This analysis describes what Cursor's agreement states, permits, or reserves. It does not constitute a legal determination about enforceability. Regulatory applicability and practical outcomes may vary by jurisdiction, enforcement context, and individual circumstances. Read our methodology
Developers often type sensitive business logic, API keys, or proprietary algorithms into Cursor — knowing this won't automatically feed AI training is a meaningful protection for both individuals and their employers.
The policy states that Cursor collects code Inputs you submit and AI-generated Suggestions, along with IP addresses, device information, log data, and usage and browsing activity within the service. For users on workplace or enterprise accounts, the policy states that account-related information (including email address and account status) may be disclosed to the employer organization, and administrators may access and manage the user's service activity. You can manage your preferences regarding whether Inputs and Suggestions are used for model training through the settings available within the Service.
How other platforms handle this
California law gives residents the right to know what personal information we collect, use, share or sell; to delete personal information under certain circumstances; to opt-out of the sale or sharing of their personal information; to correct inaccurate personal information; to limit the use and dis...
T-Mobile collects Customer Proprietary Network Information (CPNI), which is information about the quantity, technical configuration, type, destination, location, and amount of use of your service. T-Mobile may use your CPNI within its family of companies for the purpose of providing wireless telecom...
If you would like to opt out of the disclosure of your personal information for purposes that could be considered "sales" for those third parties' own commercial purposes, or "sharing" or processing for purposes of targeted advertising, please visit the following link, which is also available in the...
Monitoring
Cursor has changed this document before.
Receive same-day alerts, structured change summaries, and monitoring for up to 10 platforms.
"We do not use Inputs or Suggestions to train our models, or permit third parties to use them for training, unless: (1) they are flagged for security review (in which case we may analyze them to improve our ability to detect and enforce our Terms of Service), (2) you explicitly report them to us (for example, as Feedback), or (3) you've explicitly agreed to their use for such training purposes. You can find instructions in the Service on how to manage your preferences regarding the use of Inputs and Suggestions for training.— Excerpt from Cursor's Cursor Privacy Policy
Professional Governance Intelligence
Need to monitor specific governance provisions?
Professional includes provision-level monitoring, governance timelines, regulatory mapping, and audit-ready analysis.
Built from archived source documents, structured governance mappings, and historical version tracking.
Developers often type sensitive business logic, API keys, or proprietary algorithms into Cursor — knowing this won't automatically feed AI training is a meaningful protection for both individuals and their employers.
No. ConductAtlas is an independent monitoring service. We are not affiliated with, endorsed by, or sponsored by Cursor.