Category: Prompt Engineering

Data Access Policies

Data access policies are rules that determine who can view, use or change information stored in a system. These policies help organisations control data security and privacy by specifying permissions for different users or groups. They are essential for protecting sensitive information and ensuring that only authorised people can access specific data.

Data Stewardship Roles

Data stewardship roles refer to the responsibilities assigned to individuals or teams to manage, protect, and ensure the quality of data within an organisation. These roles often involve overseeing how data is collected, stored, shared, and used, making sure it is accurate, secure, and complies with relevant laws. Data stewards act as the point of…

Data Retention Policies

Data retention policies are rules that determine how long an organisation keeps different types of information before deleting or archiving it. These policies help ensure that data is managed responsibly, stays secure, and complies with legal or industry requirements. By setting clear guidelines, organisations can avoid keeping unnecessary data and reduce the risks of data…

Data Anonymisation Techniques

Data anonymisation techniques are methods used to remove or hide personal identifiers from datasets so that individuals cannot be easily recognised. These techniques help protect privacy when sharing or analysing information. Common approaches include removing names, replacing details with random values, or grouping data into broader categories.

Compliance-Sensitive Output

Compliance-sensitive output refers to information or responses generated by a system that must follow specific legal, regulatory, or organisational requirements. These outputs are carefully managed to ensure they do not violate rules such as data privacy laws, industry standards, or internal policies. This concept is especially important for systems that process sensitive data or operate…

Compliance Tag Propagation

Compliance tag propagation is a process used in information management systems where labels or tags that indicate compliance requirements are automatically applied to related documents or data. These tags may specify rules for retention, privacy, or security, and help organisations manage regulatory obligations. When content is moved, copied, or inherited, the compliance tags continue to…

LLM Data Retention Protocols

LLM Data Retention Protocols are the rules and processes that determine how long data used by large language models is stored, managed, and eventually deleted. These protocols help ensure that sensitive or personal information is not kept longer than necessary, reducing privacy risks. Proper data retention also supports compliance with legal and organisational requirements regarding…

Data Sharing via Prompt Controls

Data sharing via prompt controls refers to managing how and what information is shared with AI systems through specific instructions or settings in the prompt. These controls help users specify which data can be accessed or used, adding a layer of privacy and security. By using prompt controls, sensitive or confidential information can be protected…