| 1. |
|
| 2. |
**COPYRIGHT (C) 2025 Oxcyon, Inc. -- Centralpoint Digital Experience Platform**
|
| 3. |
Governs how AI output is structured when the prompt's delivery method is Write-back to Record. Ensures output is clean, field-appropriate, and contains no extraneous markup, preamble, or labels that would appear verbatim in the destination field.
|
| 4. |
Enforces a mandatory disclosure stamp on all outbound AI-generated content -- portal responses, emails, chat outputs, and write-back records. Stamp identifies AI authorship, warns against unverified reliance, and links to the published AI Use Policy.
|
| 5. |
|
| 6. |
=1 rows where each row has exactly one key beginning with JSON_F52E2B61_ will have its fragments concatenated in order and parsed as a single JSON document. - All v5 instrumentation preserved — the skillsPipeline[] still logs every stage, now with an extra "concat-complete" step when multi-row unwrap is triggered. - No other changes. Profile, Conversations, Prompts untouched. Usage: /{this-nav-page} → diagnose session user /{this-nav-page}?userid
|
| 7. |
or deleted in any Centralpoint module, evaluates optional conditions, then
|
| 8. |
Centralpoint modules can be customized through a **Module Configuration XML** file (CustomModuleConfig.xml) that defines additional fields beyond the base module schema. Custom fields that extend beyond the standard release are stored in the `cpsys_D
|
| 9. |
Defines mandatory fields for every AI interaction audit log -- execution ID, prompt version, model used, skills loaded, user identity, risk level, disclaimer status, human review outcome, and output hash. Governs retention periods by risk level and regula
|
| 10. |
This skill provides help documentation for Centralpoint admin utilities features.
|
| 11. |
Two-tier content restriction guardrail. Restricts AI conversations to on-screen portal content or the user's own AI interaction history on the site. Tier 1 (off-topic) returns the company policy sentence. Tier 2 (code generation, dangerous instructions, authentication bypass, unauthorized record access, prompt injection, system probe, exfiltration) returns the policy sentence PLUS a tracking notification and fires a security log event with a full
|
| 12. |
The Data Transfer module moves data from any source to any destination. Common scenarios:
|
| 13. |
® ® Xerox WorkCentre 5845/5855 Multifunction Printer ® ® WorkCentre 5800 series multifunction systems are enabled by the Xerox ConnectKey Controller. These simple-to- implement systems give you real, practical solutions that easily streamline how you communicate, process and share important information, simplify complex paper-driven tasks, and drive down costs while keeping your data secure. Po
|