User administration

To enable access to the PI Detect and Data Breach Response application directly from Relativity:

Note: Permissions for the PI Detect and Data Breach Response application cannot be applied to the Workspace Admin group. You must create a group in Relativity and add users to that group in order to apply the permissions mentioned below. We recommend creating different groups for each permission level. For example, a PI Detect FLR group for all users assigned the PI Detect and Data Breach Response - FLR permission. See Creating and editing groups and Add users to groups for more details.

  1. From your workspace, navigate to Workspace details.
  2. Click Manage Workspace Permissions.
    An image of the Workspace Details page and Manage Workspace Permissions button.
  3. Add user permissions.
    An image of user permission options.
    Under object security, assign the group a PI Detect and Data Breach Response workspace permission. See PI Detect and Data Breach Response permission options for more details.
  4. Click Save.
  5. After an ingestion job is run for the first time, the content in the Privacy Workflow tab will appear and provide access to the following options.

    Note: Prior to running ingestion for the first time, the Privacy Workflow tab will be blank. See Ingest documents for more information.

    • Set up
    • Running the pipeline
    • Quality Control
      An image of the Privacy Workflow tab.

PI Detect and Data Breach Response permission options

Following are all user roles and permissions available for PI Detect.

Role Permissions
PI Detect and Data Breach Response - Lead

Users assigned a lead role have access to all features in PI Detect and Data Breach Response:

  • Jobs
  • Batches
  • Data Settings
  • Privacy Workflow
    • Document Ingestion
    • Incorporate Feedback
    • Document Search
    • Excel Reports
    • Quality Control
    • Report Generation
    • Settings
  • Error Codes
  • Configuration
  • Document Reports
  • PI and Entity Search
  • Reviewing documents in the Viewer
    • PI Detection panel
    • Linked Entities panel
    • Table card
PI Detect and Data Breach Response - Annotator

Annotators can access the following features:

  • Reviewing documents in the Viewer
    • PI Detection panel
    • Linked Entities panel
    • Table card
PI Detect and Data Breach Response - FLR

First level reviewers can access the following features:

  • Reviewing documents in the Viewer
    • PI Detection panel
    • Linked Entities panel
    • Table card
PI Detect and Data Breach Response - QC

Quality control reviewers can access the following features:

  • Reviewing documents in the Viewer
    • PI Detection panel
    • Linked Entities panel
    • Table card

Establishing project lead permissions

Users assigned a lead role have access to all features in PI Detect and Data Breach Response. To set permissions for project leads:

  1. Create a user group for project leads.

  2. Add users who you want to have lead-level access to the group.

  3. Navigate to the project workspace.

  4. Click the Administration tab and select Workspace Details.

  5. Click Manage Workspace Permissions to open the Workspace Security dialog.

  6. Select the group for your project leads to edit permissions.

  7. Select the Object Security tab.

  8. Select View, Edit, Add, and Delete for Document Centric Report and Document Centric Report Row.

  9. Select View, Edit, Add, and Delete for all options starting with "PI."

  10. Select all options under Redact.

  11. Select PI Detect and Data Breach Response - Lead as the access level.

    Note: A user can only have one permission level at a time. Therefore, they cannot be in two user groups with conflicting permission levels.

  12. Select the Tab Visibility tab.

  13. Select all options under PI Detect and Data Breach Response.

    Note: For user groups that you do not want to run ingestion or report jobs, deselect the Jobs, Batches, Data Settings, and Configuration tabs.