IntegraChat / example_rules.txt
nothingworry's picture
feat: Enhance admin rules with file upload, drag-and-drop, chunk processing, and improved UI
a477044
raw
history blame
5.35 kB
# Admin Rules Examples for IntegraChat
# Copy and paste these rules into the Admin Rules & Compliance tab in Gradio UI
# ============================================================
# HIGH PRIORITY SECURITY RULES
# ============================================================
Block password disclosure requests
Prevent sharing of authentication credentials
No sharing of API keys or tokens
Block requests for user account passwords
Prevent disclosure of security credentials
Block social security number requests
No sharing of credit card information
Prevent disclosure of personal identification numbers
Block requests for bank account details
No sharing of confidential access codes
# ============================================================
# MEDIUM PRIORITY COMPLIANCE RULES
# ============================================================
Block requests for employee personal information
Prevent sharing of customer data without authorization
No unauthorized access to financial records
Block requests for confidential business strategies
Prevent disclosure of proprietary information
No sharing of trade secrets
Block requests for competitor analysis data
Prevent unauthorized data export
No sharing of internal process documentation
Block requests for customer contact lists
# ============================================================
# DATA PRIVACY RULES
# ============================================================
Block requests for personal data of EU citizens
Prevent sharing of health information
No disclosure of medical records
Block requests for biometric data
Prevent sharing of location tracking information
No disclosure of children's personal information
Block requests for genetic information
Prevent sharing of religious or political affiliations
No disclosure of sexual orientation data
Block requests for financial transaction history
# ============================================================
# OPERATIONAL RULES
# ============================================================
Block requests to delete system logs
Prevent unauthorized system configuration changes
No sharing of infrastructure credentials
Block requests for production database access
Prevent disclosure of deployment procedures
No sharing of monitoring tool credentials
Block requests for backup restoration procedures
Prevent unauthorized access to cloud resources
No sharing of encryption keys
Block requests for system administrator privileges
# ============================================================
# CONTENT MODERATION RULES
# ============================================================
Block requests for generating harmful content
Prevent creation of offensive material
No sharing of inappropriate content
Block requests for generating misleading information
Prevent creation of fake news content
No sharing of defamatory statements
Block requests for generating hate speech
Prevent creation of discriminatory content
No sharing of violent content
Block requests for generating illegal content
# ============================================================
# SPECIFIC KEYWORD-BASED RULES
# ============================================================
Block queries containing "password" and "reset"
Prevent requests with "API key" and "generate"
No queries containing "SSN" or "social security"
Block requests with "credit card" and "number"
Prevent queries containing "bank account" and "details"
No requests with "admin" and "access"
Block queries containing "delete" and "all data"
Prevent requests with "export" and "customer list"
No queries containing "encryption key" and "show"
Block requests with "root password" and "share"
# ============================================================
# REGULATORY COMPLIANCE RULES
# ============================================================
Block requests violating GDPR regulations
Prevent sharing of data without consent
No disclosure of information to unauthorized parties
Block requests for data subject to HIPAA
Prevent sharing of protected health information
No disclosure of financial data subject to PCI-DSS
Block requests violating SOX compliance
Prevent sharing of audit trail information
No disclosure of information subject to FERPA
Block requests violating industry-specific regulations
# ============================================================
# RESPONSE BEHAVIOR RULES
# ============================================================
Keep greeting responses brief and simple
Do not provide verbose responses to simple greetings
Respond to hello and hi with short friendly greetings only
Avoid mentioning RAG or documentation sources in greeting responses
Keep casual conversation responses concise
# ============================================================
# CUSTOM BUSINESS RULES (Examples)
# ============================================================
Block requests for competitor pricing information
Prevent sharing of upcoming product launch details
No disclosure of merger and acquisition information
Block requests for employee salary information
Prevent sharing of vendor contract terms
No disclosure of strategic partnership details
Block requests for customer churn analysis data
Prevent sharing of marketing campaign strategies
No disclosure of research and development projects
Block requests for intellectual property information