Are you collecting sensitive data about ai models ?

hw 0 Reputation points
2024-08-21T08:05:01.0966667+00:00

I'm currently testing the AI models.

If I upload my company's invoice, will you collect that sensitive data on your system?

Azure AI services
Azure AI services
A group of Azure services, SDKs, and APIs designed to make apps more intelligent, engaging, and discoverable.
2,893 questions
{count} votes

1 answer

Sort by: Most helpful
  1. navba-MSFT 24,890 Reputation points Microsoft Employee
    2024-08-21T08:40:13.9633333+00:00

    @hw Welcome to Microsoft Q&A Forum, Thank you for posting your query here!

    .

    .

    As mentioned in our privacy public documentation, Data, privacy, and security for Document Intelligence - Azure AI services | Microsoft Learn , We can assure you that the customer that data uploaded is encrypted and are not used to any other purposes.

    .

    For the pre-built models, the customer data is not used.

    For customer trained models: For customer trained models, the customers can delete their models and associated metadata at any time by using the API. The interim outputs after analysis and labeling are stored in the same location. The trained custom models are stored in Azure storage in the same region and logically isolated with their Azure subscription and API credentials. More info:

    1. The reason we need the 24 hours, is this is a async API and you submit a document for analysis and request the results in a separate request.
    2. All the data is encrypted with a Microsoft managed key always and customers have the option to double encrypt with a customer managed key.
    3. Your data is your data and is not used to train or improve our models

    .

    .

    .

    Our commitment to you:

    We’re transparent about the specific policies, operational practices, and technologies that help ensure the security, compliance, and privacy of your data across Microsoft services.

    1. You control your data.
    2. We're transparent about where data is located and how it’s used.
    3. We secure data at rest and in transit.
    4. We defend your data.

    More info here. and here.

    .

    Hope this helps. If you have any follow-up questions, please let me know. I would be happy to help.

    **

    Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.