This page shows frequently asked questions about Gemini Code Assist Standard and Enterprise.
Data security and privacy
Does Gemini CLI use my data to train Gemini models when I use my Gemini Code Assist Standard or Enterprise license?
Google doesn't use your data to train our models without your permission.
For more information, see Gemini CLI: Terms of Service and Privacy Notice and Security, privacy, and compliance for Gemini Code Assist Standard and Enterprise.
Does Gemini Code Assist use prompt and response data to train Gemini models?
Gemini doesn't use your prompts or its responses as data to train its models. If you opt-in to some features made available through the Gemini for Google Cloud Trusted Tester Program, some of your data is shared, but the data is used for product improvements, not for training Gemini models.
What is covered by Google's indemnification policy for Gemini Code Assist?
Gemini Code Assist is a Generative AI Indemnified Service. If you are challenged on copyright grounds after using content generated by Gemini, then we assume certain responsibility for the potential legal risks involved.
For full details about Google's indemnity policies, see the following references:
- Google Cloud Terms (search for indemnification)
- Service Specific Terms (search for AI/ML services)
- Blog: Shared fate: Protecting customers with generative AI indemnification
Can separate environments be isolated at the network level within Gemini Code Assist deployments?
Yes, it's possible to achieve network-level isolation for different environments when using Gemini Code Assist. The primary method for isolating Google Cloud services is to use VPC Service Controls context-based perimeters and network configurations.
For additional security you can do the following:
- Only enable the Gemini Code Assist API in specific Google Cloud projects.
- Use Identity and Access Management (IAM) and role based access control. This is critical for a defense-in-depth strategy and completing network-level controls.
By combining VPC Service Controls, project separation, and IAM role-based access control, you can establish robust isolation between your different environments.