User administration
To enable access to the Data Breach Response application directly from Relativity:
Note: Permissions for the Data Breach Response application cannot be applied to the Workspace Admin group. You must create a group in Relativity and add users to that group in order to apply the permissions mentioned below. We recommend creating different groups for each permission level. For example, a Data Breach Response FLR group for all users assigned the Data Breach Response - FLR permission. For more information on groups, see See Creating and editing groups and Add users to groups for more details.
- From your workspace, navigate to Workspace details.
- Click Manage Workspace Permissions.
- Add user permissions.
Under object security, assign the group a Data Breach Response workspace permission. See Data Breach Response permission options for more details.
- Click Save.
- After an ingestion job is run for the first time, the content in the Privacy Workflow tab will appear and provide access to the following options.
Note: Prior to running ingestion for the first time, the Privacy Workflow tab will be blank. See Ingest documents for more information.
- Set up
- Running Data Analysis
- Quality Control
Data Breach Response permission options
Following are all user roles and permissions available for Data Breach Response.
Role |
Permissions |
Data Breach Response - Lead |
Users assigned a lead role have access to all features in Data Breach Response:
- Jobs
- Batches
- Data Settings
- Privacy Workflow
- Document Ingestion
- Incorporate Feedback
- Document Search
- Excel Reports
- Quality Control
- Report Generation
- Settings
- Error Codes
- Configuration
- Document Reports
- PI and Entity Search
- Reviewing documents in the Viewer
- PI Detection panel
- Linked Entities panel
- Table card
|
Data Breach Response - Annotator |
Annotators can access the following features:
-
Reviewing documents in the Viewer
-
PI Detection panel
-
Linked Entities panel
- Table card
|
Establishing project lead permissions
Users assigned a lead role have access to all features in Data Breach Response. To set permissions for project leads:
- Create a user group for project leads.
- Add users who you want to have lead-level access to the group.
- Click the Administration tab and select Workspace Details.
- Click Manage Workspace Permissions to open the Workspace Security dialog.
- Select the group for your project leads to edit permissions.
- Select the Object Security tab.
- Select View, Edit, Add, and Delete for Document Centric Report and Document Centric Report Row.
- Select View, Edit, Add, and Delete for all options starting with "PI."
- Select all options under Redact.
- Select the Tab Visibility tab.
- Select all options under Data Breach Response.
Note: For user groups that you do not want to run ingestion or report jobs, deselect the Jobs, Batches, Data Settings, and Configuration tabs.