Skip to main content

Sensitive Data Policy

This article describes how to use and configure SurePath AI's Sensitive Data settings

Updated today

Content Controls and PII Detection

The platform governing GenAI solutions, detecting usage, mitigating risks, and controlling AI's access to enterprise data.

This guide explains how to configure Content Controls and PII Detection for public GenAI services. It is written for IT administrators and follows the same tone and structure used across SurePath AI docs.

What these features do

Content Controls inspect requests to public services for risky patterns such as harmful content, prompt injection, high‑risk heuristics, code, and potential confidential data. Based on policy, the system allows the request, warns the end user, modifies the content, or blocks the request. PII Detection focuses specifically on personally identifiable information and, with a single global action applied to enabled entities, can monitor, warn, redact, synthesize, or block. Content Controls and PII Detection operate independently and can be used together.

Where they apply

These controls apply to public services. For private models, enforcement is intentionally narrower: Harmful Content can warn and block, and Prompt Injection can warn but not block.

Actions and their effects

The following table compares how each action behaves at request time, what the end user sees, and what is recorded for administrators. "Warn" messages are tailored to the detection and can be customized.

Action

Request handling

End‑user experience

Admin visibility

Content example

Ignore

No detection performed

No message

No event

n/a

Monitor

Detected but not modified

No message

Violation logged

n/a

Warn

Detected; request continues

Warning shown

Violation logged

n/a

Tag

Offending content replaced with a label

Warning shown

Violation logged with labels

John Smith<PERSON_NAME>; any code block → <CODE_BLOCK>

Mask

Offending content replaced with ***

Warning shown

Violation logged

123‑45‑6789***

Delete

Offending content removed

Warning shown

Violation logged

"secret token abc" removed

Synthesize

Offending content replaced with synthetic value

Warning shown

Violation logged

(415) 555‑0101(206) 555‑0199)

Block

Request is prevented from completing

Warning shown

Violation logged

Not available for High‑risk Request and Confidential Data

Every non‑Ignore detection creates a policy event that includes the control or entity type, the selected action, and any relevant labels (for example <PERSON_NAME> or <CODE_BLOCK>). These appear in audits and analytics.

Content Controls

Location: Default Policy - Sensitive Data tab - Content Controls section. For each content type, choose an action. Content Controls are independent from PII Detection.

High‑risk Request

High‑risk Request is a heuristic that aggregates multiple signals of elevated risk, such as exfiltration prompts or suspicious intent. Choose Ignore, Monitor, or Warn to set organizational posture; Block is not yet available. Use Monitor to build visibility without friction, or Warn to coach users while preserving productivity.

Confidential Data

Confidential Data indicates the request may include sensitive, private, or proprietary business information even when it is not a specific PII entity. Select Ignore, Monitor, or Warn; Block is not yet available. Warn is appropriate for knowledge‑worker scenarios, and pairing this control with PII Detection provides stronger defense‑in‑depth.

Programming Language (code)

Programming Language detects code or markup contained in the request. In addition to Ignore, Monitor, and Warn, this control supports the Tag redact option, which replaces detected code with <CODE_BLOCK>. Tag is useful when you need to prevent source code from leaving the organization while still allowing the request to proceed.

Harmful Content

Harmful Content captures offensive or dangerous material that could lead to unwanted or unsafe responses. Choose Ignore, Monitor, Warn, or Block. Many organizations start with Warn for coaching and move to Block in regulated or high‑risk environments.

Prompt Injection

Prompt Injection attempts to manipulate a model to ignore prior instructions or safeguards. Choose Ignore, Monitor, or Warn. Availability of Block may vary by release; consult the UI for the current options. At minimum, use Monitor to build visibility, and Warn to deter accidental policy bypass attempts.

PII Detection Settings

Location: Default Policy - Sensitive Data tab - PII Detection Settings and PII Entities.

Global setting and action

  • Enabled: Master toggle to turn PII detection on for public services.

  • Action (global default): The selected action applies to all enabled PII entities.

    • Available actions: Monitor, Warn, Tag, Mask, Delete, Synthesize, Block (where allowed), and Ignore.

PII entities list

  • Enable per entity: Toggle individual entities on or off (e.g., Phone Number, Credit Card, Email Address, IP Address, Person, etc.).

  • Filter: Use "Filter by name" and "Filter by category" (e.g., GDPR, CCPA/CPRA, PCI/DSS, HIPAA, GLBA, FERPA) to locate entities quickly.

  • Entity badges: Compliance tags indicate common regulatory alignments for each entity type.

Person entity: Detection Mode

Open the gear icon next to Person to select a mode. The table below compares how each option behaves.

Mode

Behavior

Latency

False positives

Public figures

Rapid (most restrictive)

Fastest verification; may verify only if no other entity types are detected

Lowest

Highest

Treated as PII

Balanced

Verifies person entities for all requests

Moderate

Moderate

Treated as PII

Context‑aware (least restrictive)

Aims for fewest false positives with additional context

Slightly higher

Lowest

Ignored (treated as non‑PII)

Notes: Detection modes currently apply only to the Person entity and also adjust the confidence thresholds used during detection.

How to configure

Configure Content Controls

  1. Go to Default Policy - Sensitive Data.

  2. In Content Controls, choose an action for each control you want to enforce.

  3. Click Save.

Recommended starting points:

Control

Recommended initial action

High‑risk Request

Warn

Confidential Data

Warn

Programming Language

Tag

Harmful Content

Block (or Warn in low‑risk environments)

Prompt Injection

Warn

Configure PII Detection

  1. Go to Default Policy - Sensitive Data.

  2. In PII Detection Settings, turn Enabled on and select the global Action.

  3. In PII Entities, enable the specific entities you want to detect.

  4. For Person, open Settings and choose a Detection Mode.

  5. Click Save.

Example results when the global action is Tag:

"Please email John Smith at [email protected]" 
→ "Please email <PERSON_NAME> at <EMAIL_ADDRESS>"

Example results when the global action is Mask:

"My SSN is 123-45-6789" 
→ "My SSN is ***"

Example results when the global action is Synthesize:

"Call me at (415) 555‑0101"
→ "Call me at (206) 555‑0199"  (synthetic phone number)

End‑user experience and admin visibility

For actions other than Ignore, end users see a contextual message that explains what was detected and what action the system took; these messages are tailored to the detection and can be customized. Administrators receive a corresponding event that includes the control or entity type, the action taken, and any labels used in redaction (for example <PERSON_NAME> or <CODE_BLOCK>). Redacted content is stored as placeholders to prevent sensitive values from being retained in logs.

When to use each action

Action

When to use

Monitor

Establish visibility without changing user experience.

Warn

Coach users and reduce risk while maintaining productivity.

Tag / Mask / Delete

Prevent sensitive values from leaving the environment while allowing the request to proceed.

Synthesize

Provide safe, realistic stand‑ins for testing, demos, or downstream systems that require a value.

Block

Enforce non‑negotiable policies or high‑risk scenarios (not available for High‑risk Request and Confidential Data).

Did this answer your question?