Salesforce

Training Implementation Playbook

« Go Back
Information
Training Implementation Playbook
UUID-f661e140-d5e3-b04f-2cbb-36d68a03f19a
Article Content

Using OneTrust's Training module, you can conduct training across your organization to enhance users' knowledge of regulations and best practices related to privacy, security, ethics.

Providing training to your users can enhance your organization's compliance with laws and industry protocol.

Setup Checklist

Refer to the following steps when implementing Training:

  • Add users.

    Add users to OneTrust manually in Global Settings. If you need to add multiple users, skip to the next step.

  • Bulk import users.

    Add multiple new users at once using the Create Users bulk import template.

  • Assign roles and permissions.

    Once you've added users, assign them appropriate roles. These roles will apply specific permissions for accessing and viewing courses and enrollment information. If you need to assign a custom role, see Creating Custom Roles for Training.

  • Select courses.

    Pick which course(s) you want users to complete. For a complete list of course offerings, see Training Course and Packaging Guide.

  • Enroll users in courses.

    After you've selected a course, enroll your users. You can also select a language, set a deadline, and configure enrollment reminder emails.

    Note

    Course enrollment is not available for all customers. Specifically, if you have purchased the OneTrust LMS, you can assign courses in a Campaign. For more information, see the Campaigns knowledge base in myOneTrust.

  • Monitor and export enrollment information.

    After enrolling users, view enrollment information on the Enrolled Users tab of the Course Details screen and export a full report of enrollment data, including the enrollment date, course status, and deadline for each user.

Training Permissions and Roles

The following permissions and roles are currently available for use with the Training module.

Training Permissions

Permission

Description

Info

AwarenessTrainingModuleAccess

Access the Training module from the main navigation menu.

Users must have this permission in order to access any Training feature.

AwarenessTrainingLibrary

Access the Training Courses screen and Course Details screen. Watch video previews of training courses.

Users must have this permission to access courses and course files.

AwarenessTrainingAssign

Assign courses to other users.

Users must also have AwarenessTrainingLibrary for this permission to work as expected.

Users must also have AwarenessTrainingViewEnrollment to see which users have been assigned specific courses.

AwarenessTrainingViewEnrollment

View the users enrolled in a course along with status and score.

Users must also have AwarenessTrainingAssign to view the enrollment wizard.

AwarenessTrainingRequestDemo

View and interact with the Request Demo button on the Training Welcome screen.

AwarenessTrainingDownloadSCORM

Download Training SCORM packages to upload them to external LMS tools.

Training Roles

  • Training Learner: Training Learners are low-level users who can only access training courses that have been assigned to them. Training Learners do not have access to any administrative functions.

  • Training Manager: Training Managers are business users who have access to most everyday and some administrative functions in the Training module. By default, Training Managers have limited access to destructive and configuration functions.

  • Employee: Employees are users who only need access to the Employee Portal, where they can find their assigned courses under My Action Items. This role is for customers who are using the OneTrust LMS.

Creating Custom Roles for Training

You can create custom roles for Training to allow your Learning and Development team to access and download course files.

About the role

This role is designed to give limited access to the OneTrust application for employees who need to preview and download Training files. It does not grant access to other application modules.

This role has 4 total permissions:

Permission

Description

Welcome

Grants access to the OneTrust application home screen.

Training Module Access

Grants access to the Training module from the main navigation menu and home screen.

Training Library

Grants access to the course library including the ability to preview courses.

permission.name.AwarenessTrainingDownloadSCORM

Grants access to download Training courses as SCORM files for upload to LMS tools.

If you want to add these permissions to an existing custom role, these permissions can be found in the Training section of the role customization interface.

To create a custom role by upload

  1. On the Global Settings menu, select Roles from the User Management section. The Roles screen appears.

  2. Click the Import button. The Import Role modal appears.

  3. Complete the fields. For more info, see Import Role Modal Reference.

  4. Click the Import button.

Import Role Modal Reference

import_role.png

Field

Description

Name

Enter a name for the role.

Description

Enter a brief description of the role and its purpose.

Organization

Select the organization group with which the role is associated.

File

Click the Upload button and then use the file explorer to select the role spreadsheet.

The spreadsheet for this role (RoleAwarenessTrainingDownload.xlsx )is attached to this article or can be found in the Training Discussion group.

Adding and Editing Users

In order to access the OneTrust application, every user will need their own user profile. You can add users to the account directly from Global Settings. Users can be assigned multiple roles within multiple organizations, which can provide flexibility to accommodate each user's specific permissions needed to perform their respective job duties. Users can also be assigned to user groups through which they will inherit the roles associated with that user group in addition to their existing roles and permissions.

Note

For additional information, click here to reference frequently asked questions (FAQ) about user management.

To add a user

  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the Add User button. The Add User Details section appears.

  4. Complete the required fields and enter additional details, as needed. For more information, see Add User Screen Reference.

  5. Click the Next button. The Assign Roles to User section appears. For more information, see Add User Screen Reference.

  6. Click the Add Role button. The Add Role modal appears.

  7. In the Role field, select a role to assign to the user.

  8. In the Organization field, select the organizational group in which the user will have the defined role.

  9. Click the Add button. The selected role appears in the Assign Roles to User section.

    Note

    You can assign multiple roles within multiple organizations to a user by repeating steps 5 - 8 or by clicking the Save and Add New button on the Add Role modal.

  10. Click the Create button.

    Note

    The new user will be sent a Welcome email with a link to access the application. Clicking the link will take the user to the OneTrust Login screen and the user will be prompted to create a password before accessing the application.

    To disable sending the Welcome email to new users that will use basic authentication to log in to the application (i.e. users with non-SSO email domains), disable the Welcome Email template on the Templates tab on the Email screen.

    To disable sending the Welcome email to new users that will use Single Sign-On (SSO) to log in to the application, disable the Welcome Email (Directory User) template.

    For more information on disabling email templates, see the To disable an email template procedure in Emails: Branding & Templates.

Add User Screen Reference

Add_User_Wizard.png
Add_Role_modal.png

Section

Field

Description

User Details

First Name

Enter the user's first name.

Last Name

Enter the user's last name.

Email Address

Enter the email address for the user. The email address must be unique and will be used to access the application.

External User

Select the check box if this is an external user. Leave the check box blank if this is an internal user.

Enter Expiration Date

Enter the date on which an external user's access to the application should automatically expire.

Note

This field is available when the External User check box is selected. This optional feature can be used when you need to add external users for a short period of time; for example, just the amount of time necessary for a vendor to complete an assessment.

Additional Attributes (Optional)

Business Unit

Enter the user's business unit.

Department

Enter the department with which the user is associated.

Division

Enter the division with which the user is associated.

Employee ID

Enter the user's employee ID.

Job Title

Enter the user's job title.

Manager

Select the user's manager from the list of users within the application.

Manager (Legacy)

Enter the name of the user's manager.

Note

The Manager (Legacy) field will be deprecated in the future. OneTrust recommends using the new Manager field to populate this attribute for new and existing users.

Office Location

Enter the location of the user's office.

Assign Roles to User

Role

Select a role to assign to the user. You can select from the default roles provided in the application or select a custom role. You can also assign multiple roles to the user.

For more information about roles and how to customize them, see Creating and Editing Custom Roles.

Organization

Select the organizational group in which the user will have the defined role.

For more information about organizational groups and hierarchy, see Managing Organizations.

User Information tab

On the User Information tab on the Users screen, you can modify an existing user's details and any additional attributes configured when the user was created.

Note

If editing the user's email address, see Editing a User's Email Address.

To edit user details
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user you want to edit. The User Information tab on the Users screen appears.

  4. Hover over a field you want to modify, and click the Edit icon that appears. Editable fields become available.

    User_Information_tab.png
  5. Edit the fields, as necessary.

  6. Click the Save button.

Editing a User's Email Address

Global Settings Configuration

Site Admins can configure whether a user is required to confirm changes to their email address using the Require Users to Confirm Email Address Change setting on the User Settings screen in Global Settings.

User_Profile_-_Advanced_Options_tab.png

Based on the selected configuration, the following scenarios will apply:

Global Settings Configuration

Description

Require Users to Confirm Email Address Change setting is enabled in Global Settings

If a change is made to a user's email address, an email message will be sent to the new email address with a link to confirm the change. Another email message will be sent to the old email address to inform the user of the change request.

Note

The email address will be updated in the application only after the change request is confirmed using the received link.

Require Users to Confirm Email Address Change setting is disabled in Global Settings

Changes made to a user's email address will be automatically updated and will take effect immediately. Users will not be required to confirm the change once submitted.

Things to Know

If SSO is enabled, Site Admins will need to ensure that the new email address is updated in the IdP for the change to take immediate effect. It is important to update the email address correctly in both the IdP and the application to avoid user lockout and/or unwarranted access.

Note

A user's email address cannot be updated in the following scenarios:

  • The user being edited is an External user.

  • The user being edited is an Invited user.

  • The user being edited has multiple accounts in the same application environment.

  • The user who is attempting to update the user's information is an External Site Admin. OneTrust Consultants are generally External users and cannot perform this action within your account.

  • The user who is attempting to update the user's information is not assigned to the root organization.

  • The user is attempting to update their existing email address on a domain verified for SSO to an email address that is not on a domain verified for SSO.

To edit a user's email address
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user you want to edit. The User Information tab on the Users screen appears.

  4. Hover over the Email Address field, and click the Edit icon that appears. Editable fields become available.

  5. In the Email Address field, update the user's current email address to the new email address.

  6. Click the Save button.

Roles tab

On the Roles tab on the Users screen, you can assign, edit, and remove roles from the user. Roles assigned to the user individually as well as roles inherited by the user through an assigned user group appear on the Roles tab. In addition, when the user logs in, they will then be able to see their access granted by their assigned roles.

Note

For more information on identifying your assigned roles and organizations, see Viewing Assigned Roles and Organizations.

Roles_tab.png
To assign roles to a user
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user to which you want to assign a role. The User Information tab on the Users screen appears.

  4. Navigate to the Roles tab. The roles assigned to the user appear.

  5. Click the Add Role button. The Add Role modal appears.

    Add_Role_modal.png

    Field

    Description

    Role

    Select a role to assign to the user.

    Note

    Only existing Site Admins can assign the Site Admin role to another user.

    Organization

    Select the organizational group in which the user will have the defined role.

  6. Complete the fields, as necessary.

  7. Click the Add button.

To edit an assigned role
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user for which you want to edit a role. The User Information tab on the Users screen appears.

  4. Navigate to the Roles tab. The roles assigned to the user appear.

  5. Hover over the role that you want to edit, and click the Context Menu icon context_menu_icon_v2.png that appears.

  6. On the Context menu, select Edit. The Edit modal appears.

    Users_screen_-_Edit_modal.png
  7. Modify the fields, as necessary.

  8. Click the Save button.

To remove roles from a user
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user from which you want to remove a role. The User Information tab on the Users screen appears.

  4. Navigate to the Roles tab. The roles assigned to the user appear.

  5. Select the check boxes corresponding to the role(s) you want to remove from the user. Multiple check boxes can be selected.

  6. Click the Remove button. The Remove Role modal appears.

    Note

    At least one role must remain assigned to a user.

    Users_screen_-_Remove_Role_modal.png

    Note

    If the role you are removing is tied to an assigned user group, the modal below will appear stating that the user will be removed from the respective user group. All inherited roles and permissions granted by the user group will be removed from the user. You can identify which roles were inherited from a user group using the User Group column on the Roles tab.

    Users_screen_-_Remove_Role_modal_-_tied_to_user_group.png
  7. Click the Confirm button.

User Groups tab

On the User Groups tab on the Users screen, you can assign the user to user groups. When a user is added to a user group that has additional roles that the user may not currently have, the user will inherit the roles associated with that user group in addition to their existing roles and permissions. When the user logs in, they will then be able to see their additional access granted by those new roles.

Note

For more information on identifying your assigned roles and organizations, see Viewing Assigned Roles and Organizations.

Users_screen_-_User_Groups_tab.png
To add the user to a user group
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user that you want to add to a user group. The User Information tab on the Users screen appears.

  4. Navigate to the User Groups tab. The user groups to which the user is added appear.

  5. Click the Add User Group button. The Add User to User Group(s) modal appears.

    Users_screen_-_Add_User_to_User_Groups_modal.png
  6. In the User Group field, select the user group(s) to which you want to add the user.

  7. Click the Add button.

To remove the user from a user group
  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select User Management > Users. The Users screen appears.

  3. Click the link in the Name column for the user that you want to remove from a user group. The User Information tab on the Users screen appears.

  4. Navigate to the User Groups tab. The user groups to which the user is added appear.

  5. Select the check boxes corresponding to the user group(s) from which you want to remove the user. Multiple check boxes can be selected.

  6. Click the Remove button. The Remove User from User Group modal appears.

    Users_screen_-_Remove_User_from_User_Group_modal.png

    Note

    If removing the user from multiple user groups, the Remove User From Multiple User Groups modal appears.

    Users_screen_-_Remove_User_from_Multiple_User_Groups_modal.png
  7. Click the Confirm button.

Additional Resources

For more information on managing users, see the following articles in the OneTrust Knowledge Base.

User Management FAQ

The following responses are supported solutions to frequently asked questions (FAQ) about user management. The OneTrust team continuously monitors these inquiries and will make additional FAQ available as they are identified.

1.

Why am I receiving the following error message: "Unable to add user as an email update is In progress."

This error message appears if an update to a user's email address is actively in progress and an attempt to create a new user with that same email address is made. You can locate the user record that is actively being updated on the Users screen > All Users list by either searching for the user's old email address or by searching for the user's first or last name.

The error can be resolved using one of the following methods:

  1. The user can confirm the change via the link in the email message sent to the new email address.

  2. If the user is unable to confirm the change, you can cancel the change, disable the Require Users to Confirm Email Address Change setting in Global Settings, and update the user's email address again. With this setting disabled, changes made to a user's email address will be automatically updated and will take effect immediately. Users will not be required to confirm the change once submitted.

    Note

    For more information, see Editing a User's Email Address.

To import users in bulk

  1. Click the gear icon gear-icon_global-settings.png in the upper right-hand corner to access Global Settings.

  2. On the Global Settings menu, select Data Import > Import Templates. The Import Templates screen appears.

  3. Download the Create Users import template.

    Note

    You can update users in bulk using the Update Users template.

  4. Open the downloaded file in Microsoft Excel.

  5. Complete the downloaded template for the users you want to import. For more information, see Bulk Import Fields.

    Note

    The bulk import process does not support the following characters when creating multiple users: /, |, and ;. A new row is needed for each user.

    In addition, allow the bulk import to complete before uploading more files. Files larger than 64 MB are not supported.

  6. On the Import Templates screen, click the New Import button. The New Import modal appears.

  7. In the Import Name field, enter a name for the import.

  8. In the Import Description field, enter a brief description of the contents of the import.

  9. In the Import Type field, select the type of import which corresponds to the template you are using.

  10. In the File field, click the Upload File button.

  11. Use the file explorer to select the spreadsheet you want to import.

    Note

    Verify that the spreadsheet is saved as an .xlsx file.

  12. Click the Submit button. 

  13. To view the status and result of your bulk import, select Data Import > Bulk Import on the Global Settings menu.

    Note

    If there was an error in the upload, click the link in the Result column for the import to download a report indicating the errors.

Bulk Import Fields

Users

The following fields are required for bulk importing users. Complete the remaining optional fields, as necessary.

Field

Description

Action

Enter Create.

Email Address

Enter the email address of the user you want to add. The user will need to use this email address to log in to OneTrust and all OneTrust platform emails will be sent to this address.

First Name

Enter the first name of the user.

Last Name

Enter the last name of the user.

Organization

Enter the name of the organization to which the user belongs.

The organization must already exist in OneTrust for the bulk upload to work correctly. 

Role

Select the role you want the user to have.

If you want to assign a user to a different role, you can reassign the user's role on the Users screen.

User Type

Enter whether the user is Internal or External.

Expiration Date

(Optional)

Enter the expiration date for an external user's access to OneTrust in the format YYYY-MM-DD.

Note

Only enter an expiration date for external users, as needed.

Department

Enter the department to which the user belongs.

Business Unit

Enter the business unit to which the user belongs.

Employee Id

Enter the employee Id of the user.

Manager

Enter the name of the user's manager.

Division

Enter the division to which the user belongs.

Job Title

Enter the job title of the user.

Office Location

Enter the office location of the user.

Send Activation Email

Enter True or False to indicate whether to send the initial activation email to the user.

Note

A blank entry in this field is interpreted as True.

New Email Address

Enter the new email address to update for the user. The user will use this new email address to log in to OneTrust and all OneTrust platform emails will be sent to this address.

Note

The email address can only be updated for active, internal users by users with appropriate permissions.

Training Course and Packaging Guide

OneTrust Training Course Design

OneTrust Training courses are learning experiences de. igned for compatibility with modern LMS and LCMS platforms. These courses are interactive and require employees to participate and engage with the content being presented. Many of the courses also include assessments which help to gauge the success of the training. Because everyone learns and interacts at a different pace, it may take longer than the estimated runtime to fully experience the course and complete any assessments that are included.

How Training is Sold

OneTrust training is available in four packages:

Package

Description

Privacy Essentials

This package includes 15 essential privacy and security courses covering data protection basics and key global regulations such as GDPR, CCPA, and LGPD.

Ethics Essentials

This package includes 19 essential ethics, compliance, and security courses covering topics such as corruption, anti-trust, and whistleblowing. This package includes an 8unit course on anti-harassment.

Privacy All Access

This package includes all available privacy courses including role-based courses for customer service, human resources, and marketing.

Learning Management System (LMS)

This package includes access to the OneTrust Campaigns tool as well as Training's Bring Your Own Content (BYOC) feature.

Customization Options

We offer fully customized courses tailored to your programs and policies. Some course examples include topics like Code of Conduct, Gifts & Hospitality, and Privacy Policies. We can use training methodologies like gamification, and video/audio and include interactivity. These projects are uniquely scoped and can be translated for a fee.

Branding Projects:

This process is for projects that require branding only. There will only be a Technical Consultant assigned to these - no Project Manager.

  • Branding definition:

    • Branding colors throughout course

    • Logo on title screen

    • Custom Background (logo + branding)

    • 1 resource or policy slide

    • Custom pass/fail quiz scores/percentages

    • Customized completion certificate

Branding + Markup Projects:

This process is for projects that require branding along with any markup changes that are captured in the course transcripts. There will be a Project Manager and a Technical Consultant working together.

  • Branding (as defined above)

  • Markup in course transcript:

    • Various levels of verbiage changes/swaps/updates.

Custom Course Projects:

This process is for projects made entirely from scratch using customer content.

Some course examples include topics like Code of Conduct, Gifts and Hospitality, and Privacy Policies.

We can use training methodologies like gamification and can include add-ons like video, voice-overs, custom knowledge checks and assessments.

Privacy Essentials

The courses in this package are available in the following languages: English (US), Chinese (Simplified), Czech, Danish, Dutch, Finnish, French, German, Italian, Japanese, Norwegian, Polish, Portuguese (Brazil), Slovak, Spanish (Spain), and Swedish. OneTrust can facilitate translation to additional languages for a fee.

Topic

Description

Estimated Duration

Data Protection Basics Unit 1 - Why Privacy Matters

This unit answers questions such as:

  • What is privacy?

  • Why should I care about data protection?

  • Why is data protection important to my organization?

By helping employees understand data protection and information security, you can reduce errors that often result in data protection incidents.

10 minutes

Data Protection Basics Unit 2 - Personal Information

Recognizing personal data is a critical step in data protection.

This course introduces the concepts of sensitivity, identifiability, masking, aggregating and truncating to help employees better recognize and process personal data.

10 minutes

Data Protection Basics Unit 3 - Handling Personal Information

Data protection responsibilities begin the moment personal data enters your organization and continue until it is destroyed.

Through various scenarios, employees understand how to apply the data protection principles of transparency, consent, data minimization, purpose limitation, security, and access throughout the information life cycle.

10 minutes

Privacy and Data Protection Basics Review - A Knowledge Check (Quiz Only)

This course is designed as a refresher course for your team on the essentials of privacy and data protection.

It includes 15 questions, varying in difficulty, to assess how well employees remember their basic training.

10 minutes

Privacy and Data Protection Essentials

This introductory course provides learners the foundation needed to understand privacy concepts, including defining personal information, outlining the data lifecycle, defining privacy and its importance to organizations handling personal information.

The course also covers basic privacy principles and how they form the basis for laws and organizational policies.

10 minutes

Privacy and Security Awareness

Increase employees’ awareness of basic privacy and security practices in the workplace.

Topics include analyzing types of information, minimizing data access to only what is necessary, keeping information secure, properly destroying information, and staying alert.

10 minutes

Privacy by Design

This course explains what privacy by design is, how it works and how it benefits your organization.

Topics include identifying necessary data, protecting data, limiting how data can be used, limiting data sharing, ensuring accessibility of user controls and providing notice to individuals.

10 minutes

The California Consumer Privacy Act and California Privacy Rights Act (CCPA and CPRA)

The California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA) feature broad privacy requirements new to many businesses.

Get out in front of this sweeping legislation by helping employees understand the scope of the law, definitions of “personal information” and “consumer,” business obligations and consumer rights.

10 minutes

Brazil’s LGPD: A Practical Overview

Having a basic grasp of Brazil’s new data protection law lets mid-level employees better explain and enforce the policies and procedures your organization puts into place.

It also helps identify potential issues in data processing that should be addressed.

This course discusses the terminology used in the LGPD, data subject rights, the legal bases for data processing, basic privacy principles, and data controller obligations.

10 minutes

GDPR: A Practical Overview

This course discusses GDPR terms and their real-world applications, data subject rights, privacy principles and data controllers’ obligations, so mid-level employees can better explain and enforce GDPR policies and procedures within your organization.

24 minutes

GDPR: A Knowledge Check

How well do your employees understand basic concepts of the GDPR and their effect on the handling of personal data?

This course tests employees’ retention of what they’ve learned about the GDPR and identifies those who need follow-up training.

10 minutes

Identifying Phishing Attacks

This fully-interactive and timed unit raises learner awareness of various indicators to help identify phishing attempts.

Learners are challenged to review emails and decide which are legitimate and which are phishing attacks.

10 minutes

Recognizing and Avoiding Social Engineering

Data thieves use a variety of methods to trick employees into divulging information.

This course explores some of the tactics and common warning signs for phishing, spoofing, telephone and in-person scams.

10 minutes

Data Security for Remote Work

This course will outline essential information regarding employees working remotely and suggest best practices to mitigate potential data security vulnerabilities.

10 minutes

Incident Preparedness: Recognizing Risks

This training is designed to help you identify potential sources of incidents, many of which are common employee errors or social engineering attacks.

Learn best practices, potential consequences of security incidents, and recognize when to report issues that arise.

10 minutes

Ethics Essentials

The courses in this package will be available in the following languages, starting February 2023: English (US), Chinese (Simplified), Czech, Danish, Dutch, Finnish, French, German, Italian, Japanese, Norwegian, Polish, Portuguese (Brazil), Slovak, Spanish (Spain), and Swedish. OneTrust can facilitate translation to additional languages for a fee.

Topic

Description

Estimated Duration

Anti-Retaliation for Managers

Managers understand that employees are encouraged to report suspicious or discriminatory action.

This courses teaches managers what retaliation is, steps that they can take to prevent it, and the consequences of retaliation.

10 minutes

Speak Up: Whistleblowing in the Workplace

Healthy organizations have open and transparent cultures.

Promote your culture with OneTrust’s Speak Up training course.

Educate your employees on why they have the shared responsibility to step forward and how they’ll be protected.

10 minutes

Anti-Money Laundering

Familiarize learners with the basics and seriousness of money laundering.

Learners will navigate a money laundering scheme as a criminal and learn how to identify, recognize, and understand what measures to take to prevent it within the organization.

10 minutes

Introduction to Anti-Bribery

This course explains how to identify bribery and avoid it.

Learners will be provided with an overview of what activities are inappropriate, along with major legislation and penalties around the world.

10 minutes

Conflict of Interest

This course is intended to educate and explain the importance of understanding conflicts of interest. Employees will explore common types of conflicts of interest and how to identify and report them to the business.

10 minutes

Insider Trading

Educate and equip learners with an overview of how to handle material non-public information and explain the responsibilities relative to preventing insider trading.

10 minutes

Handling Confidential Information

Managing confidential information correctly is critical for preventing data breaches.

After completing this course, learners will be able to define key terminology, discuss information handling practices, identify how confidential information is organized and be able to do their part to keep confidential information safe.

10 minutes

Identifying Phishing Attacks

This fully-interactive course raises learner awareness of various indicators to help identify phishing attempts.

Learners are challenged to review emails, text messages, and voice calls and decide which are legitimate and which are phishing attacks.

10 minutes

Recognizing and Avoiding Social Engineering

Data thieves use a variety of methods to trick employees into divulging information.

This course explores some of the tactics and common warning signs for phishing, spoofing, telephone and in-person scams.

10 minutes

Data Security for Remote Work

This course will outline essential information regarding employees working remotely and suggest best practices to mitigate potential data security vulnerabilities.

10 minutes

Incident Preparedness

This training is designed to help you identify potential sources of incidents, many of which are common employee errors or social engineering attacks.

Learn best practices, potential consequences of security incidents, and recognize when to report issues that arise.

10 minutes

Anti-Harassment Unit 1: Anti-HarassmentBasics

Our workplaces should be friendly, welcoming, comfortable, and safe.

This course will introduce learners to workplace harassment, and teach them how to contribute to a safe work environment.

10 minutes

Anti-Harassment Unit 2: Responsibilities of Supervisors

This course will outline the responsibilities supervisors and people managers have to prevent harassment on their teams.

10 minutes

Anti-Harassment Unit 3: Reporting and Investigations

This course will educate employees on how to report harassment and what will happen after a report is made.

10 minutes

Anti-Harassment Unit 4: Handling Complaints

This course is designed to teach supervisors how to handle complaints and reports made by their team members, including when and how to escalate with HR.

10 minutes

Anti-Harassment Unit 5: Bystander Intervention

This course will educate team members on when and how to intervene in situations they observe.

10 minutes

Anti-Harassment Unit 6: Identifying Harassment in Practice

This course is a hands-on practice in identifying what is or is not harassment.

Learners will navigate multiple scenarios where harassment may be taking place and make decisions about what to do.

10 minutes

Anti-Harassment Unit 7: What Should I Do?

Sometimes you just need some advice. In this course, learners will act as the sounding board for others who aren’t sure what to do and offer advice on how to proceed.

10 minutes

Anti-Harassment Unit 8: Harassment in the News

Harassment can be big news and enforcement can carry big fines.

In this course, learners will read real news stories talking about the impact of harassment and how it’s enforced.

10 minutes

Privacy All Access

The courses in this package are available in English only. OneTrust can facilitate translation to additional languages for a fee.

Advanced Privacy Topics

Topic

Description

Estimated Duration

Data Privacy for Information Security Professionals Part 1

Information security professionals, system administrators and other IT employees must understand how to maintain privacy and navigate potential risks to personal information while managing an organization’s network.

Unit topics include inventorying and updating systems and information, deleting unnecessary information, setting and reviewing access controls, employee monitoring, vendor management, plus helping develop and implement policies and training.

10 minutes

Data Privacy for Information Security Professionals Part 2

This unit helps information security professionals, system administrators and other IT employees recognize security issues throughout the data lifecycle.

It addresses topics such as what personal information is and how to identify it, so they can better assist in determining appropriate uses for that data.

This, in turn, allows them to institute proper limitations on access to the data.

Understanding how data is classified also permits proper storage, archiving and destruction of data.

10 minutes

Advanced Data Subject Rights: GDPR

Under GDPR regulations, companies are obligated to comply with data subject requests in a timely, efficient manner.

This unit provides specific information on data mapping and minimization, plus data storage and sharing that facilitate compliance. We also review what constitutes “consent,” appropriate authentication and how privacy notices enable proper compliance.

10 minutes

Privacy Topics for Management and Customer-Facing Personnel

Topic

Description

Estimated Duration

Privacy for Managers

Managers are in a unique position to regularly gather personal information about the employees they oversee.

This unit is designed to help them recognize personal information when they encounter it, as well as understand their role in helping organizations maintain employee privacy.

10 minutes

Privacy Essentials for Sales Professionals

If your sales team can’t address customer concerns about basic privacy fundamentals and policies, sales can be delayed or lost.

This introductory unit provides them with foundational knowledge of key privacy concepts, including the definition of personal data, privacy laws that can affect sales professionals, the data lifecycle and data protection principles with a focus on data minimization.

10 minutes

Privacy Essentials for Finance

Employees working in the financial sector—for example, personal banking, investment banking, insurance, credit reporting, credit lending, and mortgage lending—handle a significant amount of information about individuals.

This introductory unit provides foundational knowledge of key privacy concepts, including the definition of personal data, global privacy laws that apply to the finance sector, and the data lifecycle.

10 minutes

Privacy and Customer Service

On the front lines of handling personal information, customer service employees need to be educated in proper processing to keep data safe and maintain customer privacy.

This unit discusses the importance of verification and authentication procedures, the critical privacy principles of data minimization and use limitation, as well as concerns about sharing data and taking notes when helping customers.

10 minutes

Protecting Privacy in Call Centers

Call center employees handle personal information every day and must be aware of how to handle it properly.

This unit examines several primary privacy concerns, including social engineering, note taking, data minimization, use limitation and security.

10 minutes

GDPR Compliance for Customer Service

Customer Service Employees will learn about Data Subject Requests and their role and responsibilities in responding to these requests.

Through a series of interactive scenarios, this unit will cover details about Data Subject Rights, what employees are and are not authorized to do in response to a request, and when a request may need to be escalated while providing context through real-life examples.

10 minutes

CCPA Compliance for Customer Service

Employees will learn about consumer rights and their role in fulfilling them, as well as when a request may require escalation.

In addition, they will learn about CCPA business requirements, such as providing consumers with the means to submit a request and the importance of authenticating consumers

10 minutes

Privacy in the Procurement Process

Employees are not always aware of privacy concerns that can arise when working with vendors.

This unit explains what a vendor is and how to select one, what to consider when ending a vendor relationship, and how to identify potential privacy risks while managing vendors.

10 minutes

Privacy Topics for Human Resources (HR)

Topic

Description

Estimated Duration

HR: Bring YourOwn Device (BYOD)

Human Resource professionals face special considerations and issues when employees use their own devices for work.

Understanding the risks involved with Bring Your Own Device (BYOD) and knowing how to communicate and enforce policies are key to protecting your organization and your employees.

10 minutes

HR: Employee Privacy and Third-Party Vendor Management

Discusses the potential risks and mitigation strategies involved with outsourcing health records management, 401K plan administration, and management of other benefit and wellness plans.

10 minutes

HR: Privacy Considerations When Monitoring Employees

This unit is designed to help you consider the implications of monitoring, so you can better protect your organization and the privacy of employees.

Monitoring employees, workplaces and information is becoming more and more important. Along with the need for monitoring comes the need for well-thought out policies, clear communication and careful implementation.

10 minutes

HR: Handling Employee Files

This unit covers the proper handling of data stored in employee files, including controlling access to those files, appropriate storage of medical and background check data, managing employee data throughout its lifecycle, exercising discretion when discussing employee information, and how to handle sensitive information.

10 minutes

HR: Privacy in the Hiring Process

How does privacy impact the hiring process when you need to reduce legal risks yet maintain a good reputation with applicants?

Learn how to protect the information of applicants and employees while protecting yourself and your organization from legal ramifications.

10 minutes

Privacy Topics for Marketing

Topic

Description

Course Duration

Marketing: Collecting Consumer Information

This unit focuses on privacy concerns raised when marketers collect information about consumers, including why information collection should be limited, the importance of a comprehensive privacy notice, and how laws vary depending on location and how information is collected.

10 minutes

Marketing: Using Consumer Information

With so many ways to use consumer information, marketers need to be tuned in to customers’ points of view, be aware of privacy risks, concerns and legal requirements associated with different methods of marketing, and understand the importance of customer controls.

10 minutes

Marketing:  Maintaining Privacy When Working with List Vendors

Using list vendors to reach consumers allows your organization to expand its marketing reach.

This unit highlights important privacy concerns, plus concrete ways you can minimize risk when contracting with a list vendor.

10 minutes

Marketing: Interest-based Advertising for the Privacy-Conscious Marketer

By its nature, interest-based advertising centers on information collected about individuals.

How can your organization utilize this effective marketing technique while simultaneously protecting consumers’ privacy?

Learn about privacy concerns that may surface with interest-based advertising, plus how to recognize and avoid risk.

10 minutes

Marketing: Tracking Technologies and Privacy

Provide marketing employees with best practices for utilizing tracking technologies such as cookies effectively, while meeting consumer expectations and protecting your organization.

Explore necessary notices and consents, issues related to identifying individuals across devices through tracking technologies, and how to mitigate the risks of third-party data collection on websites and apps.

10 minutes

Marketing: Loyalty Programs

This unit examines how privacy can be maintained while collecting information from customers through a privacy program.

It explores why notice and choice are important, how to employ privacy principles and the potential effect of third parties on privacy.

10 minutes

Marketing: Children's Data Protection Around the World

Children’s personal information is subject to additional regulation and consideration beyond that of adults.

This course covers those considerations and requirements in various global laws and design codes.

10 minutes

Privacy Topics for Healthcare

Topic

Description

Estimated Duration

Privacy Essentials in the Healthcare Industry

This course will help define personal data and sensitive personal data, including health data.

The course will discuss general data protection principles, with a focus on data minimization and data lifecycle, meeting privacy expectations of individuals and list key privacy laws that affect processing of health data.

10 minutes

HIPAA for Self- Insured Companies

Since self-insured companies may receive information about employee health or medical treatments, they must comply with HIPAA.

This course covers the obligations self-insured companies have to protect health data.

10 minutes

Global Privacy Regulations

Topic

Description

Estimated Duration

Canada PIPEDA

Canada's PIPEDA is a federal law that sets out the rules of how businesses can collect, use and disclose personal information in the course of commercial activities in Canada.

(Available in English and French Canadian.)

10 minutes

Virginia CDPA

The Virginia Consumer Data Privacy Act (CDPA) was signed into law on March 2, 2021 and will become effective on January 1, 2023.

This course covers: definitions, obligations, penalties, and more.

10 minutes

Thailand PDPA

The PDPA course covers the collection, use, disclosure, and/or transfer of personal data (data processing) within Thailand as well as data processing outside of Thailand.

(Available in English and Thai.)

10 minutes

Japan APPI

Is your organization compliant with Japan's Act on the Protection of Personal Information, or APPI?

This mini course will help your organization discover the various elements of personal information, principals' rights, and the duties for a Personal Information Controller under the APPI.

(Available in English and Japanese.)

10 minutes

South Africa POPIA

Is your organization compliant with South Africa’s POPIA?

POPIA protects the personal data of both natural and legal persons and applies to the processing of personal information by a responsible party.

10 minutes

Privacy in China

This course covers privacy regulation in China, including the Cybersecurity Law (CSL) and Personal Information Protection Law (PIPL).

(Available in English and Simplified Chinese.)

10 minutes

Colorado Privacy Act

The Colorado Privacy Act (CPA) was signed into law on July 7th, 2021 and will become effective on July 1, 2023.

This course covers: definitions, obligations, penalties, and more.

10 minutes

The Connecticut Data Privacy Act (CTDPA)

The Connecticut Data Privacy Act (CTPDA) was signed into law on May 10th, 2022 and will become effective on July 1, 2023.

This course covers: definitions, obligations, penalties, and more.

10 minutes

ISO 27001

ISO 27001 is an internationally recognized standard for information security management.

It provides a systematic approach for organizations to establish, implement, maintain, and continually improve their information security management system (ISMS).

The standard outlines a comprehensive set of controls and best practices designed to safeguard the confidentiality, integrity, and availability of information assets.

By adhering to ISO 27001, organizations can effectively manage risks, protect sensitive data, and demonstrate their commitment to maintaining a robust information security posture.

10 minutes

System and Organization Controls 2 (SOC 2)

System and Organization Controls 2 (SOC 2) is a widely recognized auditing standard developed by the American Institute of Certified Public Accountants (AICPA).

It focuses on evaluating the effectiveness of a service organization's controls related to security, availability, processing integrity, confidentiality, and privacy.

SOC 2 reports provide valuable insights to customers and stakeholders regarding the organization's ability to safeguard sensitive data and ensure the integrity of its systems.

By undergoing a SOC 2 audit, service organizations demonstrate their commitment to maintaining strong security and data protection practices, enhancing trust and confidence among their clients.

10 minutes

Payment Card Industry Data Security Standard (PCI DSS)

Payment Card Industry Data Security Standard (PCI DSS) is a comprehensive set of security requirements designed to protect sensitive cardholder data during payment card transactions.

Developed by major credit card companies, including Visa, Mastercard, and American Express, PCIDSS aims to ensure the secure handling, storage, and transmission of cardholder information.

It outlines a range of technical and operational controls that organizations must implement, such as network security, access controls, encryption, and regular system monitoring.

Compliance with PCIDSS is mandatory for all entities that handle cardholder data, including merchants, service providers, and financial institutions.

By adhering to PCIDSS, organizations demonstrate their commitment to maintaining a secure payment environment, reducing the risk of data breaches, and protecting the privacy and trust of their customers.

10 minutes

Learning Management System (LMS)

This package contains access to the following:

Managing Course Enrollment

Using Training, you can enroll and unenroll users from training courses, view the details of their course assignment, and resend enrollment notifications.

Note

Course enrollment is not available for all customers. Specifically, if you have purchased the OneTrust LMS, you can assign courses in a Campaign. For more information, see the Campaigns knowledge base in myOneTrust.

To enroll a user in a course

  1. On the Training menu, select Courses. The Courses screen appears.

  2. Hover over a course tile until the Enroll button appears.

  3. Click the Enroll button. The Enrollment Details screen appears.

  4. Select a deadline and set a default language. You can also set automatic enrollment reminders, add any comments you have for the enrolled user, and opt to update the course to its latest version.

    enrollment_wizard_update.png
  5. Click the Next button.

  6. Select the check boxes next to the names of each user or group you want to enroll. For more information, see Enrollment Details All Users Screen Reference and Enrollment Details Groups Screen Reference.

    Note

    When selecting users across multiple pages of the user list, your selections from previous pages will remain intact when navigating to subsequent pages.

    Note

    To filter the list of enrolled users by managing organization, click the the filter Filter.png icon.

  7. Click the Submit button. The Course Details screen appears.

  8. A list of enrolled users and course assignment details will display in the Enrolled Users tab.

Enrollment Details All Users Screen Reference

AllUsersEnroll.png

Note

When you select a record, you have the ability to select all available records at once.

Field

Description

Full Name

The user's name.

Email

The user's email.

Organization

The managing organization to which the user belongs.

Filter

Select the icon Filter.png to filter the list of users by managing organization.

Enrollment Details Groups Screen Reference

EnrollGroups.png

Note

User Groups are added through the Global Settings menu. For more information, see Managing User Groups.

Field

Description

Select Row

Select the groups to be enrolled in the course.

Group Name

The name of the group.

Description

A brief description of the users in the group.

Number of Users

The number of users in the group.

To unenroll a user from a course

  1. On the Training menu, select Courses. The Courses screen appears.

  2. Hover over a course tile until the View Details button appears.

  3. Click the View Details button. The Course Details screen appears.

  4. Go to the Enrolled Users tab.

  5. On the list of enrolled users, click the Context Menu icon context_menu_icon_v2.png at the end of a row for a user you want to unenroll. The Context menu appears.

  6. Select Unenroll. A confirmation modal appears.

    Important

    Unenrolling a user will delete that user's history, including course progress and score.

  7. Click the Unenroll button.

To resend an enrollment notification

  1. On the Training menu, select Courses. The Courses screen appears.

  2. Hover over course tile until the View Details button appears.

  3. Click the View Details button. The Course Details screen appears.

  4. Go to the Enrolled Users tab.

  5. On the list of enrolled users, select the Context Menu icon at the end of a row for a user you want to receive a notification. The Context menu appears.

  6. Select Resend Notification. A notification will be sent to the user via email.

To filter the list of enrolled users

  1. On the Training menu, select Courses. The Courses screen appears.

  2. Hover over course tile until the View Details button appears.

  3. Click the View Details button. The Course Details screen appears.

  4. Go to the Enrolled Users tab.

  5. On the list of enrolled users, select the Filter icon. The Filter pane appears.

  6. Configure the filter.

    add_enrollment_filter.png
  7. Click the Save button.

  8. Click the Apply button.

Exporting Course Enrollment Data

Use the Export button on the Enrolled Users tab to download a spreadsheet report of enrollment data for a specific course.

To export course enrollment data

  1. On the Training menu, select Courses. The Courses screen appears.

  2. Hover over a course tile until the View Details button appears.

  3. Click the View Details button. The Course Details screen appears.

  4. Go to the Enrolled Users tab.

    enrolled_users_tab.png
  5. Click the Export button. A Report Download modal appears.

  6. Click the Close button on the Report Download modal.

  7. Click the task notification icon. The Alert Center pane appears.

  8. Select enrollment-export from the list of tasks to download the file.

    Note

    The export will download as a Microsoft Excel spreadsheet.

  9. View the export file.

    export_enrollment_data.png

    For each enrolled user, the export will include the following:

    • Course name.

    • User name.

    • User email address.

    • Course language.

    • Enrolled date.

    • Deadline date.

    • Course status.

    • Course status.

    • Score.

    • Completion date.

For More Information

To learn more about course enrollment, see Managing Course Enrollment.

Training Course Player Overview

Use the Course Player to view course content and complete assigned courses.

Course Player

updated_course_player_popout.png

Button

Description

1

Menu

Click to view and navigate course segments.

2

Search

Click to search within the training.

3

Accessibility

Click to turn on accessibility.

4

Select a Language

Click to select a language for a course

5

Save and Close

Click to save progress on the course and exit.

6

Home

Click to view and navigate course segments.

7

Exit

Click to exit course.

Warning

Your changes will not be saved. save your changes before exiting, click the Save and Close button.

8

Section Navigation

Displays your current section out of the total number of sections within a segment.

 
Article Visibility
2,272
Translation
English
Checked

Powered by