Last date modified: 2025-Dec-19

Installation and configuration

Relativity installs the Data Breach Response application at the instance level. After this initial installation, you must add the application to each workspace where you plan to use it.

Prerequisites

Following are prerequisites for using the Data Breach Response application:

  • Data Breach Response relies on the Control Number field. This field must be populated in the Document ID data settings field mapping before ingesting documents.
  • There are two Permission Groups required for DBR.
    • PI Detect and Data Breach Response - Lead
      • Project Management duties like creating projects, and selecting detectors and managing review.
    • PI Detect and Data Breach Response - Annotator
      • Reviewing documents
  • We recommend creating two dedicated permission groups for Data Breach Response users.
  • The Data Breach Response application analyzes the Extracted Text field.
    • If documents are OCRed the resulting text must be stored in the Extracted Text field
    •  The Extracted Text field must be stored in Data Grid.

Configuring permissions

To configure the permissions groups for the Data Breach Response Application:

  1. From your workspace, navigate to Workspace details.
  2. Click Manage Workspace Permissions.
    An image of the Manage Workspace Permissions button found in the Relativity Utilities section of the Workspace details page..
  3. Assign group permissions for the workspace in the Object Security tab.
    There are two User roles and permissions options, both of which are assigned at the workspace level.
    An image of group permissions set in the Object Security tab.
    For more instructions on editing and deleting permissions, see Setting workspace permissions

  4. Click Save.

User roles and permissions

Following is a list of user roles for the Data Breach Response application and the permissions available to them.

Role Permissions
Data Breach Response - Lead

Users assigned a lead role have access to all features in Data Breach Response:

  • Jobs
  • Settings
  • Data Analysis
  • Project Dashboard
  • Privacy Workflow
  • Entity Analysis
  • PI and Entity Search
  • Reviewing documents in the Viewer
    • PI Detection panel
    • Records panel
    • Table card
Data Breach Response - Annotator

Annotators can access the following features:

  • Reviewing documents in the Viewer
    • PI Detection panel
    • Records panel
    • Table card
Users included in the workspace admin group must still be added to the Data Breach Response - Lead group.

Defaulting the Data Breach Response application tab

Once the application has been installed, you can set it as a default tab:

  1. Click on Workspace Setup and select Tabs.
  2. Find the Data Breach Response application.
  3. Click the pencil icon to edit.
  4. Enable Visible under Tab Information.
  5. Enable Show in Sidebarunder Tab Location.
  6. Pick an icon.
  7. Click Save.

The Data Breach Response application should now be visible in the sidebar.
An image of the PI Detect and Data Breach Response application tab in the sidebar.

Frequently asked questions

Return to top of the page
Feedback