Last date modified: 2026-May-01

Installation and configuration

Relativity installs the aiR for Data Breach Response application at the instance level. After this initial installation, you must add the application to each workspace where you plan to use it and configure user roles and permissions.

Prerequisites

Before you begin, verify the following:

  • The Control Number field is populated in the Document ID data settings field mapping before you ingest documents.
  • The Extracted Text field contains all text you want analyzed. If you OCR documents, the resulting text must be stored in this field.
  • The Extracted Text field is stored in Data Grid.

Installation to workspaces

Once Relativity installs the application at the instance level, your team can install it into selected workspaces.

To add the application to a workspace:

  1. Search for and open Relativity Applications from the Quick nav.
  2. Click New Relativity Application.
  3. Click Select from Application Library.
  4. Search in your application library for aiR for Data Breach Response.
  5. Select the application and install it in your workspace.
aiR for Data Breach Response is not compatible with sandbox environments.

User roles and permissions

We recommend creating two dedicated permission groups for aiR for Data Breach Response users.

Following is a list of user roles for the aiR for Data Breach Response application and the permissions available to them.

Role Permissions
aiR for Data Breach Response - Lead

Users assigned a lead role have access to all features in aiR for Data Breach Response:

  • Jobs
  • Settings
  • Data Analysis
  • Project Dashboard
  • Privacy Workflow
  • Entity Analysis
  • PI and Entity Search
  • Reviewing documents in the Viewer
    • PI Detection panel
    • Records panel
    • Table card
aiR for Data Breach Response - Annotator

Annotators can access the following features:

  • Reviewing documents in the Viewer
    • PI Detection panel
    • Records panel
    • Table card
You must still add users in the workspace admin group to the aiR for Data Breach Response - Lead group.

Configure permissions

To configure the permissions groups for the aiR for Data Breach Response application:

  1. From your workspace, navigate to Workspace details.
  2. Click Manage Workspace Permissions.
  3. Open the Object Security tab.
  4. Search for Workspace and toggle on either the Lead or Annotator group as appropriate.
    Object Security user interface.
    See User roles and permissions for details on each role.
    For more instructions on editing and deleting permissions, see Setting workspace permissions

  5. Click Save.

Set the aiR for Data Breach Response application as a default tab

Once you install the application to a workspace, you can set it as a default tab:

  1. Click on Workspace Setup and select Tabs.
  2. Find the aiR for Data Breach Response application.
  3. Click the pencil icon to edit.
  4. Enable Visible under Tab Information.
  5. Enable Show in Sidebarunder Tab Location.
  6. Pick an icon.
  7. Click Save.

The aiR for Data Breach Response application now appears in the sidebar.

Frequently asked questions

Return to top of the page
Feedback