Security and Privacy
Handling Sensitive Data
Section titled “Handling Sensitive Data”What you should NOT do
Section titled “What you should NOT do”- Upload classified information
- Share third-party personal data without authorization
- Process private medical information without consent
- Upload credentials or passwords
- Documents with sensitive banking information
File Protection
Section titled “File Protection”Security Measures
Section titled “Security Measures”- Encryption in transit: All files are transmitted securely
- Secure processing: Analysis in protected environment
Best Practices
Section titled “Best Practices”- Review files before uploading
- Remove unnecessary sensitive information
- Use anonymized versions when possible
- Don’t upload files with visible passwords
Document Preparation
Section titled “Document Preparation”Before Uploading
Section titled “Before Uploading”-
Identify sensitive information
- Account numbers
- Personal identifications
- Private contact data
- Critical financial information
-
Anonymize when necessary
- Replace names with initials
- Partially hide numbers
- Remove non-relevant data
- Use sample data if possible
-
Verify permissions
- Confirm you have authorization to share
- Review your organization’s policies
- Consider confidentiality agreements
Types of Sensitive Information
Section titled “Types of Sensitive Information”Personal Data
Section titled “Personal Data”- Identifiers: SSN, RFC, CURP, etc.
- Contact: Private addresses, personal phones
- Financial: Account numbers, cards
- Medical: Records, diagnoses
Corporate Information
Section titled “Corporate Information”- Strategic: Confidential plans
- Financial: Detailed financial statements
- Legal: Ongoing litigation
- Intellectual property: Trade secrets
Regulatory Compliance
Section titled “Regulatory Compliance”Legal Considerations
Section titled “Legal Considerations”- Respect privacy regulations (GDPR, etc.)
- Comply with your company’s internal policies
- Keep record of what information you share
- Request consent when necessary
User Responsibility
Section titled “User Responsibility”- You are responsible for the content you upload
- Verify that you comply with all regulations
- Don’t share information that doesn’t belong to you
- Protect third-party data
Additional Recommendations
Section titled “Additional Recommendations”For Maximum Security
Section titled “For Maximum Security”- Use secure connections (avoid public WiFi)
- Verify the URL before uploading files
- Don’t share screenshots of analysis if they contain sensitive data
- Log out when finished
When in Doubt
Section titled “When in Doubt”- If you’re not sure, don’t upload it
- Consult with your security team
- Use test data for validations
- Request censored versions of sensitive documents
Retention Policy
Section titled “Retention Policy”During Processing
Section titled “During Processing”- Files available only during session
- Limited access to analysis
- No sharing with third parties
After Processing
Section titled “After Processing”- Automatic file deletion
- No permanent backup
- Analysis results under your control
- No subsequent access to original documents