Jit logo
Platform
Platform & Use Cases Overview
Integrations
Core Product Security Workflow Automation
Vulnerability Triage, Prioritization, and Remediation
Shift-left Security for Developers
Full-Stack Product Security Scanning
Compliance Gap Analysis
Beta
Threat Modeling
Beta
Customized Product Security Workflow Automation
Automate Program-Specific Workflows
Solutions
Use Cases
Build an AppSec Program
Achieve Compliance
Simplify Security for Developers
Comparisons
Jit vs Snyk
Jit vs GitHub Advanced Security
Jit vs GitLab Ultimate Security
Jit vs SonarQube
Jit vs Aikido
Organization Type
Startups
Enterprises
Partners
Pricing
Company
About Us
Partners
Careers
Events
Customers
Learn
All Resources
Blog
Documentation
Resources
DevSecOps:
Practices & Implementation
Application Security Tools:
Selection & Guidance
Cloud Security Tools:
Best Practices & Use Cases
Security Standards:
What to Know & Apply
Application Security:
Strategies & Essentials
OWASP ZAP:
Setup & Best Practices
LoginStart FreeBook a demo

Welcome to Jit’s Legal Page

Here you will find the terms and conditions that apply directly to you and the solutions you purchase. You will also find links to information about Jit’s data privacy and security program, along with data privacy terms.

Back

AI Principles

Last updated:
May 1, 2025
Version:

‍Our Commitment to Responsible AI Usage

At Jit Inc., we leverage artificial intelligence to enhance our application security (AppSec) services while maintaining the highest standards of data privacy and security. This document outlines how we use AI technologies and the measures we take to protect your data.

How We Use AI

AI-Powered Security Agents

We utilize Generative AI (GenAI) for inference to power intelligent agents that help identify, analyze, and address application security challenges. These AI agents for example may provide:

  • Real-time security assessments
  • Automated vulnerability detection
  • Intelligent threat analysis
  • Smart remediation recommendations

Infrastructure and Technology Stack

  • Platform: We deploy our AI services through AWS Bedrock, ensuring enterprise-grade security and reliability
  • Model Usage: We exclusively use pre-trained models for inference - we do not create, train, or fine-tune our own models
  • Scope: All AI operations are strictly limited to inference and analysis tasks

Your Data Protection

Complete Data Isolation

  • Tenant Segregation: Each customer's data is isolated within their own tenant environment
  • No Cross-Sharing: Customer data is never shared between tenants or used for any purpose outside of your specific services
  • Dedicated Processing: AI operations are executed exclusively within your tenant's scope

No Training on Customer Data

  • We never use customer data to train, fine-tune, or develop machine learning models
  • Customer data is used solely for delivering the AppSec services you've contracted
  • We do not contribute your data to any model training datasets

Zero Data Sharing with Model Providers

  • Customer data is never shared with AI model providers for design, training, tuning, building or modifying ML Models - including generative models such as large language models (LLMs)
  • Your data remains exclusively within our secure infrastructure
  • Model providers have no access to your data for any purpose, including training or improvement of their models

Internal AI Usage

Productivity Tools

  • We use AI tools internally to enhance our team's productivity and efficiency
  • These internal tools are completely separate from customer-facing services
  • Strict Policy: Customer data is never permitted to be used in our internal AI productivity tools

Employee Guidelines

  • All employees are trained on our AI usage policies
  • Clear protocols prevent any customer data from being used in internal AI applications
  • Regular audits ensure compliance with these policies

Security and Compliance

Data Handling Standards

  • All AI operations comply with industry-standard security practices
  • Data is encrypted in transit and at rest
  • Access controls ensure only authorized personnel can interact with AI systems

Transparency Commitment

  • We maintain this document to keep you informed about our AI practices
  • Any significant changes to our AI usage will be communicated to customers
  • We're committed to responsible and ethical AI deployment

Questions and Contact

If you have any questions about our AI usage or data protection practices, please contact:

  • Email: infosec@jit.io
  • Support: support@jit.io
Jit logo

Platform

How Jit WorksSecurity ToolsIntegrationsJit vs. SnykUser Stories

Company

About UsPartnersCareersEventsNews

Resources

BlogDocsPricingCustomers
Contact usBook a DemoStart Free
TwitterLinkedinFacebook
Read Jit reviews on G2
SOC 2 Type 2AWS partner badge
2025 © Jit | All Rights Reserved
Legal and SecurityModern Slavery Act

100 Summer Street
Boston, MA, 02110
USA