-
Notifications
You must be signed in to change notification settings - Fork 8
Description
Clarification Needed on Data Handling and Retention Policies
Overview
When users and enterprises evaluate using the library with sensitive data and they need clarification on how data is handled during the optimization process, particularly regarding data retention and privacy compliance.
Questions/Concerns
-
Data Transmission: When using the optimizer, training data and prompts are sent to AWS Bedrock. Are there any logs or retained copies of this data?
-
Data Retention:
- How long is training data retained in AWS services during optimization?
- Are intermediate results from MIPROv2 optimization stored anywhere?
- Is there a way to ensure complete data deletion after optimization?
-
Compliance Considerations:
- For GDPR/HIPAA compliance, we need to ensure no PII is retained
- Can you provide guidance on using the optimizer with regulated data?
- Are there any data residency controls available?
-
Audit Trail: Is there any logging of what data was used for optimization that could potentially expose sensitive information?
Example Use Case
Optimize prompts for a healthcare chatbot that processes patient queries. What assurances are there around data handling?
Requested Information
- Documentation on data handling practices
- Best practices for using the optimizer with sensitive data
- Configuration options for enhanced privacy (if available)
- Confirmation of AWS Bedrock's data handling for optimization requests
Suggestions
- Add a section in the README about data privacy and security
- Provide configuration options to disable any logging/retention
- Consider adding local optimization options that don't require cloud calls
- Document which AWS services are involved in the data flow
Current Documentation Gap
The current README mentions AWS credentials and Bedrock access but doesn't address:
- Data retention policies
- Privacy considerations
- Compliance guidance
- Security best practices for sensitive data
This information would be valuable for enterprise adoption and security reviews.