Skip to content

Security and Privacy

  • Upload classified information
  • Share third-party personal data without authorization
  • Process private medical information without consent
  • Upload credentials or passwords
  • Documents with sensitive banking information
  • Encryption in transit: All files are transmitted securely
  • Secure processing: Analysis in protected environment
  • Review files before uploading
  • Remove unnecessary sensitive information
  • Use anonymized versions when possible
  • Don’t upload files with visible passwords
  1. Identify sensitive information

    • Account numbers
    • Personal identifications
    • Private contact data
    • Critical financial information
  2. Anonymize when necessary

    • Replace names with initials
    • Partially hide numbers
    • Remove non-relevant data
    • Use sample data if possible
  3. Verify permissions

    • Confirm you have authorization to share
    • Review your organization’s policies
    • Consider confidentiality agreements
  • Identifiers: SSN, RFC, CURP, etc.
  • Contact: Private addresses, personal phones
  • Financial: Account numbers, cards
  • Medical: Records, diagnoses
  • Strategic: Confidential plans
  • Financial: Detailed financial statements
  • Legal: Ongoing litigation
  • Intellectual property: Trade secrets
  • Respect privacy regulations (GDPR, etc.)
  • Comply with your company’s internal policies
  • Keep record of what information you share
  • Request consent when necessary
  • You are responsible for the content you upload
  • Verify that you comply with all regulations
  • Don’t share information that doesn’t belong to you
  • Protect third-party data
  1. Use secure connections (avoid public WiFi)
  2. Verify the URL before uploading files
  3. Don’t share screenshots of analysis if they contain sensitive data
  4. Log out when finished
  • If you’re not sure, don’t upload it
  • Consult with your security team
  • Use test data for validations
  • Request censored versions of sensitive documents
  • Files available only during session
  • Limited access to analysis
  • No sharing with third parties
  • Automatic file deletion
  • No permanent backup
  • Analysis results under your control
  • No subsequent access to original documents