Reference
AI Security Glossary
Essential definitions for AI security, data loss prevention, compliance, and privacy. Reference guide for security professionals.
Key Concepts
AI Data Loss Prevention
Security controls for preventing data exposure through AI tools
Context-Preserving Masking
Protecting data while maintaining AI response quality
Reveal Technology
Restoring masked responses for authorized users
A
AI Data Loss Prevention (AI DLP)
AI SecuritySecurity controls specifically designed to prevent sensitive data from being exposed through AI tools and large language models. Unlike traditional DLP, AI DLP must handle conversational data flows and understand context.
Related:DLPShadow AIData Masking
B
Business Associate Agreement (BAA)
ComplianceA legally binding contract under HIPAA that requires business associates to appropriately safeguard protected health information (PHI). Required when AI vendors process healthcare data.
Related:HIPAAPHICovered Entity
C
Context-Preserving Masking
TechnicalA data protection technique that replaces sensitive information with tokens while maintaining enough semantic meaning for AI models to provide useful responses. Unlike simple redaction, it preserves relationships and context.
Related:Data MaskingTokenizationReveal Technology
Covered Entity
ComplianceUnder HIPAA, a health plan, healthcare clearinghouse, or healthcare provider that transmits health information electronically. Covered entities must comply with HIPAA rules for protecting PHI.
Related:HIPAABusiness AssociatePHI
D
Data Loss Prevention (DLP)
AI SecurityTechnology and processes designed to detect and prevent unauthorized transmission of sensitive data. Traditional DLP focuses on email and file transfers; modern DLP must include AI channels.
Related:AI DLPData ClassificationSensitive Data
Data Masking
TechnicalThe process of hiding original data with modified content to protect sensitive information. In AI contexts, masking must balance data protection with preserving enough context for useful AI interactions.
Related:TokenizationRedactionContext-Preserving Masking
De-identification
Data PrivacyThe process of removing or obscuring personal identifiers from data. Under HIPAA, properly de-identified data is no longer considered PHI and has fewer restrictions.
Related:HIPAASafe HarborExpert Determination
G
GDPR (General Data Protection Regulation)
ComplianceEuropean Union regulation governing data protection and privacy. Requires organizations to protect personal data and provides rights to individuals over their data.
Related:Personal DataData Subject RightsPrivacy
H
HIPAA (Health Insurance Portability and Accountability Act)
ComplianceU.S. federal law that sets standards for protecting sensitive patient health information. Includes Privacy Rule, Security Rule, and Breach Notification Rule.
Related:PHIBAACovered Entity
L
Large Language Model (LLM)
TechnicalAI models trained on massive text datasets that can understand and generate human-like text. Examples include GPT-4, Claude, and Gemini. Security considerations include data retention and training data exposure.
Related:AIPromptModel Training
M
Minimum Necessary Standard
ComplianceHIPAA principle requiring covered entities to limit PHI disclosure to the minimum amount needed to accomplish the intended purpose. Applies to AI workflows processing healthcare data.
Related:HIPAAPHIAccess Controls
N
Named Entity Recognition (NER)
TechnicalMachine learning technique used to identify and classify named entities (people, organizations, locations) in text. Core technology for detecting PII in unstructured data.
Related:PII DetectionMachine LearningNatural Language Processing
P
PCI DSS (Payment Card Industry Data Security Standard)
ComplianceSecurity standard for organizations handling credit card data. Requires protection of cardholder data including primary account numbers (PANs).
Related:Credit CardCardholder DataPayment Security
Personally Identifiable Information (PII)
Data PrivacyInformation that can identify an individual directly or indirectly. Includes names, SSN, email addresses, and other identifiers. Different regulations define PII differently.
Related:PHISensitive DataData Classification
Prompt Injection
AI SecurityAttack technique where malicious instructions are embedded in prompts to manipulate AI model behavior. Can be used to extract sensitive data or bypass controls.
Related:LLM SecurityAI AttackJailbreak
Protected Health Information (PHI)
Data PrivacyUnder HIPAA, individually identifiable health information held by covered entities. Includes 18 specific identifiers when combined with health data.
Related:HIPAA18 IdentifiersDe-identification
R
Redaction
TechnicalComplete removal or blacking out of sensitive information from documents or text. Unlike masking, redacted content cannot be recovered.
Related:Data MaskingDe-identificationDocument Sanitization
Reveal Technology
TechnicalSecured AI's proprietary capability to restore masked AI responses back to readable format for authorized users. Enables full AI utility while maintaining data protection.
Related:Context-Preserving MaskingDe-obscuringData Protection
S
Shadow AI
AI SecurityUnauthorized or unmonitored use of AI tools within an organization. Similar to Shadow IT, creates security blind spots where sensitive data may be exposed without oversight.
Related:Shadow ITAI GovernanceData Exposure
SOC 2 (Service Organization Control 2)
ComplianceAuditing framework for service providers storing customer data. Evaluates controls for security, availability, processing integrity, confidentiality, and privacy.
Related:AuditTrust Services CriteriaCompliance
T
Tokenization
TechnicalSecurity technique replacing sensitive data with non-sensitive placeholder tokens. Original data is stored securely and can be retrieved using the token as a reference.
Related:Data MaskingEncryptionData Protection
Z
Zero-Trust Architecture
AI SecuritySecurity model that requires strict verification for every person and device accessing resources, regardless of location. "Never trust, always verify" approach applied to AI access.
Related:Access ControlAuthenticationSecurity Architecture
Learn More
Explore our learning resources for deeper understanding.
See These Concepts in Action
Experience how Secured AI implements AI DLP, context-preserving masking, and reveal technology in a live demo.
No credit card required - No setup needed
