Veritas Enterprise Vault™ Compliance Accelerator Administrator's Guide
- Introducing Compliance Accelerator
- Product documentation
- Introducing the Compliance Accelerator client
- Setting up employees and employee groups
- Working with departments
- Implementing Chinese Walls security
- Managing exception employees
- Grouping departments into partitions
- Using attributes to classify departments
- Searching for items
- About searching with Compliance Accelerator
- Building Compliance Accelerator search schedules
- Defining hotwords to search for
- Manually reviewing items
- About reviewing with Compliance Accelerator
- Escalating items
- Working with research folders
- Exporting items
- Creating and viewing reports
- Available Compliance Accelerator reports
- About viewing Compliance Accelerator datasets using the OData web service
- Appendix A. Customizing Compliance Accelerator
- Setting Compliance Accelerator system configuration options
- Appendix B. Importing configuration data from an XML file
- Appendix C. Troubleshooting
- Issues with Compliance Accelerator reports
Implementing Chinese Walls security
Chinese Walls are the barriers between divisions of an institution that prevent communication between distinct business sections. For example, in investment banks, Chinese Walls are commonly employed to separate people who make investment decisions from people who are privy to undisclosed information that may influence those decisions.
You may want to erect similar barriers in Compliance Accelerator so that department reviewers can share the results of their searches with a specific subset of department reviewers only, and not with all Compliance Accelerator reviewers. For example, consider a bank with an equity research department and an investment banking department. It would be appropriate for a Compliance Accelerator reviewer in the equity research department to share information with other reviewers and compliance supervisors in that department, but not with reviewers in the investment banking department. By implementing Chinese Walls, you can achieve this.
There are two stages to implementing Chinese Walls security: you first enable Chinese Walls, and then assign the role of Department User to selected users in a department.