-33a7facbb822