Building AI That Respects Our Privacy

I built a crude AI system that aggregated my Fitbit data and healthcare records with my financial information, email, and more.
I also started to grasp how powerful having my data in one place could be when, unbeknownst to me, the app had a conversation with my then girlfriend.
While this experience helped me see the light, it also highlighted the dark places we could find ourselves if we don't have control over our own data.
Four years later, we're having heated debates about the role AI should play in our lives and what we need to do to control the negative ramifications of it.
How to Integrate Privacy Into AI Like most things, there is no black and white approach to the ethical application of AI. So as the world grapples with its impact and we wait for legislation to protect us, we innovators have a responsibility - and I'd argue an opportunity - to start implementing privacy best practices, or standards that we need to protect and uphold basic human rights.
This one step alone could help us start to envision an AI-centric world that works to our advantage, while limiting its negative impact.
Model per user: Let's shift from a big aggregate model to an isolated model trained on individual user data sets.
By having individual data influence models, we make them private.
Closed systems: Take this a step further by shifting AI models to closed systems, like laptops, where data is trained on a device close to each person versus being held somewhere else.
Transparency and tracking across models: Adding transparency on data sets can be used to train models.
By watermarking data, videos, and images, we can understand originating sources and build AI models that access or ignore certain data.
Data removal rights: Tracking can give us the chance to integrate data removal rights.
If individuals opt out of having personal information shared, the AI model can adjust accordingly.
What We Can Do Today However, until these are in place, we need to discover ways to work with the current system.
Be aware: Understand how AI platforms collect, store, and use the data you share.
Read privacy policies, pay attention to notifications, do a quick Google search, and do your due diligence.
Limit sharing: Avoid providing any information to an AI platform that is not absolutely necessary.
Do not ask questions or provide responses that contain any personal data.
Understand limitations: While we've done a great job of teaching AI how to interact with us, we still need to remember that assigning human characteristics to machine learning doesn't work past surface use.
So let's take up the challenge with a moral compass and consumer-forward approach that can help artificial intelligence work harder for us, faster - while maintaining our fundamental right to privacy.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 18 Jan 2024 15:05:07 +0000


Cyber News related to Building AI That Respects Our Privacy

Privacy Education for Students: A Vital Curriculum Component - Recognizing privacy as a fundamental right, educators are increasingly acknowledging the importance of integrating privacy education into the curriculum. This article explores the significance of privacy education for students and its role as a vital ...
1 year ago Securityzap.com
Privacy Isn't Dead. Far From It. - EFF is one of dozens, if not hundreds, of organizations that work to protect privacy. Millions of people read EFF's website each year, and tens of millions use the tools we've made, like Privacy Badger. Privacy is one of EFF's biggest concerns, and ...
1 year ago Eff.org
Holistic Approach To Privacy and Security in Tech - In this article, I would like to explain how I tackle privacy and security issues that are specific for large scale web and mobile applications and Big Tech. First, let's outline some of the biggest challenges Big Tech companies deal with in terms of ...
1 year ago Feeds.dzone.com
Building a Privacy-Centric Organization with FireMon - As organizations increasingly rely on technology to streamline operations and connect with customers, the need for robust privacy measures has become more critical than ever. Here at FireMon, we play a pivotal role in building a privacy-centric ...
1 year ago Securityboulevard.com
Enhancing Home Privacy with Technology: Your Digital Shield - In an ever-evolving world, technology has become increasingly integral to home privacy. Smart lock systems, video doorbells, motion sensors, security cameras, and automated privacy settings are some of the popular home privacy tech options available. ...
1 year ago Securityzap.com Meow
Protecting Student Privacy Online - In the rapidly evolving world of online education, the protection of student privacy has emerged as a critical concern. This article delves into the privacy risks associated with online education and highlights the significance of complying with ...
1 year ago Securityzap.com
Cisco's Commitment to Human Rights: A Tribute to the 75th Anniversary of the Universal Declaration of Human Rights - December 10 marks the 75th anniversary of the United Nations' adoption of the Universal Declaration of Human Rights, a landmark document that for the first time recognized human rights and freedoms are inherent to all individuals, regardless of ...
1 year ago Feedpress.me Inception
Business Data Privacy Laws: Compliance and Beyond - Governments worldwide have implemented strict data privacy laws to protect individuals' information in the face of increasing cyber threats and data breaches. Let's dive into the world of business data privacy laws as we navigate the complexities of ...
1 year ago Securityzap.com
Thought GDPR Compliance Was Hard? Buckle Up - COMMENTARY. Five years since the European Union's General Data Protection Regulation took effect, its fingerprints are everywhere: from proliferating privacy laws worldwide to the now-ubiquitous consent banners seen across websites of every kind. For ...
1 year ago Darkreading.com Patchwork
What CISOs Need to Know About Data Privacy in 2024 - While consumers continue to demand stronger personal data protections, companies are scrambling to keep track of an ever-evolving patchwork of applicable laws and regulations. In this environment, cybersecurity professionals need to understand the ...
1 year ago Cybersecurity-insiders.com Patchwork
Privacy Badger Puts You in Control of Widgets - The latest version of Privacy Badger replaces embedded tweets with click-to-activate placeholders. This is part of Privacy Badger's widget replacement feature, where certain potentially useful widgets are blocked and then replaced with placeholders. ...
1 year ago Eff.org
Transcend enhances its privacy platform to address current and future compliance challenges - Transcend announced an expansion of its product suite-going even further to help the world's best brands manage complex privacy compliance challenges. Powering privacy for Fortune 100 companies, the global 2000s, and high-growth start-ups, Transcend ...
1 year ago Helpnetsecurity.com
My Yearly Look Back, a Look Forward and a Warning - 2023 saw cybersecurity and privacy law arrive at a crossroads, especially with regard to the regulatory landscape. This is the time of year when it is traditional to look back at the past year and extrapolate forward to make predictions for the year ...
1 year ago Securityboulevard.com
Enabling Threat-Informed Cybersecurity: Evolving CISA's Approach to Cyber Threat Information Sharing - One of CISA's most important and enduring roles is providing timely and actionable cybersecurity information to our partners across the country. Nearly a decade ago, CISA stood up our Automated Indicator Sharing, or AIS, program to widely exchange ...
1 year ago Cisa.gov
Telus Makes History with ISO Privacy Certification in AI Era - Telus, a prominent telecoms provider, has accomplished a significant milestone by obtaining the prestigious ISO Privacy by Design certification. This certification represents a critical turning point in the business's dedication to prioritizing ...
1 year ago Cysecurity.news
The CISO’s Guide to Data Privacy Regulations - GDPR, CCPA - CISOs must work across teams to align security controls with regulatory requirements, foster a culture of privacy, and prepare for the next wave of data protection laws. For CISOs, this means mapping data flows across borders, understanding the ...
1 month ago Cybersecuritynews.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com
Navigating the Digital Frontier: Insights from Leading Experts on Data Privacy Day - The roots of Data Privacy Day can be traced back to the European Data Protection Day, marking the historic signing of Convention 108 on January 28, 1981 - the first-ever international treaty addressing privacy and data protection. Fast forward to ...
1 year ago Cybersecurity-insiders.com