1. Use of Artificial Intelligence in Our Product
AI features in the Zip console are strictly opt-in and require explicit approval from a customer's Zip console administrator. Customer-specific data is not processed by AI workflows until the AI feature toggle has been enabled by the customer.
Once approved by you or your administrator, Zip Security integrates artificial intelligence workflows to enhance your Zip console. Applications of AI include but are not limited to automatically classifying and enriching metadata about security events and entities when upstream data providers don't provide sufficient context for classification.
Note: Due to the initialization process required to securely prepare AI features for your console environment, there may be a delay between enabling AI capabilities and their full availability in your console.
2. Transparency
We commit to full transparency by always disclosing when information, advice, or decisions are generated or augmented using AI workflows. These elements are typically indicated by the “✨AI” or “✨ Enriched by AI” contextual clue.
3. Data Processing Limitations
At this time Zip’s AI workflows are never used to autonomously decide upon and execute security actions through the Zip console. Our AI systems process only descriptive, non-uniquely-identifying data about security-relevant concepts, events, and entities for classification and enrichment purposes. We maintain a human-in-the-loop approach for all security decisions that are predicated on AI-enhanced information. This stance may be re-evaluated as the AI state of the art evolves, but you will be made aware and given the decision to opt-in to autonomous AI security actions.
4. Data Security Measures
We maintain rigorous technical controls and have selected AI partners who comply with our strict data handling requirements.
Relevant security precautions that we take include (but are not limited to) the following:
- AI workflows are specifically designed to minimize model processing of sensitive customer data or personally identifying information, and to avoid linking potential security issues to specific customers, systems, or accounts
- We enforce strict controls preventing AI model providers from using your data for training, fine-tuning, or other learning tasks
- We maintain comprehensive security protocols including encryption at rest and in transit, robust auditing, and strong authentication measures
If you require more in-depth information about Zip’s security practices, please consult our terms of service and privacy policy, contact your Zip representative, or reach out to us at info@zipsecinc.cc.
