What is Data Breach Response? - Ans - An AI-powered solution used to reduce the time, cost, and
risk to produce an entity notification list
What unit is billed for Data Breach Response? - Ans - Gigabytes of data in Data Breach Response per
month
How can you provide RelativityOne users access to DataBreach Response? - Ans - Add them to a
group that has the correct permissions set
What must you provide to analyze documents in Data BreachResponse? - Ans - A saved search with
documents to ingest
What tools does Data Breach Response leverage for personal information identification? - Ans - Pre-
built AI and ML models to find pre-determined PI types.
How does Data Breach Response link personal information (PI) for structured and unstructured
documents? - Ans - PI is automatically linked for structured documents and automatically linked for
unstructured documents.
How does Data Breach Response expedite manual deduplication efforts while still providing
transparency into the process, leading to faster and cleaner generation of entity reports? - Ans -
Through automatic deduplication of entities and entity review workflows.
What is an advantage of Data Breach Response compared too ther solutions? - Ans - Its a purpose-
built data breach application in RelativityOne.
, What is a benefit to using Data Breach Response? - Ans - Data never leaves the RelativityOne
security boundary
How much can review time be reduced, on average, when leveraging AI in Data Breach Response? -
Ans - 50%
How long does it take, on average, to produce an initial assessment of personal information found
within a data set? - Ans - 2-3 days
What are the two reports that can be used to QC entity results? - Ans - Merge reason table and
Unlinked PI Log.
What should you do after resolving conflicts generated by the automatic entity normalization
process? - Ans - Rerun the deduplicate individuals and report generation Incorporate Feedback
stages to record your changes and generate an updated version of the Entity Centric Report.
What is the purpose of configuring your deduplication preferences? - Ans - To tell the algorithm
how to deduplicate the entities found within the data set.
What information about entities is searchable with PI and Entity Search? - Ans - Other names an
entity is known by in the dataset.
What is the purpose of resolving conflicts within EntityClusters? - Ans - To perform quality control
efforts on the machine-generated list of entities with possible similarities.
What syntax can you use for a PI and Entities Search to find documents with a breached entity? -
Ans - CONTAINS PI
What type of Review Center queue should be used for Data Breach Response? - Ans - Data breach
review queue