Search results for keyword 'security'

2. Privacy Principles Privacy by Design

...o We have implemented an enterprise wide Privacy by Design approach that incorporates privacy and data security into our ML and associated data processing systems....

Published by ADP

(Preamble)

...Establish a correct view of artificial intelligence development; clarify the basic principles and operational guides for the development and use of artificial intelligence; help to build an inclusive and shared, fair and orderly development environment; and form a sustainable development model that is safe secure, trustworthy, rational, and responsible....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 5: Secure safe and controllable.

...· Article 5: secure safe and controllable....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 5: Secure safe and controllable.

...Ensure that AI systems operate securely safely, reliably, and controllably throughout their lifecycle....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 5: Secure safe and controllable.

...Evaluate system security safety and potential risks, and continuously improve system maturity, robustness, and anti tampering capabilities....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 7: Protect privacy.

...Strengthen technical methods, ensure data security, and be on guard against risks such as data leaks....

Published by Artificial Intelligence Industry Alliance (AIIA), China

· Article 11: Formulate standards.

...Enhance the measurability of ethical principles such as security and controllability, transparency and explainability, privacy protection, and diversity and inclusiveness; and simultaneously build corresponding assessment capabilities....

Published by Artificial Intelligence Industry Alliance (AIIA), China

Sustainability

...They must also keep in mind that the technical sustainability of these systems depends on their safety: their accuracy, reliability, security, and robustness....

Published by The Alan Turing Institute

2. RELIABILITY, SECURITY AND PRIVACY

...RELIABILITY, security AND PRIVACY...

Published by the Law, Society and Ethics Working Group of the AI Forum,New Zealand

2. RELIABILITY, SECURITY AND PRIVACY

...AI stakeholders must ensure AI systems and related data are reliable, accurate and secure and the privacy of individuals is protected throughout the AI system’s life cycle, with potential risks identified and managed on an ongoing basis....

Published by the Law, Society and Ethics Working Group of the AI Forum,New Zealand

Privacy protection and security

... Privacy protection and security...

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...Throughout their lifecycle, AI systems should respect and uphold privacy rights and data protection, and ensure the security of data....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...This principle also aims to ensure appropriate data and AI system security measures are in place....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...This includes the identification of potential security vulnerabilities, and assurance of resilience to adversarial attacks....

Published by Department of Industry, Innovation and Science, Australian Government

Privacy protection and security

...security measures should account for unintended applications of AI systems, and potential abuse risks, with appropriate mitigation measures....

Published by Department of Industry, Innovation and Science, Australian Government

· Control Risks

...Continuous efforts should be made to improve the maturity, robustness, reliability, and controllability of AI systems, so as to ensure the security for the data, the safety and security for the AI system itself, and the safety for the external environment where the AI system deploys....

Published by Beijing Academy of Artificial Intelligence (BAAI); Peking University; Tsinghua University; Institute of Automation, Chinese Academy of Sciences; Institute of Computing Technology, Chinese Academy of Sciences; Artifical Intelligence Industry Innovation Strategy Alliance (AITISA); etc.

· Control Risks

...Continuous efforts should be made to improve the maturity, robustness, reliability, and controllability of AI systems, so as to ensure the security for the data, the safety and security for the AI system itself, and the safety for the external environment where the AI system deploys....

Published by Beijing Academy of Artificial Intelligence (BAAI); Peking University; Tsinghua University; Institute of Automation, Chinese Academy of Sciences; Institute of Computing Technology, Chinese Academy of Sciences; Artifical Intelligence Industry Innovation Strategy Alliance (AITISA); etc.

· Control risks

...Considering that the influence of AI on children's psychology, physiology, and behaviors is still to be studied, and children's own thinking and behaviors are highly uncertain, AI technology and products for children should conform to higher standards and requirements in terms of maturity, robustness, reliability, controllability, safety and security, etc....

Published by Beijing Academy of Artificial Intelligence (BAAI), Peking University, Tsinghua University and the Chinese Academy of Sciences, together with enterprises that focus on AI development.

· Privacy and security

...· Privacy and security...

Published by Centre for International Governance Innovation (CIGI), Canada

· Transparency

...Intellectual property, and sometimes even cyber security, is rewarded by a lack of transparency....

Published by Centre for International Governance Innovation (CIGI), Canada

· Transparency

...Intellectual property, and sometimes even cyber security, is rewarded by a lack of transparency....

Published by Centre for International Governance Innovation (CIGI), Canada

(k) Good governance:

...Governments should provide regular reports about their use of AI in policing, intelligence, and security....

Published by The Extended Working Group on Ethics of Artificial Intelligence (AI) of the World Commission on the Ethics of Scientific Knowledge and Technology (COMEST), UNESCO

· (4) Security

...· (4) security...

Published by Cabinet Office, Government of Japan

· (4) Security

...Therefore, there is a new security risk for the use of AI....

Published by Cabinet Office, Government of Japan

· (4) Security

...Society must also pay attention to risk management, including cybersecurity awareness....

Published by Cabinet Office, Government of Japan

· (6) Fairness, Accountability, and Transparency

... In order to ensure the above viewpoints and to utilize AI safely in society, a mechanism must be established to secure trust in AI and its using data....

Published by Cabinet Office, Government of Japan

· (7) Innovation

... To implement AI efficiently and securely in society, methods for confirming the quality and reliability of AI and for efficient collection and maintenance of data utilized in AI must be promoted....

Published by Cabinet Office, Government of Japan

· (7) Innovation

... To ensure the sound development of AI technology, it is necessary to establish an accessible platform in which data from all fields can be mutually utilized across borders with no monopolies, while ensuring privacy and security....

Published by Cabinet Office, Government of Japan

4. be as open as we can by sharing source code, training data, and other relevant information, all while protecting personal information, system integration, and national security and defence

... 4. be as open as we can by sharing source code, training data, and other relevant information, all while protecting personal information, system integration, and national security and defence...

Published by Government of Canada

2. We care.

...AI systems have to meet the same high technical requirements as any other IT system of ours, such as security, robustness, etc....

Published by Deutsche Telekom

5. We are secure.

...We are secure....

Published by Deutsche Telekom

5. We are secure.

...Data security is a prime quality of Deutsche Telekom....

Published by Deutsche Telekom

5. We are secure.

...In order to maintain this asset, we ensure that our security measures are up to date while having a full overview of how customer related data is used and who has access to which kind of data....

Published by Deutsche Telekom

5. We are secure.

...Additionally, we limit the usage to appropriate use cases and thoroughly secure our systems to obstruct external access and ensure data privacy....

Published by Deutsche Telekom

6. We set the framework.

...The essential paradigm for our AI systems’ impact analysis is “privacy und security by design”....

Published by Deutsche Telekom

4. Reliable.

...DoD AI systems should have an explicit, well defined domain of use, and the safety, security, and robustness of such systems should be tested and assured across their entire life cycle within that domain of use....

Published by Defense Innovation Board (DIB), Department of Defense (DoD), United States

II. Technical robustness and safety

...Trustworthy AI requires algorithms to be secure, reliable and robust enough to deal with errors or inconsistencies during all life cycle phases of the AI system, and to adequately cope with erroneous outcomes....

Published by European Commission

II. Technical robustness and safety

...AI systems need to be reliable, secure enough to be resilient against both overt attacks and more subtle attempts to manipulate data or algorithms themselves, and they must ensure a fall back plan in case of problems....

Published by European Commission

II. Technical robustness and safety

...In addition, AI systems should integrate safety and security by design mechanisms to ensure that they are verifiably safe at every step, taking at heart the physical and mental safety of all concerned....

Published by European Commission

(g) Security, safety, bodily and mental integrity

... (g) security, safety, bodily and mental integrity...

Published by European Group on Ethics in Science and New Technologies, European Commission

(g) Security, safety, bodily and mental integrity

...Safety and security of ‘autonomous’ systems materialises in three forms: (1) external safety for their environment and users, (2) reliability and internal robustness, e.g....

Published by European Group on Ethics in Science and New Technologies, European Commission

(g) Security, safety, bodily and mental integrity

...All dimensions of safety must be taken into account by AI developers and strictly tested before release in order to ensure that ‘autonomous’ systems do not infringe on the human right to bodily and mental integrity and a safe and secure environment....

Published by European Group on Ethics in Science and New Technologies, European Commission

(g) Security, safety, bodily and mental integrity

...in cybersecurity, finance, infrastructure and armed conflict....

Published by European Group on Ethics in Science and New Technologies, European Commission

· 6) Safety

...AI systems should be safe and secure throughout their operational lifetime, and verifiably so where applicable and feasible....

Published by Future of Life Institute (FLI), Beneficial AI 2017

· 1.4. Robustness, security and safety

...Robustness, security and safety...

Published by G20 Ministerial Meeting on Trade and Digital Economy

· 1.4. Robustness, security and safety

...a) AI systems should be robust, secure and safe throughout their entire lifecycle so that, in conditions of normal use, foreseeable use or misuse, or other adverse conditions, they function appropriately and do not pose unreasonable safety risk....

Published by G20 Ministerial Meeting on Trade and Digital Economy

· 1.4. Robustness, security and safety

...c) AI actors should, based on their roles, the context, and their ability to act, apply a systematic risk management approach to each phase of the AI system lifecycle on a continuous basis to address risks related to AI systems, including privacy, digital security, safety and bias....

Published by G20 Ministerial Meeting on Trade and Digital Economy

Security

... security...

Published by Data Ethics Commission, Germany

Security

...The principle of security relates not only to the physical and emotional safety of humans but also to environmental protection, and as such involves the preservation of vitally important assets....

Published by Data Ethics Commission, Germany

Security

...Guaranteeing security entails compliance with stringent requirements, e.g....

Published by Data Ethics Commission, Germany

· 1. Be socially beneficial.

...Advances in AI will have transformative impacts in a wide range of fields, including healthcare, security, energy, transportation, manufacturing, and entertainment....

Published by Google

· 3. Be built and tested for safety.

...We will continue to develop and apply strong safety and security practices to avoid unintended results that create risks of harm....

Published by Google

· 2. The Principle of Non maleficence: “Do no Harm”

...By design, AI systems should protect the dignity, integrity, liberty, privacy, safety, and security of human beings in society and at work....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 8. Robustness

...Trustworthy AI requires that algorithms are secure, reliable as well as robust enough to deal with errors or inconsistencies during the design, development, execution, deployment and use phase of the AI system, and to adequately cope with erroneous outcomes....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 8. Robustness

...A secure AI has safeguards that enable a fall back plan in case of problems with the AI system....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

5. The autonomous power to hurt, destroy or deceive human beings should never be vested in artificial intelligence.

...The Cabinet Office's final cyber security & Technology Strategy must explicitly consider the risks of AI with respect to cyber security, and the Government should conduct further research as how to protect data sets from any attempts at data sabotage....

Published by House of Lords of United Kingdom, Select Committee on Artificial Intelligence

5. The autonomous power to hurt, destroy or deceive human beings should never be vested in artificial intelligence.

...The Cabinet Office's final Cyber security & Technology Strategy must explicitly consider the risks of AI with respect to cyber security, and the Government should conduct further research as how to protect data sets from any attempts at data sabotage....

Published by House of Lords of United Kingdom, Select Committee on Artificial Intelligence

5. The autonomous power to hurt, destroy or deceive human beings should never be vested in artificial intelligence.

...The Cabinet Office's final Cyber security & Technology Strategy must explicitly consider the risks of AI with respect to cyber security, and the Government should conduct further research as how to protect data sets from any attempts at data sabotage....

Published by House of Lords of United Kingdom, Select Committee on Artificial Intelligence

3. Skills

...Therefore, the IBM company will work to help students, workers and citizens acquire the skills and knowledge to engage safely, securely and effectively in a relationship with cognitive systems, and to perform the new kinds of work and jobs that will emerge in a cognitive economy....

Published by IBM

1. Principle 1 — Human Rights

...To best honor human rights, society must assure the safety and security of A IS so that they are designed and operated in a way that benefits humans:...

Published by The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems

4. Principle 4 — Transparency

...(The mechanisms by which transparency is provided will vary significantly, for instance 1) for users of care or domestic robots, a why did you do that button which, when pressed, causes the robot to explain the action it just took, 2) for validation or certification agencies, the algorithms underlying the A IS and how they have been verified, and 3) for accident investigators, secure storage of sensor and internal state data, comparable to a flight data recorder or black box.)...

Published by The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems

5. Principle 5 — A IS Technology Misuse and Awareness of It

...Providing ethics education and security awareness that sensitizes society to the potential risks of misuse of A IS (e.g., by providing “data privacy” warnings that some smart devices will collect their user’s personal data)....

Published by The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems

· 2.3 Promoting Innovation and the Security of the Internet

...· 2.3 Promoting Innovation and the security of the Internet...

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...· 2.4 cybersecurity and Privacy...

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...Just like technologies that have come before it, AI depends on strong cybersecurity and privacy provisions....

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...We encourage governments to use strong, globally accepted and deployed cryptography and other security standards that enable trust and interoperability....

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...The tech sector incorporates strong security features into our products and services to advance trust, including using published algorithms as our default cryptography approach as they have the greatest trust among global stakeholders, and limiting access to encryption keys....

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...Data and cybersecurity are integral to the success of AI....

Published by Information Technology Industry Council (ITI)

• Foster Innovation and Open Development

...• Address global societal challenges: AI powered flagship initiatives should be funded to find solutions to the world’s greatest challenges such as curing cancer, ensuring food security, controlling climate change, and achieving inclusive economic growth....

Published by Intel

• Liberate Data Responsibly

...• Keep data moving: Governments should eliminate unwarranted data localization mandates and enable secure international data transfers through international agreements and legal tools....

Published by Intel

• Rethink Privacy

...• Keep data secure: Policies should help enable cutting edge AI technology with robust cyber and physical security to mitigate risks of attacks and promote trust from society....

Published by Intel

• Rethink Privacy

...• Keep data secure: Policies should help enable cutting edge AI technology with robust cyber and physical security to mitigate risks of attacks and promote trust from society....

Published by Intel

• Rethink Privacy

...barriers to the sharing of data for cybersecurity purposes....

Published by Intel

(Preamble)

...Furthermore, while this paper is focused on the specific challenges surrounding AI, the strong interdependence between its development and the expansion of the Internet of Things (IoT) demands a closer look at interoperability and security of IoT devices....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Ethical Considerations in Deployment and Design

...They need to consider their collective responsibility in building AI systems that will not pose security risks to the Internet and Internet users....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Public Empowerment

...Provide the public with information: While full transparency around a service’s machine learning techniques and training data is generally not advisable due to the security risk, the public should be provided with enough information to make it possible for people to question its outcomes....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Responsible Deployment

...High standards of device, system and network security should be applied....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Responsible Deployment

...Responsible disclosure: security researchers acting in good faith should be able to responsibly test the security of AI systems without fear of prosecution or other legal action....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Responsible Deployment

...Responsible disclosure: security researchers acting in good faith should be able to responsibly test the security of AI systems without fear of prosecution or other legal action....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

Responsible Deployment

...At the same time, researchers and others who discover security vulnerabilities or other design flaws should responsibly disclose their findings to those who are in the best position to fix the problem....

Published by Internet Society, "Artificial Intelligence and Machine Learning: Policy Paper"

5. Security

...security...

Published by The Japanese Society for Artificial Intelligence (JSAI)

3. Principle of controllability

...One of the conceivable methods of risk assessment is to conduct experiments in a closed space such as in a laboratory or a sandbox in which security is ensured, at a stage before the practical application in society....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...Principle of security...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...Developers should pay attention to the security of AI systems....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...In addition to respecting international guidelines on security such as “OECD Guidelines for the security of Information Systems and Networks,” it is encouraged that developers pay attention to the followings, with consideration of the possibility that AI systems might change their outputs or programs as a result of learning or other methods:...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...In addition to respecting international guidelines on security such as “OECD Guidelines for the security of Information Systems and Networks,” it is encouraged that developers pay attention to the followings, with consideration of the possibility that AI systems might change their outputs or programs as a result of learning or other methods:...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...● To pay attention, as necessary, to the reliability (that is, whether the operations are performed as intended and not steered by unauthorized third parties) and robustness (that is, tolerance to physical attacks and accidents) of AI systems, in addition to: (a) confidentiality; (b) integrity; and (c) availability of information that are usually required for ensuring the information security of AI systems....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...● To make efforts to conduct verification and validation in advance in order to assess and control the risks related to the security of AI systems....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...● To make efforts to take measures to maintain the security to the extent possible in light of the characteristics of the technologies to be adopted throughout the process of the development of AI systems (“security by design”)....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...● To make efforts to take measures to maintain the security to the extent possible in light of the characteristics of the technologies to be adopted throughout the process of the development of AI systems (“security by design”)....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

1. Principle of proper utilization

...of damages caused by accidents, security breaches, privacy infringement, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

2. Principle of data quality

...B) Attention to security vulnerabilities of AI by learning inaccurate or inappropriate data...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

2. Principle of data quality

...Users and data providers may be expected to pay attention to the risk that the security of AI might become vulnerable by learning inaccurate or inappropriate data....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...Principle of security...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...Users and data providers should pay attention to the security of AI systems or AI services....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...A) Implementation of security measures...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...Users may be expected to pay attention to the security of AI and take reasonable measures in light of the technology level at that time....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...In addition, users may be expected to consider measures to be taken against security breaches of AI in advance....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...for security measures...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...AI service providers may be expected, with regard to their AI services, to provide services for security measures to end users and share incident information with end users....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...C) Attention to security vulnerabilities of AI by learning inaccurate or inappropriate data...

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

5. Principle of security

...Users and data providers may be expected to pay attention to the risk that AI’s security might become vulnerable by learning inaccurate or inappropriate data....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

3. Technical reliability, Safety and security

...Technical reliability, Safety and security...

Published by Megvii

3. Technical reliability, Safety and security

...Artificial intelligence solutions should be able to make accurate and effective decisions, while providing adequate security and defense against external attacks....

Published by Megvii

6. Data Security and Privacy Protection

...Data security and Privacy Protection...

Published by Megvii

6. Data Security and Privacy Protection

...In the development and use of artificial intelligence solutions, users' personal privacy and data security need to be strictly protected....

Published by Megvii

Privacy & Security

... Privacy & security...

Published by Microsoft

Privacy & Security

...AI systems should be secure and respect privacy....

Published by Microsoft

5 DEMOCRATIC PARTICIPATION PRINCIPLE

...4) The discovery of AIS operating errors, unexpected or undesirable effects, security breaches, and data leaks must imperatively be reported to the relevant public authorities, stakeholders, and those affected by the situation....

Published by University of Montreal

8 PRUDENCE PRINCIPLE

...3) Before being placed on the market and whether they are offered for charge or for free, AIS must meet strict reliability, security, and integrity requirements and be subjected to tests that do not put people’s lives in danger, harm their quality of life, or negatively impact their reputation or psychological integrity....

Published by University of Montreal

D. Reliability:

...The safety, security, and robustness of such capabilities will be subject to testing and assurance within those use cases across their entire life cycle, including through established NATO and or national certification procedures....

Published by The North Atlantic Treaty Organization (NATO)

1. Harmony and Human friendly

...The development of AI should be based on the premise of ensuring social security and respecting human rights, and should prevent misuse, abuse and evil use of AI technology by all means....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...This set of norms aims to integrate ethics into the entire life cycle of AI, to promote fairness, justice, harmony, safety and security, and to avoid issues such as prejudice, discrimination, privacy and information leakage....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...(3) Protecting privacy and security....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 1. General Principles

...Fully respect the rights of personal information, to know, and to consent, etc., handle personal information, protect personal privacy and data security in accordance with the principles of lawfulness, justifiability, necessity, and integrity, do no harm to the legitimate rights of personal data, must not illegally collect and use personal information by stealing, tampering, or leaking, etc., and must not infringe on the rights of personal privacy....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 3. The Norms of Research and Development

...Enhance safety, security and transparency....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 5. The Norms of Use

...It is strictly forbidden to endanger national security, public safety and production safety, and it is strictly forbidden to do harm to public interests....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

Chapter 5. The Norms of Use

...Actively participate in the practice of AI ethics and governance, prompt feedback to relevant subjects and assistance for solving problems are expected when technical safety and security flaws, policy and law vacuums, and lags of regulation are found in the use of AI products and services....

Published by National Governance Committee for the New Generation Artificial Intelligence, China

· 4. A.I. must be designed for intelligent privacy — sophisticated protections that secure personal and group information in ways that earn trust.

...must be designed for intelligent privacy — sophisticated protections that secure personal and group information in ways that earn trust....

Published by Satya Nadella, CEO of Microsoft

· 1.4. Robustness, security and safety

...Robustness, security and safety...

Published by The Organisation for Economic Co-operation and Development (OECD)

· 1.4. Robustness, security and safety

...a) AI systems should be robust, secure and safe throughout their entire lifecycle so that, in conditions of normal use, foreseeable use or misuse, or other adverse conditions, they function appropriately and do not pose unreasonable safety risk....

Published by The Organisation for Economic Co-operation and Development (OECD)

· 1.4. Robustness, security and safety

...c) AI actors should, based on their roles, the context, and their ability to act, apply a systematic risk management approach to each phase of the AI system lifecycle on a continuous basis to address risks related to AI systems, including privacy, digital security, safety and bias....

Published by The Organisation for Economic Co-operation and Development (OECD)

4. Cooperative Orientation

...Today this includes publishing most of our AI research, but we expect that safety and security concerns will reduce our traditional publishing in the future, while increasing the importance of sharing safety, policy, and standards research....

Published by OpenAI

· a. Working to protect the privacy and security of individuals.

...Working to protect the privacy and security of individuals....

Published by Partnership on AI

· d. Ensuring that AI research and technology is robust, reliable, trustworthy, and operates within secure constraints.

...· d. Ensuring that AI research and technology is robust, reliable, trustworthy, and operates within secure constraints....

Published by Partnership on AI

11. Robustness and Security

...Robustness and security...

Published by Personal Data Protection Commission (PDPC), Singapore

11. Robustness and Security

...AI systems should be safe and secure, not vulnerable to tampering or compromising the data they are trained on....

Published by Personal Data Protection Commission (PDPC), Singapore

6. Security and privacy:

...security and privacy:...

Published by The Pontifical Academy for Life, Microsoft, IBM, FAO, the Italia Government

6. Security and privacy:

...AI systems must work securely and respect the privacy of users....

Published by The Pontifical Academy for Life, Microsoft, IBM, FAO, the Italia Government

b) Security

... b) security...

Published by Office of the President of the Russian Federation, Decree of the President of the Russian Federation on the Development of Artificial Intelligence in the Russian Federation

b) Security

...security: the impermissibility of the use of artificial intelligence for the purpose of intentionally inflicting harm on individuals and legal entities, as well as the prevention and minimization of the risks of negative consequences of the use of artificial intelligence technologies;...

Published by Office of the President of the Russian Federation, Decree of the President of the Russian Federation on the Development of Artificial Intelligence in the Russian Federation

· 1. THE MAIN PRIORITY OF THE DEVELOPMENT OF AI TECHNOLOGIES IS PROTECTING THE INTERESTS AND RIGHTS OF HUMAN BEINGS COLLECTIVELY AND AS INDIVIDUALS

...For critical applications of the AIS, in special cases, it is encouraged that a risk assessment be conducted through the involvement of a neutral third party or authorized official body when to do so would not harm the performance and information security of the AIS and would ensure the protection of the intellectual property and trade secrets of the developer....

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...Data security...

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...Information security....

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...AI Actors should provide the maximum possible protection against unauthorized interference in the work of the AI by third parties by introducing adequate information security technologies, including the use of internal mechanisms for protecting the AIS from unauthorized interventions and informing users and developers about such interventions....

Published by AI Alliance Russia

· 2. NEED FOR CONSCIOUS RESPONSIBILITY WHEN CREATING AND USING AI

...They must also inform users about the rules regarding information security when using the AIS....

Published by AI Alliance Russia

· 1. Foundation of the code action

...These include the National Strategy for the Development of Artificial Intelligence, the National security Strategy of the Russian Federation and the Concept for the Regulation of Artificial Intelligence and Robotics....

Published by AI Alliance Russia

· 1. THE KEY PRIORITY OF AI TECHNOLOGIES DEVELOPMENT IS PROTECTION OF THE INTERESTS AND RIGHTS OF HUMAN BEINGS AT LARGE AND EVERY PERSON IN PARTICULAR

...In special cases concerning critical applications of an AI system it is encouraged that risk assessment be conducted with the involvement of a neutral third party or authorized official body given that it does not harm the performance and information security of the AI system and ensures the protection of the intellectual property and trade secrets of the developer....

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...Data security....

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...AI Actors must comply with the national legislation in the field of personal data and secrets protected by law when using AI systems; ensure the security and protection of personal data processed by AI systems or by AI Actors in order to develop and improve the AI systems; develop and integrate innovative methods to counter unauthorized access to personal data by third parties and use high quality and representative datasets obtained without breaking the law from reliable sources....

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...Information security....

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...AI Actors should ensure the maximum possible protection from unauthorized interference of third parties in the operation of AI systems; integrate adequate information security technologies, i.a....

Published by AI Alliance Russia

· 2. RESPONSIBILITY MUST BE FULLY ACKNOWLEDGED WHEN CREATING AND USING AI

...use internal mechanisms designed to protect the AI system from unauthorized interventions and inform users and developers about such interventions; as well as promote the informing of users about the rules of information security during the use of AI systems....

Published by AI Alliance Russia

5. We uphold quality and safety standards

...We work closely with our customers and users to uphold and further improve our systems’ quality, safety, reliability, and security....

Published by SAP

7. We engage with the wider societal challenges of AI

... Normative questions around how AI should confront ethical dilemmas and what applications of AI, specifically with regards to security and safety, should be considered permissible....

Published by SAP

(Preamble)

...In order to meet the security challenges of artificial intelligence and guard the future of mankind in the intelligent age, the Shanghai Advisory Committee of Experts on Artificial Intelligence Industry security, on the basis of fully absorbing the consensus on artificial intelligence security at home and abroad, jointly launched the Shanghai Initiative for the security development of Artificial Intelligence and industry colleagues in the field of artificial intelligence security....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

(Preamble)

...In order to meet the security challenges of artificial intelligence and guard the future of mankind in the intelligent age, the Shanghai Advisory Committee of Experts on Artificial Intelligence Industry security, on the basis of fully absorbing the consensus on artificial intelligence security at home and abroad, jointly launched the Shanghai Initiative for the security development of Artificial Intelligence and industry colleagues in the field of artificial intelligence security....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

(Preamble)

...In order to meet the security challenges of artificial intelligence and guard the future of mankind in the intelligent age, the Shanghai Advisory Committee of Experts on Artificial Intelligence Industry security, on the basis of fully absorbing the consensus on artificial intelligence security at home and abroad, jointly launched the Shanghai Initiative for the security development of Artificial Intelligence and industry colleagues in the field of artificial intelligence security....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

(Preamble)

...In order to meet the security challenges of artificial intelligence and guard the future of mankind in the intelligent age, the Shanghai Advisory Committee of Experts on Artificial Intelligence Industry security, on the basis of fully absorbing the consensus on artificial intelligence security at home and abroad, jointly launched the Shanghai Initiative for the security development of Artificial Intelligence and industry colleagues in the field of artificial intelligence security....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

(Preamble)

...In order to meet the security challenges of artificial intelligence and guard the future of mankind in the intelligent age, the Shanghai Advisory Committee of Experts on Artificial Intelligence Industry security, on the basis of fully absorbing the consensus on artificial intelligence security at home and abroad, jointly launched the Shanghai Initiative for the security development of Artificial Intelligence and industry colleagues in the field of artificial intelligence security....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

1. Future oriented

...The developement of AI requires coordination between innovation and safety, so as to protect innovation with security, and to drive security with innovation....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

1. Future oriented

...The developement of AI requires coordination between innovation and safety, so as to protect innovation with security, and to drive security with innovation....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

1. Future oriented

...While ensuring the safety of artificial intelligence itself, we will actively apply artificial intelligence technology to solve the security problems of human society....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

4. Privacy Protection

...The development of artificial intelligence needs to ensure the user's data security, artificial intelligence development must not be at the expense of user privacy, need to strengthen data protection legislation, enrich the technical route of artificial intelligence, and constantly strengthen user privacy protection in artificial intelligence applications....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

6. Transparent regulation

...The development of artificial intelligence should avoid the security risks caused by the technology black box, and it is necessary to ensure the unity of target functions and technologies through the establishment of reviewable, traceable, reputable regulatory mechanisms....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

8. Open cooperation

...The development of artificial intelligence requires the concerted efforts of all countries and all parties, and we should actively establish norms and standards for the safe development of artificial intelligence at the international level, so as to avoid the security risks caused by incompatibility between technology and policies....

Published by Shanghai Advisory Committee of Experts on Artificial Intelligence Industry Security

3. Accountability

...AI system will be adequately protected and have security measures to prevent data breach and cyber attacks....

Published by Samsung

· 1) Robustness:

...We are dedicated to accentuating technical robustness and security throughout the research process, providing a secure and reliable system to improve the ability to prevent attack and conduct self repair....

Published by Youth Work Committee of Shanghai Computer Society

· 1) Robustness:

...We are dedicated to accentuating technical robustness and security throughout the research process, providing a secure and reliable system to improve the ability to prevent attack and conduct self repair....

Published by Youth Work Committee of Shanghai Computer Society

Security

... security...

Published by Smart Dubai

· AI systems will be safe, secure and controllable by humans

...· AI systems will be safe, secure and controllable by humans...

Published by Smart Dubai

· AI systems will be safe, secure and controllable by humans

...Safety and security of the people, be they operators, end users or other parties, will be of paramount concern in the design of any AI system...

Published by Smart Dubai

· AI systems will be safe, secure and controllable by humans

...AI systems should be verifiably secure and controllable throughout their operational lifetime, to the extent permitted by technology...

Published by Smart Dubai

· AI systems will be safe, secure and controllable by humans

...The continued security and privacy of users should be considered when decommissioning AI systems...

Published by Smart Dubai

· We will respect people’s privacy

...AI systems should uphold high standards of data governance and security, protecting personal information...

Published by Smart Dubai

3. Provision of Trusted Products and Services

...Sony understands the need for safety when dealing with products and services utilizing AI and will continue to respond to security risks such as unauthorized access....

Published by Sony Group

4. Privacy Protection

...Sony, in compliance with laws and regulations as well as applicable internal rules and policies, seeks to enhance the security and protection of customers' personal data acquired via products and services utilizing AI, and build an environment where said personal data is processed in ways that respect the intention and trust of customers....

Published by Sony Group

4. Understanding the need to protect privacy and national security, AI systems should be deployed in the most transparent manner possible;

...Understanding the need to protect privacy and national security, AI systems should be deployed in the most transparent manner possible;...

Published by The Treasury Board Secretariat of Canada (TBS)

4. Privacy and security by design

...Privacy and security by design...

Published by Telefónica

4. Privacy and security by design

...When building AI systems, as with other systems, we follow Telefónica’s security by Design approach....

Published by Telefónica

4. Privacy and security by design

...We apply, according to Telefónica’s privacy policy, in all of the processing cycle phases, the technical and organizational measures required to guarantee a level of security adequate to the risk to which the personal information may be exposed and, in any case, in accordance with the security measures established in the law in force in each of the countries and or regions in which we operate....

Published by Telefónica

4. Privacy and security by design

...We apply, according to Telefónica’s privacy policy, in all of the processing cycle phases, the technical and organizational measures required to guarantee a level of security adequate to the risk to which the personal information may be exposed and, in any case, in accordance with the security measures established in the law in force in each of the countries and or regions in which we operate....

Published by Telefónica

6. Safe and secure

...Safe and secure...

Published by Telia Company AB

· Digital security, physical security, and political security

...· Digital security, physical security, and political security...

Published by Tencent Research Institute

· Digital security, physical security, and political security

...· Digital security, physical security, and political security...

Published by Tencent Research Institute

· Digital security, physical security, and political security

...· Digital security, physical security, and political security...

Published by Tencent Research Institute

5. Assessment and Accountability Obligation.

...If an assessment reveals substantial risks, such as those suggested by principles concerning Public Safety and cybersecurity, then the project should not move forward....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

9. Cybersecurity Obligation.

...cybersecurity Obligation....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

9. Cybersecurity Obligation.

...Institutions must secure AI systems against cybersecurity threats....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

9. Cybersecurity Obligation.

...Institutions must secure AI systems against cybersecurity threats....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

9. Cybersecurity Obligation.

...The cybersecurity Obligation follows from the Public Safety Obligation and underscores the risk that even well designed systems may be the target of hostile actors....

Published by The Public Voice coalition, established by Electronic Privacy Information Center (EPIC)

Safety & security

... Safety & security...

Published by Tieto

Second, the principle of security.

... Second, the principle of security....

Published by Center for International Strategy and Security, Tsinghua University (Tsinghua CISS)

Second, the principle of security.

...AI systems must be secure, applicable and controllable....

Published by Center for International Strategy and Security, Tsinghua University (Tsinghua CISS)

Third principle: Understanding

...What our systems do, how we intend to use them, and our processes for ensuring beneficial outcomes result from their use should be as transparent as possible, within the necessary constraints of the national security context....

Published by The Ministry of Defence (MOD), United Kingdom

Fifth principle: Reliability

...AI enabled systems must be demonstrably reliable, robust and secure....

Published by The Ministry of Defence (MOD), United Kingdom

Fifth principle: Reliability

...Given Defence’s unique operational context and the challenges of the information environment, this principle also requires AI enabled systems to be secure, and a robust approach to cybersecurity, data protection and privacy....

Published by The Ministry of Defence (MOD), United Kingdom

Fifth principle: Reliability

...Given Defence’s unique operational context and the challenges of the information environment, this principle also requires AI enabled systems to be secure, and a robust approach to cybersecurity, data protection and privacy....

Published by The Ministry of Defence (MOD), United Kingdom

· Safety and security

...· Safety and security...

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Safety and security

...Unwanted harms (safety risks), as well as vulnerabilities to attack (security risks) should be avoided and should be addressed, prevented and eliminated throughout the life cycle of AI systems to ensure human, environmental and ecosystem safety and security....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Safety and security

...Unwanted harms (safety risks), as well as vulnerabilities to attack (security risks) should be avoided and should be addressed, prevented and eliminated throughout the life cycle of AI systems to ensure human, environmental and ecosystem safety and security....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Safety and security

...Safe and secure AI will be enabled by the development of sustainable, privacy protective data access frameworks that foster better training and validation of AI models utilizing quality data....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

· Transparency and explainability

...While efforts need to be made to increase transparency and explainability of AI systems, including those with extra territorial impact, throughout their life cycle to support democratic governance, the level of transparency and explainability should always be appropriate to the context and impact, as there may be a need to balance between transparency and explainability and other principles such as privacy, safety and security....

Published by The United Nations Educational, Scientific and Cultural Organization (UNESCO)

7. Secure a Just Transition and Ensuring Support for Fundamental Freedoms and Rights

...secure a Just Transition and Ensuring Support for Fundamental Freedoms and Rights...

Published by UNI Global Union

7. Secure a Just Transition and Ensuring Support for Fundamental Freedoms and Rights

...AI systems coupled with the wider transition to the digital economy will require that workers on all levels and in all occupations have access to social security and to continuous lifelong learning to remain employable....

Published by UNI Global Union

5. Ensure safety for children

...Require testing of AI systems for safety, security and robustness....

Published by United Nations Children's Fund (UNICEF) and the Ministry of

(a) The United States must drive technological breakthroughs in AI across the Federal Government, industry, and academia in order to promote scientific discovery, economic competitiveness, and national security.

... (a) The United States must drive technological breakthroughs in AI across the Federal Government, industry, and academia in order to promote scientific discovery, economic competitiveness, and national security....

Published by The White House, United States

4. Reliable

...The department's AI capabilities will have explicit, well defined uses, and the safety, security and effectiveness of such capabilities will be subject to testing and assurance within those defined uses across their entire life cycles....

Published by Department of Defense (DoD), United States

Transparent and Accountable.

...We will provide appropriate transparency to the public and our customers regarding our AI methods, applications, and uses within the bounds of security, technology, and releasability by law and policy, and consistent with the Principles of Intelligence Transparency for the IC....

Published by Intelligence Community (IC), United States

Human Centered Development and Use.

...We will develop and use AI to augment our national security and enhance our trusted partnerships by tempering technological guidance with the application of human judgment, especially when an action has the potential to deprive individuals of constitutional rights or interfere with their free exercise of civil liberties....

Published by Intelligence Community (IC), United States

Secure and Resilient.

... secure and Resilient....

Published by Intelligence Community (IC), United States

Secure and Resilient.

...We will develop and employ best practices for maximizing reliability, security, and accuracy of AI design, development, and use....

Published by Intelligence Community (IC), United States

Secure and Resilient.

...We will employ security best practices to build resilience and minimize potential for adversarial influence....

Published by Intelligence Community (IC), United States

1. Public Trust in AI

...AI is expected to have a positive impact across sectors of social and economic life, including employment, transportation, education, finance, healthcare, personal security, and manufacturing....

Published by The White House Office of Science and Technology Policy (OSTP), United States

2. Public Participation

...Agencies should provide ample opportunities for the public to national standard for a specific aspect related to AI is not essential, however, agencies should provide information and participate in all stages of the rulemaking process, to the extent feasible and consistent with legal requirements (including legal constraints on participation in certain situations, for example, national security preventing imminent threat to or responding to emergencies)....

Published by The White House Office of Science and Technology Policy (OSTP), United States

9. Safety and Security

...Safety and security...

Published by The White House Office of Science and Technology Policy (OSTP), United States

9. Safety and Security

...Agencies should promote the development of AI systems that are safe, secure, and operate as intended, and encourage the consideration of safety and security issues throughout the AI design, development, deployment, and operation process....

Published by The White House Office of Science and Technology Policy (OSTP), United States

9. Safety and Security

...Agencies should promote the development of AI systems that are safe, secure, and operate as intended, and encourage the consideration of safety and security issues throughout the AI design, development, deployment, and operation process....

Published by The White House Office of Science and Technology Policy (OSTP), United States

9. Safety and Security

...Agencies should give additional consideration to methods for guaranteeing systemic resilience, and for preventing bad actors from exploiting AI system weaknesses, including cybersecurity risks posed by AI operation, and adversarial use of AI against a regulated entity’s AI technology....

Published by The White House Office of Science and Technology Policy (OSTP), United States

9. Safety and Security

...When evaluating or introducing AI policies, agencies should be mindful of any potential safety and security risks, as well as the risk of possible malicious deployment and use of AI applications....

Published by The White House Office of Science and Technology Policy (OSTP), United States

Preservation of Privacy and Security

... Preservation of Privacy and security...

Published by Vodafone Group

Preservation of Privacy and Security

...We endeavour to respect the privacy and protect the security of all individuals served by the AI we develop....

Published by Vodafone Group