Last date modified: 2026-Jan-23

Installation and configuration

Relativity installs the Data Breach Response application at the instance level. After this initial installation, you must add the application to each workspace where you plan to use it and configure user roles and permissions.

Prerequisites

Following are prerequisites for using the Data Breach Response application:

  • Data Breach Response relies on the Control Number field. This field must be populated in the Document ID data settings field mapping before ingesting documents.
  • The Data Breach Response application analyzes the Extracted Text field.
    • If you OCR documents, the resulting text must be stored in the Extracted Text field
    • The Extracted Text field must be stored in Data Grid.

Installation to workspaces

Once Relativity installs the application at the instance-level, your team can install it into selected workspaces.

To add the application to a workspace:

  1. Search for and open Relativity Applications from the Quick nav.
  2. Click New Relativity Application.
  3. Click Select from Application Library.
  4. Search in your application library for Data Breach Response and install it in your workspace.

User roles and permissions

We recommend creating two dedicated permission groups for Data Breach Response users.

Following is a list of user roles for the Data Breach Response application and the permissions available to them.

Role Permissions
Data Breach Response - Lead

Users assigned a lead role have access to all features in Data Breach Response:

  • Jobs
  • Settings
  • Data Analysis
  • Project Dashboard
  • Privacy Workflow
  • Entity Analysis
  • PI and Entity Search
  • Reviewing documents in the Viewer
    • PI Detection panel
    • Records panel
    • Table card
Data Breach Response - Annotator

Annotators can access the following features:

  • Reviewing documents in the Viewer
    • PI Detection panel
    • Records panel
    • Table card
Users included in the workspace admin group must still be added to the Data Breach Response - Lead group.

Configure permissions

To configure the permissions groups for the Data Breach Response Application:

  1. From your workspace, navigate to Workspace details.
  2. Click Manage Workspace Permissions.

    An image of the Manage Workspace Permissions button found in the Relativity Utilities section of the Workspace details page..

  3. Open the Object Security tab.
  4. Under Workspace, toggle on either the Lead or Annotator group as appropriate.
    See User roles and permissions for details on each role.
    An image of group permissions set in the Object Security tab.
    For more instructions on editing and deleting permissions, see Setting workspace permissions

  5. Click Save.

Set the Data Breach Response application as a default tab

Once you install the application to a workspace you can set it as a default tab:

  1. Click on Workspace Setup and select Tabs.
  2. Find the Data Breach Response application.
  3. Click the pencil icon to edit.
  4. Enable Visible under Tab Information.
  5. Enable Show in Sidebarunder Tab Location.
  6. Pick an icon.
  7. Click Save.

The Data Breach Response application should now be visible in the sidebar.
An image of the PI Detect and Data Breach Response application tab in the sidebar.

Frequently asked questions

Return to top of the page
Feedback