Data security and privacy
Q: What happens to our data if we discontinue using iManage MCP Server?
A: When iManage MCP Server access is revoked, all tokens are immediately destroyed. No client data is retained by the MCP system. Your data remains securely within your iManage environment.
Q: How does iManage MCP Server handle highly sensitive or classified documents?
A: iManage MCP Server maintains all existing iManage access controls and permissions. If a user doesn't have access to a document in iManage, they won't have access through iManage MCP Server.
Q: How do we audit AI assistance activity through iManage MCP Server for regulatory compliance?
A: iManage MCP Server provides comprehensive audit logs, which record all AI interactions with documents, through the Document History timeline. These logs include timestamps, user information, and details about AI assistance provided, supporting regulatory compliance and potential discovery requirements.
Technical and operational
Q: Can we restrict iManage MCP Server access to specific groups or teams?
A: Yes. Administrators can control iManage MCP Server access on a per-user basis through Control Center. Organizations can implement access policies that align with their practice structure and security requirements.
Q: What are the bandwidth and infrastructure requirements for iManage MCP Server?
A: iManage MCP Server leverages your existing iManage Cloud infrastructure and doesn’t require additional on-premises hardware. The system operates efficiently within normal business network bandwidth constraints, with temporary increases during document processing activities.
Q: Can users access iManage MCP Server from mobile devices and external networks?
A: iManage MCP Server access follows the same security policies as your iManage environment. If users can securely access iManage from mobile devices or external networks through your existing security controls, they can access iManage MCP Server using the same authentication and security framework.