Veritas Surveillance Reviewer's Guide
- Introducing Veritas Surveillance
- Getting started
- Working with dashboard widgets
- Managing department-level searches
- Managing reviews
Key features of Veritas Surveillance
Veritas Surveillance streamlines compliance search and review tasks with intuitive workflows adhering to industry best practices. It empowers organizations to conduct cost-effective supervisory reviews, ensuring regulatory compliance in employee communications.
Some important key features of Veritas Surveillance are listed below:
The Compliance Accelerator desktop client, used until the 14.5 release, is discontinued. It has been entirely replaced by the more efficient web-based alternative, Veritas Surveillance. Compared to the desktop client, Veritas Surveillance, being a web-based client, offers more convenient workflows for managing departments, employees, item searches, intelligent reviews, exporting search results, and various other operations.
Veritas Surveillance enables organizations to replicate their departmental structure, moving departments from one department to other, add employees and employee groups for easy monitoring.
The accessibility of features in Veritas Surveillance varies according to the roles assigned to users, with distinct levels of permissions defined for each role.
can configure, manage and control the application workflow.
can monitor, review, keep the review pending, question, escalate, appraise, and comment on the items that they review manually or with the help of hotwords. Additionally, they can add comments, assign review status to captured items, view history of items, print and download the items, Generate reports for the collected information, and export the items and reports for offline reviews or for approved third-party use.
Veritas Surveillance supports department-level and application-level searches and labels. It captures archived items from various content sources, including Microsoft Exchange, Domino journal mailboxes, SMTP, and Shared Enterprise Vault archives across Enterprise Vault sites. By default, all application-level archives are accessible in departments. However, later, the department administrator can include or exclude the archives as needed.
While configuring a monitoring policy during creating a department, users can select their preferred sampling mode from the following options:
: This is the default mode. In this mode, the application captures all items for each monitored employee throughout the day. There is no option to restrict or limit the number of items that are added to the review set.
: In this mode, the application randomly selects items from each monitored employees according to the specified monitoring policy and adds these sampled items to the review set.
: In this mode, the application selects the items that are randomly sampled in the previous 24-hours period and adds these sampled items to the review set. As a result, certain employees may have fewer captured items compared to others.
This feature empowers organizations to identify and eliminate duplicates from search results, preventing their inclusion in the review set. The fingerprint mechanism is used to determine whether one item is a duplicate of another. Deduplication works within individual searches only, and does not work across multiple searches, even when conducted within the same department.
During sampling, the duplicate items in all search types (immediate, scheduled, and guaranteed sample searches) are removed. In guaranteed sample searches, it includes randomly sampled items in the review set to make up for any shortage caused by the deduplication process.
: Messages from specific employees who are exceptions can be kept apart and checked by assigned reviewers.
This feature helps application to learn from the reviewer's actions of marking items as relevant or irrelevant, allowing it to intelligently capture and sample items the next time and categorize items as relevant or irrelevant before presenting then to reviewers. This way, reviewers can efficiently spend their review time by focusing more on the relevant items over irrelevant ones.
A secured SQL database stores details about monitored employees, captured items, and the review processes applied to those items.
Customers' sensitive data residing in temporary storage is encrypted for enhanced security.
: This feature empowers organizations to enhance their reporting and analytics capabilities. Veritas Surveillance provides predefined Power BI Templates that consume Reporting API endpoints to view interactive reports.
: Though the support for SSRS reports is discontinued, users can still access the previously generated SSRS reports from database.
: The Open Data (OData) web service enables users to retrive information from the configuration and customer databases using OData-compatible reporting tools like Microsoft Excel and PowerQuery.
: New reporting endpoint APIs, such as Departments, Users, UserRoles, Roles, ItemMetrics, ReviewerMapping, MonitoredEmployees, EvidenceOfReviewAsync, EvidenceOfReview, and ReviewStatus are introduced.
: This feature enables users to search and export audit records for different modules and operations within Veritas Surveillance.