LogoLogo
SupportDeveloper Docs
  • Welcome
  • Getting Started
    • Introduction to BalkanID
      • BalkanID Onboarding
      • BalkanID Summary Dashboard
    • Setting Up BalkanID
      • User Role Management
      • Users Entitlements Discovery
      • Employee Data Extraction
      • Application Integration & Entitlement Data Extraction
      • Business Owners for Application Integrations
    • Entitlement Discovery
      • Entitlements Discovery
      • Applications Entitlements Discovery
      • Connection Entitlement Discovery
      • Resource Entitlement Discovery
      • Identities Entitlements Discovery
      • Working with Filters
      • Impact Analysis
    • Access Review Management
      • Access Review Campaigns
      • Performing Access Reviews
      • Campaign dashboard and management
      • Campaign Audit Reporting
      • Access Review Campaign Notifications and Reminders
      • Configuring Integration Specific Multi-Level Review Settings
      • Configuring Multi-Level Review Settings in Campaigns
      • Reviewer Insight Escalation for Campaigns
      • Recurring Campaigns
      • Campaign Escalation
      • Nominate Delegate In Account Preferences
      • Access Review Graphs
      • Access Review Recommendations
    • Access Request Management
      • Creating and Managing Access Requests
        • New User Access Request
        • New Service Account Access Request
        • New Identity Access Request
        • New Connection Access Request
        • New Resource Access Request
        • New SCIM Access Request
    • System Notifications & Automatic Ticket Creation
      • Notification Preferences
      • In-app Notifications
      • Supported Ticketing Systems
    • BalkanID CLI
      • BalkanID Extractor CLI
      • BalkanID API CLI
  • Configurations and Integrations
    • Integrations Overview
    • HRIS Integrations
      • Integrate via Merge
    • Direct Application Integrations
      • Asana Integration Setup
      • Atlassian Confluence Integration Setup
      • Atlassian Jira Application Integration Setup
      • AWS Application Integration Setup
      • AWS Identity Center Integration Setup
      • Bitbucket Integration Setup
      • Box Integration Setup
      • Code Climate Integration SetupPage
      • Datadog Integration Setup
      • Dropbox Integration Setup
      • GitHub Application Integration Setup
      • Gitlab Integration Setup
      • Google Cloud Platform Integration Setup
      • Google Drive Integration Setup Guide
      • Google Workspace Integration Setup
      • Jenkins Integration Setup
      • JumpCloud Integration Setup
      • MariaDB Integration Setup
      • Microsoft Azure and Active Directory (AD) Integration Setup
      • On-Prem Active Directory (AD) Integration Setup
      • Microsoft Office365 Integration Setup
      • MongoDB Integration Setup
      • MySQL Integration Setup
      • Netsuite Application Integration Setup
      • New Relic Integration Setup
      • Okta Application Integration Setup
      • Onelogin Integration Setup
      • OpenVPN Integration Setup
      • Pagerduty Integration Setup
      • Ping Identity Integration SetupPage
      • PostgreSQL Integration Setup
      • Ramp Integration Setup
      • Salesforce Application Integration Setup
      • SAP Integration Setup
      • Sendgrid Integration Setup
      • Sentry Integration Setup
      • Slack Application Integration Setup
      • Smartsheet Integration Setup
      • Snowflake Integration setup
      • Splunk Integration Setup
      • Sumologic Integration Setup
      • Twingate Integration Setup
      • Zoom Integration Setup
    • Manual Uploads
      • Application Entitlement Data
      • Employee Data
      • Mapping Identities to Employees
    • SSO Integrations
      • Ping Identity
      • Okta
      • OneLogin
      • Microsoft
    • Fulfillment Options
    • BalkanID API
  • Playbooks and Webhooks
    • Playbooks Overview
    • Configuring Global Playbooks
    • Configuring Integration Specifc Playbooks
    • Configuring Global Webhooks
    • Configuring Integration Specific Webhooks
    • Automated Employee Data Upload Playbook with AWS Lambda & S3
    • Automated Entitlement Data Upload Playbook with AWS Lambda & S3
  • IAM RISK ANALYZER
    • Findings
    • Current State RBAC
    • IAM Risk & RBAC Analysis Report
  • Insights and Rules
    • Entitlement Rules & Labels
      • Setup Rules and Labels
      • Terminated Employee Label
      • Privileged identity Label
      • Setup privileged identities
    • Entity Insights and Finding Rules
      • Creating entity filters
      • Setup insights using entity filters
      • Setup finding rules using entity filters
  • BalkanID Slackbot
    • Setting up BalkanID Slackbot
    • Access Requests and Access Review Notifications with BalkanID Slackbot
    • Findings (Daily Alert) with BalkanID Slackbot
  • JITPBAC
    • Overview of JITPBAC
    • Purposes
      • Create Purpose
      • Edit Purpose
      • Delete Purpose
      • Filtering Purposes
      • Create User-Purpose Access Request
        • Creating a Request Through the Web App
        • Creating a Request Through the Slackbot
      • Starting & Stopping Assigned Purposes
  • BalkanID Copilot
    • BalkanID Copilot
  • Updates
    • Release Notes
      • Introducing Findings: Prioritize, Act, and Automate Identity Risk Management
      • Action Center as a command hub for identity risk findings
      • Introducing Impact Analysis: Visualize, Understand, and Manage Access
      • In-app Notifications & Notification Preferences
      • Upgrades to RBAC Analyzer
      • Slackbot for Access Requests and Review Notifications
      • Playbooks and Webhooks for enhanced workflow automation
      • Introducing support assistant for BalkanID application for in-app support
      • Scheduling campaigns & multi-level approvals, nomination & delegation of reviews and graph views for
      • Campaign dashboard actions, access reviews by identity, enhanced access requests and entities connec
      • Access Provisioning & Deprovisioning, Email Notifications, Access Reviews & Campaigns Updates and Ne
      • Quickly find what you’re looking for with the new People, Applications, and Identities pages
      • Integrate your HRIS or Identity Provider without exposing sensitive personnel data or powerful admin
      • Quickly find unusual entitlements with Outliers (Early Access)
      • Announcing “Days Since Termination” filter
      • Announcing JumpCloud direct integration
      • Published Access Review Campaigns can now be deleted
      • Easily switch between tenants using the new tenant picker
      • Skip Access Review Campaigns by downloading a PDF report of your Entitlements
      • User account information now available on the Account page
      • Announcing Bulk API (Early Access)
      • Announcing HRIS integration capability with 23 new HRIS integrations
      • Privileged Identity insights help to quickly identify privileged identities
      • Terminated insights help to quickly identify and remediate entitlements held by terminated employees
      • Announcing Azure and Azure Active Directory direct integration
      • Access Review Campaign drafts can now be permanently deleted
  • Terms & Conditions
    • Privacy Policy
    • Terms of Service
    • AI Policy FAQ
    • Trust Center
Powered by GitBook

© 2025 · BalkanID, Inc. | Nothing on the BalkanID website, platform, or services, nor any portion thereof constitutes actual legal or regulatory advice, opinion, or recommendation by BalkanID, Inc.

On this page

Was this helpful?

Export as PDF
  1. Terms & Conditions

AI Policy FAQ

This document provides answers to common questions regarding our AI practices, data isolation measures, and commitment to customer data security.

1. What is the purpose of this AI policy?

The AI policy outlines our commitment to providing secure, ethical, and compliant AI services within our SaaS offerings. It ensures that each production enterprise customer tenant operates in a dedicated environment with isolated data that is not used for cross-customer AI model training.

2. What does a “dedicated environment” mean for my tenancy?

A dedicated environment is a separate computing space allocated exclusively to you. This means your data and applications run independently of other customers, enhancing security and performance.

3. How does BalkanID ensure tenant isolation?

We implement strict access controls and infrastructure separation so that each tenant’s environment is completely isolated from others. This prevents unauthorized access and ensures that activities in one environment do not impact another.

4. What measures are in place for data isolation and security?

  • Data Segregation: Your data is stored and processed separately from other tenants’ data.

  • Encryption: All data is encrypted at rest and in transit using industry-standard protocols.

  • Access Management: Only authorized personnel with a legitimate need can access your data, following the principle of least privilege.

5. Will my data be used to train AI models that other customers can access?

No. We prohibit the use of any customer’s data for training AI models that could affect other customers. Your data will not be used in cross-customer AI training without your explicit consent.

6. Can my data be used for AI training within my own environment?

Yes, but only within your dedicated environment and for purposes that benefit you. Any such use will comply with our data handling policies and require your explicit consent.

7. How do you handle consent for using my data in AI training?

We require a formal agreement outlining the scope and purpose before using your data for AI training. This ensures transparency and gives you control over how your data is used.

8. What steps are taken if my data is used for AI training with my consent?

If you consent to data usage for AI training:

  • Anonymization: We anonymize your data to remove personally identifiable information (PII).

  • Secure Handling: Data is processed securely, following strict protocols to prevent unauthorized access.

9. How does BalkanID comply with data protection laws like GDPR and CCPA?

We adhere to all applicable data protection laws by:

  • Obtaining necessary consents for data processing.

  • Providing transparency in how data is used.

  • Ensuring data subject rights can be exercised.

  • Conducting regular compliance audits.

10. Who is responsible for enforcing the AI policy?

  • Management: Communicates and enforces the policy across all departments.

  • Employees and Contractors: Must adhere to the policy and report any breaches.

  • IT and Security Teams: Implement technical measures for tenant and data isolation.

11. Are there any exceptions to this policy?

Any exceptions must be reviewed and approved by our Chief Information Security Officer (CISO) and properly documented.

12. How often is the AI policy reviewed and updated?

The policy is reviewed annually or whenever significant changes occur in our operations or relevant laws and regulations.

14. What is “data segregation,” and why is it important?

Data segregation involves storing and processing your data separately from others. It’s crucial for maintaining privacy and ensuring that your data is not inadvertently accessed or used by others.

15. What is meant by “principle of least privilege” in access management?

It means that employees and systems are granted the minimum level of access—or permissions—needed to perform their duties. This minimizes the risk of unauthorized access to your data.

16. How does encryption protect my data?

Encryption transforms your data into a secure format that can only be read with the correct decryption key. This protects your data from unauthorized access during storage (at rest) and transmission (in transit).

17. What happens in the event of a data breach?

In the unlikely event of a data breach:

  • We will promptly notify affected customers.

  • Take immediate action to mitigate the breach.

  • Conduct a thorough investigation.

  • Review and enhance security measures to prevent future incidents.

18. Does BalkanID conduct regular audits of its AI practices?

Yes, we perform regular audits to ensure compliance with our AI policy and relevant laws. Audit reports are made available to authorized stakeholders.

19. How can I be sure that other tenants cannot access my data?

Our infrastructure is designed with robust tenant isolation protocols, and we continuously monitor and test our systems to prevent and detect any unauthorized access.

PreviousTerms of Service

Last updated 7 months ago

Was this helpful?