Overview of Security Audit Records

Picture of Kalanithi Balasubramanian

Kalanithi Balasubramanian

Updated on April 10, 2024

Security audit records get created when a prompt runs and a response gets back from AI. These records help identify the data we send and receive.

Feedback after running a prompt also gets tagged to these records. These records will host the error messages that are encountered when we run GPTfy, too.

Identifying Important Tabs and Fields in Security Audit Records

  • Context Tab:
    • Data (PII Key): The encryption key to process Personally Identifiable Information (PII).
    • Data (Original): The raw data extracted from Salesforce.
    • Data (PII Removed): Review the data processed to remove PII, transmitted to the AI.

 

    • The context tab has the option to View in the JSON Viewer. The Data Original and the Data PII Removed are available in JSON format so this allows users to view and analyze the JSON (JavaScript Object Notation) data in a user-friendly manner.
  • Response Tab:
    • Data (Decrypt PII Key): Decrypting key to reintroduce PII back into the data.
    • AI Processed Data (No PII): Examine the response after deidentification of data.
    • AI Processed Data (PII Added): Review the response received from the AI, now including PII.
  • Feedbacks Tab:
    • Access a list of feedback related to a specific response.
    • Feedback is captured through the thumbs-down icon on the GPTfy console, allowing users to provide suggestions if they have any.
    • This feedback is associated with responses and linked to the respective audit record.

Feedbacks can be added via the GPTfy console, and here is the step-by-step procedure on how to provide feedback on a particular response and how it gets mapped to the security audit record.

Step 1: Run a prompt

  • Run a prompt on a record.

  • Response gets pasted to the console and a Security audit record is created.

Step 2: Give a Feedback. For example – Thumbs-up

  • Click on the Thumbs-down icon in the console.

  • Add Comments and select any available options.

  • Click Save.

Step 3: Verify the feedback

  • Open the security audit record by click on the hyperlink on the console.

  • Click on the feedback tab.

  • A related record of feedback is added.