Chain of custody diagram addressing IP concerns

Hey there, I am busy with a pilot for cursor and claude for my organisation - I have been loving the tool for many months - we have some corporate inertia around the concern that somehow claude and cursor are training their models on our code or that our IP would be leaked - which I believe is a low risk concern in privacy mode, we have reviewed the privacy docs and forwarded to the powers that be, but what would be great would be some kind of sequence diagram that demonstrates the flow of information between local IDE → cursor cloud → anthropic and back, detailing the safeguards and standards for ensuring the safe custody of our sourcecode. I asked the cursor agent for exactly this and it generated a puml sequence diagram - this is really useful for taking the more technical skeptics through things - I saw some nice stuff like Privacy filters - but who would I be able to speak to from cursor to get confirmation that this diagram is indeed accurate? Or is there something else out there that is better?

1 Like